WorldWideScience

Sample records for stability enhancing security

  1. Enhancing Security and Stability in Afghanistan

    2015-12-01

    Helmand and Kandahar, were as expected, but the ANDSF were also forced to confront insecurity at a higher level than expected in other parts of the...creating a sense of insecurity that undercuts perceptions of the Afghan government’s ability to provide security. The increase in violence over the...able to defeat the ANDSF on the battlefield in 2016, countering insurgent propaganda will remain a challenge as the insurgents advertise the perceived

  2. FINANCIAL STABILITY AS A FACTOR ECONOMIC SECURITY

    A. V. Endovitskaya

    2015-01-01

    Full Text Available Summary. The article examines the linkages between financial stability and the level of its economic security. Considered the content of financial stability, represented by its own definition, we studied the basic conditions to achieve it. The logic diagram showing the location of financial stability and financial security to ensure the economic security of the business entity. A system of internal and external factors affecting the financial stability and endanger financial stability and financial security company. It has been established that it is the internal factors such as the availability of financial resources and financial position, capital structure, the company's ability to generate profits determine the level of economic security and its ability to withstand the negative impact of external and internal threats. The necessity of improving the financial sustainability in order to improve the economic security of the enterprise. On the basis of the research proposed matrix of risks affecting the financial stability and economic security, which allows to determine the probability of their occurrence and impact. It presents the economic, social, human, financial, organizational, economic, innovative and productive tools to increase the stability and financial security of an economic entity. List considered standard measures will make a plan of action to minimize the adverse impacts and enhance financial stability and security. Therefore, a prerequisite for the economic security of the enterprise is the attainment of financial stability.

  3. Measuring Stability and Security in Iraq

    2006-01-01

    .... The first section of the report, Stability and Security in Iraq, describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable...

  4. Measuring Stability and Security in Iraq

    2005-01-01

    .... The initial section of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, economic progress, and achieving a stable security environment in Iraq...

  5. Measuring Stability and Security in Iraq

    2006-01-01

    ... of the report, "Stability and Security in Iraq," describes trends and progress towards meeting goals for political stability, strengthening economic activity, and achieving a stable security environment in Iraq...

  6. Enhancing implementation security of QKD

    Tamaki, Kiyoshi

    2017-10-01

    Quantum key distribution (QKD) can achieve information-theoretic security, which is a provable security against any eavesdropping, given that all the devices the sender and the receiver employ operate exactly as the theory of security requires. Unfortunately, however, it is difficult for practical devices to meet all such requirements, and therefore more works have to be done toward guaranteeing information-theoretic security in practice, i.e., implementation security. In this paper, we review our recent efforts to enhance implementation security. We also have a brief look at a flaw in security proofs and present how to fix it.

  7. Security assurances and regional stability

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  8. Noise Enhanced Stability

    Spagnolo, B.; Agudov, N.V.; Dubkov, A.A.

    2004-01-01

    The noise can stabilize a fluctuating or a periodically driven metastable state in such a way that the system remains in this state for a longer time than in the absence of white noise. This is the noise enhanced stability phenomenon, observed experimentally and numerically in different physical systems. After shortly reviewing all the physical systems where the phenomenon was observed, the theoretical approaches used to explain the effect are presented. Specifically the conditions to observe the effect in systems: (a) with periodical driving force, and (b) with random dichotomous driving force, are discussed. In case (b) we review the analytical results concerning the mean first passage time and the nonlinear relaxation time as a function of the white noise intensity, the parameters of the potential barrier, and of the dichotomous noise. (author)

  9. Enhancing QR Code Security

    Zhang, Linfan; Zheng, Shuang

    2015-01-01

    Quick Response code opens possibility to convey data in a unique way yet insufficient prevention and protection might lead into QR code being exploited on behalf of attackers. This thesis starts by presenting a general introduction of background and stating two problems regarding QR code security, which followed by a comprehensive research on both QR code itself and related issues. From the research a solution taking advantages of cloud and cryptography together with an implementation come af...

  10. Analyzing Security-Enhanced Linux Policy Specifications

    Archer, Myla

    2003-01-01

    NSA's Security-Enhanced (SE) Linux enhances Linux by providing a specification language for security policies and a Flask-like architecture with a security server for enforcing policies defined in the language...

  11. Measuring Stability and Security in Iraq

    2007-01-01

    This report to Congress, Measuring Stability and Security in Iraq, is submitted pursuant to Section 9010 of the Department of Defense Appropriations Act 2007, Public Law 109-289 as amended by Section...

  12. Measuring Stability and Security in Iraq

    2008-01-01

    ... 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181.1 The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  13. Measuring Stability and Security in Iraq

    2007-01-01

    ... 1308 of Public Law 110-28. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  14. Stability, Security, Transition and Reconstruction Operations Conference

    2010-12-16

    integration and measureable outcome of security, stability and prosperity. Introduction 4 • Background • Nature of Non-permissive environments...stage, And all the men and women merely players – William Shakespeare • Sharing the Experience • Reinventing the wheel 11 Conclusion – The

  15. Measuring Stability and Security in Iraq

    2008-01-01

    ... by Section 1308 of Public Law 110-28 and Section 1224 of Public Law 110-181. The report includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in that legislation...

  16. Development and analysis of security policies in security enhanced Android

    Rimando, Ryan A.

    2012-01-01

    Approved for public release; distribution is unlimited. This thesis examines Security Enhanced Android. Both its policy and its additional security features are explored. The policy is examined in depth, providing a better understanding of the security provided by SE Android. We analyze the default SE Android policy. We identify a potential weakness and change the policy to facilitate control over communication channels. A proof-of-concept set of applications is developed to demonstrate ho...

  17. Safety, Security, and Stability: The Role of Nuclear Control Regimes in a Proliferated World

    Collins, James

    1995-01-01

    ... with developing and deploying nuclear weapons. The US, in the past, has refused to provide technical assistance to enhance the safety, security, and stability of proliferating countries' nuclear arsenals-we believe this policy...

  18. CAR SECURITY ENHANCEMENT IN PARKING AREAS

    NANYONGA BERINDA; AYESIGA LINDSEY PATRA; BYEKWASO FAISAL; NATULINDA LADAN

    2017-01-01

    Over time, car thefts have been reported within Kampala parking areas. This has been majorly due to inefficient security measures of the available parking systems which focus mainly on the car and not the driver, making parking management a challenge. The focus of this survey was to explore the requirements of a new system called Car to Driver Matching Security System to enhance security of cars in Kampala, in particular, from the experience of 15 people. The data collected was then analyzed ...

  19. Enhanced security in the nuclear industry

    Frappier, G.

    2007-01-01

    This article describes the security in the nuclear industry. After 9/11, Canada's nuclear regulator - the Canadian Nuclear Safety Commission (CNSC) - determined that the entire industry (including its own organization) faced a need for significant enhancements in their approach to security.

  20. Strategy to Enhance International Supply Chain Security

    2007-01-01

    .... at 1901, 1903, October 13, 2006) which require the development of a strategic plan to enhance the security of the international supply chain, including protocols for the expeditious resumption of the flow of trade following...

  1. Civil-military relations : enhancing international security

    Fekete, Florian

    2003-01-01

    Approved for public release; distribution is unlimited The thesis describes how civil-military relations at the international level enhance international security, in particular, the way of development of international society in trying to orient its progress towards international peace, security and sustainable development. It focuses upon civil-military relationships in the League of Nations and the United Nations, the North Atlantic Treaty Organization, The International Committee of Re...

  2. An Enhanced Vigenere Cipher For Data Security

    Aized Amin Soofi

    2015-08-01

    Full Text Available In todays world the amount of data that is exchanged has increased in the last few years so securing the information has become a crucial task. Cryptography is an art of converting plain text message into unreadable message. Encryption algorithms play an important role in information security systems. Encryption is considered as one of the most powerful tool for secure transmission of data over the communication network. Vigenere technique is an example of polyalphabetic stream cipher it has various limitations such as Kasiski and Friedman attack to find the length of encryption key. In this paper an enhanced version of traditional vigenere cipher has been proposed that eliminates the chances of Kaisiski and Friedman attack. Proposed technique also provides better security against cryptanalysis and pattern prediction.

  3. 75 FR 37971 - Providing Stability and Security for Medicare Reimbursements

    2010-06-30

    ... Part IV The President Memorandum of June 25, 2010--Providing Stability and Security for Medicare Reimbursements #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 75, No. 125 / Wednesday...

  4. DefenseLink: Securing Afganistan, Stabilization & Growth

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  5. Security and Political Stability in the Mediterranean

    Antonio Marquina

    1997-09-01

    Full Text Available The author revises with a critical eye the treatment given the issue of security during the Euro-Mediterranean process from the Declaration of Barcelona to the Conference at Malta. According to Marquina, no idea of security exists which gives backbone to theEuro-Mediterranen process and the documents themselves contain incoherencies and significant imprecisions, especially regarding the concepts of cooperative security, preventative diplomacy and ‘good neighbor’ relations. These principles appear to be rather underexplained in both their conceptual and operative aspects. On one hand, the information about matters that affect security is exchanged on both a voluntary and official basis and can be, as such, thus opaque and not always reliable; on the other hand, the issues thataffect security are so wide-ranging that the operative approach - the communications network, mechanisms for early-warning, the conciliation and peaceful resolution of controversies - seems hardly realistic. With respect to confidence-building measures, the author considers that these should be linked to arms control agreements, which are more in accord with the stated objectives of defense sufficiency and the non-proliferation of weapons of mass destruction. Marquina also maintains that the role of civil society and the importance of cultural dialogue - both fundamental to conflict prevention - have not been reinforced even though the principal problems of security in the region are due to structural imbalances –military, economical, political– and, precisely the disparities amongcultures. In this sense, the EU states might consider putting forward unilateral policies that restrict such disparities, provided that a certain reciprocity of policy is put forth from the southern states in the Mediterranean.

  6. Modeling Security-Enhanced Linux Policy Specifications for Analysis (Preprint)

    Archer, Myla; Leonard, Elizabeth; Pradella, Matteo

    2003-01-01

    Security-Enhanced (SE) Linux is a modification of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server...

  7. Enhancement of Email Security in Nuclear Malaysia

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  8. Enhancing Security and Stability in Afghanistan

    2016-06-01

    accept Afghan constitutional safeguards for women and ethnic minorities. As the Afghan government works toward this end, developing ANDSF...the 2001 Authorization for the Use of Military Force and the President’s constitutional authority as the Commander in Chief as its domestic legal...Czech Republic 288 Slovakia 83 Denmark 82 Slovenia 0 Estonia 5 Spain 25 Finland 22 Sweden 26 Georgia 867 FYR of Macedonia 39 Germany 884 Turkey 743

  9. Security and Stability in Africa: A Development Approach

    2010-01-01

    Dar el Salaam in 1998, and against Israeli interests in Kenya in 2002. Wars, lawlessness, and corruption have also fostered international crime on...operations are an important way for military forces to foster stability and security through economic and political development. These operations show...security and exports of unwisely breaking up large commercial farms. Within families, such dualism also exists, which is a legacy of colonial policies

  10. Security Analysis and the Contribution of UPFC for Improving Voltage Stability

    Asma Meddeb

    2018-02-01

    Full Text Available The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis is important tasks in modern energy management systems. This paper proposes an approach based on the Newton Raphson power flow method for power system security analysis. Firstly, the contingencies will be specified to assess their impact on the transient stability. Secondly, the selected contingencies will be classified in the order of severity. In addition, the integration of the Unified Power Flow Controller (UPFC to enhance the transient stability of the power system is considered. The proposed method is implemented on the IEEE-14 bus system. We performed this case study using the well-known software EUROSTAG.

  11. Enhancing regional security agreements through cooperative monitoring

    Pregenzer, A.L.

    1995-05-01

    This paper proposes that strengthening regional capabilities for formulating and implementing arms control and confidence-building measures is a tangible method of enhancing regional security. It discusses the importance of developing a regional infrastructure for arms control and confidence building and elucidates the role of technology in facilitating regional arms control and confidence-building agreements. In addition, it identifies numerous applications for regional cooperative monitoring in the areas of arms control, resource management, international commerce and disaster response. The Cooperative Monitoring Center at Sandia National Laboratories, whose aim is to help individual countries and regions acquire the tools they need to develop their own solutions to regional problems, is discussed briefly. The paper ends with recommendations for establishing regional cooperative monitoring centers

  12. The Stability and the Security of the Tangle

    Bramas , Quentin

    2018-01-01

    In this paper we study the stability and the security of the Tangle, which is the distributed data structure at the base of the IOTA protocol. The contribution of this paper is twofold. Firstly we present simple model to analyze the Tangle and give the first formal analyzes of the average number of unconfirmed transactions and the average confirmation time of a transaction. Secondly we define the notion of assiduous honest majority that captures the fact that the honest nodes have more hashin...

  13. Enhancing Parliamentary Oversight for Effective Security Sector ...

    2015-06-09

    Jun 9, 2015 ... transition from violent conflict or prolonged authoritarian rule. .... State whose primary interest was to secure his regime and prevent ... June 12, 1993 presidential elections triggered the emergence of violent non-state security.

  14. Enhancing Food Security through Information and Communication ...

    ... national food security, and prior approval of the government's National Food Security and Nutrition Policy 2006-2015. In alignment with these governmental commitments, this project will enable researchers to provide policymakers with practical and sustainable solutions that directly respond to national food security goals ...

  15. Security-Enhanced Autonomous Network Management

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  16. Enhanced stabilization of collagen by furfural.

    Lakra, Rachita; Kiran, Manikantan Syamala; Usha, Ramamoorthy; Mohan, Ranganathan; Sundaresan, Raja; Korrapati, Purna Sai

    2014-04-01

    Furfural (2-furancarboxaldehyde), a product derived from plant pentosans, has been investigated for its interaction with collagen. Introduction of furfural during fibril formation enhanced the thermal and mechanical stability of collagen. Collagen films treated with furfural exhibited higher denaturation temperature (Td) (pFurfural and furfural treated collagen films did not have any cytotoxic effect. Rheological characterization showed an increase in shear stress and shear viscosity with increasing shear rate for treated collagen. Circular dichroism (CD) studies indicated that the furfural did not have any impact on triple helical structure of collagen. Scanning electron microscopy (SEM) of furfural treated collagen exhibited small sized porous structure in comparison with untreated collagen. Thus this study provides an alternate ecologically safe crosslinking agent for improving the stability of collagen for biomedical and industrial applications. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. 2007 Stability, Security, Transition and Reconstruction Operations Conference

    2007-11-28

    narcotics Foster sustainable economy U.S.PRT tasks Jalalabad June 2007 Who can respond to which challeges ? 2. Battlespace or Humanitarian Space...Education Integrated Interagency Stabilization and Reconstruction Training Plug and Play System Lessons Learned from the Field USAID NGOs World Bank ...World Bank , IMF? Expanding the Focus… At the US and NATO Strategic/Operational Level Enhanced/new structures and procedures to improve: Interaction

  18. Haiti’s Army, Stabilization and Security Sector Governance

    Geoff Burt

    2016-09-01

    Full Text Available Haiti’s long and difficult security sector reform (SSR process has entered a new phase. The reinstatement of the Haitian armed forces, nearly 20 years after former President Jean-Bertrand Aristide disbanded them, adds a new set of actors and more complexity to a process already struggling to deliver results amidst a seemingly endless series of political crises. The armed forces must be an impartial and apolitical institution if they are to contribute to stability in Haiti – an uncertain proposition given their past inability to stay out of the political arena. Building on a summary of the latest developments in the reinstatement process, this paper discusses its implications for Haiti’s prolonged international engagement. In particular, the paper focuses on the process to develop a new White Paper on Defence and National Security in Haiti. This process has the potential to contribute to two of the most significant shortcomings of SSR in Haiti, a limited focus on security sector governance and a lack of local ownership. The reinstatement process has been an interesting test case of the international donor community’s commitment to the concept of local ownership, long held to be a moral and practical pillar of international engagement. Though reinstatement has been driven by Haitian authorities, the process has struggled to make progress without donor support, raising questions about the appropriate role of international actors in strategic decision-making at the national level. Regardless of their initial reaction to reinstatement, Haiti’s international donors risk missing an opportunity to influence the development of an important pillar of Haiti’s post-MINUSTAH security sector by choosing to remain on the sidelines.

  19. Communications and Integration Enhancements to Improve Homeland Security

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  20. Superamphiphobic cotton fabrics with enhanced stability

    Xu, Bi, E-mail: xubi@dhu.edu.cn [National Engineering Research Center for Dyeing and Finishing of Textiles, Donghua University, Shanghai 201620 (China); Key Laboratory of Science & Technology of Eco-Textile, Ministry of Education, Donghua University, Shanghai 201620 (China); College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China); Ding, Yinyan; Qu, Shaobo [College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China); Cai, Zaisheng, E-mail: zshcai@dhu.edu [College of Chemistry, Chemical Engineering and Biotechnology, Donghua University, Shanghai 201620 (China)

    2015-11-30

    Highlights: • Superamphiphobic cotton fabrics were prepared. • Water and hexadecane contact angels reach to 164.4° and 156.3°, respectively. • Nanoporous organically modified silica alcogel particles were synthesized. • The superamphiphobic cotton fabrics exhibit enhanced stability against abrasion, laundering and acid. - Abstract: Superamphiphobic cotton fabrics were prepared by alternately depositing organically modified silica alcogel (ormosil) particles onto chitosan precoated cotton fabrics and subsequent 1H, 1H, 2H, 2H-perfluorooctyltrimethoxysilane (PFOTMS) modification. Transmission electron microscopy and scanning electron microscopy images reveal that the ormosil particles display a fluffy, sponge-like nanoporous structure, and the entire cotton fiber surface is covered with highly porous networks. PFOTMS acts as not only a modifier to lower the surface energy of the cotton fabric but also a binder to enhance the coating stability against abrasion and washing. The treated cotton fabrics show highly liquid repellency with the water, cooking oil and hexadecane contact angels reaching to 164.4°, 160.1° and 156.3°, respectively. Meanwhile, the treated cotton fabrics exhibit good abrasion resistance and high laundering durability, which can withstand 10,000 cycles of abrasion and 30 cycles of machine wash without apparently changing the superamphiphobicity. The superamphiphobic cotton fabric also shows high acid stability, and can withstand 98% H{sub 2}SO{sub 4}. Moreover, the superamphiphobic coating has almost no influence on the other physical properties of the cotton fabrics including tensile strength, whiteness and air permeability. This durable non-wetting surface may provide a wide range of new applications in the future.

  1. Enhancing Parliamentary Oversight for Effective Security Sector ...

    The provision of the most essential public good – security in accordance with the will of the people is very germane to the consolidation of democratic governance. Though, the Nigerian state is set to inaugurate her 8th National Assembly on 9th June, 2015, the capacity of the nation's parliamentary body (National Assembly) ...

  2. Entanglement enhances security in quantum communication

    Demkowicz-Dobrzanski, Rafal; Sen, Aditi; Sen, Ujjwal; Lewenstein, Maciej

    2009-01-01

    Secret sharing is a protocol in which a 'boss' wants to send a classical message secretly to two 'subordinates', such that none of the subordinates is able to know the message alone, while they can find it if they cooperate. Quantum mechanics is known to allow for such a possibility. We analyze tolerable quantum bit error rates in such secret sharing protocols in the physically relevant case when the eavesdropping is local with respect to the two channels of information transfer from the boss to the two subordinates. We find that using entangled encoding states is advantageous to legitimate users of the protocol. We therefore find that entanglement is useful for secure quantum communication. We also find that bound entangled states with positive partial transpose are not useful as a local eavesdropping resource. Moreover, we provide a criterion for security in secret sharing--a parallel of the Csiszar-Koerner criterion in single-receiver classical cryptography.

  3. Enhancing Global Health Security: US Africa Command's Disaster Preparedness Program.

    Morton Hamer, Melinda J; Reed, Paul L; Greulich, Jane D; Beadling, Charles W

    2018-03-07

    US Africa Command's Disaster Preparedness Program (DPP), implemented by the Center for Disaster and Humanitarian Assistance Medicine, partnered with US Government agencies and international organizations to promote stability and security on the African continent by engaging with African Partner Nations' (PN) civil and military authorities to improve disaster management capabilities. From 2008 to 2015, DPP conducted disaster preparedness and response programming with 17 PNs. DPP held a series of engagements with each, including workshops, strategic planning, developing preparedness and response plans, tabletop exercises, and prioritizing disaster management capability gaps identified through the engagements. DPP partners collected data for each PN to further capacity building efforts. Thus far, 9 countries have completed military pandemic plans, 10 have developed national pandemic influenza plans, 9 have developed military support to civil authorities plans, and 11 have developed disaster management strategic work plans. There have been 20 national exercises conducted since 2009. DPP was cited as key in implementation of Ebola response plans in PNs, facilitated development of disaster management agencies in DPP PNs, and trained nearly 800 individuals. DPP enhanced PNs' ability to prepare and respond to crises, fostering relationships between international agencies, and improving civil-military coordination through both national and regional capacity building. (Disaster Med Public Health Preparedness. 2018;page 1 of 11).

  4. Laboratory research irradiators with enhanced security features

    Srivastava, Piyush

    2016-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There is a number of such equipment in use at different institutions and are found to be very useful. (author)

  5. Laboratory research irradiators with enhanced security features

    Srivastava, Piyush

    2014-01-01

    Over the years BRIT has developed state of art technology for laboratory research irradiators which are suited most for carrying out research and development works in the fields of radiation processing. These equipment which house radioactive sources up to 14 kCi are having a number of features to meet users requirements. They are manufactured as per the national and International standards of safety codes. The paper deals with design, development and application aspects of laboratory research irradiator called Gamma Chamber and also the new security features planned for incorporation in the equipment. Equipment are being regularly manufactured, supplied and installed by BRIT in India and Abroad. There are a number of such equipment in use at different institutions and are found to be very useful. (author)

  6. Using digital watermarking to enhance security in wireless medical image transmission.

    Giakoumaki, Aggeliki; Perakis, Konstantinos; Banitsas, Konstantinos; Giokas, Konstantinos; Tachakra, Sapal; Koutsouris, Dimitris

    2010-04-01

    During the last few years, wireless networks have been increasingly used both inside hospitals and in patients' homes to transmit medical information. In general, wireless networks suffer from decreased security. However, digital watermarking can be used to secure medical information. In this study, we focused on combining wireless transmission and digital watermarking technologies to better secure the transmission of medical images within and outside the hospital. We utilized an integrated system comprising the wireless network and the digital watermarking module to conduct a series of tests. The test results were evaluated by medical consultants. They concluded that the images suffered no visible quality degradation and maintained their diagnostic integrity. The proposed integrated system presented reasonable stability, and its performance was comparable to that of a fixed network. This system can enhance security during the transmission of medical images through a wireless channel.

  7. Study on Enhancing nuclear security cooperation in Northeast Asia

    Lee, Jounghoon; Heo, Chul

    2015-01-01

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening

  8. Study on Enhancing nuclear security cooperation in Northeast Asia

    Lee, Jounghoon; Heo, Chul [Korea Institute of Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    Regional and global cooperation in nuclear security was urged. Nevertheless, it is hard to seek a successful example of regional cooperation in nuclear security, with the exception of EURATOM. Northeast Asia which includes China, Russia, Japan, ROK and, DPRK has many nuclear issues. For example, the concerns of the international community were raised when the DPRK has conducted three nuclear tests. Countries in this region also possess many nuclear power plants and materials. However, there has been no attempt at creating a community or organization for multinational security in this region. In this paper, we discuss various ways of enhancing nuclear security cooperation in Northeast Asia. We begin with an examination of current global, regional and national nuclear security cooperation efforts. We then discuss directions and strategies for nuclear security cooperation in Northeast Asia, and offer some detailed cooperation agendas to be considers. Northeast Asia countries have tried to cooperate in many areas such as energy, environment, economy, and policy. However, nuclear security issues have not been discussed seriously. We need to start cooperating on nuclear security issues, because a nuclear security event may affect several countries. One country may not be able to respond to such an event independently. In order to gain cooperate in nuclear security, we have to be able to suggest pertinent agendas to Northeast Asia countries. R and D, education and training of nuclear security may be a good suggestion for starting cooperation. And more practical and detailed agendas such as joint response and information sharing may be suggested for cooperation strengthening.

  9. Secure Handshake in Wi-Fi Connection (A Secure and Enhanced Communication Protocol)

    Ranbir Sinha; Nishant Behar; Devendra Singh

    2012-01-01

    This paper presents a concept of enhancing the security in wireless communication. A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. These days wireless...

  10. Enhancing QKD security with weak measurements

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  11. Enhanced Security for Online Exams Using Group Cryptography

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  12. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  13. Congestion management enhancing transient stability of power systems

    Esmaili, Masoud; Shayanfar, Heidar Ali; Amjady, Nima

    2010-01-01

    In a competitive electricity market, where market parties try to maximize their profits, it is necessary to keep an acceptable level of power system security to retain the continuity of electricity services to customers at a reasonable cost. Congestion in a power system is turned up due to network limits. After relieving congestion, the network may be operated with a reduced transient stability margin because of increasing the contribution of risky participants. In this paper, a novel congestion management method based on a new transient stability criterion is introduced. Using the sensitivity of corrected transient stability margin with respect to generations and demands, the proposed method so alleviates the congestion that the network can more retain its transient security compared with earlier methods. The proposed transient stability index is constructed considering the likelihood of credible faults. Indeed, market parties participate by their security-effective bids rather than raw bids. Results of testing the proposed method along with the earlier ones on the New-England test system elaborate the efficiency of the proposed method from the viewpoint of providing a better transient stability margin with a lower security cost. (author)

  14. 2008 Stability, Security, Transition and Reconstruction Operations Conference

    2008-09-04

    Facilitator Power of Public-Private Partnerships • Health Professional Education • Greater Access to Care China Diabetes Education Program Dominican Republic...Argentina Canada Chile Colombia Ecuador Peru Uruguay Interagency, multinational, inter-institutional partnerships State Department Homeland Security...Disaster Preparedness Disaster Response Regional Response Capacity OFDA-LAC / MDROs Regional Security System (RSS) UNCLASSIFIED ECUADOR / KY PERU / WV

  15. Security Enhancement for Data Migration in the Cloud

    Jean Raphael Ngnie Sighom

    2017-06-01

    Full Text Available In today’s society, cloud computing has significantly impacted nearly every section of our lives and business structures. Cloud computing is, without any doubt, one of the strategic directions for many companies and the most dominating infrastructure for enterprises as long as end users. Instead of buying IT equipment (hardware and/or software and managing it themselves, many organizations today prefer to buy services from IT service providers. The number of service providers increase dramatically and the cloud is becoming the tools of choice for more cloud storage services. However, as more personal information and data are moved to the cloud, into social media sites, DropBox, Baidu WangPan, etc., data security and privacy issues are questioned. Daily, academia and industry seek to find an efficient way to secure data migration in the cloud. Various solution approaches and encryption techniques have been implemented. In this work, we will discuss some of these approaches and evaluate the popular ones in order to find the elements that affect system performance. Finally, we will propose a model that enhances data security and privacy by combining Advanced Encryption Standard-256, Information Dispersal Algorithms and Secure Hash Algorithm-512. Our protocol achieves provable security assessments and fast execution times for medium thresholds.

  16. Security-Enhanced Push Button Configuration for Home Smart Control.

    Han, Junghee; Park, Taejoon

    2017-06-08

    With the emergence of smart and converged home services, the need for the secure and easy interplay of various devices has been increased. Push Button Configuration (PBC) is one of the technologies proposed for easy set-up of a secure session between IT and consumer devices. Although the Wi-Fi Direct specification explicitly states that all devices must support the PBC method, its applicability is very limited. This is because the security vulnerability of PBC can be maliciously exploited so that attackers can make illegitimate sessions with consumer devices. To address this problem, this paper proposes a novel Security-enhanced PBC (SePBC) scheme with which we can uncover suspicious or malicious devices. The proposed mechanism has several unique features. First, we develop a secure handshake distance measurement protocol by preventing an adversary sitting outside the region from maliciously manipulating its distance to be fake. Second, it is compatible with the original Wi-Fi PBC without introducing a brand-new methodology. Finally, SePBC uses lightweight operations without CPU-intensive cryptography computation and employs inexpensive H/W. Moreover, it needs to incur little overhead when there is no attack. This paper also designs and implements the proposed SePBC in the real world. Our experimental results and analysis show that the proposed SePBC scheme effectively defeats attacks on PBC while minimizing the modification of the original PBC equipment.

  17. Enhancing water security in a rapidly developing shale gas region

    Shannon Holding

    2017-06-01

    New hydrological insights for the region: Initiatives and tools enhancing water security in the region include strategic partnerships and stakeholder collaborations, policy and regulation development, and data collection and distribution efforts. The contributions and limitations of each of these are discussed. A vulnerability mapping framework is presented which addresses data gaps and provides a tool for decision-making surrounding risk to water quality from various hazards. An example vulnerability assessment was conducted for wastewater transport along pipeline and trucking corridors.

  18. Microsoft Windows Server 2003: Security Enhancements and New Features

    Montehermoso, Ronald

    2004-01-01

    .... Windows NT and Windows 2000 were known to have numerous security vulnerabilities; hence Microsoft focused on improving security by making Windows Server 2003 secure by design, secure by default, secure in deployment...

  19. Windows Vista Kernel-Mode: Functions, Security Enhancements and Flaws

    Mohammed D. ABDULMALIK

    2008-06-01

    Full Text Available Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws that can be attacked by malicious leading to compromising the kernel.

  20. Enhancing probiotic stability in industrial processes

    Miguel Gueimonde

    2012-06-01

    Full Text Available Background: Manufacture of probiotic products involves industrial processes that reduce the viability of the strains. This lost of viability constitutes an economic burden for manufacturers, compromising the efficacy of the product and preventing the inclusion of probiotics in many product categories. Different strategies have been used to improve probiotic stability during industrial processes. These include technological approaches, such as the modification of production parameters or the reformulation of products, as well as microbiological approaches focused on the strain intrinsic resistance. Among the later, both selection of natural strains with the desired properties and stress-adaptation of strains have been widely used. Conclusion: During recent years, the knowledge acquired on the molecular basis of stress-tolerance of probiotics has increased our understanding on their responses to industrial stresses. This knowledge on stress-response may nowadays be used for the selection of the best strains and industrial conditions in terms of probiotic stability in the final product.

  1. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Lee, Chanyoung; Seong, Poong Hyun

    2016-01-01

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is possible to

  2. Application of the Concept of Intrusion Tolerant System for Evaluating Cyber Security Enhancements

    Lee, Chanyoung; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    One of the major problems is that nuclear industry is in very early stage in dealing with cyber security issues. It is because that cyber security has received less attention compared to other safety problems. In addition, late adoption of digital I and C systems has resulted in lower level of cyber security advancements in nuclear industry than ones in other industries. For the cyber security of NPP I and C systems, many regulatory documents, guides and standards were already published. These documents include cyber security plans, methods for cyber security assessments and comprehensive set of security controls. However, methods which can help assess how much security is improved if a specific security control is applied are not included in these documents. Hence, NPP I and C system designers may encounter difficulties when trying to apply security controls with limited structure and cost. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. In order to provide useful information about cyber security issues including cyber security enhancements, this paper suggests a framework to evaluate how much cyber security is improved when a specific cyber security enhancement is applied in NPPs. The extent of cyber security improvement caused by security enhancement was defined as reduction ratio of the failure probability to secure the system from cyber-attack as Eq.1. The concept of 'intrusion tolerant system' was applied to not only prevent cyber-attacks but also limit the extent of damage in this study. For applying the concept of intrusion tolerant system to NPP, the event tree was constructed with some assumptions. Cyber security improvement caused by cyber security enhancement can be estimated as Eq.3. By comparing current system to the enhanced system, it is

  3. Power system security enhancement through direct non-disruptive load control

    Ramanathan, Badri Narayanan

    The transition to a competitive market structure raises significant concerns regarding reliability of the power grid. A need to build tools for security assessment that produce operating limit boundaries for both static and dynamic contingencies is recognized. Besides, an increase in overall uncertainty in operating conditions makes corrective actions at times ineffective leaving the system vulnerable to instability. The tools that are in place for stability enhancement are mostly corrective and suffer from lack of robustness to operating condition changes. They often pose serious coordination challenges. With deregulation, there have also been ownership and responsibility issues associated with stability controls. However, the changing utility business model and the developments in enabling technologies such as two-way communication, metering, and control open up several new possibilities for power system security enhancement. This research proposes preventive modulation of selected loads through direct control for power system security enhancement. Two main contributions of this research are the following: development of an analysis framework and two conceptually different analysis approaches for load modulation to enhance oscillatory stability, and the development and study of algorithms for real-time modulation of thermostatic loads. The underlying analysis framework is based on the Structured Singular Value (SSV or mu) theory. Based on the above framework, two fundamentally different approaches towards analysis of the amount of load modulation for desired stability performance have been developed. Both the approaches have been tested on two different test systems: CIGRE Nordic test system and an equivalent of the Western Electric Coordinating Council test system. This research also develops algorithms for real-time modulation of thermostatic loads that use the results of the analysis. In line with some recent load management programs executed by utilities, two

  4. USign--a security enhanced electronic consent model.

    Li, Yanyan; Xie, Mengjun; Bian, Jiang

    2014-01-01

    Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.

  5. Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.

    Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles

    2018-05-01

    Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  6. EUV multilayer mirrors with enhanced stability

    Benoit, Nicolas; Yulin, Sergiy; Feigl, Torsten; Kaiser, Norbert

    2006-08-01

    The application of multilayer optics in EUV lithography requires not only the highest possible normal-incidence reflectivity but also a long-term thermal and radiation stability at operating temperatures. This requirement is most important in the case of the collector mirror of the illumination system close to the EUV source where a short-time decrease in reflectivity is most likely. Mo/Si multilayer mirrors, designed for high normal reflectivity at the wavelength of 13.5 nm and deposited by dc magnetron sputtering, were directly exposed to EUV radiation without mitigation system. They presented a loss of reflectivity of more than 18% after only 8 hours of irradiation by a Xe-discharge source. Another problem of Mo/Si multilayers is the instability of reflectivity and peak wavelength under high heat load. It becomes especially critical at temperatures above 200°C, where interdiffusion between the molybdenum and the silicon layers is observed. The development of high-temperature multilayers was focused on two alternative Si-based systems: MoSi II/Si and interface engineered Mo/C/Si/C multilayer mirrors. The multilayer designs as well as the deposition parameters of all systems were optimized in terms of high peak reflectivity (>= 60 %) at a wavelength of 13.5 nm and high thermal stability. Small thermally induced changes of the MoSi II/Si multilayer properties were found but they were independent of the annealing time at all temperatures examined. A wavelength shift of -1.7% and a reflectivity drop of 1.0% have been found after annealing at 500°C for 100 hours. The total degradation of optical properties above 650°C can be explained by a recrystallization process of MoSi II layers.

  7. Double polymer sheathed carbon nanotube supercapacitors show enhanced cycling stability

    Zhao, Wenqi; Wang, Shanshan; Wang, Chunhui; Wu, Shiting; Xu, Wenjing; Zou, Mingchu; Ouyang, An; Cao, Anyuan; Li, Yibin

    2015-12-01

    Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices.Pseudo-materials are effective in boosting the specific capacitance of supercapacitors, but during service their degradation may also be very strong, causing reduced cycling stability. Here, we show that a carbon nanotube sponge grafted by two conventional pseudo-polymer layers in sequence can serve as a porous supercapacitor electrode with significantly enhanced cycling stability compared with single polymer grafting. Creating conformal polymer coatings on the nanotube surface and the resulting double-sheath configuration are important structural factors leading to the enhanced performance. Combining different polymers as double sheaths as reported here might be a potential route to circumvent the dilemma of pseudo-materials, and to simultaneously improve the capacitance and stability for various energy storage devices. Electronic supplementary information (ESI) available. See DOI: 10.1039/c5nr05978j

  8. Enhancing energy security in Malayia: the challenges towards sustainable environment

    Sahid, E J M; Peng, L Y; Siang, C Ch

    2013-01-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  9. Security Enhancement of Wireless Sensor Networks Using Signal Intervals

    Jaegeun Moon

    2017-04-01

    Full Text Available Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP, the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  10. Security Enhancement of Wireless Sensor Networks Using Signal Intervals.

    Moon, Jaegeun; Jung, Im Y; Yoo, Jaesoo

    2017-04-02

    Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.

  11. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo [KINAC, Daejeon (Korea, Republic of)

    2013-10-15

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012.

  12. Implementing Physical Protection Education for an Enhanced Nuclear Security Culture

    Lee, Jeong Ho; Kim, Hyun Chul; Shin, Ick Hyun; Lee, Hyung Kyung; Choe, Kwan Kyoo

    2013-01-01

    In this paper, we are going to outline our efforts and experiences at implementing physical protection education. KINAC (as the only designated educational institute) places great effort in delivering an effective and a high-quality education program for physical protection. We have also provided a way for nuclear operators to share the lessons they have gained through their own experiences. We made physical protection education an important communication channel, not only among nuclear operators but also between operators and a regulatory body. There is growing attention given to education and training on the subject of physical protection in order to enhance the nuclear security culture. The IAEA recommends that all personnel in organizations directly involved with the nuclear industry receive regularly education in physical protection according to the recently revised INFCIRC/225/Rev.5. The Korea Institute of Nuclear Nonproliferation and Control (KINAC) and the Nuclear Safety and Security Commission (NSSC), which are mainly responsible for the national nuclear security regime, have already recognized the importance of education and training in physical protection. The NSSC enacted its decree on physical protection education and training in 2010. KINAC was designated as the first educational institute in 2011 and implemented physical protection education as mandatory from 2012

  13. C-5 Propynyl Modifications Enhance the Mechanical Stability of DNA.

    Aschenbrenner, Daniela; Baumann, Fabian; Milles, Lukas F; Pippig, Diana A; Gaub, Hermann E

    2015-07-20

    Increased thermal or mechanical stability of DNA duplexes is desired for many applications in nanotechnology or -medicine where DNA is used as a programmable building block. Modifications of pyrimidine bases are known to enhance thermal stability and have the advantage of standard base-pairing and easy integration during chemical DNA synthesis. Through single-molecule force spectroscopy experiments with atomic force microscopy and the molecular force assay we investigated the effect of pyrimidines harboring C-5 propynyl modifications on the mechanical stability of double-stranded DNA. Utilizing these complementary techniques, we show that propynyl bases significantly increase the mechanical stability if the DNA is annealed at high temperature. In contrast, modified DNA complexes formed at room temperature and short incubation times display the same stability as non-modified DNA duplexes. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. The enhancement of security in healthcare information systems.

    Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De

    2012-06-01

    With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.

  15. Inorganic electret with enhanced charge stability for energy harvesting

    Wang, Fei; Hansen, Ole

    2013-01-01

    We report a new surface treatment of inorganic electret materials which enhances the charge stability. Coating the surfaces with 1H, 1H, 2H, 2H - perfluorodecyltrichlorosilane (FDTS) makes the electret surface more hydrophobic which improves the surface charge stability under high humidity condit...... conditions. Thermal tests show that the thermal stability of charge in the inorganic electrets is also much better than that of polymer materials such as CYTOP. A demonstrator device with SiO2 electrets shows promising results for energy harvesting applications....

  16. Method for enhancing the thermal stability of ionic compounds

    2013-01-01

    This invention relates to a method for enhancing the thermal stability of ionic compounds including ionic liquids, by immobilization on porous solid support materials having a pore diameter of between about 20-200 AA, wherein the solid support does not have a pore size of 90 AA.......This invention relates to a method for enhancing the thermal stability of ionic compounds including ionic liquids, by immobilization on porous solid support materials having a pore diameter of between about 20-200 AA, wherein the solid support does not have a pore size of 90 AA....

  17. Subnanometric stabilization of plasmon-enhanced optical microscopy

    Yano, Taka-aki; Ichimura, Taro; Kuwahara, Shota; Verma, Prabhat; Kawata, Satoshi

    2012-01-01

    We have demonstrated subnanometric stabilization of tip-enhanced optical microscopy under ambient condition. Time-dependent thermal drift of a plasmonic metallic tip was optically sensed at subnanometer scale, and was compensated in real-time. In addition, mechanically induced displacement of the tip, which usually occurs when the amount of tip-applied force varies, was also compensated in situ. The stabilization of tip-enhanced optical microscopy enables us to perform long-time and robust measurement without any degradation of optical signal, resulting in true nanometric optical imaging with high reproducibility and high precision. The technique presented is applicable for AFM-based nanoindentation with subnanometric precision. (paper)

  18. A case for avoiding security-enhanced HTTP tools to improve security for Web-based applications

    Wood, B.

    1996-03-01

    This paper describes some of the general weaknesses of the current popular Hypertext Transmission Protocol (HTTP) security standards and products in an effort to show that these standards are not appealing for many applications. The author will then show how one can treat HTTP browsers and servers as untrusted elements in the network so that one can rely on other mechanisms to achieve better overall security than can be attained through today`s security-enhanced HTTP tools.

  19. Report on Enhancing Security and Stability in Afghanistan

    2015-06-01

    11 international terrorist groups, and accept Afghanistan’s constitution , including its protections for the rights of women and minorities...Slovakia 39 Finland 80 Slovenia 7 Georgia 885 Spain 294 Germany 850 Sweden 30 Greece 4 FYR of Macedonia 38 Hungary 97 Turkey 503 Iceland 4 Ukraine...advisors work with the MoD and the MoI to ensure the ANDSF respect the rule of law and operate in accordance with Afghanistan’s constitution

  20. Resonating, Rejecting, Reinterpreting: Mapping the Stabilization Discourse in the United Nations Security Council, 2000–14

    David Curran

    2015-10-01

    Full Text Available This article charts the evolution of the conceptualisation of stabilization in the UN Security Council (UNSC during the period 2001–2014. UNSC open meetings provide an important dataset for a critical review of stabilization discourse and an opportunity to chart the positions of permanent Members, rotating Members and the UN Secretariat towards this concept. This article is the first to conduct an analysis of this material to map the evolution of stabilization in this critical chamber of the UN. This dataset of official statements will be complemented by a review of open source reporting on UNSC meetings and national stabilization doctrines of the ‘P3’ – France, the UK and the US. These countries have developed national stabilization doctrines predominantly to deal with cross-governmental approaches to counterinsurgency operations conducted during the 2000s. The article therefore presents a genealogy of the concept of stabilization in the UNSC to help understand implications for its future development in this multilateral setting. This article begins by examining efforts by the P3 to ‘upload’ their conceptualisations of stabilization into UN intervention frameworks. Secondly, the article uses a content analysis of UNSC debates during 2000–2014 to explore the extent to which the conceptualisation of stabilization resonated with other Council members, were rejected in specific contexts or in general, or were re-interpreted by member states to suit alternative security agendas and interests. Therefore, the article not only examines the UNSC debates surrounding existing UN ‘stabilization operations’ (MONUSCO, MINUSTAH, MINUSCA, MINUSMA, which could be regarded as evidence that this ‘western’ concept has resonated with other UNSC members and relevant UN agencies, but also documents the appearance of stabilization in other contexts too. The article opens new avenues of research into concepts of stabilization within the UN, and

  1. Secure and privacy enhanced gait authentication on smart phone.

    Hoang, Thang; Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  2. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    Thang Hoang

    2014-01-01

    Full Text Available Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR and false rejection rate (FRR of 3.92% and 11.76%, respectively, in terms of key length of 50 bits.

  3. Distributed fiber optic sensing enhances pipeline safety and security

    Frings, Jochen; Walk, Tobias [ILF Consulting Engineers, Munich (Germany)

    2011-09-15

    Pipelines are efficient, highly reliable and safe means of transportation. However, despite intensive right of way surveillance by foot, car and out of the air, pipeline leaks and illegal tappings are a reality - sometimes with catastrophic results. These events show a gap in real-time monitoring caused by the highly distributed nature of pipelines. Parts of this gap now can be closed with distributed fiber optic sensing technology. Using various physical effects this technology is apt to detect temperature, strain, vibrations and sound with very good localization over spans up to 50 km with a single sensor cable. Various field tested applications like leakage detection, third party activity monitoring and intrusion detection or ground movement detection as well as integrity monitoring proof that distributed fiber optic sensing can enhance pipeline safety and security. (orig.)

  4. An assessment of the effectiveness of fuel cycle technologies for the national energy security enhancement in the electricity sector

    Kim, Hyun Jun; Jun, Eunju; Chang, Soon Heung; Kim, Won Joon

    2009-01-01

    Energy security, in the 21st century, draws significant attention in most countries worldwide, because the national security and sustainable development depend largely on energy security. The anticipated fossil energy depletion and the instability of their supply drive many countries to consider nuclear energy as their alternative energy source for the enhancement of their national energy security. In this study, indicators measuring the level of energy security in the electric power sector are developed and applied for the assessment of the effectiveness of four electric power system schemes which deploy different nuclear fuel cycle technologies, with consideration for the diversification of the energy markets and the vulnerability to economic disruption. Results show that the contribution of the closed fuel cycle scheme is larger than the once-through fuel cycle scheme in the perspective of energy security. In addition, the completely closed fuel cycle with the spent fuel recycling enhances the national energy security to the maximum extent compared to all other fuel cycle schemes. Since a completely closed fuel cycle is hardly affected by the uranium price changes, this scheme is found to be the most favorable scheme, ensuring the stable profit of utilities and stabilizing the electricity tariff. In addition, the completely closed fuel cycle scheme provides the best enhancement of national energy security with respect to energy supply, under reasonable price conditions. The indicators developed in this study can be utilized as a useful instrument for the measurement of the level of the energy security, especially by the countries importing energy resources for the generation of electric power.

  5. Collaborative Decision Making Process for Complex Defense, Security and Stability Challenges

    Bemmel, I.E. van; Eikelboom, A.R.

    2014-01-01

    How to intervene in crises and conflicts? How to cope with complex challenges in the field of defense, security and stability? Questions like these are difficult to answer due to amongst others the involvement of multiple stakeholders that contribute to these complex challenges and need to cooperate

  6. Power system stability enhancement using facts controllers: a review

    Abido, M. A

    2009-01-01

    In recent years, power demand has increased substantially while the expansion of power generation and transmission has been severely limited due to limited resources and environmental restrictions. As a consequence, some transmission lines are heavily loaded and the system stability becomes a power transfer-limiting factor. Flexible AC transmission systems (FACTS) controllers have been mainly used for solving various power system steady state control problems. However, recent studies reveal that FACTS controllers could be employed to enhance power system stability in addition to their main function of power flow control. The literature shows an increasing interest in this subject for the last two decades, where the enhancement of system stability using FACTS controllers has been extensively investigated. This paper presents a comprehensive review on the research and developments in the power system stability enhancement using FACTS damping controllers. Several technical issues related to FACTS installations have been highlighted and performance comparison of different FACTS controllers has been discussed. In addition, some of the utility experience, real-world installations, and semiconductor technology development have been reviewed and summarized. Applications of FACTS to other power system studies have also been discussed. About two hundred twenty seven research publications have been classified and appended for a quick reference. (author)

  7. Relevance of Linear Stability Results to Enhanced Oil Recovery

    Ding, Xueru; Daripa, Prabir

    2012-11-01

    How relevant can the results based on linear stability theory for any problem for that matter be to full scale simulation results? Put it differently, is the optimal design of a system based on linear stability results is optimal or even near optimal for the complex nonlinear system with certain objectives of interest in mind? We will address these issues in the context of enhanced oil recovery by chemical flooding. This will be based on an ongoing work. Supported by Qatar National Research Fund (a member of the Qatar Foundation).

  8. Genetic Moderation of Stability in Attachment Security from Early Childhood to Age 18 Years: A Replication Study

    Raby, K. Lee; Roisman, Glenn I.; Booth-LaForce, Cathryn

    2015-01-01

    A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin…

  9. Enhancing stability of industrial turbines using adjustable partial arc bearings

    Chasalevris, Athanasios; Dohnal, Fadi

    2016-09-01

    The paper presents the principal of operation, the simulation and the characteristics of two partial-arc journal bearings of variable geometry and adjustable/controllable stiffness and damping properties. The proposed journals are supposed to consist of a scheme that enables the periodical variation of bearing properties. Recent achievements of suppressing rotor vibrations using plain circular journal bearings of variable geometry motivate the further extension of the principle to bearings of applicable geometry for industrial turbines. The paper describes the application of a partial-arc journal bearing to enhance stability of high speed industrial turbines. The proposed partial-arc bearings with adjustable/controllable properties enhance stability and they introduce stable margins in speeds much higher than the 1st critical.

  10. Considerations to Enhance the Florida Domestic Security Strategic Plan

    2011-03-01

    security strategies. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION ...Thank you all. xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. PROBLEM STATEMENT After the terrorist attacks of September 11, 2001...State Homeland Security Strategy (Nebraska Emergency Mangement Agency, 2009) • Vermont Homeland Security Strategy (Vermont Department of Public

  11. Friendship Security, But Not Friendship Intimacy, Moderates the Stability of Anxiety During Preadolescence.

    Wood, Megan A; Bukowski, William M; Santo, Jonathan B

    2017-01-01

    A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.

  12. 77 FR 25188 - Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security...

    2012-04-27

    ... general aviation (GA) aircraft operators who wish to fly into and/or out of Ronald Reagan Washington.... Information Collection Requirement Title: Enhanced Security Procedures at Ronald Reagan Washington National...] Extension of Agency Information Collection Activity Under OMB Review: Enhanced Security Procedures at Ronald...

  13. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Crawford,C.; de Boer,G.; De Castro, K; Landers, Ph.D., J; Rogers, E

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." This paper will describe some of the key elements of a comprehensive, sustainable nuclear security culture enhancement program and how implementation can mitigate the insider threat.

  14. Novel Approaches to Enhance Mobile WiMAX Security

    Taeshik Shon

    2010-01-01

    Full Text Available The IEEE 802.16 Working Group on Broadband Wireless Access Standards released IEEE 802.16-2004 which is a standardized technology for supporting broadband and wireless communication with fixed and nomadic access. After the IEEE 802.16-2004 standard, a new advanced and revised standard was released as the IEEE 802.16e-2005 amendment which is foundation of Mobile WiMAX network supporting handover and roaming capabilities. In the area of security aspects, compared to IEEE 802.16-2004, IEEE 802.16e, called Mobile WiMAX, adopts improved security architecture—PKMv2 which includes EAP authentication, AES-based authenticated encryption, and CMAC or HMAC message protection. However, there is no guarantee that PKMv2-based Mobile WiMAX network will not have security flaws. In this paper, we investigate the current Mobile WiMAX security architecture focusing mainly on pointing out new security vulnerabilities such as a disclosure of security context in network entry, a lack of secure communication in network domain, and a necessity of efficient handover supporting mutual authentication. Based on the investigation results, we propose a novel Mobile WiMAX security architecture, called RObust and Secure MobilE WiMAX (ROSMEX, to prevent the new security vulnerabilities.

  15. Soil Stabilization Methods with Potential for Application at the Nevada National Security Site: A Literature Review

    Shillito, Rose [DRI; Fenstermaker, Lynn [DRI

    2014-01-01

    Nuclear testing at the Nevada National Security Site (NNSS) has resulted in large areas of surficial radionuclide-contaminated soils. Much of the radionuclide contamination is found at or near the soil surface, and due to the dry climate setting, and the long half-life of radioactive isotopes, soil erosion poses a long-term health risk at the NNSS. The objective of this literature review is to present a survey of current stabilization methods used for minimizing soil erosion, both by water and wind. The review focuses on in situ uses of fundamental chemical and physical mechanisms for soil stabilization. A basic overview of the physical and chemical properties of soil is also presented to provide a basis for assessing stabilization methods. Some criteria for stabilization evaluation are identified based on previous studies at the NNSS. Although no specific recommendations are presented as no stabilization method, alone or in combination, will be appropriate in all circumstances, discussions of past and current stabilization procedures and specific soil tests that may aid in current or future soil stabilization activities at the NNSS are presented. However, not all Soils Corrective Action Sites (CASs) or Corrective Action Units (CAUs) will require stabilization of surficial radionuclide-contaminated soils. Each Soils CAS or CAU should be evaluated for site-specific conditions to determine if soil stabilization is necessary or practical for a given specific site closure alternative. If stabilization is necessary, then a determination will be made as to which stabilization technique is the most appropriate for that specific site.

  16. Security and Stability Analysis of Wind Farms Integration into Distribution Network

    Guan-yang, Li; Hongzhao, Wang; Guanglei, Li; Yamei, Cheng; Hong-zheng, Liu; Yi, Sun

    2017-05-01

    With the increasing share of the wind power in the power system, wind power fluctuations will cause obvious negative impacts on weak local grid. This paper firstly establish electromechanical transient simulation model for doubly fed induction wind turbine, then use Matlab/Simulink to achieve power flow calculation and transient simulation of power system including wind farms, the local synchronous generator, load, etc, finally analyze wind power on the impact of the local power grid under typical circumstances. The actual calculated results indicate that wind mutation causes little effect on the power grid, but when the three-phase short circuit fault happens, active power of wind power decreases sharply and the voltage of location of wind power into the grid also drop sharply, finally wind farm split from power system. This situation is not conducive to security and stability of the local power grid. It is necessary to develop security and stability measures in the future.

  17. Fluorinated Phosphorene: Electrochemical Synthesis, Atomistic Fluorination, and Enhanced Stability.

    Tang, Xian; Liang, Weiyuan; Zhao, Jinlai; Li, Zhongjun; Qiu, Meng; Fan, Taojian; Luo, Crystal Shaojuan; Zhou, Ye; Li, Yu; Guo, Zhinan; Fan, Dianyuan; Zhang, Han

    2017-12-01

    Phosphorene has attracted great interest due to its unique electronic and optoelectronic properties owing to its tunable direct and moderate band-gap in association with high carrier mobility. However, its intrinsic instability in air seriously hinders its practical applications, and problems of technical complexity and in-process degradation exist in currently proposed stabilization strategies. A facile pathway in obtaining and stabilizing phosphorene through a one-step, ionic liquid-assisted electrochemical exfoliation and synchronous fluorination process is reported in this study. This strategy enables fluorinated phosphorene (FP) to be discovered and large-scale, highly selective few-layer FP (3-6 atomic layers) to be obtained. The synthesized FP is found to exhibit unique morphological and optical characteristics. Possible atomistic fluorination configurations of FP are revealed by core-level binding energy shift calculations in combination with spectroscopic measurements, and the results indicate that electrolyte concentration significantly modulates the fluorination configurations. Furthermore, FP is found to exhibit enhanced air stability thanks to the antioxidation and antihydration effects of the introduced fluorine adatoms, and demonstrate excellent photothermal stability during a week of air exposure. These findings pave the way toward real applications of phosphorene-based nanophotonics. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Security region-based small signal stability analysis of power systems with FSIG based wind farm

    Qin, Chao; Zeng, Yuan; Yang, Yang; Cui, Xiaodan; Xu, Xialing; Li, Yong

    2018-02-01

    Based on the Security Region approach, the impact of fixed-speed induction generator based wind farm on the small signal stability of power systems is analyzed. Firstly, the key factors of wind farm on the small signal stability of power systems are analyzed and the parameter space for small signal stability region is formed. Secondly, the small signal stability region of power systems with wind power is established. Thirdly, the corresponding relation between the boundary of SSSR and the dominant oscillation mode is further studied. Results show that the integration of fixed-speed induction generator based wind farm will cause the low frequency oscillation stability of the power system deteriorate. When the output of wind power is high, the oscillation stability of the power system is mainly concerned with the inter-area oscillation mode caused by the integration of the wind farm. Both the active power output and the capacity of reactive power compensation of the wind farm have a significant influence on the SSSR. To improve the oscillation stability of power systems with wind power, it is suggested to reasonably set the reactive power compensation capacity for the wind farm through SSSR.

  19. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  20. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  1. Enhancing the Safety and Security of Radioactive Sources

    Hickey, J.

    2004-01-01

    The NRC initiatives to improve safety and security of sources began before 091101 and include both international and domestic activities. They supported the development and implementation of the IAEA Code of Conduct, which provides categorization of sources of concern, based on risk, improvement of regulatory programs of all member countries and improvement of safety and security of sources. International activities include the IAEA International Conference on Security of Sources (Vienna, Austria, March, 2003), the trilateral cooperation with Canada and Mexico, the assistance to individual countries to improve security and the proposed rule on export and import of radioactive material. The domestic initiatives are to issue the security orders and advisories to licensees, issue the panoramic irradiator orders (June 2003), issue the manufacturer orders (January 2004), complete the interim national source inventory, develop the national source tracking system, maintain the orphan source registration and retrieval program and upgrade the emergency preparedness

  2. Does a crouched leg posture enhance running stability and robustness?

    Blum, Yvonne; Birn-Jeffery, Aleksandra; Daley, Monica A; Seyfarth, Andre

    2011-07-21

    Humans and birds both walk and run bipedally on compliant legs. However, differences in leg architecture may result in species-specific leg control strategies as indicated by the observed gait patterns. In this work, control strategies for stable running are derived based on a conceptual model and compared with experimental data on running humans and pheasants (Phasianus colchicus). From a model perspective, running with compliant legs can be represented by the planar spring mass model and stabilized by applying swing leg control. Here, linear adaptations of the three leg parameters, leg angle, leg length and leg stiffness during late swing phase are assumed. Experimentally observed kinematic control parameters (leg rotation and leg length change) of human and avian running are compared, and interpreted within the context of this model, with specific focus on stability and robustness characteristics. The results suggest differences in stability characteristics and applied control strategies of human and avian running, which may relate to differences in leg posture (straight leg posture in humans, and crouched leg posture in birds). It has been suggested that crouched leg postures may improve stability. However, as the system of control strategies is overdetermined, our model findings suggest that a crouched leg posture does not necessarily enhance running stability. The model also predicts different leg stiffness adaptation rates for human and avian running, and suggests that a crouched avian leg posture, which is capable of both leg shortening and lengthening, allows for stable running without adjusting leg stiffness. In contrast, in straight-legged human running, the preparation of the ground contact seems to be more critical, requiring leg stiffness adjustment to remain stable. Finally, analysis of a simple robustness measure, the normalized maximum drop, suggests that the crouched leg posture may provide greater robustness to changes in terrain height

  3. Security enhancement of double random phase encoding using rear-mounted phase masking

    Chen, Junxin; Zhang, Yu; Li, Jinchang; Zhang, Li-bo

    2018-02-01

    In this paper, a security enhancement for double random phase encoding (DRPE) by introducing a rear-mounted phase masking procedure is presented. Based on exhaustively studying the cryptanalysis achievements of DRPE and its variants, invalidation of the second lens, which plays a critical role in cryptanalyzing processes, is concluded. The improved system can exploit the security potential of the second lens and consequently strengthen the security of DRPE. Experimental results and security analyses are presented in detail to demonstrate the security potential of the proposed cryptosystem.

  4. Biometric Enhancement of Home and Office Security to Reduce ...

    PROF. OLIVER OSUAGWA

    Biometrics security technology uses the physiological and ... verification and authentication methodology to verify how facial screening explores the different ... mouth, nose etc and stores the bio-information extracted from the face of every ...

  5. A Cyber Federal Deposit Insurance Corporation Achieving Enhanced National Security

    2017-12-21

    machine is being bridged by wearables, augmented reality (AR), and artificial intelligence (AI). In this near-future the uncanny valley no longer...and security represent key pol- icy, security, and business tradeoffs, connectivity and national cybersecurity are similarly dialectical choices. On...Consumer Electronics Show (CES), is at once the digital sycophant’s dream and the cybersecurity hermit’s nightmare, as each connected gewgaw and

  6. Enhancing Financial Security in Agricultural Business: Financial and Property Aspects

    Yuliya Bezdushna

    2014-01-01

    The article provides the analysis of information support for the developing agrarian businesses financial security activities. The impact of financial statements on financial security has been proved through generalization procedure of such calculating indicators as operating margin, return on assets, total liquidity ratio and financial autonomy ratio. A causal effect between mass underestimation of operating fixed assets in accounting and inflated profitability rates in agribusinesses operat...

  7. Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system

    Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang

    2018-02-01

    The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.

  8. Optimal Allocation of Wind Turbines by Considering Transmission Security Constraints and Power System Stability

    Rodrigo Palma-Behnke

    2013-01-01

    Full Text Available A novel optimization methodology consisting of finding the near optimal location of wind turbines (WTs on a planned transmission network in a secure and cost-effective way is presented on this paper. While minimizing the investment costs of WTs, the algorithm allocates the turbines so that a desired wind power energy-penetration level is reached. The optimization considers both transmission security and power system stability constraints. The results of the optimization provide regulators with a support instrument to give proper signals to WT investors, in order to achieve secure and cost effective wind power network integration. The proposal is especially aimed at countries in the initial stage of wind power development, where the WT network integration process can still be influenced by policy-makers. The proposed methodology is validated with a real power system. Obtained results are compared with those generated from a business-as-usual (BAU scenario, in which the WT network allocation is made according to existing WT projects. The proposed WT network allocation scheme not only reduces the total investment costs associated with a determined wind power energy target, but also improves power system stability.

  9. Enhancing China’s energy security: Determining influential factors and effective strategic measures

    Ren, Jingzheng; Sovacool, Benjamin K.

    2014-01-01

    Highlights: • The most influential factors affecting China’s energy security are identified. • Fuzzy AHP is used to quantify the importance of influential factors. • Strategic measures for enhancing China’s energy security are prioritized. • Fuzzy AHP is used to determine the priorities of the strategic measures. - Abstract: This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies and improving energy efficiency is the most salient, positive, and necessary strategic measure

  10. Viability of Hydrogen Pathways that Enhance Energy Security: A Comparison of China and Denmark

    Ren, Jingzheng; Andreasen, Kristian Peter; Sovacool, Benjamin

    2014-01-01

    When designed and built properly, hydrogen energy systems can enhance energy security through technological diversification and minimizing dependence on foreign imports of energy fuels. However, hydrogen can be produced from different feedstocks according to separate pathways, and these different...... pathways create particular consequences on a nation's overall energy security. The objective of this study is to investigate the superiorities and inferiorities of hydrogen pathways from the perspective of China and Denmark, and to determine which pathways best contribute to national energy security...

  11. Real Time MODBUS Transmissions and Cryptography Security Designs and Enhancements of Protocol Sensitive Information

    Aamir Shahzad

    2015-07-01

    Full Text Available Information technology (IT security has become a major concern due to the growing demand for information and massive development of client/server applications for various types of applications running on modern IT infrastructure. How has security been taken into account and which paradigms are necessary to minimize security issues while increasing efficiency, reducing the influence on transmissions, ensuring protocol independency and achieving substantial performance? We have found cryptography to be an absolute security mechanism for client/server architectures, and in this study, a new security design was developed with the MODBUS protocol, which is considered to offer phenomenal performance for future development and enhancement of real IT infrastructure. This study is also considered to be a complete development because security is tested in almost all ways of MODBUS communication. The computed measurements are evaluated to validate the overall development, and the results indicate a substantial improvement in security that is differentiated from conventional methods.

  12. Natural polyphenols enhance stability of crosslinked UHMWPE for joint implants.

    Shen, Jie; Gao, Guorong; Liu, Xincai; Fu, Jun

    2015-03-01

    Radiation-crosslinked UHMWPE has been used for joint implants since the 1990s. Postirradiation remelting enhances oxidative stability, but with some loss in strength and toughness. Vitamin E-stabilized crosslinked UHMWPE has shown improved strength and stability as compared with irradiated and remelted UHMWPE. With more active phenolic hydroxyl groups, natural polyphenols are widely used in the food and pharmaceutical industries as potent stabilizers and could be useful for oxidative stability in crosslinked UHMWPE. We asked whether UHMWPE blended with polyphenols would (1) show higher oxidation resistance after radiation crosslinking; (2) preserve the mechanical properties of UHMWPE after accelerated aging; and (3) alter the wear resistance of radiation-crosslinked UHMWPE. The polyphenols, gallic acid and dodecyl gallate, were blended with medical-grade UHMWPE followed by consolidation and electron beam irradiation at 100 kGy. Radiation-crosslinked virgin and vitamin E-blended UHMWPEs were used as reference materials. The UHMWPEs were aged at 120 °C in air with oxidation levels analyzed by infrared spectroscopy. Tensile (n = 5 per group) and impact (n = 3 per group) properties before and after aging as per ASTM F2003 were evaluated. The wear rates were examined by pin-on-disc testing (n = 3 per group). The data were reported as mean ± SDs. Statistical analysis was performed by using Student's t-test for a two-tailed distribution with unequal variance for tensile and impact data obtained with n ≥ 3. A significant difference is defined with p Accelerated aging of these polyphenol-blended UHMWPEs resulted in ultimate tensile strength of 50.4 ± 1.4 MPa and impact strength of 53 ± 5 kJ/m(2) for 100 kGy-irradiated UHMWPE with 0.05 wt% dodecyl gallate, for example, in comparison to 51.2 ± 0.7 MPa (p = 0.75) and 58 ± 5 kJ/m(2) (p = 0.29) before aging. The pin-on-disc wear rates of 100 kGy-irradiated UHMWPE with 0.05 wt% dodecyl gallate and 0.05 wt% gallic acid

  13. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  14. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  15. Enhancing MISP with Fast Mobile IPv6 Security

    Ilsun You

    2011-01-01

    Full Text Available The Mobile Broadband Association has developed the MIS and MISAUTH protocols as link-layer fast authentication protocols. A combination of MIS and MISAUTH protocols, called as MISP, provides secure and fast connection for a wireless access network, but it has been reported that MISP creates a weak session key and suffers from a denial-of-service attack. In addition, a transaction with an authentication server that is required for every authentication is considered as a delay factor during handovers. In this paper, we present an improvement of MISP that utilizes the fast handover approach of Fast Mobile IPv6 and minimizes an involvement of the authentication server while eliminating identified security drawbacks of MISP. The formal security analysis is performed to verify the correctness of the proposed scheme. Moreover, the handover performance of the proposed scheme is compared with an existing scheme.

  16. Enhanced structural stability of DNA origami nanostructures by graphene encapsulation

    Matković, Aleksandar; Vasić, Borislav; Pešić, Jelena; Gajić, Radoš; Prinz, Julia; Bald, Ilko; Milosavljević, Aleksandar R

    2016-01-01

    We demonstrate that a single-layer graphene replicates the shape of DNA origami nanostructures very well. It can be employed as a protective layer for the enhancement of structural stability of DNA origami nanostructures. Using the AFM based manipulation, we show that the normal force required to damage graphene encapsulated DNA origami nanostructures is over an order of magnitude greater than for the unprotected ones. In addition, we show that graphene encapsulation offers protection to the DNA origami nanostructures against prolonged exposure to deionized water, and multiple immersions. Through these results we demonstrate that graphene encapsulated DNA origami nanostructures are strong enough to sustain various solution phase processing, lithography and transfer steps, thus extending the limits of DNA-mediated bottom-up fabrication. (paper)

  17. Optical and tribomechanical stability of optically variable interference security devices prepared by dual ion beam sputtering.

    Çetinörgü-Goldenberg, Eda; Baloukas, Bill; Zabeida, Oleg; Klemberg-Sapieha, Jolanta; Martinu, Ludvik

    2011-07-01

    Optical security devices applied to banknotes and other documents are exposed to different types of harsh environments involving the cycling of temperature, humidity, chemical agents, and tribomechanical intrusion. In the present work, we study the stability of optically variable devices, namely metameric interference filters, prepared by dual ion beam sputtering onto polycarbonate and glass substrates. Specifically, we assess the color difference as well as the changes in the mechanical properties and integrity of all-dielectric and metal-dielectric systems due to exposure to bleach, detergent and acetone agents, and heat and humidity. The results underline a significant role of the substrate material, of the interfaces, and of the nature and microstructure of the deposited films in long term stability under everyday application conditions.

  18. Enhancing security of DICOM images during storage and ...

    Brain tumour Image is in DICOM standard (Rosslyn 1996) in which the patient informa- tion including name, birth date, gender, history are included in object classes. This information is sensitive to the patient and important for radiologist diagnosis. Data security becomes an important issue when brain tumour images are ...

  19. Managing climatic risks for enhanced food security: Key information capabilities

    Balaghi, R.; Badjeck, M.C.; Bakari, D.; Pauw, de E.D.; Wit, de A.J.W.; Defourny, P.; Donato, S.; Gommes, R.; Jlibene, M.; Ravelo, A.C.; Sivakumar, M.V.K.; Telahigue, N.; Tychon, B.

    2010-01-01

    Food security is expected to face increasing challenges from climatic risks that are more and more exacerbated by climate change, especially in the developing world. This document lists some of the main capabilities that have been recently developed, especially in the area of operational

  20. Hollow wall to stabilize and enhance ignition hohlraums

    Vandenboomgaerde, M.; Grisollet, A.; Bonnefille, M.; Clérouin, J.; Arnault, P.; Desbiens, N.; Videau, L.

    2018-01-01

    In the context of the indirect-drive scheme of the inertial-confinement fusion, performance of the gas-filled hohlraums at the National Ignition Facility appears to be reduced. Experiments ascertain a limited efficacy of the laser beam propagation and x-ray conversion. One identified issue is the growth of the gold plasma plume (or bubble) which is generated near the ends of the hohlraum by the impact of the laser beams. This bubble impedes the laser propagation towards the equator of the hohlraum. Furthermore, for high foot or low foot laser pulses, the gold-gas interface of the bubble can be unstable. If this instability should grow to mixing, the x-ray conversion could be degraded. A novel hollow-walled hohlraum is designed, which drastically reduces the growth of the gold bubble and stabilizes the gold-gas interface. The hollow walls are built from the combination of a thin gold foil and a gold domed-wall. We theoretically explain how the bubble expansion can be delayed and the gold-gas interface stabilized. This advanced design lets the laser beams reach the waist of the hohlraum. As a result, the x-ray drive on the capsule is enhanced, and more spherical implosions are obtained. Furthermore, this design only requires intermediate gas fill density to be efficient.

  1. Stabilizing ultrasmall Au clusters for enhanced photoredox catalysis.

    Weng, Bo; Lu, Kang-Qiang; Tang, Zichao; Chen, Hao Ming; Xu, Yi-Jun

    2018-04-18

    Recently, loading ligand-protected gold (Au) clusters as visible light photosensitizers onto various supports for photoredox catalysis has attracted considerable attention. However, the efficient control of long-term photostability of Au clusters on the metal-support interface remains challenging. Herein, we report a simple and efficient method for enhancing the photostability of glutathione-protected Au clusters (Au GSH clusters) loaded on the surface of SiO 2 sphere by utilizing multifunctional branched poly-ethylenimine (BPEI) as a surface charge modifying, reducing and stabilizing agent. The sequential coating of thickness controlled TiO 2 shells can further significantly improve the photocatalytic efficiency, while such structurally designed core-shell SiO 2 -Au GSH clusters-BPEI@TiO 2 composites maintain high photostability during longtime light illumination conditions. This joint strategy via interfacial modification and composition engineering provides a facile guideline for stabilizing ultrasmall Au clusters and rational design of Au clusters-based composites with improved activity toward targeting applications in photoredox catalysis.

  2. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  3. Enhancing China’s Energy Security: Determining Influential Factors and Effective Strategic Measures

    Ren, Jingzheng; Sovacool, Benjamin

    2014-01-01

    This study investigates the most influential factors affecting China’s energy security. It also identifies the most effective strategic measures for enhancing it. Fuzzy AHP has been used to determine weights for ranking the importance of Chinese energy security factors, and it has also been used...... to determine the priorities of the strategic measures with respect to enhancing those same factors. The study argues that a low proportion of renewable energy penetration is the most severe factor threatening China’s energy security, and that conducting research and development on energy technologies...

  4. Remote monitoring in safeguards: Security of information and enhanced cooperation

    Galdoz, Erwin; Calzetta, Osvaldo; Fernández Moreno, Sonia; Llacer, Carlos; Díaz, Gustavo; Vigile, Sebastián; Brunhuber, Christoph

    2011-01-01

    Unattended systems with remote transmission capabilities (RM) have the potential to improve safeguards efficiency. Moreover, the evolution of technology and the steady growing of nuclear materials subject to control, lead modern safeguards increasingly utilizing unattended equipment with the capability to store relevant data for long periods of time coupled with the option of being remotely accessed and checked. Remote inspection is still a concept under development, but it may end to be a powerful more efficient verification modality in medium term future. An important part of drawing meaningful safeguards conclusions rests on authenticity and reliability of the information on nuclear material and facilities acquired through the various verification activities and measures applied by IAEA and regional safeguards organizations, like ABACC. The increasing utilization of such technology to further optimize safeguards responds to a multifaceted environment where security of information for all relevant parties is of utmost importance. From the point of view of the IAEA and ABACC, the use of any technology for safeguards application, and specially the use of RM, requires to ensure the security of data collected to guarantee the validity and veracity of such information throughout the whole process (e.g., from collecting to reviewing). This is also valid to the SSAC involved in the process. Information security is also relevant for States and Operators. Assurance should be given that the information could not be withdrawn by non-authorized entities and that facility data is also fully secured. Another important aspect related to RM that may also fall in the security aspect of safeguards relevant information that merits further consideration, is the sharing of information between organizations like ABACC and the IAEA as well as the possibility to make this data available for States authorities purposes. This paper discusses three main themes related to RM: (i) the extent

  5. Trust Model to Enhance Security and Interoperability of Cloud Environment

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  6. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  7. Intelligent data analysis for e-learning enhancing security and trustworthiness in online learning systems

    Miguel, Jorge; Xhafa, Fatos

    2016-01-01

    Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the security deficiencies found in most online collaborative learning systems. The book explores trustworthiness methodologies based on collective intelligence than can overcome these deficiencies. It examines trustworthiness analysis that utilizes the large amounts of data-learning activities generate. In addition, as proc...

  8. Security enhanced BioEncoding for protecting iris codes

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  9. The ASEAN Political-Security Community: Enhancing Defense Cooperation

    2015-12-01

    Yoong Lee, ASEAN Matters: Reflecting on the Association of Southeast Asian Nations (Singapore; Hackensack, NJ: World Scientific., 2011), i, http...from becoming overpopulated —by moving Javanese to low-density islands: Kalimantan, Sumatera, Papua, and Sulawesi. 58 Collins, Security and Southeast...In the mid-2000s, the increasing number of piracy and armed robbery activities in the Malacca Straits attracted world attention and attributed to the

  10. Hydrogel Tethering Enhances Interdomain Stabilization of Single-Chain Antibodies

    Xiong, Yijia [Department; Ford, Nicole R. [Marine; Hecht, Karen A. [Marine; Roesijadi, Guritno [Marine; Department; Squier, Thomas C. [Department

    2017-10-12

    Self-assembly of recombinant proteins within the biosilica of living diatoms represents a means to construct functional materials in a reproducible and scalable manner that enable applications that harness the inherent specificities of proteins to sense and respond to environmental cues. Here we describe the use of a silaffin-derived lysine-rich 39 amino-acid targeting sequence (Sil3T8) to direct a single chain fragment variable (scFv) antibody or an enhanced green fluorescent protein (EGFP) to assemble within the biosilica frustule, resulting in abundances in excess of 200,000 proteins per frustule. The fluorescence of either a derivative of trinitrotoluene (TNT) bound to the scFv or the endogenous fluorescence of EGFP was used to monitor pro-tein conformational dynamics, accessibility to external quenchers, binding affinity, and conformational stability. We find that proteins within isolated frustules undergo isotropic rotational motions with two-fold increases in rotational correlation times, which are indicative of weak macromolecular associations within the biosilica. Solvent accessibilities and high-affinity (pM) binding are comparable to those in solution. In contrast to solution conditions, scFv antibod-ies within the biosilica matrix retain their binding affinity in the presence of chaotropic agents (i.e., 8 M urea). These results argue that dramatic increases in protein conforma-tional stability within the biosilica frustule matrices arise through molecular crowding, acting to retain native protein folds and associated functionality to allow the utility of engineered proteins under a range of harsh environmental conditions associated with environmental sensing and industrial catalytic transformations.

  11. Good Manufacturing Practices (GMP) / Good Laboratory Practices (GLP) Review and Applicability for Chemical Security Enhancements

    Iveson, Steven W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). International Chemical Security Threat Reduction

    2014-11-01

    Global chemical security has been enhanced through the determined use and integration of both voluntary and legislated standards. Many popular standards contain components that specifically detail requirements for the security of materials, facilities and other vital assets. In this document we examine the roll of quality management standards and how they affect the security culture within the institutions that adopt these standards in order to conduct business within the international market place. Good manufacturing practices and good laboratory practices are two of a number of quality management systems that have been adopted as law in many nations. These standards are designed to protect the quality of drugs, medicines, foods and analytical test results in order to provide the world-wide consumer with safe and affective products for consumption. These standards provide no established security protocols and yet manage to increase the security of chemicals, materials, facilities and the supply chain via the effective and complete control over the manufacturing, the global supply chains and testing processes. We discuss the means through which these systems enhance security and how nations can further improve these systems with additional regulations that deal specifically with security in the realm of these management systems. We conclude with a discussion of new technologies that may cause disruption within the industries covered by these standards and how these issues might be addressed in order to maintain or increase the level of security within the industries and nations that have adopted these standards.

  12. Enhanced way of securing automated teller machine to track the misusers using secure monitor tracking analysis

    Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil

    2017-11-01

    Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.

  13. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  14. Observation of enhanced nuclear stability near the 162 neutron shell

    Lougheed, R.W.; Moody, K.J.; Wild, J.F.; Hulet, E.K.; McQuaid, J.H. [Lawrence Livermore National Lab., CA (United States); Lazarev, Yu.A.; Lobanov, Yu.V.; Oganessian, Yu.Ts.; Utyonkov, V.K.; Abdullin, F.Sh.; Buklanov, G.V.; Gikal, B.N.; Iliev, S.; Mezentsev, A.N.; Polyakov, A.N.; Sedykh, I.M.; Shirokovsky, I.V.; Subbotin, V.G.; Sukhov, A.M.; Tsyganov, Yu.S.; Zhuchko, V.E. [Joint Inst. for Nuclear Research, Dubna (Russian Federation)

    1993-09-22

    In bombardments of {sup 248}Cm with {sup 22}Ne the authors discovered two new isotopes, {sup 265}106 and {sup 266}106, by establishing genetic links between {alpha} decays of the 106 nuclides and SF or {alpha} decays of the daughter (grand-daughter) nuclides. For {sup 266}106 they measured E{sub {alpha}}=8.62{+-}0.06 MeV followed by the SF decay of {sup 262}104 for which they measured a half-life value of 1.2{sup +1.0}{sub {minus}0.5} s. For {sup 265}106 they measured E{sub {alpha}}=8.82{+-}0.06 MeV. They estimated {alpha} half-lives of 10-30 s for {sup 266}106 and 2-30 s for {sup 265}106 with SF branches of {approximately}50% or less. The decay properties of {sup 266}106 indicate a large enhancement in the SF stability of this N=160 nuclide and confirm the existence of the predicted neutron-deformed shell N=162.

  15. Power system security enhancement with unified power flow controller under multi-event contingency conditions

    S. Ravindra

    2017-03-01

    Full Text Available Power system security analysis plays key role in enhancing the system security and to avoid the system collapse condition. In this paper, a novel severity function is formulated using transmission line loadings and bus voltage magnitude deviations. The proposed severity function and generation fuel cost objectives are analyzed under transmission line(s and/or generator(s contingency conditions. The system security under contingency conditions is analyzed using optimal power flow problem. An improved teaching learning based optimization (ITLBO algorithm has been presented. To enhance the system security under contingency conditions in the presence of unified power flow controller (UPFC, it is necessary to identify an optimal location to install this device. Voltage source based power injection model of UPFC, incorporation procedure and optimal location identification strategy based on line overload sensitivity indexes are proposed. The entire proposed methodology is tested on standard IEEE-30 bus test system with supporting numerical and graphical results.

  16. Security Enhanced EMV-Based Mobile Payment Protocol

    Ming-Hour Yang

    2014-01-01

    Full Text Available Near field communication has enabled customers to put their credit cards into a smartphone and use the phone for credit card transaction. But EMV contactless payment allows unauthorized readers to access credit cards. Besides, in offline transaction, a merchant’s reader cannot verify whether a card has been revoked. Therefore, we propose an EMV-compatible payment protocol to mitigate the transaction risk. And our modifications to the EMV standard are transparent to merchants and users. We also encrypt the communications between a card and a reader to prevent eavesdropping on sensitive data. The protocol is able to resist impersonation attacks and to avoid the security threats in EMV. In offline transactions, our scheme requires a user to apply for a temporary offline certificate in advance. With the certificate, banks no longer need to lower customer’s credits for risk control, and users can have online-equivalent credits in offline transactions.

  17. Thermo-cleavable polymers: Materials with enhanced photochemical stability

    Manceau, Matthieu; Petersen, Martin Helgesen; Krebs, Frederik C

    2010-01-01

    Photochemical stability of three thermo-cleavable polymers was investigated as thin films under atmospheric conditions. A significant increase in lifetime was observed once the side-chain was cleaved emphasizing the detrimental effect of solubilizing groups on the photochemical stability of conju......Photochemical stability of three thermo-cleavable polymers was investigated as thin films under atmospheric conditions. A significant increase in lifetime was observed once the side-chain was cleaved emphasizing the detrimental effect of solubilizing groups on the photochemical stability...... of conjugated polymers. In addition to their ease of processing, thermo-cleavable polymers thus also offer a greater intrinsic stability under illumination....

  18. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  19. Conflicts in the Horn of Africa and their Consequences on Sudan's Stability and Security

    Elfatih Abdullahi Abdel Salam

    1995-06-01

    Full Text Available Armed conflicts in the Horn of Africa have been raging in that region for the last forty years with tragic consequences for human life and for economic advancement. These conflicts have three different, but overlapping dimensions: the intrastate, the interstate, and the global levels. The conflicts are of a decided relevance for the Sudan, and particularly to the rebellion in the southern Sudan. The lack of security and stability in southern Sudan forced hundreds of thousand southerners into neighbouring countries, especially Ethiopia and Uganda. Likewise, the Sudan hosted hundreds of thousands Eritreans, Ethiopians, and Ugandans caught in the crossfire of their national conflicts. This development not only created a heavy economic burden on these relatively poor and economically underdeveloped communities, but led to strained political relations among governments. The Sudan has deep-seated security concerns emanating from the tragic developments in that part of the world. It is argued that one practical step to defuse the situation is to look for political solutions for essentially political problems. The next step that follows logically from the first step is to establish economic cooperation arrangements with a view to creating a future economic community in that African region.

  20. Mechanisms for training security inspectors to enhance human performance

    Burkhalter, H.E.; Sessions, J.C.

    1988-01-01

    The Department of Energy (DOE) has established qualification standards for protective force personnel employed at nuclear facilities [10 CFR Part 1046 (Federal Register)]. Training mechanisms used at Los Alamos to enhance human performance in meeting DOE standards include, but are not limited to, the following: for cardio-respiratory training, they utilize distance running, interval training, sprint training, pacing, indoor aerobics and circuit training; for muscular strength, free weights, weight machines, light hand weights, grip strength conditioners, and calistenics are employed; for muscular endurance, participants do high repetitions (15 - 40) using dumbbells, flex weights, resistive rubber bands, benches, and calisthenics; for flexibility, each training session devotes specific times to stretch the muscles involved for a particular activity. These training mechanisms with specific protocols can enhance human performance

  1. International cooperation for the development of consistent and stable transportation regulations to promote and enhance safety and security

    Strosnider, J.

    2004-01-01

    International commerce of radioactive materials crosses national boundaries, linking separate regulatory institutions with a common purpose and making it necessary for these institutions to work together in order to achieve common safety goals in a manner that does not place an undue burden on industry and commerce. Widespread and increasing use of radioactive materials across the world has led to increases in the transport of radioactive materials. The demand for consistency in the oversight of international transport has also increased to prevent unnecessary delays and costs associated with incongruent or redundant regulatory requirements by the various countries through which radioactive material is transported. The International Atomic Energy Agency (IAEA) is the authority for international regulation of transportation of radioactive materials responsible for promulgation of regulations and guidance for the establishment of acceptable methods of transportation for the international community. As such, the IAEA is seen as the focal point for consensus building between its Member States to develop consistency in transportation regulations and reviews and to ensure the safe and secure transport of radioactive material. International cooperation is also needed to ensure stability in our regulatory processes. Changes to transportation regulations should be based on an anticipated safety benefit supported by risk information and insights gained from continuing experience, evaluation, and research studies. If we keep safety as the principle basis for regulatory changes, regulatory stability will be enhanced. Finally, as we endeavour to maintain consistency and stability in our international regulations, we must be mindful of the new security challenges that lay before the international community as a result of a changing terrorist environment. Terrorism is a problem of global concern that also requires international cooperation and support, as we look for ways to

  2. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  3. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  4. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  5. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  6. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  7. Chemical stabilization of porous silicon for enhanced biofunctionalization with immunoglobulin

    Nelson Naveas, Vicente Torres Costa, Dario Gallach, Jacobo Hernandez-Montelongo, Raul Jose Martín Palma, Josefa Predenstinacion Garcia-Ruiz and Miguel Manso-Silván

    2012-01-01

    Full Text Available Porous silicon (PSi is widely used in biological experiments, owing to its biocompatibility and well-established fabrication methods that allow tailoring its surface. Nevertheless, there are some unresolved issues such as deciding whether the stabilization of PSi is necessary for its biological applications and evaluating the effects of PSi stabilization on the surface biofunctionalization with proteins. In this work we demonstrate that non-stabilized PSi is prone to detachment owing to the stress induced upon biomolecular adsorption. Biofunctionalized non-stabilized PSi loses the interference properties characteristic of a thin film, and groove-like structures resulting from a final layer collapse were observed by scanning electron microscopy. Likewise, direct PSi derivatization with 3-aminopropyl-triethoxysilane (APTS does not stabilize PSi against immunoglobulin biofunctionalization. To overcome this problem, we developed a simple chemical process of stabilizing PSi (CoxPSi for biological applications, which has several advantages over thermal stabilization (ToxPSi. The process consists of chemical oxidation in H2O2, surface derivatization with APTS and a curing step at 120 °C. This process offers integral homogeneous PSi morphology, hydrophilic surface termination (contact angle θ = 26° and highly efficient derivatized and biofunctionalized PSi surfaces (six times more efficient than ToxPSi. All these features are highly desirable for biological applications, such as biosensing, where our results can be used for the design and optimization of the biomolecular immobilization cascade on PSi surfaces.

  8. Application of Evolutionary Mechanisms of Enhancers for Development Effective Artificial Intelligence Systems for Providing Data Security

    M. L. Garanina

    2010-06-01

    Full Text Available This article describes the base approaches of the methods of evolutionary mechanisms (special type of genes — enhancers for parameterizations of AI systems genotype. This method can help in increasing adaptability of AI systems for providing data security.

  9. Enhancement of security using structured phase masked in optical image encryption on Fresnel transform domain

    Yadav, Poonam Lata; Singh, Hukum

    2018-05-01

    To enhance the security in optical image encryption system and to protect it from the attackers, this paper proposes new digital spiral phase mask based on Fresnel Transform. In this cryptosystem the Spiral Phase Mask (SPM) used is a hybrid of Fresnel Zone Plate (FZP) and Radial Hilbert Mask (RHM) which makes the key strong and enhances the security. The different keys used for encryption and decryption purposed make the system much more secure. Proposed scheme uses various structured phase mask which increases the key space also it increases the number of parameters which makes it difficult for the attackers to exactly find the key to recover the original image. We have also used different keys for encryption and decryption purpose to make the system much more secure. The strength of the proposed cryptosystem has been analyzed by simulating on MATLAB 7.9.0(R2008a). Mean Square Errors (MSE) and Peak Signal to Noise Ratio (PSNR) are calculated for the proposed algorithm. The experimental results are provided to highlight the effectiveness and sustainability of proposed cryptosystem and to prove that the cryptosystem is secure for usage.

  10. Security Enhancement for Multicast over Internet of Things by Dynamically Constructed Fountain Codes

    Qinghe Du

    2018-01-01

    Full Text Available The Internet of Things (IoT is expected to accommodate every object which exists in this world or likely to exist in the near future. The enormous scale of the objects is challenged by big security concerns, especially for common information dissemination via multicast services, where the reliability assurance for multiple multicast users at the cost of increasing redundancy and/or retransmissions also benefits eavesdroppers in successfully decoding the overheard signals. The objective of this work is to address the security challenge present in IoT multicast applications. Specifically, with the presence of the eavesdropper, an adaptive fountain code design is proposed in this paper to enhance the security for multicast in IoT. The main novel features of the proposed scheme include two folds: (i dynamical encoding scheme which can effectively decrease intercept probability at the eavesdropper; (ii increasing the transmission efficiency compared with the conventional nondynamical design. The analysis and simulation results show that the proposed scheme can effectively enhance information security while achieving higher transmission efficiency with a little accredited complexity, thus facilitating the secured wireless multicast transmissions over IoT.

  11. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  12. International Conference on Nuclear Security: Enhancing Global Efforts. Summary of an International Conference

    2014-01-01

    The International Conference on Nuclear Security: Enhancing Global Efforts was organized by the IAEA and held in Vienna on 1-5 July 2013. The conference was organized in cooperation with the following organizations and initiatives: the European Union; the Global Initiative to Combat Nuclear Terrorism (GICNT); the International Criminal Police Organization (INTERPOL); the Institute of Nuclear Materials Management (INMM); the Nuclear Threat Initiative (NTI); the Organization for Security and Co-operation in Europe (OSCE); the Partnership for Global Security; the Police Community of the Americas (AMERIPOL); the United Nations Interregional Crime and Justice Research Institute (UNICRI); the United Nations Office on Drugs and Crime (UNODC); the World Institute for Nuclear Security (WINS); the World Nuclear Association (WNA); and the World Nuclear Transport Institute (WNTI). A total of 34 ministers participated in the ministerial session of the conference. Altogether, the conference attracted more than 1300 registered participants from 125 IAEA Member States and 21 organizations. The aim of the conference was to review the international community's experience and achievements to date in strengthening nuclear security, to enhance the understanding of current approaches to nuclear security worldwide and identify trends, and to provide a global forum for ministers, policymakers and senior officials to formulate views on future directions and priorities for nuclear security. This book contains the President's Summary of the conference and a summary of the ministerial session, the full text of the ministerial declaration adopted by the conference and summaries of the main conference sessions. The attached CD-ROM contains the full conference programme, the list of conference participants, the national statements from the ministerial session and a selection of papers

  13. SecMAS: Security Enhanced Monitoring and Analysis Systems for Wireless Sensor Networks

    Ding Chao

    2016-01-01

    Full Text Available The monitoring, control, and security guarantee for the communication in the wireless sensor networks (WSNs are currently treated as three independent issues and addressed separately through specialized tools. However, most cases of WSNs applications requires the network administrator change the network configuration in a very short time to response to the change of observed phenomenon with security guarantee. To meet this requirement, we propose a security enhanced monitoring and control platform named SecMAS for WSNs, which provides the real-time visualization about network states and online reconfiguration of the network properties and behaviours in a resource-efficient way. Besides, basic cryptographic primitives and part of the anomaly detection functionalities are implemented in SecMAS to enabling the secure communication in WSNs. Furthermore, we conduct experiments to evaluate the performance of SecMAS in terms of the latency, throughput, communication overhead, and the security capacity. The experimental results demonstrate that the SecMAS system achieves stable, efficient and secure data collection with lightweight quick-response network control.

  14. A framework to enhance security of physically unclonable functions using chaotic circuits

    Chen, Lanxiang

    2018-05-01

    As a new technique for authentication and key generation, physically unclonable function (PUF) has attracted considerable attentions, with extensive research results achieved already. To resist the popular machine learning modeling attacks, a framework to enhance the security of PUFs is proposed. The basic idea is to combine PUFs with a chaotic system of which the response is highly sensitive to initial conditions. For this framework, a specific construction which combines the common arbiter PUF circuit, a converter, and the Chua's circuit is given to implement a more secure PUF. Simulation experiments are presented to further validate the framework. Finally, some practical suggestions for the framework and specific construction are also discussed.

  15. A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

    Srinivas Koppu

    2017-01-01

    Full Text Available An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. The pseudorandom generator has been used along with Lanczos algorithm to generate root characteristics and eigenvectors. Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. Compared with existing methods, the proposed method had more robustness to various attacks: brute-force attack, known cipher plaintext, chosen-plaintext, security key space, key sensitivity, correlation analysis and information entropy, and differential attacks. Simulation results show that the proposed methods give better result in protecting images with low-time complexity.

  16. Trustworthy reconfigurable systems enhancing the security capabilities of reconfigurable hardware architectures

    Feller, Thomas

    2014-01-01

    ?Thomas Feller sheds some light on trust anchor architectures fortrustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware.Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-b

  17. Enhanced Stability of a Protein with Increasing Temperature

    Vinther, Joachim Møllesøe; Kristensen, Søren M; Led, Jens J

    2010-01-01

    The unusual stability of a structured but locally flexible protein, human growth hormone (hGH) at pH 2.7, was investigated using the temperature dependence of the nanosecond-picosecond dynamics of the backbone amide groups obtained from (15)N NMR relaxation data. It is found that the flexibility ...

  18. Power system stabilizer control for wind power to enhance power system stability

    Domínguez García, José Luís; Gomis Bellmunt, Oriol; Bianchi, Fernando Daniel; Sumper, Andreas

    2011-01-01

    The paper presents a small signal stability analysis for power systems with wind farm interaction. Power systems have damping oscillation modes that can be excited by disturbance or fault in the grid. The power converters of the wind farms can be used to reduce these oscillations and make the system more stable. These ideas are explored to design a power system stabilized (PSS) for a network with conventional generators and a wind farm in order to increase the damping of the oscillation...

  19. Rapid stabilization of thawing soils For enhanced vehicle mobility: a field demonstration project

    1999-02-01

    Thawing soil presents a formidable challenge for vehicle operations cross-country and on unsurfaced roads. To mitigate the problem, a variety of stabilization techniques were evaluated for their suitability for rapid employment to enhance military ve...

  20. Enhancement of small signal stability of a DFIG-based wind power ...

    International Journal of Engineering, Science and Technology ... logic controllers for enhancing the small signal stability of DFIG-based wind integrated power system. ... state space model, eigenvalue analysis, fuzzy logic based tuning circuits ...

  1. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  2. ENHANCING FOOD SAFETY AND STABILITY THROUGH IRRADIATION: A REVIEW

    Manzoor Ahmad Shah

    2014-04-01

    Full Text Available Food irradiation is one of the non thermal food processing methods. It is the process of exposing food materials to the controlled amounts of ionizing radiations such as gamma rays, X-rays and accelerated electrons, to improve microbiological safety and stability. Irradiation disrupts the biological processes that lead to decay of food quality. It is an effective tool to reduce food-borne pathogens, spoilage microorganisms and parasites; to extend shelf-life and for insect disinfection. The safety and consumption of irradiated foods have been extensively studied at national levels and in international cooperations and have concluded that foods irradiated under appropriate technologies are both safe and nutritionally adequate. Specific applications of food irradiation have been approved by national legislations of more than 55 countries worldwide. This review aims to discuss the applications of irradiation in food processing with the emphasis on food safety and stability.

  3. Enhanced stability of bound pairs at nonzero lattice momenta

    Kornilovitch, Pavel

    2004-01-01

    A two-body problem on the square lattice is analyzed. The interaction potential consists of strong on-site repulsion and nearest-neighbor attraction. The exact pairing conditions are derived for s-, p-, and d-symmetric bound states. The pairing conditions are strong functions of the total pair momentum K. It is found that the stability of pairs increases with K. At weak attraction, the pairs do not form at the Γ point but stabilize at lattice momenta close to the Brillouin zone boundary. The phase boundaries in the momentum space, which separate stable and unstable pairs, are calculated. It is found that the pairs are formed easier along the (π,0) direction than along the (π,π) direction. This might lead to the appearance of 'hot pairing spots' on the K x and K y axes

  4. Stability enhancement of cytochrome c through heme deprotonation and mutations

    Sonoyama, Takafumi; Hasegawa, Jun; Uchiyama, Susumu; Nakamura, Shota; Kobayashi, Yuji; Sambongi, Yoshihiro

    2009-01-01

    The chemical denaturation of Pseudomonas aeruginosa cytochrome c551 variants was examined at pH 5.0 and 3.6. All variants were stabilized at both pHs compared with the wild-type. Remarkably, the variants carrying the F34Y and/or E43Y mutations were more stabilized than those having the F7A/V13M or V78I ones at pH 5.0 compared with at pH 3.6 by ~3.0 – 4.6 kJ/mol. Structural analyses predicted that the side chains of introduced Tyr-34 and Tyr-43 become hydrogen donors for the hydrogen bond form...

  5. Stability enhancement of cytochrome c through heme deprotonation and mutations.

    Sonoyama, Takafumi; Hasegawa, Jun; Uchiyama, Susumu; Nakamura, Shota; Kobayashi, Yuji; Sambongi, Yoshihiro

    2009-01-01

    The chemical denaturation of Pseudomonas aeruginosa cytochrome c(551) variants was examined at pH 5.0 and 3.6. All variants were stabilized at both pHs compared with the wild-type. Remarkably, the variants carrying the F34Y and/or E43Y mutations were more stabilized than those having the F7A/V13M or V78I ones at pH 5.0 compared with at pH 3.6 by ~3.0-4.6 kJ/mol. Structural analyses predicted that the side chains of introduced Tyr-34 and Tyr-43 become hydrogen donors for the hydrogen bond formation with heme 17-propionate at pH 5.0, but less efficiently at pH 3.6, because the propionate is deprotonated at the higher pH. Our results provide an insight into a stabilization strategy for heme proteins involving variation of the heme electronic state and introduction of appropriate mutations.

  6. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  7. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  8. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  9. Prioritizing low-carbon energy sources to enhance China’s energy security

    Ren, Jingzheng; Sovacool, Benjamin K.

    2015-01-01

    Highlights: • Four dimensions and ten metrics are used for energy security assessment. • Both qualitative and quantitative metrics are considered for energy security. • AHP has been used to quantify qualitative metrics. • TOPSIS method has been used for prioritize the low-carbon energy sources. • Sensitivity analysis and integrated ranking have been carried out. - Abstract: This paper explores how low-carbon systems compare to each other in terms of their net effect on Chinese energy security, and how they ought to be ranked and strategized into an optimal and integrated resource plan. The paper utilizes Analytic Hierarchy Process (AHP) to first determine the relative performances of hydroelectricity, wind energy, solar energy, biomass energy, and nuclear power with respect to the energy security dimensions of availability, affordability, accessibility, and acceptability. Both qualitative and quantitative metrics are considered. It relies on AHP to calculate the relative weights of the qualitative metrics attached to these dimensions of energy security for each of our five low carbon energy sources. Then, energy security performance is determined by aggregating multiple, weighted metrics into a generic index based on the method of TOPSIS and then tweaked with a sensitivity analysis. Finally, an integrated method has been developed to rank the low-carbon energy systems from most to least important, with major implications for Chinese decision-makers and stakeholders. We conclude that hydroelectricity and wind power are the two low-carbon energy sources with the most potential to enhance China’s energy security. By contrast, nuclear and solar power have the least potential

  10. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  11. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  13. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  14. Enhancing Experiment Central Service Reliability: from delivery to security and virtualization

    Donno, Flavia; Buzykaev, Alexey; Saiz Santos, Maria Dolores

    2011-01-01

    The four LHC experiments rely on experiment specific services running on machines mainly located at CERN. Some of these services have been rated by the experiments as very critical: any loss or degradation of performance has a major impact on the experiment's production and analysis activities. It is therefore important to provide a reliable and robust operational environment. In this work we describe the strategy based on service deployment, security and virtualization adopted to enhance the reliability of ATLAS and CMS central services.

  15. Time for Stability in Derivatives Markets – a New Look at Central Counterparty Clearing for Securities Markets

    Thorsten V. Koeppl

    2011-01-01

    The recent financial crisis has driven many plans for improving the stability and resilience of the global financial system. One concept, managing the risk of default in securities or financial derivatives markets through central counterparties, receives scrutiny in this report. The author examines the role centralized clearing parties could play in improving system resilience. These centralized clearing parties are institutions that interpose themselves between counterparties in financial tr...

  16. Enhanced Lamb dip for absolute laser frequency stabilization

    Siegman, A. E.; Byer, R. L.; Wang, S. C.

    1972-01-01

    Enhanced Lamb dip width is 5 MHz and total depth is 10 percent of peak power. Present configuration is useful as frequency standard in near infrared. Technique extends to other lasers, for which low pressure narrow linewidth gain tubes can be constructed.

  17. Both solubility and chemical stability of curcumin are enhanced by solid dispersion in cellulose derivative matrices.

    Li, Bin; Konecke, Stephanie; Wegiel, Lindsay A; Taylor, Lynne S; Edgar, Kevin J

    2013-10-15

    Amorphous solid dispersions (ASD) of curcumin (Cur) in cellulose derivative matrices, hydroxypropylmethylcellulose acetate succinate (HPMCAS), carboxymethylcellulose acetate butyrate (CMCAB), and cellulose acetate adipate propionate (CAAdP) were prepared in order to investigate the structure-property relationship and identify polymer properties necessary to effectively increase Cur aqueous solution concentration. XRD results indicated that all investigated solid dispersions were amorphous, even at a 9:1 Cur:polymer ratio. Both stability against crystallization and Cur solution concentration from these ASDs were significantly higher than those from physical mixtures and crystalline Cur. Remarkably, curcumin was also stabilized against chemical degradation in solution. Chemical stabilization was polymer-dependent, with stabilization in CAAdP>CMCAB>HPMCAS>PVP, while matrices enhanced solution concentration as PVP>HPMCAS>CMCAB≈CAAdP. HPMCAS/Cur dispersions have useful combinations of pH-triggered release profile, chemical stabilization, and strong enhancement of Cur solution concentration. Copyright © 2013 Elsevier Ltd. All rights reserved.

  18. The Importance of the Study of Cognitive Performance Enhancement for U.S. National Security.

    Malish, Richard G

    2017-08-01

    The American military is embarking on the 'Third Offset'-a strategy designed to produce seismic shifts in the future of warfare. Central to the approach is the conjoining of humans, technology, and machines to deliver a decisive advantage on the battlefield. Because technology will spread rapidly and globally, tactical overmatch will occur when American operators possess a competitive edge in cognition. Investigation of cognitive enhancing therapeutics is not widely articulated as an adjunct to the Third Offset, yet failure to study promising agents could represent a strategic vulnerability. Because of its legacy of research into therapeutic agents to enhance human-machine interplay, the aerospace medical community represents a front-running candidate to perform this work. Notably, there are strong signals emanating from gambling, academic, and video-gaming enterprises that already-developed stimulants and other agents provide cognitive benefits. These agents should be studied not only for reasons of national security, but also because cognitive enhancement may be a necessary step in the evolution of humankind. To illustrate these points, this article will assert that: 1) the need to preserve and enhance physical and cognitive health will become more and more important over the next century; 2) aeromedical specialists are in a position to take the lead in the endeavor to enhance cognition; 3) signals of enhancement of the type useful to both military and medical efforts exist aplenty in today's society; and 4) the aeromedical community should approach human enhancement research deliberately but carefully.Malish RG. The importance of the study of cognitive performance enhancement for U.S. national security. Aerosp Med Hum Perform. 2017; 88(8):773-778.

  19. Modification of polymer surfaces to enhance enzyme activity and stability

    Hoffmann, Christian

    Enzyme immobilization is an important concept for the development of improved biocatalytic processes, primarily through facilitated separation procedures. However, enzyme immobilization usually comes at a price of reduced biocatalytic activity. For this reason, different immobilization methods have...... already been developed, combining the same goal to improve enzyme activity, stability and selectivity. Polymer materials have shown, due to their easy processibility and versatile properties, high potential as enzyme support. However, in order to achieve improved enzyme performance, the combination...... on their tailored surface modification in order to obtain improved enzyme-support systems. Firstly, an off-stoichiometric thiol-ene (OSTE) thermosetting material was used for the development of a screening platform allowing the investigation of micro-environmental effects and their impact on the activity...

  20. Delay-enhanced stability and stochastic resonance in perception bistability under non-Gaussian noise

    Yang, Tao; Zeng, Chunhua; Liu, Ruifen; Wang, Hua; Mei, Dongcheng

    2015-01-01

    In this paper we investigate the effect of time delay in an attractor network model of perception bistability driven by non-Gaussian noise. Using delay Langevin and Fokker–Planck approaches, the theoretical analysis of the model is presented. It is found that the mean first-passage time (MFPT) as a function of the time delay exhibits a maximum, which is identified as the characteristic of the delay-enhanced stability of the system. This is different to the case of noise-enhanced stability. The non-Gaussian noise-enhanced stability of the system is also analyzed. The signal-to-noise ratio (SNR) as a function of the noise intensity exhibits a maximum. This maximum implies the identifying characteristic of stochastic resonance (SR), and the time delay and non-Gaussian noise can enhance the SR phenomenon. (paper)

  1. Status and determinants of small farming households' food security and role of market access in enhancing food security in rural Pakistan.

    Umar Ijaz Ahmed

    Full Text Available In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.

  2. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into

  3. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  4. Enhanced weathering strategies for stabilizing climate and averting ocean acidification

    Taylor, Lyla L.; Quirk, Joe; Thorley, Rachel M. S.; Kharecha, Pushker A.; Hansen, James; Ridgwell, Andy; Lomas, Mark R.; Banwart, Steve A.; Beerling, David J.

    2016-04-01

    Chemical breakdown of rocks, weathering, is an important but very slow part of the carbon cycle that ultimately leads to CO2 being locked up in carbonates on the ocean floor. Artificial acceleration of this carbon sink via distribution of pulverized silicate rocks across terrestrial landscapes may help offset anthropogenic CO2 emissions. We show that idealized enhanced weathering scenarios over less than a third of tropical land could cause significant drawdown of atmospheric CO2 and ameliorate ocean acidification by 2100. Global carbon cycle modelling driven by ensemble Representative Concentration Pathway (RCP) projections of twenty-first-century climate change (RCP8.5, business-as-usual; RCP4.5, medium-level mitigation) indicates that enhanced weathering could lower atmospheric CO2 by 30-300 ppm by 2100, depending mainly on silicate rock application rate (1 kg or 5 kg m-2 yr-1) and composition. At the higher application rate, end-of-century ocean acidification is reversed under RCP4.5 and reduced by about two-thirds under RCP8.5. Additionally, surface ocean aragonite saturation state, a key control on coral calcification rates, is maintained above 3.5 throughout the low latitudes, thereby helping maintain the viability of tropical coral reef ecosystems. However, we highlight major issues of cost, social acceptability, and potential unanticipated consequences that will limit utilization and emphasize the need for urgent efforts to phase down fossil fuel emissions.

  5. Enhanced Weathering Strategies for Stabilizing Climate and Averting Ocean Acidification

    Taylor, Lyla L.; Quirk, Joe; Thorley, Rachel M. S.; Kharecha, Pushker A.; Hansen, James; Ridgwell, Andy; Lomas, Mark R.; Banwart, Steve A.; Beerling, David J.

    2015-01-01

    Chemical breakdown of rocks, weathering, is an important but very slow part of the carbon cycle that ultimately leads to CO2 being locked up in carbonates on the ocean floor. Artificial acceleration of this carbon sink via distribution of pulverized silicate rocks across terrestrial landscapes may help offset anthropogenic CO2 emissions. We show that idealized enhanced weathering scenarios over less than a third of tropical land could cause significant drawdown of atmospheric CO2 and ameliorate ocean acidification by 2100. Global carbon cycle modelling driven by ensemble Representative Concentration Pathway (RCP) projections of twenty-first-century climate change (RCP8.5, business-as-usual; RCP4.5, medium-level mitigation) indicates that enhanced weathering could lower atmospheric CO2 by 30-300 ppm by 2100, depending mainly on silicate rock application rate (1 kg or 5 kg m(exp -2) yr (exp -1)) and composition. At the higher application rate, end-of-century ocean acidification is reversed under RCP4.5 and reduced by about two-thirds under RCP8.5. Additionally, surface ocean aragonite saturation state, a key control on coral calcification rates, is maintained above 3.5 throughout the low latitudes, thereby helping maintain the viability of tropical coral reef ecosystems. However, we highlight major issues of cost, social acceptability, and potential unanticipated consequences that will limit utilization and emphasize the need for urgent efforts to phase down fossil fuel emissions.

  6. Enhancement of stability of various nZVI suspensions used in groundwater remediation with environmentally friendly organic stabilizers

    Schmid, Doris; Wagner, Stephan; Velimirović, Milica; Laumann, Susanne; Micić, Vesna; Hofmann, Thilo

    2014-05-01

    The use of nanoscale zero-valent iron (nZVI) particles for in situ remediation of polluted soil and groundwater has been shown as one of the most promising techniques [1]. The success of this technology depends on the mobility, reactivity, and longevity of nZVI particles. The mobility of nZVI particles depends on the properties of the single particles, stability of the particle suspension, and the aquifer material [1,2]. In order to enhance the mobility of nZVI, the mobility-decisive properties of the nZVI particles in suspension such as concentration, size distribution, surface charge, and sedimentation rate have to be investigated and optimized. Previous studies showed that pristine nZVI particles aggregate rapidly in water, reducing the particles radius of influence after injection [3]. In order to prevent aggregation and sedimentation of the nZVI particles, and consequently improve the stability of nZVI suspension and therefore the mobility of the nZVI particles, surface stabilizers can be used to provide electrostatic repulsion and steric or electrosteric stabilization [3,4]. The objective of this lab-scale study is to investigate the potential for enhancing the stability of different nZVI suspensions by means of environmentally friendly organic stabilizers, including carboxymethyl cellulose, pectin, alginate, xanthan, and guar gum. The different nZVI particles used included pristine and polyacrylic acid-coated nZVI particles provided in suspension (Nanofer 25 and Nanofer 25S, respectively, NANOIRON s.r.o., Czech Republic), air-stable nZVI particles (Nanofer Star, (NANOIRON s.r.o., Czech Republic), and milled iron flakes (UVR-FIA, Germany). In order to study the enhancement of nZVI stability (1 g L-1 total iron) different concentrations of organic stabilizers (1-20 wt.%) were applied in these nZVI suspensions. Each nZVI suspension was freshly prepared and treated for 10 minutes with Ultra-Turrax (15 000 rpm) and 10 minutes ultrasonic bath prior to

  7. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  8. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  9. Enhancement of the vibration stability of a microdiffraction goniometer

    Lee, S. H.; Preissner, C.; Lai, B.; Cai, Z.; Shu, D.

    2002-01-01

    High-precision instrumentation, such as that for x-ray diffraction, electron microscopy, scanning probe microscopy, and other optical micropositioning systems, requires the stability that comes from vibration-isolated support structures. Structure-born vibrations impede the acquisition of accurate experimental data through such high-precision instruments. At the Advanced Photon Source, a multiaxis goniometer is installed in the 2-ID-D station for synchrotron microdiffraction investigations. However, ground vibration can excite the kinematic movements of the goniometer linkages, resulting in critically contaminated experimental data. In this paper, the vibration behavior of the goniometer has been considered. Experimental vibration measurements were conducted to define the present vibration levels and determine the threshold sensitivity of the equipment. In addition, experimental modal tests were conducted and used to guide an analytical finite element analysis. Both results were used for finding the best way to reduce the vibration levels and to develop a vibration damping/isolation structure for the 2-ID-D goniometer. The device that was designed and tested could be used to reduce local vibration levels for the vibration isolation of similar high-precision instruments

  10. Pressurizer safety valve serviceability enhancement by spring compression stability

    Ratiu, M.D.; Moisidis, N.T. [California Consulting Engineering and Technology (CALCET), San Leandro, California (United States)

    2007-07-01

    The proactive maintenance of the spring-loaded-self-actuated Pressurizer Safety Valve (PSV) has caused frequent concerns pertaining the spring self actuated reliability due to set point drift, spurious openings, and seat leakage. The exhaustive testing performed on a Crosby PSV model 6M6 has revealed that the principal cause of these malfunctions is the spring compression elastic instability during service. The spring lateral deformations measurements performed validated the analytical shapes for spring compression: symmetrical bending - for coaxial supported ends - restraining any support displacement, and asymmetrical bending induced by the potential misalignment of the supported top end. The source of the spring compression instability appears on the tested Crosby PSV induced by the top end lateral displacement during long term operation. The testing with restrained displacement at the spring top has shown consistent set-point reproducibility, less than +/- 1 per cent. To eliminate the asymmetrical spring buckling, a design review of the PSV is proposed including the guided fixture at the top and the decrease of spring coil slenderness ratio H/D, corresponding to the general analytical elastic stability for the asymmetrical compression. (authors)

  11. Pressurizer safety valve serviceability enhancement by spring compression stability

    Ratiu, M.D.; Moisidis, N.T.

    2007-01-01

    The proactive maintenance of the spring-loaded-self-actuated Pressurizer Safety Valve (PSV) has caused frequent concerns pertaining the spring self actuated reliability due to set point drift, spurious openings, and seat leakage. The exhaustive testing performed on a Crosby PSV model 6M6 has revealed that the principal cause of these malfunctions is the spring compression elastic instability during service. The spring lateral deformations measurements performed validated the analytical shapes for spring compression: symmetrical bending - for coaxial supported ends - restraining any support displacement, and asymmetrical bending induced by the potential misalignment of the supported top end. The source of the spring compression instability appears on the tested Crosby PSV induced by the top end lateral displacement during long term operation. The testing with restrained displacement at the spring top has shown consistent set-point reproducibility, less than +/- 1 per cent. To eliminate the asymmetrical spring buckling, a design review of the PSV is proposed including the guided fixture at the top and the decrease of spring coil slenderness ratio H/D, corresponding to the general analytical elastic stability for the asymmetrical compression. (authors)

  12. Measuring Stability and Security in Iraq: Report to Congress in Accordance with the Department of Defense Appropriations Act 2007 (Section 9010, Public Law 109-289)

    2006-01-01

    This report to Congress includes specific performance indicators and measures of progress toward political, economic, and security stability in Iraq, as directed in Section 9010, DoD Defense Appropriations Act 2007...

  13. An enhanced performance through agent-based secure approach for mobile ad hoc networks

    Bisen, Dhananjay; Sharma, Sanjeev

    2018-01-01

    This paper proposes an agent-based secure enhanced performance approach (AB-SEP) for mobile ad hoc network. In this approach, agent nodes are selected through optimal node reliability as a factor. This factor is calculated on the basis of node performance features such as degree difference, normalised distance value, energy level, mobility and optimal hello interval of node. After selection of agent nodes, a procedure of malicious behaviour detection is performed using fuzzy-based secure architecture (FBSA). To evaluate the performance of the proposed approach, comparative analysis is done with conventional schemes using performance parameters such as packet delivery ratio, throughput, total packet forwarding, network overhead, end-to-end delay and percentage of malicious detection.

  14. Security-enhanced chaos communication with time-delay signature suppression and phase encryption.

    Xue, Chenpeng; Jiang, Ning; Lv, Yunxin; Wang, Chao; Li, Guilan; Lin, Shuqing; Qiu, Kun

    2016-08-15

    A security-enhanced chaos communication scheme with time delay signature (TDS) suppression and phase-encrypted feedback light is proposed, in virtue of dual-loop feedback with independent high-speed phase modulation. We numerically investigate the property of TDS suppression in the intensity and phase space and quantitatively discuss security of the proposed system by calculating the bit error rate of eavesdroppers who try to crack the system by directly filtering the detected signal or by using a similar semiconductor laser to synchronize the link signal and extract the data. The results show that TDS embedded in the chaotic carrier can be well suppressed by properly setting the modulation frequency, which can keep the time delay a secret from the eavesdropper. Moreover, because the feedback light is encrypted, without the accurate time delay and key, the eavesdropper cannot reconstruct the symmetric operation conditions and decode the correct data.

  15. Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research

    Johnsen, Stig; Skramstad, Torbjorn; Hagen, Janne

    This paper discusses the results of a questionnaire-based survey used to assess the safety, security and resilience of information and communications technology (ICT) and supervisory control and data acquisition (SCADA) systems used in the Norwegian oil and gas industry. The survey identifies several challenges, including the involvement of professionals with different backgrounds and expertise, lack of common risk perceptions, inadequate testing and integration of ICT and SCADA systems, poor information sharing related to undesirable incidents and lack of resilience in the design of technical systems. Action research is proposed as a process for addressing these challenges in a systematic manner and helping enhance the safety, security and resilience of ICT and SCADA systems used in oil and gas operations.

  16. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  17. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  18. Enhanced Secure Trusted AODV (ESTA Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks

    Dilraj Singh

    2015-09-01

    Full Text Available The self-organizing nature of the Mobile Ad hoc Networks (MANETs provide a communication channel anywhere, anytime without any pre-existing network infrastructure. However, it is exposed to various vulnerabilities that may be exploited by the malicious nodes. One such malicious behavior is introduced by blackhole nodes, which can be easily introduced in the network and, in turn, such nodes try to crumble the working of the network by dropping the maximum data under transmission. In this paper, a new protocol is proposed which is based on the widely used Ad hoc On-Demand Distance Vector (AODV protocol, Enhanced Secure Trusted AODV (ESTA, which makes use of multiple paths along with use of trust and asymmetric cryptography to ensure data security. The results, based on NS-3 simulation, reveal that the proposed protocol is effectively able to counter the blackhole nodes in three different scenarios.

  19. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  20. Solid Waste Biodegradation Enhancements and the Evaluation of Analytical Methods Used to Predict Waste Stability

    Kelly, Ryan J.

    2002-01-01

    Conventional landfills are built to dispose of the increasing amount of municipal solid waste (MSW) generated each year. A relatively new type of landfill, called a bioreactor landfill, is designed to optimize the biodegradation of the contained waste to stabilized products. Landfills with stabilized waste pose little threat to the environment from ozone depleting gases and groundwater contamination. Limited research has been done to determine the importance of biodegradation enhancement tech...

  1. Vastly enhancing the chemical stability of phosphorene by employing an electric field.

    Gao, Junfeng; Zhang, Gang; Zhang, Yong-Wei

    2017-03-23

    Currently, a major hurdle preventing phosphorene from various electronic applications is its rapid oxidation under ambient conditions. Thus how to enhance its chemical stability by suppressing oxidation becomes an urgent task. Here, we reveal a highly effective procedure to suppress the oxidation of phosphorene by employing a suitable van der Waals (vdW) substrate and a vertical electric field. Our first-principles study shows that the phosphorene-MoSe 2 vdW heterostructure is able to reverse the stability of physisorption and chemisorption of molecular O 2 on phosphorene. With further application of a vertical electric field of -0.6 V Å -1 , the energy barrier for oxidation is able to further increase to 0.91 eV, leading to a 10 5 times enhancement in its lifetime compared with that without using the procedure at room temperature. Our work presents a viable strategy to vastly enhance the chemical stability of phosphorene in air.

  2. The Interagency and Counterinsurgency Warfare: Stability, Security, Transition, and Reconstruction Roles

    Cerami, Joseph R; Boggs, Jay W

    2007-01-01

    Too many American military personnel, diplomats, and government officials are returning from Iraq and Afghanistan claiming that success in bringing stability to those two countries has been minimal...

  3. Enhanced Physical Stability of Amorphous Drug Formulations via Dry Polymer Coating.

    Capece, Maxx; Davé, Rajesh

    2015-06-01

    Although amorphous solid drug formulations may be advantageous for enhancing the bioavailability of poorly soluble active pharmaceutical ingredients, they exhibit poor physical stability and undergo recrystallization. To address this limitation, this study investigates stability issues associated with amorphous solids through analysis of the crystallization behavior for acetaminophen (APAP), known as a fast crystallizer, using a modified form of the Avrami equation that kinetically models both surface and bulk crystallization. It is found that surface-enhanced crystallization, occurring faster at the free surface than in the bulk, is the major impediment to the stability of amorphous APAP. It is hypothesized that a novel use of a dry-polymer-coating process referred to as mechanical-dry-polymer-coating may be used to inhibit surface crystallization and enhance stability. The proposed process, which is examined, simultaneously mills and coats amorphous solids with polymer, while avoiding solvents or solutions, which may otherwise cause stability or crystallization issues during coating. It is shown that solid dispersions of APAP (64% loading) with a small particle size (28 μm) could be prepared and coated with the polymer, carnauba wax, in a vibratory ball mill. The resulting amorphous solid was found to have excellent stability as a result of inhibition of surface crystallization. © 2015 Wiley Periodicals, Inc. and the American Pharmacists Association.

  4. A hybrid superconducting fault current limiter for enhancing transient stability in Korean power systems

    Seo, Sangsoo; Kim, Seog-Joo; Moon, Young-Hwan; Lee, Byongjun

    2013-11-01

    Additional power generation sites have been limited in Korea, despite the fact load demands are gradually increasing. In order to meet these increasing demands, Korea’s power system company has begun constructing new generators at existing sites. Thus, multi-unit plants can create problems in terms of transient stability when a large disturbance occurs. This paper proposes a hybrid superconducting fault current limiter (SFCL) application to enhance the transient stability of multi-unit power plants. SFCLs reduce fault currents, and limitation currents decrease the imbalance of the mechanical and electrical torque of the generators, resulting in an improvement in transient stability.

  5. Printable luminescent down shifter for enhancing efficiency and stability of organic photovoltaics

    Kettle, J.; Bristow, N.; Gethin, D.T.

    2016-01-01

    monitoring, using a 16-cell monolithically connected OPV module. By applying the LDS layer, a ~5% relative enhancement in photocurrent is observed for both sets of devices. More significantly, indoor light soaking tests on single cell devices without encapsulation showed an 850% enhancement in the measured...... half-life (T50%). The OPV modules were encapsulated and tested for outdoor stability over a 70 day period in the Negev desert, Israel. The modules made with the LDS filter are shown to match the stability of those made with a commercial UV filter and outperform the modules with no filter applied...

  6. Transient Stability Enhancement in Power System Using Static VAR Compensator (SVC

    Youssef MOULOUDI

    2012-12-01

    Full Text Available In this paper, an indirect adaptive fuzzy excitation and static VAR (unit of reactive power, volt-ampere reactive compensator (SVC controller is proposed to enhance transient stability for the power system, which based on input-output linearization technique. A three-bus system, which contains a generator and static VAR compensator (SVC, is considered in this paper, the SVC is located at the midpoint of the transmission lines. Simulation results show that the proposed controller compared with a controller based on tradition linearization technique can enhance the transient stability of the power system under a large sudden fault, which may occur nearly at the generator bus terminal.

  7. Quantum-Enhanced Cyber Security: Experimental Computation on Quantum-Encrypted Data

    2017-03-02

    AFRL-AFOSR-UK-TR-2017-0020 Quantum-Enhanced Cyber Security: Experimental Computation on Quantum- Encrypted Data Philip Walther UNIVERSITT WIEN Final...on Quantum- Encrypted Data 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA9550-16-1-0004 5c.  PROGRAM ELEMENT NUMBER 61102F 6. AUTHOR(S) Philip Walther 5d...1010 AT 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) EOARD Unit 4515 APO AE 09421-4515 10

  8. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  9. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  10. Nanocaged enzymes with enhanced catalytic activity and increased stability against protease digestion

    Zhao, Zhao; Fu, Jinglin; Dhakal, Soma; Johnson-Buck, Alexander; Liu, Minghui; Zhang, Ting; Woodbury, Neal W.; Liu, Yan; Walter, Nils G.; Yan, Hao

    2016-01-01

    Cells routinely compartmentalize enzymes for enhanced efficiency of their metabolic pathways. Here we report a general approach to construct DNA nanocaged enzymes for enhancing catalytic activity and stability. Nanocaged enzymes are realized by self-assembly into DNA nanocages with well-controlled stoichiometry and architecture that enabled a systematic study of the impact of both encapsulation and proximal polyanionic surfaces on a set of common metabolic enzymes. Activity assays at both bulk and single-molecule levels demonstrate increased substrate turnover numbers for DNA nanocage-encapsulated enzymes. Unexpectedly, we observe a significant inverse correlation between the size of a protein and its activity enhancement. This effect is consistent with a model wherein distal polyanionic surfaces of the nanocage enhance the stability of active enzyme conformations through the action of a strongly bound hydration layer. We further show that DNA nanocages protect encapsulated enzymes against proteases, demonstrating their practical utility in functional biomaterials and biotechnology. PMID:26861509

  11. Nanocaged enzymes with enhanced catalytic activity and increased stability against protease digestion

    Zhao, Zhao; Fu, Jinglin; Dhakal, Soma; Johnson-Buck, Alexander; Liu, Minghui; Zhang, Ting; Woodbury, Neal W.; Liu, Yan; Walter, Nils G.; Yan, Hao

    2016-02-01

    Cells routinely compartmentalize enzymes for enhanced efficiency of their metabolic pathways. Here we report a general approach to construct DNA nanocaged enzymes for enhancing catalytic activity and stability. Nanocaged enzymes are realized by self-assembly into DNA nanocages with well-controlled stoichiometry and architecture that enabled a systematic study of the impact of both encapsulation and proximal polyanionic surfaces on a set of common metabolic enzymes. Activity assays at both bulk and single-molecule levels demonstrate increased substrate turnover numbers for DNA nanocage-encapsulated enzymes. Unexpectedly, we observe a significant inverse correlation between the size of a protein and its activity enhancement. This effect is consistent with a model wherein distal polyanionic surfaces of the nanocage enhance the stability of active enzyme conformations through the action of a strongly bound hydration layer. We further show that DNA nanocages protect encapsulated enzymes against proteases, demonstrating their practical utility in functional biomaterials and biotechnology.

  12. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  13. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  14. Securing Stability and Inclusiveness: G20 Summit Success in Controlling Financial Crises

    John Kirton

    2017-08-01

    Full Text Available The G20 summit system has successfully controlled financial crises, restoring global financial stability after the shock from the US in 2008 and preventing the third shock from Europe in 2010 from resulting in a global contagion. After the G20 finance ministers effectively responded to the Asian-turned-global financial crisis in 1999, they failed to prevent the greater American-turned-global financial crisis in 2008, yet their leaders together responded effectively to it, then prevented the escalating euro crisis from going global, and finally reduced the likelihood of another global financial crisis emanating from a systemically significant country. Since 2013, the G20 has also enhanced economic equality between rich and poor countries, but has not fully made up for the loss in economic growth experienced in 2008 to 2013 or eliminated the socioeconomic scarring created during that period. This increasing success was driven by the changing conditions of the forces identified in the systemic hub model of G20 governance. The first was steadily escalating shocks in finance and economics, and related fields, from 1997 to 2012. The sources of these shifted from emerging Asia to a newly-vulnerable United States, Europe and then China in a much reduced form. With such shocks exposing and equalizing the vulnerability of the major powers, the formal multilateral organizations created by the United States and its Atlantic allies in the 1940s and their subsequent informal supplements such as the G7 could not cope. Among its many international institutional competitors, the G20 alone contained, as full, equal members, the countries that increasingly possessed the collectively predominant and internally equalizing capabilities required to respond effectively. They increasingly, if unevenly, became more internationally and domestically open and interconnected financial systems, economies and societies, albeit with some setbacks after 2013. The often high

  15. Ecosystem Management: Tomorrow’s Approach to Enhancing Food Security under a Changing Climate

    Mike Rivington

    2011-06-01

    Full Text Available This paper argues that a sustainable ecosystem management approach is vital to ensure the delivery of essential ‘life support’ ecosystem services and must be mainstreamed into societal conscience, political thinking and economic processes. Feeding the world at a time of climate change, environmental degradation, increasing human population and demand for finite resources requires sustainable ecosystem management and equitable governance. Ecosystem degradation undermines food production and the availability of clean water, hence threatening human health, livelihoods and ultimately societal stability. Degradation also increases the vulnerability of populations to the consequences of natural disasters and climate change impacts. With 10 million people dying from hunger each year, the linkages between ecosystems and food security are important to recognize. Though we all depend on ecosystems for our food and water, about seventy per cent of the estimated 1.1 billion people in poverty around the world live in rural areas and depend directly on the productivity of ecosystems for their livelihoods. Healthy ecosystems provide a diverse range of food sources and support entire agricultural systems, but their value to food security and sustainable livelihoods are often undervalued or ignored. There is an urgent need for increased financial investment for integrating ecosystem management with food security and poverty alleviation priorities. As the world’s leaders worked towards a new international climate change agenda in Cancun, Mexico, 29 November–10 December 2010 (UNFCCC COP16, it was clear that without a deep and decisive post-2012 agreement and major concerted effort to reduce the food crisis, the Millennium Development Goals will not be attained. Political commitment at the highest level will be needed to raise the profile of ecosystems on the global food agenda. It is recommended that full recognition and promotion be given of the linkages

  16. Energy and water tradeoffs in enhancing food security: A selective international assessment

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  17. Study on stability of a-SiCOF films deposited by plasma enhanced chemical vapor deposition

    Ding Shijin; Zhang Qingquan; Wang Pengfei; Zhang Wei; Wang Jitao

    2001-01-01

    Low-dielectric-constant a-SiCOF films have been prepared from TEOS, C 4 F 8 and Ar by using plasma enhanced chemical vapor deposition method. With the aid of X-ray photoelectron spectroscopy (XPS) and Fourier transform infrared spectroscopy (FTIR), the chemical bonding configuration, thermal stability and resistance to water of the films are explored

  18. Origin of Activity and Stability Enhancement for Ag3PO4 Photocatalyst after Calcination

    Pengyu Dong

    2016-11-01

    Full Text Available Pristine Ag3PO4 microspheres were synthesized by a co-precipitation method, followed by being calcined at different temperatures to obtain a series of calcined Ag3PO4 photocatalysts. This work aims to investigate the origin of activity and stability enhancement for Ag3PO4 photocatalyst after calcination based on the systematical analyses of the structures, morphologies, chemical states of elements, oxygen defects, optical absorption properties, separation and transfer of photogenerated electron-hole pairs, and active species. The results indicate that oxygen vacancies (VO˙˙ are created and metallic silver nanoparticles (Ag NPs are formed by the reaction of partial Ag+ in Ag3PO4 semiconductor with the thermally excited electrons from Ag3PO4 and then deposited on the surface of Ag3PO4 microspheres during the calcination process. Among the calcined Ag3PO4 samples, the Ag3PO4-200 sample exhibits the best photocatalytic activity and greatly enhanced photocatalytic stability for photodegradation of methylene blue (MB solution under visible light irradiation. Oxygen vacancies play a significantly positive role in the enhancement of photocatalytic activity, while metallic Ag has a very important effect on improving the photocatalytic stability. Overall, the present work provides some powerful evidences and a deep understanding on the origin of activity and stability enhancement for the Ag3PO4 photocatalyst after calcination.

  19. Enhancement of thermal stability of silver(I) acetylacetonate by platinum(II) acetylacetonate

    Křenek, T.; Kovářík, T.; Pola, M.; Jakubec, Ivo; Bezdička, Petr; Bastl, Zdeněk; Pokorná, Dana; Urbanová, Markéta; Galíková, Anna; Pola, Josef

    2013-01-01

    Roč. 554, FEB (2013), s. 1-7 ISSN 0040-6031 Institutional support: RVO:61388980 ; RVO:61388955 ; RVO:67985858 Keywords : thermal gravimetric analysis * differential scanning calorimetry * silver(I) acetylacetonate * platinum(II) acetylacetonate * enhancement of thermal stability Subject RIV: CA - Inorganic Chemistry; CF - Physical ; Theoretical Chemistry (UFCH-W) Impact factor: 2.105, year: 2013

  20. Enhancing Economic Stability Utilizing the High Technologies in Community Colleges: A Case Study.

    Mehnert, Barbara H.; Kurki, Allan W.

    Strategies to enhance the economic stability of community colleges through high technology approaches are discussed in this paper. First, general economic problems facing higher education are identified, and the ways in which they influence community colleges are described. Next, 10 strategies to aid in the economic recovery of community colleges…

  1. The Interagency and Counterinsurgency Warfare: Stability, Security, Transition, and Reconstruction Roles

    2007-12-01

    simultaneously, rather than sequentially , as Francis Fukuyama has recommended. This methodology led to several notable complications. COMPLICATIONS...Declaration of Independence’s lineup of the purposes for which government is instituted.” Once security has been provided, in Etzioni’s view, political

  2. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Bogdan Sobczak

    2014-03-01

    Full Text Available Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power system, newly connected large thermal units and delaying of building new transmission lines. The principle of fast-valving and advantages of applying this technique in large steam turbine units was presented in the paper. Effectiveness of fast-valving in enhancing the stability of the Polish Power Grid was analyzed. The feasibility study of fast-valving application in the 560 MW unit in Kozienice Power Station (EW SA was discussed.

  3. Enhancement of Frequency Stability Using Synchronization of a Cantilever Array for MEMS-Based Sensors

    Francesc Torres

    2016-10-01

    Full Text Available Micro and nano electromechanical resonators have been widely used as single or multiple-mass detection sensors. Smaller devices with higher resonance frequencies and lower masses offer higher mass responsivities but suffer from lower frequency stability. Synchronization phenomena in multiple MEMS resonators have become an important issue because they allow frequency stability improvement, thereby preserving mass responsivity. The authors present an array of five cantilevers (CMOS-MEMS system that are forced to vibrate synchronously to enhance their frequency stability. The frequency stability has been determined in closed-loop configuration for long periods of time by calculating the Allan deviation. An Allan deviation of 0.013 ppm (@ 1 s averaging time for a 1 MHz cantilever array MEMS system was obtained at the synchronized mode, which represents a 23-fold improvement in comparison with the non-synchronized operation mode (0.3 ppm.

  4. Synthesis and Characterisation of Biocompatible Polymer-Conjugated Magnetic Beads for Enhancement Stability of Urease.

    Doğaç, Yasemin Ispirli; Teke, Mustafa

    2016-04-01

    We reported natural polymer-conjugated magnetic featured urease systems for removal of urea effectively. The optimum temperature (20-60 °C), optimum pH (3.0-10.0), kinetic parameters, thermal stability (4-70 °C), pH stability (4.0-9.0), operational stability (0-250 min), reusability (18 times) and storage stability (24 weeks) were studied for characterisation of the urease-encapsulated biocompatible polymer-conjugated magnetic beads. Also, the surface groups and chemical structure of the magnetic beads were determined by using attenuated total reflectance Fourier transform infrared spectroscopy (ATR-FTIR). The all urease-encapsulated magnetic beads protected their stability of 30-45 % relative activity at 70 °C. A significant increase was observed at their pH stability compared with the free urease for both acidic and alkaline medium. Besides this, their repeatability activity were approximately 100 % during 4(th) run. They showed residual activity of 50 % after 16 weeks. The importance of this work is enhancement stability of immobilised urease by biocompatible polymer-conjugated magnetic beads for the industrial application based on removal of urea.

  5. Big Data-Based Approach to Detect, Locate, and Enhance the Stability of an Unplanned Microgrid Islanding

    Jiang, Huaiguang; Li, Yan; Zhang, Yingchen; Zhang, Jun Jason; Gao, David Wenzhong; Muljadi, Eduard; Gu, Yi

    2017-10-01

    In this paper, a big data-based approach is proposed for the security improvement of an unplanned microgrid islanding (UMI). The proposed approach contains two major steps: the first step is big data analysis of wide-area monitoring to detect a UMI and locate it; the second step is particle swarm optimization (PSO)-based stability enhancement for the UMI. First, an optimal synchrophasor measurement device selection (OSMDS) and matching pursuit decomposition (MPD)-based spatial-temporal analysis approach is proposed to significantly reduce the volume of data while keeping appropriate information from the synchrophasor measurements. Second, a random forest-based ensemble learning approach is trained to detect the UMI. When combined with grid topology, the UMI can be located. Then the stability problem of the UMI is formulated as an optimization problem and the PSO is used to find the optimal operational parameters of the UMI. An eigenvalue-based multiobjective function is proposed, which aims to improve the damping and dynamic characteristics of the UMI. Finally, the simulation results demonstrate the effectiveness and robustness of the proposed approach.

  6. An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.

    Kiah, M L Mat; Nabi, Mohamed S; Zaidan, B B; Zaidan, A A

    2013-10-01

    This study aims to provide security solutions for implementing electronic medical records (EMRs). E-Health organizations could utilize the proposed method and implement recommended solutions in medical/health systems. Majority of the required security features of EMRs were noted. The methods used were tested against each of these security features. In implementing the system, the combination that satisfied all of the security features of EMRs was selected. Secure implementation and management of EMRs facilitate the safeguarding of the confidentiality, integrity, and availability of e-health organization systems. Health practitioners, patients, and visitors can use the information system facilities safely and with confidence anytime and anywhere. After critically reviewing security and data transmission methods, a new hybrid method was proposed to be implemented on EMR systems. This method will enhance the robustness, security, and integration of EMR systems. The hybrid of simple object access protocol/extensible markup language (XML) with advanced encryption standard and secure hash algorithm version 1 has achieved the security requirements of an EMR system with the capability of integrating with other systems through the design of XML messages.

  7. Evaluation of enhancements to Thevenin equivalent based methods for real-time voltage stability assessment

    Perez, Angel; Jóhannsson, Hjörtur; Østergaard, Jacob

    2014-01-01

    The possibilities offered by the use of Phasor Measurement Units (PMU) in real - time monitoring provide interesting ways to ensure secure operation of power systems. This paper studies the specific case of voltage stability and the possible improvements to the Thevenin equivalent methods, which...... is applied generally with local measurements. This paper uses the PMU measurements to calculate the grid transformation coefficients to obtain wide - area information. This is achieved by studying the generator's electromo tive force estimated using values in the coefficient transformation matrix...

  8. INDIA’S GROWING INFLUENCE IN STABILIZING REGIONAL SECURITY IN SOUTHEAST ASIA

    2016-02-16

    East Policy’ focusing on engagement with Southeast Asia .2 Following the reforms, Indian economy grew rapidly with an...civilizational neighbors in Southeast Asia and East Asia .”19 Thus, LEP and recognition of India’s economic, political, security and cultural potential by ASEAN...point. 21 During the 10th East Asia Summit, Prime Minister Modi emphasized the importance of South East Asian region and informed that his

  9. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Ani Kelechi Johnmary

    2014-01-01

    The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassinat...

  10. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  11. Maintaining the stability of nonlinear differential equations by the enhancement of HPM

    Hosein Nia, S.H.; Ranjbar, A.N.; Ganji, D.D.; Soltani, H.; Ghasemi, J.

    2008-01-01

    Homotopy perturbation method is an effective method to find a solution of a nonlinear differential equation. In this method, a nonlinear complex differential equation is transformed to a series of linear and nonlinear parts, almost simpler differential equations. These sets of equations are then solved iteratively. Finally, a linear series of the solutions completes the answer if the convergence is maintained. In this Letter, the need for stability verification is shown through some examples. Consequently, HPM is enhanced by a preliminary assumption. The idea is to keep the inherent stability of nonlinear dynamic, even the selected linear part is not

  12. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  13. Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security

    Belmeguenaï Aîssa

    2013-03-01

    Full Text Available The images are very largely used in our daily life; the security of their transfer became necessary. In this work a novel image encryption scheme using stream cipher algorithm based on nonlinear combination generator is developed. The main contribution of this work is to enhance the security of encrypted image. The proposed scheme is based on the use the several linear feedback shifts registers whose feedback polynomials are primitive and of degrees are all pairwise coprimes combined by resilient function whose resiliency order, algebraic degree and nonlinearity attain Siegenthaler’s and Sarkar, al.’s bounds. This proposed scheme is simple and highly efficient. In order to evaluate performance, the proposed algorithm was measured through a series of tests. These tests included visual test and histogram analysis, key space analysis, correlation coefficient analysis, image entropy, key sensitivity analysis, noise analysis, Berlekamp-Massey attack, correlation attack and algebraic attack. Experimental results demonstrate the proposed system is highly key sensitive, highly resistance to the noises and shows a good resistance against brute-force, statistical attacks, Berlekamp-Massey attack, correlation attack, algebraic attack and a robust system which makes it a potential candidate for encryption of image.

  14. Genetic engineering of crops: a ray of hope for enhanced food security.

    Gill, Sarvajeet Singh; Gill, Ritu; Tuteja, Renu; Tuteja, Narendra

    2014-01-01

    Crop improvement has been a basic and essential chase since organized cultivation of crops began thousands of years ago. Abiotic stresses as a whole are regarded as the crucial factors restricting the plant species to reach their full genetic potential to deliver desired productivity. The changing global climatic conditions are making them worse and pointing toward food insecurity. Agriculture biotechnology or genetic engineering has allowed us to look into and understand the complex nature of abiotic stresses and measures to improve the crop productivity under adverse conditions. Various candidate genes have been identified and transformed in model plants as well as agriculturally important crop plants to develop abiotic stress-tolerant plants for crop improvement. The views presented here are an attempt toward realizing the potential of genetic engineering for improving crops to better tolerate abiotic stresses in the era of climate change, which is now essential for global food security. There is great urgency in speeding up crop improvement programs that can use modern biotechnological tools in addition to current breeding practices for providing enhanced food security.

  15. A Secure-Enhanced Data Aggregation Based on ECC in Wireless Sensor Networks

    Qiang Zhou

    2014-04-01

    Full Text Available Data aggregation is an important technique for reducing the energy consumption of sensor nodes in wireless sensor networks (WSNs. However, compromised aggregators may forge false values as the aggregated results of their child nodes in order to conduct stealthy attacks or steal other nodes’ privacy. This paper proposes a Secure-Enhanced Data Aggregation based on Elliptic Curve Cryptography (SEDA-ECC. The design of SEDA-ECC is based on the principles of privacy homomorphic encryption (PH and divide-and-conquer. An aggregation tree disjoint method is first adopted to divide the tree into three subtrees of similar sizes, and a PH-based aggregation is performed in each subtree to generate an aggregated subtree result. Then the forged result can be identified by the base station (BS by comparing the aggregated count value. Finally, the aggregated result can be calculated by the BS according to the remaining results that have not been forged. Extensive analysis and simulations show that SEDA-ECC can achieve the highest security level on the aggregated result with appropriate energy consumption compared with other asymmetric schemes.

  16. ENTNEA: A concept for enhancing regional atomic energy cooperation for securing nuclear transparency in northeast Asia

    Shin, S. T. [Korea Institute for Defence Analyses, Seoul (Korea)

    2000-11-01

    Nuclear energy continues to be a strong and growing component of economic development in Northeast Asia. A broad range of nuclear energy systems already exists across the region and vigorous growth is projected. Associated with these capabilities and plans are various concerns about operational safety, environmental protection, and accumulation of spent fuel and other nuclear materials. We consider cooperative measures that might address these concerns. The confidence building measures suggested here center on the sharing of information to lessen concerns about nuclear activities or to solve technical problems. These activities are encompassed by an Enhanced Nuclear Transparency in Northeast Asia (ENTNEA) concept that would be composed of near-term, information-sharing activities and an eventual regional institution. The near-term activities would address specific concerns and build a tradition of cooperation; examples include radiation measurements for public safety and emergency response, demonstration of safe operations at facilities and in transportation, and material security in the back end of the fuel cycle. Linkages to existing efforts and organizations would be sought to maximize the benefits of cooperation. In the longer term, the new cooperative tradition might evolve into an ENTNEA institution. In institutional form, ENTNEA could combine the near-term activities and new cooperative activities, which might require an institutional basis, for the mutual benefit and security of regional parties. 28 refs., 23 figs., 5 tabs. (Author)

  17. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  18. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  19. Available transfer capability evaluation and enhancement using various FACTS controllers: Special focus on system security

    M. Venkateswara Rao

    2016-03-01

    Full Text Available Nowadays, because of the deregulation of the power industry the continuous increase of the load increases the necessity of calculation of available transfer capability (ATC of a system to analyze the system security. With this calculation, the scheduling of generator can be decided to decrease the system severity. Further, constructing new transmission lines, new substations are very cost effective to meet the increasing load and to increase the transfer capability. Hence, an alternative way to increase the transfer capability is use of flexible ac transmission system (FACTS controllers. In this paper, SSSC, STACOM and UPFC are considered to show the effect of these controllers in enhancing system ATC. For this, a novel current based modeling and optimal location strategy of these controllers are presented. The proposed methodology is tested on standard IEEE-30 bus and IEEE-57 bus test systems with supporting numerical and graphical results.

  20. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness....... Pervasive usage of such systems gives substantial powers to those monitoring the videos and poses a threat to the privacy of anyone observed by the system. Aside from protecting privacy from the outside attackers, it is equally important to protect the privacy of individuals from the inside personnel...... involved in monitoring surveillance data to minimize the chances of misuse of the system, e.g. voyeurism. In this context, several techniques to protect the privacy of individuals, called privacy enhancing techniques (PET) have therefore been proposed in the literature which detect and mask the privacy...

  1. Fabrication of amorphous curcumin nanosuspensions using β-lactoglobulin to enhance solubility, stability, and bioavailability.

    Aditya, N P; Yang, Hanjoo; Kim, Saehoon; Ko, Sanghoon

    2015-03-01

    Curcumin has low aqueous stability and solubility in its native form. It also has a low bioavailability which presents a major barrier to its use in fortifying food products. The aim of this work was to reduce the size of curcumin crystals to the nanoscale and subsequently stabilize them in an amorphous form. To this end, amorphous curcumin nanosuspensions were fabricated using the antisolvent precipitation method with β-lactoglobulin (β-lg) as a stabilizer. The resulting amorphous curcumin nanosuspensions were in the size range of 150-175 nm with unimodal size distribution. The curcumin particles were amorphous and were molecularly dispersed within the β-lg as confirmed by differential scanning calorimetry (DSC) and X-ray diffraction (XRD) studies. The solubility of the amorphous curcumin nanosuspension was enhanced ∼35-fold due to the reduced size and lower crystallinity. Among the formulations, the amorphous curcumin nanosuspensions stabilized with β-lg and prepared at pH 3.4 (β-lg-cur 3.4), showed maximum aqueous stability which was >90% after 30 days. An in vitro study using Caco-2 cell lines showed a significant increase in curcumin bioavailability after stabilization with β-lg. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. Stabilizing salt-bridge enhances protein thermostability by reducing the heat capacity change of unfolding.

    Chi-Ho Chan

    Full Text Available Most thermophilic proteins tend to have more salt bridges, and achieve higher thermostability by up-shifting and broadening their protein stability curves. While the stabilizing effect of salt-bridge has been extensively studied, experimental data on how salt-bridge influences protein stability curves are scarce. Here, we used double mutant cycles to determine the temperature-dependency of the pair-wise interaction energy and the contribution of salt-bridges to ΔC(p in a thermophilic ribosomal protein L30e. Our results showed that the pair-wise interaction energies for the salt-bridges E6/R92 and E62/K46 were stabilizing and insensitive to temperature changes from 298 to 348 K. On the other hand, the pair-wise interaction energies between the control long-range ion-pair of E90/R92 were negligible. The ΔC(p of all single and double mutants were determined by Gibbs-Helmholtz and Kirchhoff analyses. We showed that the two stabilizing salt-bridges contributed to a reduction of ΔC(p by 0.8-1.0 kJ mol⁻¹ K⁻¹. Taken together, our results suggest that the extra salt-bridges found in thermophilic proteins enhance the thermostability of proteins by reducing ΔC(p, leading to the up-shifting and broadening of the protein stability curves.

  3. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  4. On the stabilizing role of species diffusion in chemical enhanced oil recovery

    Daripa, Prabir; Gin, Craig

    2015-11-01

    In this talk, the speaker will discuss a problem on the stability analysis related to the effect of species diffusion on stabilization of fingering in a Hele-Shaw model of chemical enhanced oil recovery. The formulation of the problem is motivated by a specific design principle of the immiscible interfaces in the hope that this will lead to significant stabilization of interfacial instabilities, there by improving oil recovery in the context of porous media flow. Testing the merits of this hypothesis poses some challenges which will be discussed along with some numerical results based on current formulation of this problem. Several open problems in this context will be discussed. This work is currently under progress. Supported by the grant NPRP 08-777-1-141 from the Qatar National Research Fund (a member of The Qatar Foundation).

  5. Towards passive and active laser stabilization using cavity-enhanced atomic interaction

    Schäffer, Stefan Alaric; Christensen, Bjarke Takashi Røjle; Rathmann, Stefan Mossor

    2017-01-01

    Ultra stable frequency references such as the ones used in optical atomic clocks and for quantum metrology may be obtained by stabilizing a laser to an optical cavity that is stable over time. State-of-the-art frequency references are constructed in this way, but their stabilities are currently...... experimental efforts derived from these proposals, to use cavity-enhanced interaction with atomic 88Sr samples as a frequency reference for laser stabilization. Such systems can be realized using both passive and active approaches where either the atomic phase response is used as an error signal, or the narrow...... atomic transition itself is used as a source for a spectrally pure laser. Both approaches shows the promise of being able to compete with the current state of the art in stable lasers and have similar limitations on their ultimately achievable linewidths [1, 2]....

  6. Optimizing Tube Precurvature to Enhance Elastic Stability of Concentric Tube Robots.

    Ha, Junhyoung; Park, Frank C; Dupont, Pierre E

    2017-02-01

    Robotic instruments based on concentric tube technology are well suited to minimally invasive surgery since they are slender, can navigate inside small cavities and can reach around sensitive tissues by taking on shapes of varying curvature. Elastic instabilities can arise, however, when rotating one precurved tube inside another. In contrast to prior work that considered only tubes of piecewise constant precurvature, we allow precurvature to vary along the tube's arc length. Stability conditions for a planar tube pair are derived and used to formulate an optimal design problem. An analytic formulation of the optimal precurvature function is derived that achieves a desired tip orientation range while maximizing stability and respecting bending strain limits. This formulation also includes straight transmission segments at the proximal ends of the tubes. The result, confirmed by both numerical and physical experiment, enables designs with enhanced stability in comparison to designs of constant precurvature.

  7. Structural Design Optimization of a Tiltrotor Aircraft Composite Wing to Enhance Whirl Flutter Stability

    Kim, Taeseong; Kim, Jaehoon; Shin, Sang Joon

    2013-01-01

    In order to enhance the aeroelastic stability of a tiltrotor aircraft, a structural optimization framework is developed by applying a multi-level optimization approach. Each optimization level is designed to achieve a different purpose; therefore, relevant optimization schemes are selected for each...... level. Enhancement of the aeroelastic stability is selected as an objective in the upper-level optimization. This is achieved by seeking the optimal structural properties of a composite wing, including its mass, vertical, chordwise, and torsional stiffness. In the upper-level optimization, the response...... surface method (RSM), is selected. On the other hand, lower-level optimization seeks to determine the local detailed cross-sectional parameters, such as the ply orientation angles and ply thickness, which are relevant to the wing structural properties obtained at the upper-level. To avoid manufacturing...

  8. Enhanced stability of black phosphorus field-effect transistors with SiO₂ passivation.

    Wan, Bensong; Yang, Bingchao; Wang, Yue; Zhang, Junying; Zeng, Zhongming; Liu, Zhongyuan; Wang, Wenhong

    2015-10-30

    Few-layer black phosphorus (BP) has attracted much attention due to its high mobility and suitable band gap for potential applic5ations in optoelectronics and flexible devices. However, its instability under ambient conditions limits its practical applications. Our investigations indicate that by passivation of the mechanically exfoliated BP flakes with a SiO2 layer, the fabricated BP field-effect transistors (FETs) exhibit greatly enhanced environmental stability. Compared to the unpassivated BP devices, which show a fast drop of on/off current ratio by a factor of 10 after one week of ambient exposure, the SiO2-passivated BP devices display a high retained on/off current ratio of over 600 after one week of exposure, just a little lower than the initial value of 810. Our investigations provide an effective route to passivate the few-layer BPs for enhancement of their environmental stability.

  9. The use of synthetic ligaments in the design of an enhanced stability total knee joint replacement.

    Stokes, Michael D; Greene, Brendan C; Pietrykowski, Luke W; Gambon, Taylor M; Bales, Caroline E; DesJardins, John D

    2018-03-01

    Current total knee replacement designs work to address clinically desired knee stability and range of motion through a balance of retained anatomy and added implant geometry. However, simplified implant geometries such as bearing surfaces, posts, and cams are often used to replace complex ligamentous constraints that are sacrificed during most total knee replacement procedures. This article evaluates a novel total knee replacement design that incorporates synthetic ligaments to enhance the stability of the total knee replacement system. It was hypothesized that by incorporating artificial cruciate ligaments into a total knee replacement design at specific locations and lengths, the stability of the total knee replacement could be significantly altered while maintaining active ranges of motion. The ligament attachment mechanisms used in the design were evaluated using a tensile test, and determined to have a safety factor of three with respect to expected ligamentous loading in vivo. Following initial computational modeling of possible ligament orientations, a physical prototype was constructed to verify the function of the design by performing anterior/posterior drawer tests under physiologic load. Synthetic ligament configurations were found to increase total knee replacement stability up to 94% compared to the no-ligament case, while maintaining total knee replacement flexion range of motion between 0° and 120°, indicating that a total knee replacement that incorporates synthetic ligaments with calibrated location and lengths should be able to significantly enhance and control the kinematic performance of a total knee replacement system.

  10. Transducer-based fiber Bragg grating high-temperature sensor with enhanced range and stability

    Mamidi, Venkata Reddy; Kamineni, Srimannarayana; Ravinuthala, Lakshmi Narayana Sai Prasad; Tumu, Venkatappa Rao

    2017-09-01

    Fiber Bragg grating (FBG)-based high-temperature sensor with enhanced-temperature range and stability has been developed and tested. The sensor consists of an FBG and a mechanical transducer, which furnishes a linear temperature-dependent tensile strain on FBG by means of differential linear thermal expansion of two different ceramic materials. The designed sensor is tested over a range: 20°C to 1160°C and is expected to measure up to 1500°C.

  11. Stability Enhancement of a Power System Containing High-Penetration Intermittent Renewable Generation

    Morel, Jorge; Obara, Shin’ya; Morizane, Yuta

    2015-01-01

    This paper considers the transient stability enhancement of a power system containing large amounts of solar and wind generation in Japan. Following the Fukushima Daiichi nuclear disaster there has been an increasing awareness on the importance of a distributed architecture, based mainly on renewable generation, for the Japanese power system. Also, the targets of CO2 emissions can now be approached without heavily depending on nuclear generation. Large amounts of renewable generation leads to...

  12. Factoring tradotronic media communication for human security management and social stability in Nigerian communities

    Ani Kelechi Johnmary

    2014-04-01

    Full Text Available The level of killing and bloodletting in Nigeria is increasing every second, minute, hour, day, month and year. Man, animals, properties etc are increasingly under threat in contemporary Nigerian society. The causes of the massive insecurity of lives and properties remain multi-dimensional. This paper is centered on the need to factor tradotronic media for human security management in Nigeria. It reveals that the dimensions of human insecurity in Nigeria, include but not limited to assassination-based human insecurity, robbery/kidnapping related human insecurity, political-related human insecurity, ethnic-based human insecurity, inter-communal conflict-related human insecurity, religious-motivated human insecurity and multi-dimensional conflict related human insecurity. The paper calles on all lovers of life and human dignity to rise up and defend the survival and existence of every breathing soul around him or her in this sovereign entity, called Nigeria.

  13. Protection enhances community and habitat stability: evidence from a mediterranean marine protected area.

    Fraschetti, Simonetta; Guarnieri, Giuseppe; Bevilacqua, Stanislao; Terlizzi, Antonio; Boero, Ferdinando

    2013-01-01

    Rare evidences support that Marine Protected Areas (MPAs) enhance the stability of marine habitats and assemblages. Based on nine years of observation (2001-2009) inside and outside a well managed MPA, we assessed the potential of conservation and management actions to modify patterns of spatial and/or temporal variability of Posidonia oceanica meadows, the lower midlittoral and the shallow infralittoral rock assemblages. Significant differences in both temporal variations and spatial patterns were observed between protected and unprotected locations. A lower temporal variability in the protected vs. unprotected assemblages was found in the shallow infralittoral, demonstrating that, at least at local scale, protection can enhance community stability. Macrobenthos with long-lived and relatively slow-growing invertebrates and structurally complex algal forms were homogeneously distributed in space and went through little fluctuations in time. In contrast, a mosaic of disturbed patches featured unprotected locations, with small-scale shifts from macroalgal stands to barrens, and harsh temporal variations between the two states. Opposite patterns of spatial and temporal variability were found for the midlittoral assemblages. Despite an overall clear pattern of seagrass regression through time, protected meadows showed a significantly higher shoot density than unprotected ones, suggesting a higher resistance to local human activities. Our results support the assumption that the exclusion/management of human activities within MPAs enhance the stability of the structural components of protected marine systems, reverting or arresting threat-induced trajectories of change.

  14. Enhancing Activity and Stability of Uricase from Lactobacillus plantarum by Zeolite immobilization

    Iswantini, D.; Nurhidayat, N.; Sarah

    2017-03-01

    Lactobacillus plantarum has been known be able to produce uricase for uric acid biosensor. Durability and stability of L. plantarum in generating uricase enzyme was low. Hence, we tried to enhance its durability and stability by immobilizing it onto activated 250 mg zeolite at room temperature using 100 μL L.plantarum suspension and 2.87 mM uric acid, while Michaelis-Menten constant (KM) and Vmax were obtained at 6.7431 mM and 0.9171 µA consecutively, and the linearity range was 0.1-3.3 mM (R2 = 0.9667). Limit of detection (LOD) and limit of quantification (LOQ) value of the measurement were 0.4827 mM and 1.6092 mM respectively. Biosensor stability treatment was carried out in two different treatments, using the same electrode and using disposable electrode. The disposable electrode stability showed better result based on repeated measurements, but stability was still need improvement.

  15. Enhanced Stability of Inactivated Influenza Vaccine Encapsulated in Dissolving Microneedle Patches.

    Chu, Leonard Y; Ye, Ling; Dong, Ke; Compans, Richard W; Yang, Chinglai; Prausnitz, Mark R

    2016-04-01

    This study tested the hypothesis that encapsulation of influenza vaccine in microneedle patches increases vaccine stability during storage at elevated temperature. Whole inactivated influenza virus vaccine (A/Puerto Rico/8/34) was formulated into dissolving microneedle patches and vaccine stability was evaluated by in vitro and in vivo assays of antigenicity and immunogenicity after storage for up to 3 months at 4, 25, 37 and 45°C. While liquid vaccine completely lost potency as determined by hemagglutination (HA) activity within 1-2 weeks outside of refrigeration, vaccine in microneedle patches lost 40-50% HA activity during or shortly after fabrication, but then had no significant additional loss of activity over 3 months of storage, independent of temperature. This level of stability required reduced humidity by packaging with desiccant, but was not affected by presence of oxygen. This finding was consistent with additional stability assays, including antigenicity of the vaccine measured by ELISA, virus particle morphological structure captured by transmission electron microscopy and protective immune responses by immunization of mice in vivo. These data show that inactivated influenza vaccine encapsulated in dissolving microneedle patches has enhanced stability during extended storage at elevated temperatures.

  16. Cross-linkable liposomes stabilize a magnetic resonance contrast-enhancing polymeric fastener.

    Smith, Cartney E; Kong, Hyunjoon

    2014-04-08

    Liposomes are commonly used to deliver drugs and contrast agents to their target site in a controlled manner. One of the greatest obstacles in the performance of such delivery vehicles is their stability in the presence of serum. Here, we demonstrate a method to stabilize a class of liposomes that load gadolinium, a magnetic resonance (MR) contrast agent, as a model cargo on their surfaces. We hypothesized that the sequential adsorption of a gadolinium-binding chitosan fastener on the liposome surface followed by covalent cross-linking of the lipid bilayer would provide enhanced stability and improved MR signal in the presence of human serum. To investigate this hypothesis, liposomes composed of diyne-containing lipids were assembled and functionalized via chitosan conjugated with a hydrophobic anchor and diethylenetriaminepentaacetic acid (DTPA). This postadsorption cross-linking strategy served to stabilize the thermodynamically favorable association between liposome and polymeric fastener. Furthermore, the chitosan-coated, cross-linked liposomes proved more effective as delivery vehicles of gadolinium than uncross-linked liposomes due to the reduced liposome degradation and chitosan desorption. Overall, this study demonstrates a useful method to stabilize a broad class of particles used for systemic delivery of various molecular payloads.

  17. Enhancement of color and clarity in topaz and diamonds by nuclear radiation, safety and security concerns

    Shamshad Ahmed

    2009-01-01

    Inducement of color and clarity in gemstone Topaz, otherwise devoid of these attributes, has been achieved by synergistic utilization of neutron irradiation, electron beam irradiation and heat. The transformation of the colorless, cheaply available topaz into desirable deep blue topaz is a significant value addition, not achievable by other contending techniques .Likewise colorless and unclear diamonds, available in trade at throw away price, have been transformed by neutron irradiation into colored diamonds, known as fancy diamonds. The enhanced gems may possess stable or unstable colors depending on the nature of the color centers produced. In the case of blue topaz and fancy diamonds the colors produced were stable and heating at elevated temperatures can only lead to fading of colors. The enhancement of gems by neutron irradiation is commercially viable provided appropriate equipment and tools are used .In the paper are described the processes of the enhancement of topaz and diamonds along with the instrumentation involved. However, in view of the radioactivity generated as a result of the exposure of gems to the neutrons, and the likelihood of undue exposure of the users, operators etc to the radioactive gems, safety aspects command serious attention. In the paper, the strategies to avoid or to mitigate the radioactivity generated have been discussed. Also documented are the methodologies and the controls to ensure that the radioactive gems are not released before ensuring that the radioactivity, if any, in the irradiated materials is not above the permissible levels in conformity with the international standards. Safety, security and safeguard of these materials are thus appropriately addressed. (Authors)

  18. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    Mott, Stephen

    2007-01-01

    This research explores how hardware-based primitives can be implemented to perform security-related monitoring in real-time, offer better security, and increase performance compared to software-based approaches...

  19. Enhancing the Security Cooperation Marine Air Ground Task Force to Satisfy the Needs of the Uncertain Global Security Environment

    2009-06-12

    and 2004 National Military Strategy (NMS) continue to germinate . Discussions surrounding the spread of effective democracies and alternate...additional civil-military operation capabilities such as enhanced engineering, additional medical and dental support, and transportation tailored for

  20. Agriculture in Bangladesh : A Note on Food Security by Enhancing Productivity

    World Bank

    2009-01-01

    Awami League's Election Manifesto 2008 appropriately recognizes the importance of ensuring food security for all in Bangladesh. Food Security requires increasing agricultural growth which in turn is a key factor in reducing poverty in the country. Food security also requires increasing agricultural production and protecting consumers. Sustained production increases, in turn, require tec...

  1. Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks

    Bashar, Muhammad Shafi Al

    2011-01-01

    In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…

  2. Augmented Performance Environment for Enhancing Interagency Coordination in Stability, Security, Transition, and Reconstruction (SSTR) Operations

    2009-02-01

    mastery-harmony, hierarchy-egalitarianism, autonomy -conservatism, and intuitive-analytical (e.g., Allinson & Hayes, 2000; Hofstede, 2001; Schwartz... autonomy -conservatism in large samples of teachers and students from 49 nations, the implications for interpersonal interaction of coming from...rather than families or other social units. In contrast, collectivist cultures (e.g., Iraq and Afghanistan) place the interests of family, tribe, or

  3. Engineering bright solitons to enhance the stability of two-component Bose–Einstein condensates

    Radha, R.; Vinayagam, P.S.; Sudharsan, J.B.; Liu, Wu-Ming; Malomed, Boris A.

    2015-01-01

    We consider a system of coupled Gross–Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose–Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons. - Highlights: • We formulate a versatile mechanism to enhance the lifetime of vectorial condensates employing Feshbach Resonance. • Vectorial condensates in a transient harmonic trap are more long lived compared to their counterpart in a time independent harmonic trap. • Corroborate the exact analytical results with numerical simulations. • Addition of random noise does not impact the stability of vector BECs.

  4. Engineering bright solitons to enhance the stability of two-component Bose–Einstein condensates

    Radha, R., E-mail: radha_ramaswamy@yahoo.com [Centre for Nonlinear Science, PG and Research Dept. of Physics, Govt. College for Women (Autonomous), Kumbakonam 612001 (India); Vinayagam, P.S.; Sudharsan, J.B. [Centre for Nonlinear Science, PG and Research Dept. of Physics, Govt. College for Women (Autonomous), Kumbakonam 612001 (India); Liu, Wu-Ming, E-mail: wmliu@iphy.ac.cn [Beijing National Laboratory for Condensed Matter Physics, Institute of Physics, Chinese Academy of Sciences, Beijing-100190 (China); Malomed, Boris A., E-mail: malomed@post.tau.ac.il [Department of Physical Electronics, School of Electrical Engineering, Faculty of Engineering, Tel Aviv University, Tel Aviv 69978 (Israel)

    2015-12-04

    We consider a system of coupled Gross–Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose–Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons. - Highlights: • We formulate a versatile mechanism to enhance the lifetime of vectorial condensates employing Feshbach Resonance. • Vectorial condensates in a transient harmonic trap are more long lived compared to their counterpart in a time independent harmonic trap. • Corroborate the exact analytical results with numerical simulations. • Addition of random noise does not impact the stability of vector BECs.

  5. Origin of Shear Stability and Compressive Ductility Enhancement of Metallic Glasses by Metal Coating

    Sun, B. A.; Chen, S. H.; Lu, Y. M.; Zhu, Z. G.; Zhao, Y. L.; Yang, Y.; Chan, K. C.; Liu, C. T.

    2016-01-01

    Metallic glasses (MGs) are notorious for the poor macroscopic ductility and to overcome the weakness various intrinsic and extrinsic strategies have been proposed in past decades. Among them, the metal coating is regarded as a flexible and facile approach, yet the physical origin is poorly understood due to the complex nature of shear banding process. Here, we studied the origin of ductile enhancement in the Cu-coating both experimentally and theoretically. By examining serrated shear events and their stability of MGs, we revealed that the thin coating layer plays a key role in stopping the final catastrophic failure of MGs by slowing down shear band dynamics and thus retarding its attainment to a critical instable state. The mechanical analysis on interplay between the coating layer and shear banding process showed the enhanced shear stability mainly comes from the lateral tension of coating layer induced by the surface shear step and the bonding between the coating layer and MGs rather than the layer thickness is found to play a key role in contributing to the shear stability. PMID:27271435

  6. Validation of enhanced stabilization of municipal solid waste under controlled leachate recirculation using FTIR and XRD.

    Sethi, Sapna; Kothiyal, N C; Nema, Arvind K

    2012-07-01

    Leachate recirculation at neutral PH accompanied with buffer/nutrients addition has been used successfully in earlier stabilization of municipal solid waste in bioreactor landfills. In the present study, efforts were made to enhance the stabilization rate of municipal solid waste (MSW) and organic solid waste (OSW) in simulated landfill bioreactors by controlling the pH of recirculated leachate towards slightly alkaline side in absence of additional buffer and nutrients addition. Enhanced stabilization in waste samples was monitored with the help of analytical tools like Fourier Transform Infrared Spectroscopy (FTIR) and X-Ray Diffraction (XRD). Predominance of bands assigned to inorganic compounds and comparatively lower intensities of bands for organic compounds in the FTIR spectra of waste samples degraded with leachate recirculation under controlled pH confirmed higher rate of biodegradation and mineralization of waste than the samples degraded without controlled leachate recirculation. XRD spectra also confirmed to a greater extent of mineralization in the waste samples degraded under leachate recirculation with controlled pH. Comparison of XRD spectra of two types of wastes pointed out higher degree of mineralization in organic solid waste as compared to municipal solid waste.

  7. A fuzzy genetic approach for network reconfiguration to enhance voltage stability in radial distribution systems

    Sahoo, N.C. [Faculty of Engineering and Technology, Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang, 75450 Melaka (Malaysia); Prasad, K. [Faculty of Information Science and Technology, Multimedia University, Jalan Ayer Keroh Lama, Bukit Beruang, 75450 Melaka (Malaysia)

    2006-11-15

    This paper presents a fuzzy genetic approach for reconfiguration of radial distribution systems (RDS) so as to maximize the voltage stability of the network for a specific set of loads. The network reconfiguration involves a mechanism for selection of the best set of branches to be opened, one from each loop, such that the reconfigured RDS possesses desired performance characteristics. This discrete solution space is better handled by the proposed scheme, which maximizes a suitable optimizing function (computed using two different approaches). In the first approach, this function is chosen as the average of a voltage stability index of all the buses in the RDS, while in the second approach, the complete RDS is reduced to a two bus equivalent system and the optimizing function is the voltage stability index of this reduced two bus system. The fuzzy genetic algorithm uses a suitable coding and decoding scheme for maintaining the radial nature of the network at every stage of genetic evolution, and it also uses a fuzzy rule based mutation controller for efficient search of the solution space. This method, tested on 69 bus and 33 bus RDSs, shows promising results for the both approaches. It is also observed that the network losses are reduced when the voltage stability is enhanced by the network reconfiguration. (author)

  8. A fuzzy genetic approach for network reconfiguration to enhance voltage stability in radial distribution systems

    Sahoo, N.C.; Prasad, K.

    2006-01-01

    This paper presents a fuzzy genetic approach for reconfiguration of radial distribution systems (RDS) so as to maximize the voltage stability of the network for a specific set of loads. The network reconfiguration involves a mechanism for selection of the best set of branches to be opened, one from each loop, such that the reconfigured RDS possesses desired performance characteristics. This discrete solution space is better handled by the proposed scheme, which maximizes a suitable optimizing function (computed using two different approaches). In the first approach, this function is chosen as the average of a voltage stability index of all the buses in the RDS, while in the second approach, the complete RDS is reduced to a two bus equivalent system and the optimizing function is the voltage stability index of this reduced two bus system. The fuzzy genetic algorithm uses a suitable coding and decoding scheme for maintaining the radial nature of the network at every stage of genetic evolution, and it also uses a fuzzy rule based mutation controller for efficient search of the solution space. This method, tested on 69 bus and 33 bus RDSs, shows promising results for the both approaches. It is also observed that the network losses are reduced when the voltage stability is enhanced by the network reconfiguration

  9. Integration of the advanced transparency framework to advanced nuclear systems : enhancing Safety, Operations, Security and Safeguards (SOSS)

    Mendez, Carmen Margarita; Rochau, Gary Eugene; Cleary, Virginia D.

    2008-01-01

    The advent of the nuclear renaissance gives rise to a concern for the effective design of nuclear fuel cycle systems that are safe, secure, nonproliferating and cost-effective. We propose to integrate the monitoring of the four major factors of nuclear facilities by focusing on the interactions between Safeguards, Operations, Security, and Safety (SOSS). We proposed to develop a framework that monitors process information continuously and can demonstrate the ability to enhance safety, operations, security, and safeguards by measuring and reducing relevant SOSS risks, thus ensuring the safe and legitimate use of the nuclear fuel cycle facility. A real-time comparison between expected and observed operations provides the foundation for the calculation of SOSS risk. The automation of new nuclear facilities requiring minimal manual operation provides an opportunity to utilize the abundance of process information for monitoring SOSS risk. A framework that monitors process information continuously can lead to greater transparency of nuclear fuel cycle activities and can demonstrate the ability to enhance the safety, operations, security and safeguards associated with the functioning of the nuclear fuel cycle facility. Sandia National Laboratories (SNL) has developed a risk algorithm for safeguards and is in the process of demonstrating the ability to monitor operational signals in real-time though a cooperative research project with the Japan Atomic Energy Agency (JAEA). The risk algorithms for safety, operations and security are under development. The next stage of this work will be to integrate the four algorithms into a single framework

  10. Security-enhanced phase encryption assisted by nonlinear optical correlation via sparse phase

    Chen, Wen; Chen, Xudong; Wang, Xiaogang

    2015-01-01

    We propose a method for security-enhanced phase encryption assisted by a nonlinear optical correlation via a sparse phase. Optical configurations are established based on a phase retrieval algorithm for embedding an input image and the secret data into phase-only masks. We found that when one or a few phase-only masks generated during data hiding are sparse, it is possible to integrate these sparse masks into those phase-only masks generated during the encoding of the input image. Synthesized phase-only masks are used for the recovery, and sparse distributions (i.e., binary maps) for generating the incomplete phase-only masks are considered as additional parameters for the recovery of secret data. It is difficult for unauthorized receivers to know that a useful phase has been sparsely distributed in the finally generated phase-only masks for secret-data recovery. Only when the secret data are correctly verified can the input image obtained with valid keys be claimed as targeted information. (paper)

  11. Social Milieu Oriented Routing: A New Dimension to Enhance Network Security in WSNs.

    Liu, Lianggui; Chen, Li; Jia, Huiling

    2016-02-19

    In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing to a target a trustee node to carry out trust evaluation. This challenging social milieu oriented routing with more than one end-to-end Quality of Trust (QoT) constraint has proved to be NP-complete. Heuristic algorithms with polynomial and pseudo-polynomial-time complexities are often used to deal with this challenging problem. However, existing solutions cannot guarantee the efficiency of searching; that is, they can hardly avoid obtaining partial optimal solutions during a searching process. Quantum annealing (QA) uses delocalization and tunneling to avoid falling into local minima without sacrificing execution time. This has been proven a promising way to many optimization problems in recently published literatures. In this paper, for the first time, with the help of a novel approach, that is, configuration path-integral Monte Carlo (CPIMC) simulations, a QA-based optimal social trust path (QA_OSTP) selection algorithm is applied to the extraction of the optimal social trust path in large-scale WSNs. Extensive experiments have been conducted, and the experiment results demonstrate that QA_OSTP outperforms its heuristic opponents.

  12. Methods for improving power system security by certifying dynamic stability in island operation

    Granfors, S.; Krantz, N. [Solvina, Goteborg (Sweden)

    2007-07-01

    In response to concerns regarding the vulnerability of power systems around the world to major blackouts, a study was conducted to test island operation capability at power plants. Island operation refers to cases where one or more generators are connected to a limited power grid where there is no external voltage or frequency reference. In island operation, each generator is large enough to have a significant impact on the frequency and voltage in the grid. The ability to operate an isolated island grid can be beneficial for industries or hospitals, as well as for different rural areas. This study identified control parameters and evaluated power plant processes through step responses and frequency analysis. A hardware-in-the-loop (HWIL) simulation technique was proposed for island operation/power restoration testing. The proposed method made it possible to perform safe field studies of power stations that were synchronized to the main grid. More than 40 frequency control tests were conducted on different kinds of power plants in Sweden during normal operation. Most errors were found to be caused by improper operation and unstable conditions. Nearly all machines were stabilized after tuning. It was shown that newly built, identically designed and tuned turbines behave differently due to individual components. This paper addressed issues such as mechanical backlash, unsatisfying calibration of measuring equipment and improper tuning of controllers. In order to tune and optimize frequency control the choice of control algorithm is critical. Several different implementations were used during the tests, but the most successful was based on a separate control mode for island operation including gate-opening feedback for calculating droop. 4 refs., 8 figs.

  13. Enhancing Stability of Perovskite Solar Cells to Moisture by the Facile Hydrophobic Passivation.

    Hwang, Insung; Jeong, Inyoung; Lee, Jinwoo; Ko, Min Jae; Yong, Kijung

    2015-08-12

    In this study, a novel and facile passivation process for a perovskite solar cell is reported. Poor stability in ambient atmosphere, which is the most critical demerit of a perovskite solar cell, is overcome by a simple passivation process using a hydrophobic polymer layer. Teflon, the hydrophobic polymer, is deposited on the top of a perovskite solar cell by a spin-coating method. With the hydrophobic passivation, the perovskite solar cell shows negligible degradation after a 30 day storage in ambient atmosphere. Suppressed degradation of the perovskite film is proved in various ways: X-ray diffraction, light absorption spectrum, and quartz crystal microbalance. This simple but effective passivation process suggests new kind of approach to enhance stability of perovskite solar cells to moisture.

  14. Engineering bright solitons to enhance the stability of two-component Bose-Einstein condensates

    Radha, R.; Vinayagam, P. S.; Sudharsan, J. B.; Liu, Wu-Ming; Malomed, Boris A.

    2015-12-01

    We consider a system of coupled Gross-Pitaevskii (GP) equations describing a binary quasi-one-dimensional Bose-Einstein condensate (BEC) with intrinsic time-dependent attractive interactions, placed in a time-dependent expulsive parabolic potential, in a special case when the system is integrable (a deformed Manakov's system). Since the nonlinearity in the integrable system which represents binary attractive interactions exponentially decays with time, solitons are also subject to decay. Nevertheless, it is shown that the robustness of bright solitons can be enhanced in this system, making their respective lifetime longer, by matching the time dependence of the interaction strength (adjusted with the help of the Feshbach-resonance management) to the time modulation of the strength of the parabolic potential. The analytical results, and their stability, are corroborated by numerical simulations. In particular, we demonstrate that the addition of random noise does not impact the stability of the solitons.

  15. Application of electrolyzer system to enhance frequency stabilization effect of microturbine in a microgrid system

    Vachirasricirikul, Sitthidet [Department of Electrical Engineering, Faculty of Engineering, King Mongkut' s Institute of Technology Ladkrabang, Bangkok 10520 (Thailand); Ngamroo, Issarachai; Kaitwanidvilai, Somyot [Center of Excellence for Innovative Energy Systems, King Mongkut' s Institute of Technology Ladkrabang, Bangkok 10520 (Thailand)

    2009-09-15

    It is well known that the power output of microturbine can be controlled to compensate for load change and alleviate the system frequency fluctuations. Nevertheless, the microturbine may not adequately compensate rapid load change due to its slow dynamic response. Moreover, when the intermittent power generations from wind power and photovoltaic are integrated into the system, they may cause severe frequency fluctuation. In order to study the fast dynamic response, this paper applies electrolyzer system to absorb these power fluctuations and enhance the frequency control effect of microturbine in the microgrid system. The robust coordinated controller of electrolyzer and microturbine for frequency stabilization is designed based on a fixed-structure H{sub {infinity}} loop shaping control. Simulation results exhibit the robustness and stabilizing effects of the proposed coordinated electrolyzer and microturbine controllers against system parameters variation and various operating conditions. (author)

  16. Cross-linked aromatic cationic polymer electrolytes with enhanced stability for high temperature fuel cell applications

    Ma, Wenjia; Zhao, Chengji; Yang, Jingshuai

    2012-01-01

    Diamine-cross-linked membranes were prepared from cross-linkable poly(arylene ether ketone) containing pendant cationic quaternary ammonium group (QPAEK) solution by a facile and general thermal curing method using 4,4′-diaminodiphenylmethane with rigid framework and 1,6-diaminohexane with flexible...... anchoring of the molecule. Combining the excellent thermal stability, the addition of a small amount of diamines enhanced both the chemical and mechanical stability and the phosphoric acid doping (PA) ability of membranes. Fuel cell performance based on impregnated cross-linked membranes have been...... successfully operated at temperatures up to 120 °C and 180 °C with unhumidified hydrogen and air under ambient pressure, the maximum performance of diamine-cross-linked membrane is observed at 180 °C with a current density of 1.06 A cm−2 and the peak power density of 323 mW cm−2. The results also indicate...

  17. Enhanced Stability of DNA Nanostructures by Incorporation of Unnatural Base Pairs.

    Liu, Qing; Liu, Guocheng; Wang, Ting; Fu, Jing; Li, Rujiao; Song, Linlin; Wang, Zhen-Gang; Ding, Baoquan; Chen, Fei

    2017-11-03

    Self-assembled DNA nanostructures hold great promise in the fields of nanofabrication, biosensing and nanomedicine. However, the inherent low stability of the DNA double helices, formed by weak interactions, largely hinders the assembly and functions of DNA nanostructures. In this study, we redesigned and constructed a six-arm DNA junction by incorporation of the unnatural base pairs 5-Me-isoC/isoG and A/2-thioT into the double helices. They not only retained the structural integrity of the DNA nanostructure, but also showed enhanced thermal stability and resistance to T7 Exonuclease digestion. This research may expand the applications of DNA nanostructures in nanofabrication and biomedical fields, and furthermore, the genetic alphabet expansion with unnatural base pairs may enable us to construct more complicated and diversified self-assembled DNA nanostructures. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Stability Enhancement of a Power System Containing High-Penetration Intermittent Renewable Generation

    Jorge Morel

    2015-06-01

    Full Text Available This paper considers the transient stability enhancement of a power system containing large amounts of solar and wind generation in Japan. Following the Fukushima Daiichi nuclear disaster there has been an increasing awareness on the importance of a distributed architecture, based mainly on renewable generation, for the Japanese power system. Also, the targets of CO2 emissions can now be approached without heavily depending on nuclear generation. Large amounts of renewable generation leads to a reduction in the total inertia of the system because renewable generators are connected to the grid by power converters, and transient stability becomes a significant issue. Simulation results show that sodium-sulfur batteries can keep the system in operation and stable after strong transient disturbances, especially for an isolated system. The results also show how the reduction of the inertia in the system can be mitigated by exploiting the kinetic energy of wind turbines.

  19. Adaptive and freeze-tolerant heteronetwork organohydrogels with enhanced mechanical stability over a wide temperature range

    Gao, Hainan; Zhao, Ziguang; Cai, Yudong; Zhou, Jiajia; Hua, Wenda; Chen, Lie; Wang, Li; Zhang, Jianqi; Han, Dong; Liu, Mingjie; Jiang, Lei

    2017-06-01

    Many biological organisms with exceptional freezing tolerance can resist the damages to cells from extra-/intracellular ice crystals and thus maintain their mechanical stability at subzero temperatures. Inspired by the freezing tolerance mechanisms found in nature, here we report a strategy of combining hydrophilic/oleophilic heteronetworks to produce self-adaptive, freeze-tolerant and mechanically stable organohydrogels. The organohydrogels can simultaneously use water and oil as a dispersion medium, and quickly switch between hydrogel- and organogel-like behaviours in response to the nature of the surrounding phase. Accordingly, their surfaces display unusual adaptive dual superlyophobic in oil/water system (that is, they are superhydrophobic under oil and superoleophobic under water). Moreover, the organogel component can inhibit the ice crystallization of the hydrogel component, thus enhancing the mechanical stability of organohydrogel over a wide temperature range (-78 to 80 °C). The organohydrogels may have promising applications in complex and harsh environments.

  20. Enhanced stability of steep channel beds to mass failure and debris flow initiation

    Prancevic, J.; Lamb, M. P.; Ayoub, F.; Venditti, J. G.

    2015-12-01

    Debris flows dominate bedrock erosion and sediment transport in very steep mountain channels, and are often initiated from failure of channel-bed alluvium during storms. While several theoretical models exist to predict mass failures, few have been tested because observations of in-channel bed failures are extremely limited. To fill this gap in our understanding, we performed laboratory flume experiments to identify the conditions necessary to initiate bed failures in non-cohesive sediment of different sizes (D = 0.7 mm to 15 mm) on steep channel-bed slopes (S = 0.45 to 0.93) and in the presence of water flow. In beds composed of sand, failures occurred under sub-saturated conditions on steep bed slopes (S > 0.5) and under super-saturated conditions at lower slopes. In beds of gravel, however, failures occurred only under super-saturated conditions at all tested slopes, even those approaching the dry angle of repose. Consistent with theoretical models, mass failures under super-saturated conditions initiated along a failure plane approximately one grain-diameter below the bed surface, whereas the failure plane was located near the base of the bed under sub-saturated conditions. However, all experimental beds were more stable than predicted by 1-D infinite-slope stability models. In partially saturated sand, enhanced stability appears to result from suction stress. Enhanced stability in gravel may result from turbulent energy losses in pores or increased granular friction for failures that are shallow with respect to grain size. These grain-size dependent effects are not currently included in stability models for non-cohesive sediment, and they may help to explain better the timing and location of debris flow occurrence.

  1. Stabilizing Niger

    Hahonou, Eric Komlavi

    international intervention in Niger. Their main objective is to secure their own strategic, economic and political interests by strengthening the Nigerien authorities through direct intervention and capacity building activities. For western states reinforcing state security institutions and stabilizing elite...

  2. Stabilizing the CH2 Domain of an Antibody by Engineering in an Enhanced Aromatic Sequon.

    Chen, Wentao; Kong, Leopold; Connelly, Stephen; Dendle, Julia M; Liu, Yu; Wilson, Ian A; Powers, Evan T; Kelly, Jeffery W

    2016-07-15

    Monoclonal antibodies (mAbs) exhibiting highly selective binding to a protein target constitute a large and growing proportion of the therapeutics market. Aggregation of mAbs results in the loss of their therapeutic efficacy and can result in deleterious immune responses. The CH2 domain comprising part of the Fc portion of Immunoglobulin G (IgG) is typically the least stable domain in IgG-type antibodies and therefore influences their aggregation propensity. We stabilized the CH2 domain by engineering an enhanced aromatic sequon (EAS) into the N-glycosylated C'E loop and observed a 4.8 °C increase in the melting temperature of the purified IgG1 Fc fragment. This EAS-stabilized CH2 domain also conferred enhanced stability against thermal and low pH induced aggregation in the context of a full-length monoclonal IgG1 antibody. The crystal structure of the EAS-stabilized (Q295F/Y296A) IgG1 Fc fragment confirms the design principle, i.e., the importance of the GlcNAc1•F295 interaction, and surprisingly reveals that the core fucose attached to GlcNAc1 also engages in an interaction with F295. Inhibition of core fucosylation confirms the contribution of the fucose-Phe interaction to the stabilization. The Q295F/Y296A mutations also modulate the binding affinity of the full-length antibody to Fc receptors by decreasing the binding to low affinity Fc gamma receptors (FcγRIIa, FcγRIIIa, and FcγRIIIb), while maintaining wild-type binding affinity to FcRn and FcγRI. Our results demonstrate that engineering an EAS into the N-glycosylated reverse turn on the C'E loop leads to stabilizing N-glycan-protein interactions in antibodies and that this modification modulates antibody-Fc receptor binding.

  3. Using RFID to Enhance Security in Off-Site Data Storage

    Lopez-Carmona, Miguel A.; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R.

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention. PMID:22163638

  4. Using RFID to enhance security in off-site data storage.

    Lopez-Carmona, Miguel A; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2010-01-01

    Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID)-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system's benefits in terms of efficiency and failure prevention.

  5. A numerical technique for enhanced efficiency and stability for the solution of the nuclear reactor equation

    Khotylev, V.A.; Hoogenboom, J.E.

    1996-01-01

    The paper presents new techniques for the solution of the nuclear reactor equation in diffusion approximation, that has enhanced efficiency and stability. The code system based on the new technique solves a number of steady-state and/or transient problems with coupled thermal hydraulics in one-, two-, or three dimensional geometry with reduced CPU time as compared to similar code systems of previous generations if well-posed neutronics problems are considered. Automated detection of ill-posed problem and selection of the appropriate numerical method makes the new code system capable of yielding a correct solution for wider range of problems without user intervention. (author)

  6. A numerical technique for enhanced efficiency and stability for the solution of the nuclear reactor equation

    Khotylev, V.A.; Hoogenboom, J.E. [Delft Univ. of Technology, Interfaculty Reactor Inst., Delft (Netherlands)

    1996-07-01

    The paper presents new techniques for the solution of the nuclear reactor equation in diffusion approximation, that has enhanced efficiency and stability. The code system based on the new technique solves a number of steady-state and/or transient problems with coupled thermal hydraulics in one-, two-, or three dimensional geometry with reduced CPU time as compared to similar code systems of previous generations if well-posed neutronics problems are considered. Automated detection of ill-posed problem and selection of the appropriate numerical method makes the new code system capable of yielding a correct solution for wider range of problems without user intervention. (author)

  7. Glutamine deprivation enhances antitumor activity of 3-bromopyruvate through the stabilization of monocarboxylate transporter-1.

    Cardaci, Simone; Rizza, Salvatore; Filomeni, Giuseppe; Bernardini, Roberta; Bertocchi, Fabio; Mattei, Maurizio; Paci, Maurizio; Rotilio, Giuseppe; Ciriolo, Maria Rosa

    2012-09-01

    Anticancer drug efficacy might be leveraged by strategies to target certain biochemical adaptations of tumors. Here we show how depriving cancer cells of glutamine can enhance the anticancer properties of 3-bromopyruvate, a halogenated analog of pyruvic acid. Glutamine deprival potentiated 3-bromopyruvate chemotherapy by increasing the stability of the monocarboxylate transporter-1, an effect that sensitized cells to metabolic oxidative stress and autophagic cell death. We further elucidated mechanisms through which resistance to chemopotentiation by glutamine deprival could be circumvented. Overall, our findings offer a preclinical proof-of-concept for how to employ 3-bromopyruvate or other monocarboxylic-based drugs to sensitize tumors to chemotherapy. ©2012 AACR.

  8. Development of bubble chambers with enhanced stability and sensitivity to low-energy nuclear recoils

    Bolte, W.J.; Collar, J.I.; Crisler, M.; Hall, J.; Holmgren, D.; Nakazawa, D.; Odom, B.; O'Sullivan, K.; Plunkett, R.; Ramberg, E.; Raskin, A.; Sonnenschein, A.; Vieira, J.D.

    2007-01-01

    The viability of using Bubble Chambers as dark matter particle detectors is considered. Techniques leading to the enhanced chamber stability needed for this new application are described in detail. Prototype trials show that sensitivity to the low-energy nuclear recoils induced by Weakly Interacting Massive Particles (WIMP) is possible in conditions of extreme insensitivity to minimum ionizing backgrounds. An understanding of detector response is demonstrated using existing theoretical models. We briefly comment on the prospects for detection of supersymmetric dark matter with large CF 3 I chambers

  9. Enhancing the stability of copper chromite catalysts for the selective hydrogenation of furfural using ALD overcoating

    Zhang, Hongbo; Lei, Yu; Kropf, A. Jeremy; Zhang, Guanghui; Elam, Jeffrey W.; Miller, Jeffrey T.; Sollberger, Fred; Ribeiro, Fabio; Akatay, M. Cem; Stach, Eric A.; Dumesic, James A.; Marshall, Christopher L.

    2014-08-01

    The stability of a gas-phase furfural hydrogenation catalyst (CuCr2O4 center dot CuO) was enhanced by depositing a thin Al2O3 layer using atomic layer deposition (ALD). Based on temperature-programed reduction (TPR) measurements, the reduction temperature of Cu was raised significantly, and the activation energy for furfural reduction was decreased following the ALD treatment. Thinner ALD layers yielded higher furfural hydrogenation activities. X-ray absorption fine structure (XAFS) spectroscopy studies indicated that Cu1+/Cu-0 are the active species for furfural reduction.

  10. A new reconfiguration scheme for voltage stability enhancement of radial distribution systems

    Arun, M.; Aravindhababu, P.

    2009-01-01

    Network reconfiguration is an operation problem, which entails altering the topological structure of the distribution feeders by rearranging the status of switches in order to obtain an optimal configuration in order to minimise the system losses. This paper presents a new reconfiguration algorithm that enhances voltage stability and improves the voltage profile besides minimising losses without incurring any additional cost for installation of capacitors, tap changing transformers and related switching equipment in the distribution system. Test results on a 69 node distribution system reveal the superiority of this algorithm.

  11. An Enhanced Asymptotic Expansion for the Stability of Nonlinear Elastic Structures

    Christensen, Claus Dencker; Byskov, Esben

    2010-01-01

    A new, enhanced asymptotic expansion applicable to stability of structures made of nonlinear elastic materials is established. The method utilizes “hyperbolic” terms instead of the conventional polynomial terms, covers full kinematic nonlinearity and is applied to nonlinear elastic Euler columns...... with two different types of cross-section. Comparison with numerical results show that our expansion provides more accurate predictions of the behavior than usual expansions. The method is based on an extended version of the principle of virtual displacements that covers cases with auxiliary conditions...

  12. Enhanced ionic transport in fine-grained scandia-stabilized zirconia ceramics

    Abdala, Paula M.; Lamas, Diego G. [CINSO (Centro de Investigaciones en Solidos), CONICET-CITEFA, J.B. de La Salle 4397 (B1603ALO) Villa Martelli, Pcia. de Buenos Aires (Argentina); Custo, Graciela S. [Gerencia de Area Seguridad Nuclear y Ambiente, Gerencia Quimica, Departamento Quimica Analitica, Centro Atomico Constituyentes, Comision Nacional de Energia Atomica, Av. Constituyentes 1499 (B1650KNA) San Martin, Pcia. de Buenos Aires (Argentina)

    2010-06-01

    In this work, the transport properties of fine-grained scandia-stabilized zirconia ceramics with low Si content have been investigated. These materials were prepared from ZrO{sub 2}-6 mol% Sc{sub 2}O{sub 3} nanopowders synthesized by a nitrate-lysine gel-combustion route. High relative densities and excellent electrical properties were obtained, even for sintering temperatures as low as 1350 C. Our electrochemical impedance spectroscopy study showed that both the volume fraction of grain boundaries and the specific grain-boundary conductivity are significantly enhanced with decreasing grain size, resulting in a higher total ionic conductivity. (author)

  13. Observer enhanced control for spin-stabilized tethered formation in earth orbit

    Guang, Zhai; Yuyang, Li; Liang, Bin

    2018-04-01

    This paper addresses the issues relevant to control of spin-stabilized tethered formation in circular orbit. Due to the dynamic complexities and nonlinear perturbations, it is challenging to promote the control precision for the formation deployment and maintenance. In this work, the formation dynamics are derived with considering the spinning rate of the central body, then major attention is dedicated to develop the nonlinear disturbance observer. To achieve better control performance, the observer-enhanced controller is designed by incorporating the disturbance observer into the control loop, benefits from the disturbance compensation are demonstrated, and also, the dependences of the disturbance observer performance on some important parameters are theoretically and numerically analyzed.

  14. Enhancement of ionic conductivity in stabilized zirconia ceramics under millimeter-wave irradiation heating

    Kishimoto, Akira; Ayano, Keiko; Hayashi, Hidetaka

    2011-01-01

    Ionic conductivity in yttria-stabilized zirconia ceramics under millimeter-wave irradiation heating was compared with that obtained using conventional heating. The former was found to result in higher conductivity than the latter. Enhancement of the ionic conductivity and the reduction in activation energy seemed to depend on self-heating resulting from the millimeter-wave irradiation. Millimeter-wave irradiation heating restricted the degradation in conductivity accompanying over-substitution, suggesting the optimum structure that provided the maximum conductivity could be different between the two heating methods.

  15. National Security Cutter: Enhanced Oversight Needed to Ensure Problems Discovered during Testing and Operations Are Addressed

    2016-01-01

    May Lead to NSCs and Future DHS Assets Deploying without Having Demonstrated Full Capabilities 22 Performance Issues Discovered Outside of IOT &E...Examples of National Security Cutter Critical Operational Issues and Key Performance Parameters 10 Table 3: National Security Cutter Major...Cutter IOT &E Initial Operational Test and Evaluation KPP Key Performance Parameter LRI-II Long-Range Interceptor II NSC National Security Cutter

  16. Enhancing Cyber Security for SME organizations through self-assessments : How self-assessment raises awareness

    Hassinen, Tarmo

    2017-01-01

    This thesis primarily studied the importance of self-assessment in increasing business organizations’ cyber security awareness of their ICT environment. The secondary studied item was the relevance of self-assessment in detecting new business potential while understanding ICT environment changes. The self-assessment is based on FINCS, the Finnish basic level cyber security certificate launched in December 2016. FINCSC consists of physical and management security, ICT service and system securi...

  17. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  18. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    Aamir Shahzad

    2016-01-01

    Full Text Available Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3 design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  19. Enhanced Cycling Stability of Rechargeable Li-O2 Batteries Using High Concentration Electrolytes

    Liu, Bin; Xu, Wu; Yan, Pengfei; Sun, Xiuliang; Bowden, Mark E.; Read, Jeffrey; Qian, Jiangfeng; Mei, Donghai; Wang, Chong M.; Zhang, Jiguang

    2016-01-26

    The electrolyte stability against reactive reduced-oxygen species is crucial for the development of rechargeable Li-O2 batteries. In this work, we systematically investigated the effect of lithium salt concentration in 1,2-dimethoxyethane (DME)-based electrolytes on the cycling stability of Li-O2 batteries. Cells with high concentration electrolyte illustrate largely enhanced cycling stability under both the full discharge/charge (2.0-4.5 V vs. Li/Li+) and the capacity limited (at 1,000 mAh g-1) conditions. These cells also exhibit much less reaction-residual on the charged air electrode surface, and much less corrosion to the Li metal anode. The density functional theory calculations are conducted on the molecular orbital energies of the electrolyte components and the Gibbs activation barriers for superoxide radical anion to attack DME solvent and Li+-(DME)n solvates. In a highly concentrated electrolyte, all DME molecules have been coordinated with salt and the C-H bond scission of a DME molecule becomes more difficult. Therefore, the decomposition of highly concentrated electrolyte in a Li-O2 battery can be mitigated and both air-cathodes and Li-metal anodes exhibits much better reversibility. As a results, the cyclability of Li-O2 can be largely improved.

  20. Enhanced capacity and stability for the separation of cesium in electrically switched ion exchange

    Tawfic, A.F.; Dickson, S.E.; Kim, Y. [McMaster University, Hamilton, ON (Canada); Mekky, W. [AMEC NSS, Power and Process America, Toronto (Canada)

    2015-03-15

    Electrically switched ion exchange (ESIX) can be used to separate ionic contaminants from industrial wastewater, including that generated by the nuclear industry. The ESIX method involves sequential application of reduction and oxidation potentials to an ion exchange film to induce the respective loading and unloading of cesium. This technology is superior to conventional methods (e.g electrodialysis reversal or reverse osmosis) as it requires very little energy for ionic separation. In previous studies, ESIX films have demonstrated relatively low ion exchange capacities and limited film stabilities over repeated potential applications. In this study, the methodology for the deposition of electro-active films (nickel hexacyanoferrate) on nickel electrodes was modified to improve the ion exchange capacity for cesium removal using ESIX. Cyclic voltammetry was used to investigate the ion exchange capacity and stability. Scanning electron microscopy (SEM) was used to characterize the modified film surfaces. Additionally, the films were examined for the separation of cesium ions. This modified film preparation technique enhanced the ion exchange capacity and improves the film stability compared to previous methods for the deposition of ESIX films. (authors)

  1. Nonlinear Synergetic Governor Controllers for Steam Turbine Generators to Enhance Power System Stability

    Xingbao Ju

    2017-07-01

    Full Text Available This paper proposes a decentralized nonlinear synergetic governor controller (NSGC for turbine generators to enhance power system stability by using synergetic control theory and the feedback linearization technique. The precise feedback linearization model of a turbine-generator with a steam valve control is obtained, at first, by using a feedback linearization technique. Then based on this model, a manifold is defined as a linear combination of the deviation of the rotor angle, speed deviation, and speed derivative. The control law of the proposed NSGC is deduced and the stability condition of the whole closed-loop system is subsequently analyzed. According to the requirement of the primary frequency regulation, an additional proportional integral (PI controller is designed to dynamically track the steady-state value of the rotor angle. Case studies are undertaken based on a single-machine infinite-bus system and the New England system, respectively. Simulation results show that the proposed NSGC can suppress the power oscillations and improve transient stability more effectively in comparison with the conventional proportional-integral-derivative (PID governor controller. Moreover, the proposed NSGC is robust to the variations of the system operating conditions.

  2. Enhanced capacity and stability for the separation of cesium in electrically switched ion exchange

    Tawfic, A.F.; Dickson, S.E.; Kim, Y.; Mekky, W.

    2015-01-01

    Electrically switched ion exchange (ESIX) can be used to separate ionic contaminants from industrial wastewater, including that generated by the nuclear industry. The ESIX method involves sequential application of reduction and oxidation potentials to an ion exchange film to induce the respective loading and unloading of cesium. This technology is superior to conventional methods (e.g electrodialysis reversal or reverse osmosis) as it requires very little energy for ionic separation. In previous studies, ESIX films have demonstrated relatively low ion exchange capacities and limited film stabilities over repeated potential applications. In this study, the methodology for the deposition of electro-active films (nickel hexacyanoferrate) on nickel electrodes was modified to improve the ion exchange capacity for cesium removal using ESIX. Cyclic voltammetry was used to investigate the ion exchange capacity and stability. Scanning electron microscopy (SEM) was used to characterize the modified film surfaces. Additionally, the films were examined for the separation of cesium ions. This modified film preparation technique enhanced the ion exchange capacity and improves the film stability compared to previous methods for the deposition of ESIX films. (authors)

  3. Vibration-enhanced posture stabilization achieved by tactile supplementation: may blind individuals get extra benefits?

    Magalhães, Fernando Henrique; Kohn, André Fabio

    2011-08-01

    Diminished balance ability poses a serious health risk due to the increased likelihood of falling, and impaired postural stability is significantly associated with blindness and poor vision. Noise stimulation (by improving the detection of sub-threshold somatosensory information) and tactile supplementation (i.e., additional haptic information provided by an external contact surface) have been shown to improve the performance of the postural control system. Moreover, vibratory noise added to the source of tactile supplementation (e.g., applied to a surface that the fingertip touches) has been shown to enhance balance stability more effectively than tactile supplementation alone. In view of the above findings, in addition to the well established consensus that blind subjects show superior abilities in the use of tactile information, we hypothesized that blind subjects may take extra benefits from the vibratory noise added to the tactile supplementation and hence show greater improvements in postural stability than those observed for sighted subjects. If confirmed, this hypothesis may lay the foundation for the development of noise-based assistive devices (e.g., canes, walking sticks) for improving somatosensation and hence prevent falls in blind individuals. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Intelligent Control of UPFC for Enhancing Transient Stability on Multi-Machine Power Systems

    Hassan Barati

    2010-01-01

    Full Text Available One of the benefit of FACTS devices is increase of stability in power systems with control active and reactive power at during the fault in power system. Although, the power system stabilizers (PSSs have been one of the most common controls used to damp out oscillations, this device may not produce enough damping especially to inter-area mode and therefore, there is an increasing interest in using FACTS devices to aid in damping of these oscillations. In This paper, UPFC is used for damping oscillations and to enhance the transient stability performance of power systems. The controller parameters are designed using an efficient version of the Takagi-Sugeno fuzzy control scheme. The function based Takagi-Sugeno-Kang (TSK fuzzy controller uses. For optimization parameters of fuzzy PI controller, the GA, PSO and HGAPSO algorithms are used. The computer simulation results, the effect of UPFC with conventional PI controller, fuzzy PI controller and intelligent controllers (GA, PSO and HGAPSO for damping the local-mode and inter-area mode of under large and small disturbances in the four-machine two-area power system evaluated and compared.

  5. Application of contact stabilization activated sludge for enhancing biological phosphorus removal (EBPR in domestic wastewater

    Ehab M. Rashed

    2014-04-01

    Full Text Available The experiment has been performed in order to investigate the effect of using contact stabilization activated sludge as an application of enhancing biological phosphorous removal (EBPR by using contact tank as a phosphorus uptake zone and using thickening tank as a phosphorus release zone. The study involved the construction of a pilot plant which was setup in Quhafa waste water treatment plant (WWTP that included contact, final sedimentation, stabilization and thickening tanks, respectively with two returns sludge in this system one of them to contact tank and another to stabilization tank. Then observation of the uptake and release of total phosphorus by achievement through two batch test using sludge samples from thickener and final sedimentations. Results showed the removal efficiencies of COD, BOD and TP for this pilot plant with the range of 94%, 85.44% and 80.54%, respectively. On the other hand the results of batch tests showed that the reason of high ability of phosphorus removal for this pilot plant related to the high performance of microorganisms for phosphorus accumulating. Finally the mechanism of this pilot plant depends on the removal of the phosphorus from the domestic waste water as a concentrated TP solution from the supernatant above the thickening zone not through waste sludge like traditional systems.

  6. Enhanced thermal stability of RuO2/polyimide interface for flexible device applications

    Music, Denis; Schmidt, Paul; Chang, Keke

    2017-09-01

    We have studied the thermal stability of RuO2/polyimide (Kapton) interface using experimental and theoretical methods. Based on calorimetric and spectroscopic analyses, this inorganic-organic system does not exhibit any enthalpic peaks as well as all bonds in RuO2 and Kapton are preserved up to 500 °C. In addition, large-scale density functional theory based molecular dynamics, carried out in the same temperature range, validates the electronic structure and points out that numerous Ru-C and a few Ru-O covalent/ionic bonds form across the RuO2/Kapton interface. This indicates strong adhesion, but there is no evidence of Kapton degradation upon thermal excitation. Furthermore, RuO2 does not exhibit any interfacial bonds with N and H in Kapton, providing additional evidence for the thermal stability notion. It is suggested that the RuO2/Kapton interface is stable due to aromatic architecture of Kapton. This enhanced thermal stability renders Kapton an appropriate polymeric substrate for RuO2 containing systems in various applications, especially for flexible microelectronic and energy devices.

  7. Enhanced protective properties and UV stability of epoxy/graphene nanocomposite coating on stainless steel

    H. Alhumade

    2016-12-01

    Full Text Available Epoxy-Graphene (E/G nanocomposites with different loading of graphene were prepared via in situ prepolymerization and evaluated as protective coating for Stainless Steel 304 (SS304. The prepolymer composites were spin coated on SS304 substrates and thermally cured. Transmission Electron Microscopy (TEM and Scanning Electron Microscopy (SEM were utilized to examine the dispersion of graphene in the epoxy matrix. Epoxy and E/G nanocomposites were characterized using X-ray diffraction (XRD and Fourier Transform Infrared (FTIR techniques and the thermal behavior of the prepared coatings is analyzed using Thermogravimetric analysis (TGA and Differential scanning calorimetry (DSC. The corrosion protection properties of the prepared coatings were evaluated using Electrochemical Impedance Spectroscopy (EIS and Cyclic Voltammetry (CV measurements. In addition to corrosion mitigation properties, the long-term adhesion performance of the coatings was evaluated by measuring the adhesion of the coatings to the SS304 substrate after 60 days of exposure to 3.5 wt% NaCl medium. The effects of graphene loading on the impact resistance, flexibility, and UV stability of the coating are analyzed and discussed. SEM was utilized to evaluate post adhesion and UV stability results. The results indicate that very low graphene loading up to 0.5 wt % significantly enhances the corrosion protection, UV stability, and impact resistance of epoxy coatings.

  8. Food safety security: a new concept for enhancing food safety measures.

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  9. Enhancement of efficiency and stability of phosphorescent OLEDs based on heterostructured light-emitting layers

    Chin, Byung Doo, E-mail: bdchin@dankook.ac.kr [Department of Polymer Science and Engineering and Center for Photofunctional Energy Materials, Dankook University, Jukjeon-dong, Suji-gu, Yongin-si, Gyeonggi-do 448-701 (Korea, Republic of)

    2011-03-23

    The light-emitting efficiency and stability of a phosphorescent organic light-emitting device (OLED), whose emission characteristics are strongly dominated not only by the energy transfer but also by the charge carrier trapping influenced by heterostructured emissive layers, are studied. The variation of the material combination of the heterostructured emitter, both for mixed and double layer configuration, affects the charge injection behaviour, luminous efficiency and stability. Both double and mixed emitter configurations yield low-voltage and high-efficiency behaviour (51 lm W{sup -1} at 1000 cd m{sup -2}; 30 lm W{sup -1} at 10 000 cd m{sup -2}). Such an improvement in power efficiency at elevated brightness is sufficiently universal, while the enhancement of device half-lifetime is rather sensitive to the circumstantial layout of heterostructural emitters. With an optimal mixture of hole-transport type and electron-transport type, a half-lifetime of more than 2500 h at 4000 cd m{sup -2} is obtained, which is 8 times the half-lifetime of control devices with a single emitter structure. The origin and criterion for enhancement of efficiency and lifetime are discussed in terms of the carrier transport behaviour with a specific device architecture.

  10. Increased stability of thylakoid components in Vigna sinensis seedlings grown under ultraviolet-B enhanced radiation

    Nedunchezhian, N.; Kulandaivelu, G.

    1994-01-01

    Chloroplasts isolated from Vigna sinensis L. seedlings grown under cool fluorescent (control chloroplasts) and ultraviolet-B (UV-B)-enhanced fluorescent (UV chloroplasts) radiation, when incubated at 10, 20, 30 and 40-degrees-C, showed large variations in the photosynthetic electron transport reactions. The overall electron transport activity in both control and UV chloroplasts incubated at 40-degrees-C decreased rapidly. In contrast to this, at 30-degrees-C the control chloroplasts got inactivated very rapidly during the 30 min of incubation while the UV chloroplasts showed high stability. A similar trend was also noticed at 20-degrees-C. At 10-degrees-C, although the rate of inactivation was slow, UV chloroplasts were more stable than control chloroplasts. A similar trend was noticed in photosystem (PS) 2 activity. In contrast to overall electron transport and PS2 reactions, PS1 activity showedonly marginal changes at all temperatures. The polypeptide profiles of chloroplasts exposed to UV-B irradiation for 60 min at different temperatures revealed marked decreases in the level of the 23 and 33 kDa polypeptides in control chloroplasts while in UV chloroplasts these polypeptides were highly stable. In addition, UV chloroplasts contained several new polypeptides of both high and low molecular masses. The polypeptide pattern indicated that higher photochemical activity of UV chloroplasts over the control chloroplasts could be due to stabilization of PS2 core complexes by the new polypeptides induced under UV-B enhanced radiation

  11. Inducing half-metallicity with enhanced stability in zigzag graphene nanoribbons via fluorine passivation

    Jaiswal, Neeraj K., E-mail: neerajkjaiswal@gmail.com [Discipline of Physics, Indian Institute of Information Technology Design & Manufacturing, Jabalpur 482005 (India); Tyagi, Neha [Department of Applied Physics, Delhi Technological University, Delhi 110042 (India); Kumar, Amit [Discipline of Physics, Indian Institute of Information Technology Design & Manufacturing, Jabalpur 482005 (India); Srivastava, Pankaj [Nanomaterials Research Group, ABV-Indian Institute of Information Technology & Management, Gwalior 474015 (India)

    2017-02-28

    Highlights: • F passivated zigzag graphene nanoribbon (F-ZGNR) are more favorable than pristine ones. • External electric field induces half metallicity in F-ZGNR. • The observed half metallicity is independent of ribbon widths. • Enhanced stability makes F-ZGNR preferable over pristine ribbon. - Abstract: Half metals are the primary ingredients for the realization of novel spintronic devices. In the present work, by employing density functional theory based first-principles calculation, we predict half metallic behavior in fluorine passivated zigzag graphene nanoribbons (F-ZGNR). Four different structures have been investigated viz. one edge F passivated ZGNR (F-ZGNR-1), both edges F passivated ZGNR (F-ZGNR-2), F passivation on alternate sites in first configuration (alt-1) and F passivation on alternate sites in second configuration (alt-2). Interestingly, it is noticed that F passivation is analogous to H passivation (pristine), however, F-ZGNR are reckoned energetically more stable than pristine ones. An spin induced band gap is noticed for all F-ZGNR irrespective of their widths although its magnitude is slightly less than the pristine counterparts. With an external transverse electric field, ribbons undergo semiconducting to half metallic transformation. The observed half metallic character with enhanced stability present F-ZGNR as a better candidate than pristine ZGNR towards the realization of upcoming spintronic devices.

  12. Magnesium ferrite nanocrystal clusters for magnetorheological fluid with enhanced sedimentation stability

    Wang, Guangshuo; Ma, Yingying; Li, Meixia; Cui, Guohua; Che, Hongwei; Mu, Jingbo; Zhang, Xiaoliang; Tong, Yu; Dong, Xufeng

    2017-01-01

    In this study, magnesium ferrite (MgFe2O4) nanocrystal clusters were synthesized using an ascorbic acid-assistant solvothermal method and evaluated as a candidate for magnetorheological (MR) fluid. The morphology, microstructure and magnetic properties of the MgFe2O4 nanocrystal clusters were investigated in detail by field emission scanning electron microscopy (FESEM), transmission electron microscope (TEM), thermogravimetric analyzer (TGA), X-ray diffraction (XRD) and superconducting quantum interference device (SQUID). The MgFe2O4 nanocrystal clusters were suspended in silicone oil to prepare MR fluid and the MR properties were tested using a Physica MCR301 rheometer fitted with a magneto-rheological module. The prepared MR fluid showed typical Bingham plastic behavior, changing from a liquid-like to a solid-like structure under an external magnetic field. Compared with the conventional carbonyl iron particles, MgFe2O4 nanocrystal clusters-based MR fluid demonstrated enhanced sedimentation stability due to the reduced mismatch in density between the particles and the carrier medium. In summary, the as-prepared MgFe2O4 nanocrystal clusters are regarded as a promising candidate for MR fluid with enhanced sedimentation stability.

  13. PDF and cAMP enhance PER stability in Drosophila clock neurons

    Li, Yue; Guo, Fang; Shen, James; Rosbash, Michael

    2014-01-01

    The neuropeptide PDF is important for Drosophila circadian rhythms: pdf01 (pdf-null) animals are mostly arrhythmic or short period in constant darkness and have an advanced activity peak in light–dark conditions. PDF contributes to the amplitude, synchrony, as well as the pace of circadian rhythms within clock neurons. PDF is known to increase cAMP levels in PDR receptor (PDFR)-containing neurons. However, there is no known connection of PDF or of cAMP with the Drosophila molecular clockworks. We discovered that the mutant period gene perS ameliorates the phenotypes of pdf-null flies. The period protein (PER) is a well-studied repressor of clock gene transcription, and the perS protein (PERS) has a markedly short half-life. The result therefore suggests that the PDF-mediated increase in cAMP might lengthen circadian period by directly enhancing PER stability. Indeed, increasing cAMP levels and cAMP-mediated protein kinase A (PKA) activity stabilizes PER, in S2 tissue culture cells and in fly circadian neurons. Adding PDF to fly brains in vitro has a similar effect. Consistent with these relationships, a light pulse causes more prominent PER degradation in pdf01 circadian neurons than in wild-type neurons. The results indicate that PDF contributes to clock neuron synchrony by increasing cAMP and PKA, which enhance PER stability and decrease clock speed in intrinsically fast-paced PDFR-containing clock neurons. We further suggest that the more rapid degradation of PERS bypasses PKA regulation and makes the pace of clock neurons more uniform, allowing them to avoid much of the asynchrony caused by the absence of PDF. PMID:24707054

  14. Enhancement of Orthodontic Anchor Screw Stability Under Immediate Loading by Ultraviolet Photofunctionalization Technology.

    Takahashi, Maiko; Motoyoshi, Mitsuru; Inaba, Mizuki; Hagiwara, Yoshiyuki; Shimizu, Noriyoshi

    Ultraviolet (UV)-mediated photofunctionalization technology is intended to enhance the osseointegration capability of titanium implants. There are concerns about orthodontic anchor screws loosening under immediate loading protocols in adolescent orthodontic treatment. The purpose of this in vivo study was to evaluate the effects of photofunctionalization on the intrabony stability of orthodontic titanium anchor screws and bone-anchor screw contact under immediate loading in growing rats. Custom-made titanium anchor screws (1.4 mm in diameter and 4.0 mm in length) with or without photofunctionalization pretreatment were placed on the proximal epiphysis of the tibial bone in 6-week-old male Sprague-Dawley rats and were loaded immediately after placement. After 2 weeks of loading, the stability of the anchor screws was evaluated using a Periotest device, and the bone-anchor screw contact ratio (BSC) was assessed by a histomorphometric analysis using field-emission scanning electron microscopy. In the unloaded group, Periotest values (PTVs) were ~25 for UV-untreated screws and 13 for UVtreated screws (P < .01), while in the immediate-loading group, PTVs were 28 for UV-untreated screws and 16 for UV-treated screws (P < .05). Significantly less screw mobility was observed in both UV-treated groups regardless of the loading protocol. The BSC was increased ~1.8 fold for UV-treated screws, compared with UV-untreated screws, regardless of the loading protocol. Photofunctionalization enhanced the intrabony stability of orthodontic anchor screws under immediate loading in growing rats by increasing bone-anchor screw contact.

  15. Kyrgyzstan's security problems today

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  16. Enhanced stability and dissolution of CuO nanoparticles by extracellular polymeric substances in aqueous environment

    Miao, Lingzhan; Wang, Chao; Hou, Jun; Wang, Peifang; Ao, Yanhui; Li, Yi; Lv, Bowen; Yang, Yangyang; You, Guoxiang; Xu, Yi

    2015-01-01

    Stability of engineered nanoparticles in aquatic environment is an essential parameter to evaluate their fate, bioavailability, and potential toxic effects toward living organisms. As CuO NPs enter the wastewater systems, they will encounter extracellular polymeric substances (EPS) from microbial community before directly interacting with bacterial cells. EPS may play an important role in affecting the stability and the toxicity of CuO NPs in aquatic environment. In this study, the influences of flocculent sludge-derived EPS, as well as model protein (BSA) and natural polysaccharides (alginate) on the dissolution kinetics and colloidal stability of CuO NPs were investigated. Results showed that the presence of NOMs strongly suppressed CuO NPs aggregation, confirmed by DLS, zeta potentials, and TEM analysis. The enhanced stability of CuO NPs in the presence of EPS and alginate were attributed to the electrostatic combined with steric repulsion, while the steric-hindrance effect may be the predominant mechanism retarding nano-CuO aggregation for BSA. Higher degrees of copper release were achieved with the increasing concentrations of NOMs. EPS are more effective than alginate and BSA in releasing copper, probably due to the abundant functional groups and the excellent metal-binding capacity. The ratio of free-Cu 2+ /total dissolved Cu significantly decreased in the presence of EPS, indicating that EPS may affect the speciation and Cu bioavailability in aqueous environment. These results may be important for assessing the fate and transport behaviors of CuO NPs in the environment as well as for setting up usage regulation and treatment strategy.

  17. SiC-dopped MCM-41 materials with enhanced thermal and hydrothermal stabilities

    Wang, Yingyong; Jin, Guoqiang; Tong, Xili; Guo, Xiangyun

    2011-01-01

    Graphical abstract: Novel SiC-dopped MCM-41 materials were synthesized by adding silicon carbide suspension in the molecular sieve precursor solvent followed by in situ hydrothermal synthesis. The dopped materials have a wormhole-like mesoporous structure and exhibit enhanced thermal and hydrothermal stabilities. Highlights: → SiC-dopped MCM-41 was synthesized by in situ hydrothermal synthesis of molecular sieve precursor combined with SiC. → The dopped MCM-41 materials show a wormhole-like mesoporous structure. → The thermal stability of the dopped materials have an increment of almost 100 o C compared with the pure MCM-41. → The hydrothermal stability of the dopped materials is also better than that of the pure MCM-41. -- Abstract: SiC-dopped MCM-41 mesoporous materials were synthesized by the in situ hydrothermal synthesis, in which a small amount of SiC was added in the precursor solvent of molecular sieve before the hydrothermal treatment. The materials were characterized by X-ray diffraction, transmission electron microscopy, X-ray photoelectron spectroscopy, N 2 physical adsorption and thermogravimetric analysis, respectively. The results show that the thermal and hydrothermal stabilities of MCM-41 materials can be improved obviously by incorporating a small amount of SiC. The structure collapse temperature of SiC-dopped MCM-41 materials is 100 o C higher than that of pure MCM-41 according to the differential scanning calorimetry analysis. Hydrothermal treatment experiments also show that the pure MCM-41 will losses it's ordered mesoporous structure in boiling water for 24 h while the SiC-dopped MCM-41 materials still keep partial porous structure.

  18. Enhanced stability and dissolution of CuO nanoparticles by extracellular polymeric substances in aqueous environment

    Miao, Lingzhan; Wang, Chao; Hou, Jun, E-mail: hhuhjyhj@126.com; Wang, Peifang; Ao, Yanhui; Li, Yi; Lv, Bowen; Yang, Yangyang; You, Guoxiang; Xu, Yi [Hohai University, Key Laboratory of Integrated Regulation and Resources Development on Shallow Lakes, Ministry of Education (China)

    2015-10-15

    Stability of engineered nanoparticles in aquatic environment is an essential parameter to evaluate their fate, bioavailability, and potential toxic effects toward living organisms. As CuO NPs enter the wastewater systems, they will encounter extracellular polymeric substances (EPS) from microbial community before directly interacting with bacterial cells. EPS may play an important role in affecting the stability and the toxicity of CuO NPs in aquatic environment. In this study, the influences of flocculent sludge-derived EPS, as well as model protein (BSA) and natural polysaccharides (alginate) on the dissolution kinetics and colloidal stability of CuO NPs were investigated. Results showed that the presence of NOMs strongly suppressed CuO NPs aggregation, confirmed by DLS, zeta potentials, and TEM analysis. The enhanced stability of CuO NPs in the presence of EPS and alginate were attributed to the electrostatic combined with steric repulsion, while the steric-hindrance effect may be the predominant mechanism retarding nano-CuO aggregation for BSA. Higher degrees of copper release were achieved with the increasing concentrations of NOMs. EPS are more effective than alginate and BSA in releasing copper, probably due to the abundant functional groups and the excellent metal-binding capacity. The ratio of free-Cu{sup 2+}/total dissolved Cu significantly decreased in the presence of EPS, indicating that EPS may affect the speciation and Cu bioavailability in aqueous environment. These results may be important for assessing the fate and transport behaviors of CuO NPs in the environment as well as for setting up usage regulation and treatment strategy.

  19. Stabilization

    Muhammad H. Al-Malack

    2016-07-01

    Full Text Available Fuel oil flyash (FFA produced in power and water desalination plants firing crude oils in the Kingdom of Saudi Arabia is being disposed in landfills, which increases the burden on the environment, therefore, FFA utilization must be encouraged. In the current research, the effect of adding FFA on the engineering properties of two indigenous soils, namely sand and marl, was investigated. FFA was added at concentrations of 5%, 10% and 15% to both soils with and without the addition of Portland cement. Mixtures of the stabilized soils were thoroughly evaluated using compaction, California Bearing Ratio (CBR, unconfined compressive strength (USC and durability tests. Results of these tests indicated that stabilized sand mixtures could not attain the ACI strength requirements. However, marl was found to satisfy the ACI strength requirement when only 5% of FFA was added together with 5% of cement. When the FFA was increased to 10% and 15%, the mixture’s strength was found to decrease to values below the ACI requirements. Results of the Toxicity Characteristics Leaching Procedure (TCLP, which was performed on samples that passed the ACI requirements, indicated that FFA must be cautiously used in soil stabilization.

  20. Enhanced exo-inulinase activity and stability by fusion of an inulin-binding module.

    Zhou, Shun-Hua; Liu, Yuan; Zhao, Yu-Juan; Chi, Zhe; Chi, Zhen-Ming; Liu, Guang-Lei

    2016-09-01

    In this study, an inulin-binding module from Bacillus macerans was successfully fused to an exo-inulinase from Kluyveromyces marxianus, creating a hybrid functional enzyme. The recombinant exo-inulinase (rINU), the hybrid enzyme (rINUIBM), and the recombinant inulin-binding module (rIBM) were, respectively, heterologously expressed and biochemically characterized. It was found that both the inulinase activity and the catalytic efficiency (k cat/K m(app)) of the rINUIBM were considerably higher than those of rINU. Though the rINU and the rINUIBM shared the same optimum pH of 4.5, the optimum temperature of the rINUIBM (60 °C) was 5 °C higher than that of the rINU. Notably, the fused IBM significantly enhanced both the pH stability and the thermostability of the rINUIBM, suggesting that the rINUIBM obtained would have more extensive potential applications. Furthermore, the fusion of the IBM could substantially improve the inulin-binding capability of the rINUIBM, which was consistent with the determination of the K m(app). This meant that the fused IBM could play a critical role in the recognition of polysaccharides and enhanced the hydrolase activity of the associated inulinase by increasing enzyme-substrate proximity. Besides, the extra supplement of the independent non-catalytic rIBM could also improve the inulinase activity of the rINU. However, this improvement was much better in case of the fusion. Consequently, the IBM could be designated as a multifunctional domain that was responsible for the activity enhancement, the stabilization, and the substrate binding of the rINUIBM. All these features obtained in this study make the rINUIBM become an attractive candidate for an efficient inulin hydrolysis.

  1. Security Transformation

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  2. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  3. Enhancing food security in Northern Ghana through smallholder small ruminant production and marketing

    Amankwah, K.

    2013-01-01

    Key words

    Livestock markets, technical and institutional constraints, innovation systems, veterinary services; smallholder farmers; structural adjustment, scaling out, co-learning, supplementary feeding, herd growth, food security, positive deviants, commercialization,

  4. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    Mott, Stephen

    2007-01-01

    .... In doing this, we propose a novel computing architecture, derived from a contemporary shared memory architecture, that facilitates efficient security-related monitoring in real-time, while keeping...

  5. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  6. Enhancing food security through a multi-stakeholder process: the global agenda for sustainable livestock

    Breeman, G.E.; Dijkman, J.; Termeer, C.J.A.M.

    2015-01-01

    Feeding the world is not only a complex technical matter, but also a demanding governance issue. As food security has all the characteristics of a wicked problem (variety of problem definitions, conflicting interests, interconnectedness across scales, inherent uncertainties), conventional governance

  7. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  8. Science, Technology, Engineering, and Mathematics (STEM) Education Reform to Enhance Security of the Global Cyberspace

    2014-05-01

    towards cloud computing technologies and capabilities demand needs for developing new tools that work in ensemble to handle security challenges. A...programs with the schools and/or hire from their pool of students. Therefore, no real STEM standards exist at the tertiary and beyond levels of education ...successful in cyber operations and network security related jobs much early on into the new STEM education model pipeline. Subjects such as computer

  9. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  10. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  11. Using RFID to Enhance Security in Off-Site Data Storage

    Enrique de la Hoz

    2010-08-01

    Full Text Available Off-site data storage is one of the most widely used strategies in enterprises of all sizes to improve business continuity. In medium-to-large size enterprises, the off-site data storage processes are usually outsourced to specialized providers. However, outsourcing the storage of critical business information assets raises serious security considerations, some of which are usually either disregarded or incorrectly addressed by service providers. This article reviews these security considerations and presents a radio frequency identification (RFID-based, off-site, data storage management system specifically designed to address security issues. The system relies on a set of security mechanisms or controls that are arranged in security layers or tiers to balance security requirements with usability and costs. The system has been successfully implemented, deployed and put into production. In addition, an experimental comparison with classical bar-code-based systems is provided, demonstrating the system’s benefits in terms of efficiency and failure prevention.

  12. Enhanced production of a single domain antibody with an engineered stabilizing extra disulfide bond.

    Liu, Jinny L; Goldman, Ellen R; Zabetakis, Dan; Walper, Scott A; Turner, Kendrick B; Shriver-Lake, Lisa C; Anderson, George P

    2015-10-09

    Single domain antibodies derived from the variable region of the unique heavy chain antibodies found in camelids yield high affinity and regenerable recognition elements. Adding an additional disulfide bond that bridges framework regions is a proven method to increase their melting temperature, however often at the expense of protein production. To fulfill their full potential it is essential to achieve robust protein production of these stable binding elements. In this work, we tested the hypothesis that decreasing the isoelectric point of single domain antibody extra disulfide bond mutants whose production fell due to the incorporation of the extra disulfide bond would lead to recovery of the protein yield, while maintaining the favorable melting temperature and affinity. Introduction of negative charges into a disulfide bond mutant of a single domain antibody specific for the L1 antigen of the vaccinia virus led to approximately 3.5-fold increase of protein production to 14 mg/L, while affinity and melting temperature was maintained. In addition, refolding following heat denaturation improved from 15 to 70 %. It also maintained nearly 100 % of its binding function after heating to 85 °C for an hour at 1 mg/mL. Disappointingly, the replacement of neutral or positively charged amino acids with negatively charged ones to lower the isoelectric point of two anti-toxin single domain antibodies stabilized with a second disulfide bond yielded only slight increases in protein production. Nonetheless, for one of these binders the charge change itself stabilized the structure equivalent to disulfide bond addition, thus providing an alternative route to stabilization which is not accompanied by loss in production. The ability to produce high affinity, stable single domain antibodies is critical for their utility. While the addition of a second disulfide bond is a proven method for enhancing stability of single domain antibodies, it frequently comes at the cost of reduced

  13. Local order origin of thermal stability enhancement in amorphous Ag doping GeTe

    Xu, L.; Li, Y.; Yu, N. N.; Zhong, Y. P.; Miao, X. S., E-mail: miaoxs@mail.hust.edu.cn [Wuhan National Laboratory for Optoelectronics, Huazhong University of Science and Technology (HUST), Wuhan 430074 (China); School of Optical and Electronic Information, Huazhong University of Science and Technology, Wuhan 430074 (China)

    2015-01-19

    We demonstrate the impacts of Ag doping on the local atomic structure of amorphous GeTe phase-change material. The variations of phonon vibrational modes, boding nature, and atomic structure are shown by Raman, X-ray photoelectron spectroscopy, and ab initio calculation. Combining the experiments and simulations, we observe that the number of Ge atoms in octahedral site decreases and that in tetrahedral site increases. This modification in local order of GeTe originating from the low valence element will affect the crystallization behavior of amorphous GeTe, which is verified by differential scanning calorimetry and transmission electron microscope results. This work not only gives the analysis on the structural change of GeTe with Ag dopants but also provides a method to enhance the thermal stability of amorphous phase-change materials for memory and brain-inspired computing applications.

  14. Aqueous solutions of acidic ionic liquids for enhanced stability of polyoxometalate-carbon supercapacitor electrodes

    Hu, Chenchen; Zhao, Enbo; Nitta, Naoki; Magasinski, Alexandre; Berdichevsky, Gene; Yushin, Gleb

    2016-09-01

    Nanocomposites based on polyoxometalates (POMs) nanoconfined in microporous carbons have been synthesized and used as electrodes for supercapacitors. The addition of the pseudocapacitance from highly reversible redox reaction of POMs to the electric double-layer capacitance of carbon lead to an increase in specific capacitance of ∼90% at 1 mV s-1. However, high solubility of POM in traditional aqueous electrolytes leads to rapid capacity fading. Here we demonstrate that the use of aqueous solutions of protic ionic liquids (P-IL) as electrolyte instead of aqueous sulfuric acid solutions offers an opportunity to significantly improve POM cycling stability. Virtually no degradation in capacitance was observed in POM-based positive electrode after 10,000 cycles in an asymmetric capacitor with P-IL aqueous electrolyte. As such, POM-based carbon composites may now present a viable solution for enhancing energy density of electrical double layer capacitors (EDLC) based on pure carbon electrodes.

  15. Acoustically enhanced microfluidic mixer to synthesize highly uniform nanodrugs without the addition of stabilizers.

    Le, Nguyen Hoai An; Van Phan, Hoang; Yu, Jiaqi; Chan, Hak-Kim; Neild, Adrian; Alan, Tuncay

    2018-01-01

    This article presents an acoustically enhanced microfluidic mixer to generate highly uniform and ultra-fine nanoparticles, offering significant advantages over conventional liquid antisolvent techniques. The method employed a 3D microfluidic geometry whereby two different phases - solvent and antisolvent - were introduced at either side of a 1 μm thick resonating membrane, which contained a through-hole. The vibration of the membrane rapidly and efficiently mixed the two phases, at the location of the hole, leading to the formation of nanoparticles. The versatility of the device was demonstrated by synthesizing budesonide (a common asthma drug) with a mean diameter of 135.7 nm and a polydispersity index of 0.044. The method offers a 40-fold reduction in the size of synthesized particles combined with a substantial improvement in uniformity, achieved without the need of stabilizers.

  16. Enhanced mechanical behavior of a nanocrystallised stainless steel and its thermal stability

    Roland, T.; Retraint, D.; Lu, K.; Lu, J.

    2007-01-01

    This paper discusses the mechanical properties of a nanocrystallised stainless steel obtained using surface mechanical attrition treatment (SMAT) and the underlying grain refinement mechanism using transmission electron microscopy (TEM). It was shown that grain refinement down to the nanometer range has the potential to significantly improve the mechanical properties of a 316L stainless steel which becomes comparable in strength to titanium alloys. Hence, promising structural applications could be considered for such a material. At the same time, the thermal stability of this nanocrystallised material was studied in the temperature range from 100 to 800 deg. C. The results show that the nanometer scaled microstructure is retained up to 600 deg. C and that a controlled annealing treatment could even lead to enhancement of both strength and ductility of this material. All these results are explained in terms of microstructural investigations, X-ray diffraction measurements, tensile and bending tests as well as microhardness measurements

  17. Enhanced mechanical behavior of a nanocrystallised stainless steel and its thermal stability

    Roland, T. [ICD, LASMIS, University of Technology of Troyes, 10010 Troyes (France); Retraint, D. [ICD, LASMIS, University of Technology of Troyes, 10010 Troyes (France)]. E-mail: delphine.retraint@utt.fr; Lu, K. [Shenyang National Laboratory for Materials Science, Institute of Metal Research, Chinese Academy of Sciences, Shenyang 110015 (China); Lu, J. [Department of Mechanical Engineering, Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong (China)

    2007-02-15

    This paper discusses the mechanical properties of a nanocrystallised stainless steel obtained using surface mechanical attrition treatment (SMAT) and the underlying grain refinement mechanism using transmission electron microscopy (TEM). It was shown that grain refinement down to the nanometer range has the potential to significantly improve the mechanical properties of a 316L stainless steel which becomes comparable in strength to titanium alloys. Hence, promising structural applications could be considered for such a material. At the same time, the thermal stability of this nanocrystallised material was studied in the temperature range from 100 to 800 deg. C. The results show that the nanometer scaled microstructure is retained up to 600 deg. C and that a controlled annealing treatment could even lead to enhancement of both strength and ductility of this material. All these results are explained in terms of microstructural investigations, X-ray diffraction measurements, tensile and bending tests as well as microhardness measurements.

  18. Plasma etching to enhance the surface insulating stability of alumina for fusion applications

    M. Malo

    2016-12-01

    Full Text Available A significant increase in the surface electrical conductivity of alumina, considered one of the most promising insulating materials for numerous applications in fusion devices, has been observed during ion bombardment in vacuum due to oxygen loss by preferential sputtering. Although this is expected to cause serious limitations to insulating components functionality, recent studies showed it is possible to restore the damaged lattice by oxygen reincorporation during thermal treatments in air. These studies also revealed a correlation between conductivity and ion beam induced luminescence, which is being used to monitor surface electrical conductivity degradation and help qualify the post irradiation recovery. Work now carried out for Wesgo alumina considers oxygen implantation and plasma etching as additional methods to improve recovered layer depth and quality. Both conductivity and luminescence results indicate the potential use of plasma etching not only for damage recovery, but also as a pre-treatment to enhance material stability during irradiation.

  19. Evaluation of enhanced thermostability and operational stability of carbonic anhydrase from Micrococcus species.

    Bhattacharya, Abhishek; Shrivastava, Ankita; Sharma, Anjana

    2013-06-01

    Carbonic anhydrase (CA) was purified from Micrococcus lylae and Micrococcus luteus with 49.90 and 53.8 % yield, respectively, isolated from calcium carbonate kilns. CA from M. lylae retained 80 % stability in the pH and temperature range of 6.0-8.0 and 35-45 °C, respectively. However, CA from M. luteus was stable in the pH and temperature range of 7.5-10.0 and 35-55 °C, respectively. Cross-linked enzyme aggregates (CLEAs) raised the transition temperature of M. lylae and M. luteus CA up to 67.5 and 74.0 °C, while the operational stability (T(1/20) of CA at 55 °C was calculated to be 7.7 and 12.0 h, respectively. CA from both the strains was found to be monomeric in nature with subunit molecular weight and molecular mass of 29 kDa. Ethoxozolamide was identified as the most potent inhibitor based on both IC(50) values and inhibitory constant measurement (K(i)). The K(m) and V(max) for M. lylae CA (2.31 mM; 769.23 μmol/mg/min) and M. luteus CA (2.0 mM; 1,000 μmol/mg/min) were calculated from Lineweaver-Burk plots in terms of esterase activity. Enhanced thermostability of CLEAs alleviates its role in operational stability for application at an on-site scrubber. The characteristic profile of purified CA from Micrococcus spp. advocates its effective application in biomimetic CO(2) sequestration.

  20. D-amino acid substitution enhances the stability of antimicrobial peptide polybia-CP.

    Jia, Fengjing; Wang, Jiayi; Peng, Jinxiu; Zhao, Ping; Kong, Ziqing; Wang, Kairong; Yan, Wenjin; Wang, Rui

    2017-10-01

    With the increasing emergence of resistant microbes toward conventional antimicrobial agents, there is an urgent need for the development of antimicrobial agents with novel action mode. Antimicrobial peptides (AMPs) are believed to be one kind of ideal alternatives. However, AMPs can be easily degraded by protease, which limited their therapeutic use. In the present study, D-amino acid substitution strategy was employed to enhance the stability of polybia-CP. We investigated the stability of peptides against the degradation of trypsin and chymotrypsin by determining the antimicrobial activity or determining the HPLC profile of peptides after incubation with proteases. Our results showed that both the all D-amino acid derivative (D-CP) and partial D-lysine substitution derivative (D-lys-CP) have an improved stability against trypsin and chymotrypsin. Although D-CP takes left-hand α-helical conformation and D-lys-CP loses some α-helical content, both of the D-amino acid-substituted derivatives maintain their parental peptides' membrane active action mode. In addition, D-lys-CP showed a slight weaker antimicrobial activity than polybia-CP, but the hemolytic activity decreased greatly. These results suggest that D-CP and D-lys-CP can offer strategy to improve the property of AMPs and may be leading compounds for the development of novel antimicrobial agents. © The Author 2017. Published by Oxford University Press on behalf of the Institute of Biochemistry and Cell Biology, Shanghai Institutes for Biological Sciences, Chinese Academy of Sciences. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Nanostructured polyurethane perylene bisimide ester assemblies with tuneable morphology and enhanced stability

    Zhang, Xiaoxiao; Gong, Tingyuan; Chi, Hong; Li, Tianduo

    2018-03-01

    Size control has been successfully achieved in inorganic materials, but it remains a challenge in polymer nanomaterials due to their polydispersity. Here, we report a facile approach to tailor the diameters of polyurethane (PU) nanoparticles (490 nm, 820 nm and 2.1 µm) via perylene bisimide (PBI) assisted self-assembly. The formed morphologies such as spindle, spherical and core-shell structures depend on the ratio of PBI and polymer concentrations. It is shown that the formation of PU nanoparticles is directed by π-π stacking of PBI and the morphology transition is not only affected by the amount of PBI incorporated, but also influenced by solvent, which controls the initial evaporation balance. Furthermore, the prepared PUs exhibit retained optical stability and enhanced thermal stability. The PUs, designed to have conjugated PBI segments in backbones, were synthesized via ring-opening and condensation reactions. Compared with the neat PU, gel permeation chromatography shows narrower molecular weight distribution. Fluorescence spectra and ultraviolet-visible spectra indicate retained maximum emission wavelength of PBI at 574 nm and 5.2% quantum yields. Thermo-gravimetric analysis and differential scanning calorimetry reveal 79°C higher decomposition temperature and 22°C higher glass transition temperature. This study provides a new way to fabricate well-defined nanostructures of functionalized PUs.

  2. Urease immobilized polymer hydrogel: Long-term stability and enhancement of enzymatic activity.

    Kutcherlapati, S N Raju; Yeole, Niranjan; Jana, Tushar

    2016-02-01

    A method has been developed in which an enzyme namely urease was immobilized inside hydrogel matrix to study the stability and enzymatic activity in room temperature (∼27-30°C). This urease coupled hydrogel (UCG) was obtained by amine-acid coupling reaction and this procedure is such that it ensured the wider opening of mobile flap of enzyme active site. A systematic comparison of urea-urease assay and the detailed kinetic data clearly revealed that the urease shows activity for more than a month when stored at ∼27-30°C in case of UCG whereas it becomes inactive in case of free urease (enzyme in buffer solution). The aqueous microenvironment inside the hydrogel, unusual morphological features and thermal behaviour were believed to be the reasons for unexpected behaviour. UCG displayed enzyme activity at basic pH and up to 60°C. UCG showed significant enhancement in activity against thermal degradation compared to free urease. In summary, this method is a suitable process to stabilize the biomacromolecules in standard room temperature for many practical uses. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Bee species diversity enhances productivity and stability in a perennial crop.

    Shelley R Rogers

    Full Text Available Wild bees provide important pollination services to agroecoystems, but the mechanisms which underlie their contribution to ecosystem functioning--and, therefore, their importance in maintaining and enhancing these services-remain unclear. We evaluated several mechanisms through which wild bees contribute to crop productivity, the stability of pollinator visitation, and the efficiency of individual pollinators in a highly bee-pollination dependent plant, highbush blueberry. We surveyed the bee community (through transect sampling and pan trapping and measured pollination of both open- and singly-visited flowers. We found that the abundance of managed honey bees, Apis mellifera, and wild-bee richness were equally important in describing resulting open pollination. Wild-bee richness was a better predictor of pollination than wild-bee abundance. We also found evidence suggesting pollinator visitation (and subsequent pollination are stabilized through the differential response of bee taxa to weather (i.e., response diversity. Variation in the individual visit efficiency of A. mellifera and the southeastern blueberry bee, Habropoda laboriosa, a wild specialist, was not associated with changes in the pollinator community. Our findings add to a growing literature that diverse pollinator communities provide more stable and productive ecosystem services.

  4. Amorphous Solid Dispersion of Epigallocatechin Gallate for Enhanced Physical Stability and Controlled Release.

    Cao, Yizheng; Teng, Jing; Selbo, Jon

    2017-11-09

    Epigallocatechin gallate (EGCG) has been recognized as the most prominent green tea extract due to its healthy influences. The high instability and low bioavailability, however, strongly limit its utilization in food and drug industries. This work, for the first time, develops amorphous solid dispersion of EGCG to enhance its bioavailability and physical stability. Four commonly used polymeric excipients are found to be compatible with EGCG in water-dioxane mixtures via a stepwise mixing method aided by vigorous mechanical interference. The dispersions are successfully generated by lyophilization. The physical stability of the dispersions is significantly improved compared to pure amorphous EGCG in stress condition (elevated temperature and relative humidity) and simulated gastrointestinal tract environment. From the drug release tests, one of the dispersions, EGCG-Soluplus ® 50:50 ( w / w ) shows a dissolution profile that only 50% EGCG is released in the first 20 min, and the remains are slowly released in 24 h. This sustained release profile may open up new possibilities to increase EGCG bioavailability via extending its elimination time in plasma.

  5. Determination of tensile forces to enhance the supply stability of reinforced fiber

    Kim, Kun Woo; Lee, Jae Wook; Jang, Jin Seok; Jeong, Myeong Sik; Oh, Joo Young; Kang, Hoon; Kang, Ji Heon [Daegyeong Regional Division, Korea Institute of Industrial Technology, Daegu (Korea, Republic of); Kim, Hyung Ryul [Agency for Defense Development, Changwon (Korea, Republic of); Yoo, Wan Suk [School of Mechanical Engineering, Pusan National University, Busan (Korea, Republic of)

    2016-12-15

    The manufacturing process of long fiber thermoplastic is initiated by supplying reinforced fiber wound in a spool dispenser. If problems such as tangling or kinking occur in the apparatus used for supplying the reinforced fiber in the long-fiber thermoplastic direct process, the productivity of the long-fiber thermoplastic decreases. Therefore, it is important to enhance the supply stability of reinforced fiber. In general, the increase in supply stability can be achieved by maintaining a steady balloon shape that is controlled by the unwinding velocity or tensile force of the reinforced fiber. In this research, the range of suitable tensile force was determined under the assumption that the unwinding velocity remained constant. The reinforced fiber was assumed to be inextensible, homogeneous, and isotropic and to have uniform density. The transient-state unwinding equation of motion to analyze the unwinding motion of reinforced fiber can be derived by using Hamilton’s principle for an open system in which mass can change within a control volume. In the process of solving the transient-state unwinding equation of motion, the exact two-point boundary conditions are adopted for each time step.

  6. Natural colorants: Pigment stability and extraction yield enhancement via utilization of appropriate pretreatment and extraction methods.

    Ngamwonglumlert, Luxsika; Devahastin, Sakamon; Chiewchan, Naphaporn

    2017-10-13

    Natural colorants from plant-based materials have gained increasing popularity due to health consciousness of consumers. Among the many steps involved in the production of natural colorants, pigment extraction is one of the most important. Soxhlet extraction, maceration, and hydrodistillation are conventional methods that have been widely used in industry and laboratory for such a purpose. Recently, various non-conventional methods, such as supercritical fluid extraction, pressurized liquid extraction, microwave-assisted extraction, ultrasound-assisted extraction, pulsed-electric field extraction, and enzyme-assisted extraction have emerged as alternatives to conventional methods due to the advantages of the former in terms of smaller solvent consumption, shorter extraction time, and more environment-friendliness. Prior to the extraction step, pretreatment of plant materials to enhance the stability of natural pigments is another important step that must be carefully taken care of. In this paper, a comprehensive review of appropriate pretreatment and extraction methods for chlorophylls, carotenoids, betalains, and anthocyanins, which are major classes of plant pigments, is provided by using pigment stability and extraction yield as assessment criteria.

  7. Bee species diversity enhances productivity and stability in a perennial crop.

    Rogers, Shelley R; Tarpy, David R; Burrack, Hannah J

    2014-01-01

    Wild bees provide important pollination services to agroecoystems, but the mechanisms which underlie their contribution to ecosystem functioning--and, therefore, their importance in maintaining and enhancing these services-remain unclear. We evaluated several mechanisms through which wild bees contribute to crop productivity, the stability of pollinator visitation, and the efficiency of individual pollinators in a highly bee-pollination dependent plant, highbush blueberry. We surveyed the bee community (through transect sampling and pan trapping) and measured pollination of both open- and singly-visited flowers. We found that the abundance of managed honey bees, Apis mellifera, and wild-bee richness were equally important in describing resulting open pollination. Wild-bee richness was a better predictor of pollination than wild-bee abundance. We also found evidence suggesting pollinator visitation (and subsequent pollination) are stabilized through the differential response of bee taxa to weather (i.e., response diversity). Variation in the individual visit efficiency of A. mellifera and the southeastern blueberry bee, Habropoda laboriosa, a wild specialist, was not associated with changes in the pollinator community. Our findings add to a growing literature that diverse pollinator communities provide more stable and productive ecosystem services.

  8. Amorphous Solid Dispersion of Epigallocatechin Gallate for Enhanced Physical Stability and Controlled Release

    Yizheng Cao

    2017-11-01

    Full Text Available Epigallocatechin gallate (EGCG has been recognized as the most prominent green tea extract due to its healthy influences. The high instability and low bioavailability, however, strongly limit its utilization in food and drug industries. This work, for the first time, develops amorphous solid dispersion of EGCG to enhance its bioavailability and physical stability. Four commonly used polymeric excipients are found to be compatible with EGCG in water-dioxane mixtures via a stepwise mixing method aided by vigorous mechanical interference. The dispersions are successfully generated by lyophilization. The physical stability of the dispersions is significantly improved compared to pure amorphous EGCG in stress condition (elevated temperature and relative humidity and simulated gastrointestinal tract environment. From the drug release tests, one of the dispersions, EGCG-Soluplus® 50:50 (w/w shows a dissolution profile that only 50% EGCG is released in the first 20 min, and the remains are slowly released in 24 h. This sustained release profile may open up new possibilities to increase EGCG bioavailability via extending its elimination time in plasma.

  9. Nanostructured polyurethane perylene bisimide ester assemblies with tuneable morphology and enhanced stability.

    Zhang, Xiaoxiao; Gong, Tingyuan; Chi, Hong; Li, Tianduo

    2018-03-01

    Size control has been successfully achieved in inorganic materials, but it remains a challenge in polymer nanomaterials due to their polydispersity. Here, we report a facile approach to tailor the diameters of polyurethane (PU) nanoparticles (490 nm, 820 nm and 2.1 µm) via perylene bisimide (PBI) assisted self-assembly. The formed morphologies such as spindle, spherical and core-shell structures depend on the ratio of PBI and polymer concentrations. It is shown that the formation of PU nanoparticles is directed by π-π stacking of PBI and the morphology transition is not only affected by the amount of PBI incorporated, but also influenced by solvent, which controls the initial evaporation balance. Furthermore, the prepared PUs exhibit retained optical stability and enhanced thermal stability. The PUs, designed to have conjugated PBI segments in backbones, were synthesized via ring-opening and condensation reactions. Compared with the neat PU, gel permeation chromatography shows narrower molecular weight distribution. Fluorescence spectra and ultraviolet-visible spectra indicate retained maximum emission wavelength of PBI at 574 nm and 5.2% quantum yields. Thermo-gravimetric analysis and differential scanning calorimetry reveal 79°C higher decomposition temperature and 22°C higher glass transition temperature. This study provides a new way to fabricate well-defined nanostructures of functionalized PUs.

  10. Thulium oxide fuel characterization study: Part 2, Environmental behavior and mechanical, thermal and chemical stability enhancement

    Nelson, C.A.

    1970-12-01

    A study was performed of the correlation between fuel form stability and exposure environment of (temperature and atmosphere). 100% Tm 2 O 3 , 80% Tm 2 O 3 /20% Yb 2 O 3 and 100% Yb 2 O 3 wafers were subjected to air, dynamic vacuum and static vacuum at temperatures to 2000 0 C for times to 100 hours. Results showed the Tm 2 O 3 /Yb 2 O 3 cubic structure to be unaffected by elemental levels of iron, aluminum, magnesium and silicon and unaffected by the environmental conditions imposed on the wafers. A second task emphasized the optimization of the thermal, mechanical and chemical stability of Tm 2 O 3 fuel forms. Enhancement was sought through process variable optimization and the addition of metal oxides to Tm 2 O 3 . CaO, TiO 2 and Al 2 O 3 were added to form a grain boundary precipitate to control fines generation. The presence of 1% additive was inadequate to depress the melting point of Tm 2 O 3 or to change the cubic crystalline structure of Tm 2 O 3 /Yb 2 O 3 . Tm 2 O 3 /Yb 2 O 3 wafers containing CaO developed a grain boundary phase that improved the resistance to fines generation. The presence of Yb 2 O 3 did not appear to measurably influence behavior

  11. Enhancing the stabilization of aircraft pitch motion control via intelligent and classical method

    Lukman, H.; Munawwarah, S.; Azizan, A.; Yakub, F.; Zaki, S. A.; Rasid, Z. A.

    2017-12-01

    The pitching movement of an aircraft is very important to ensure passengers are intrinsically safe and the aircraft achieve its maximum stability. The equations governing the motion of an aircraft are a complex set of six nonlinear coupled differential equations. Under certain assumptions, it can be decoupled and linearized into longitudinal and lateral equations. Pitch control is a longitudinal problem and thus, only the longitudinal dynamics equations are involved in this system. It is a third order nonlinear system, which is linearized about the operating point. The system is also inherently unstable due to the presence of a free integrator. Because of this, a feedback controller is added in order to solve this problem and enhance the system performance. This study uses two approaches in designing controller: a conventional controller and an intelligent controller. The pitch control scheme consists of proportional, integral and derivatives (PID) for conventional controller and fuzzy logic control (FLC) for intelligent controller. Throughout the paper, the performance of the presented controllers are investigated and compared based on the common criteria of step response. Simulation results have been obtained and analysed by using Matlab and Simulink software. The study shows that FLC controller has higher ability to control and stabilize the aircraft's pitch angle as compared to PID controller.

  12. IQGAP1 interacts with Aurora-A and enhances its stability and its role in cancer

    Yin, Ning; Shi, Ji; Wang, Dapeng; Tong, Tong; Wang, Mingrong; Fan, Feiyue; Zhan, Qimin

    2012-01-01

    Highlights: ► IQGAP1 interacts with Aurora-A through its RGCt domain. ► Overexpression of IQGAP1 prevents ubiquitination of Aurora-A. ► Overexpression of IQGAP1 enhances the protein stability of Aurora-A. ► Overexpression of IQGAP1 promotes the kinase activity of Aurora-A. -- Abstract: IQGAP1, a ubiquitously expressed scaffold protein, has been identified in a wide range of organisms. It participates in multiple aspects of cellular events by binding to and regulating numerous interacting proteins. In our present study, we identified a new IQGAP1 binding protein named Aurora-A which is an oncogenic protein and overexpressed in various types of human tumors. In vitro analysis with GST-Aurora-A fusion proteins showed a physical interaction between Aurora-A and IQGAP1. Moreover, the binding also occurred in HeLa cells as endogenous Aurora-A co-immunoprecipitated with IQGAP1 from the cell lysates. Overexpression of IQGAP1 resulted in an elevation of both expression and activity of Aurora-A kinase. Endogenous IQGAP1 knockdown by siRNA promoted Aurora-A degradation whereas IQGAP1 overexpression enhanced the stability of Aurora-A. Additionally, we documented that the IQGAP1-induced cell proliferation was suppressed by knocking down Aurora-A expression. Taken together, our results showed an unidentified relationship between Aurora-A and IQGAP1, and provided a new insight into the molecular mechanism by which IQGAP1 played a regulatory role in cancer.

  13. Enhanced rearrangement technique for secure data transmission: case study credit card process

    Vyavahare, Tushar; Tekade, Darshana; Nayak, Saurabh; kumar, N. Suresh; Blessy Trencia Lincy, S. S.

    2017-11-01

    Encryption of data is very important in order to keep the data secure and make secure transactions and transmission of data. Such as online shopping. whenever we give our card details there is possibility of data being hacked or intruded. So to secure that we need to encrypt the data and decryption strategy should be known only to that particular bank. Therefore to achieve this objective RSA algorithm can be used. Where only intended sender and receiver can know about the encryption and decryption of data. To make the RSA technique more secure in this paper we propose the technique we call it Modified RSA. for which a transposition module is designed which uses Row Transposition method to encrypt the data. Before giving the card details to RSA the input will be given to this transposition module which will scrambles the data and rearranges it. Output of transposition will be then provided to the modified RSA which produces the cipher text to send over the network. Use of RSA and the transposition module will provide the dual security to whole system.

  14. A flexible privacy enhanced and secured ICT architecture for a smart grid project with active cosumers in the city of Zwolle-NL

    Montes Portela, C.; Rooden, H.; Kohlmann, J.; Leersum, van D.; Geldtmeijer, D.A.M.; Slootweg, J.G.; van Eekelen, Marko

    2013-01-01

    This paper presents the ICT architecture for a Smart Grid project with consumer interaction in the city of Zwolle, the Netherlands. It describes the privacy and security enhancing measures applied to ensure a positive sum of necessary functionality and respect for consumer’s privacy and secure

  15. Enhanced conjugation stability and blood circulation time of macromolecular gadolinium-DTPA contrast agent

    Jenjob, Ratchapol [Department of New Drug Development, School of Medicine, Inha University, 2F A-dong, Jeongseok Bldg., Sinheung-dong 3-ga, Jung-gu, Incheon 400-712 (Korea, Republic of); Kun, Na [Department of Biotechnology, The Catholic University of Korea, 43 Jibong-ro, Wonmi-gu, Bucheon-si, Gyeonggi-do 420-743 (Korea, Republic of); Ghee, Jung Yeon [Utah-Inha DDS and Advanced Therapeutics, B-403 Meet-You-All Tower, SongdoTechnopark, 7–50, Songdo-dong, Yeonsu-gu, Incheon 406-840 (Korea, Republic of); Shen, Zheyu; Wu, Xiaoxia [Division of Functional Materials and Nano-Devices, Ningbo Institute of Materials Technology & Engineering (NIMTE), Chinese Academy of Sciences, 519 Zhuangshi Street, Zhenhai District, Ningbo, Zhejiang 315201 (China); Cho, Steve K., E-mail: scho@gist.ac.kr [Division of Liberal Arts and Science, GIST College, Gwangju Institute of Science and Technology, Gwangju 500-712 (Korea, Republic of); Lee, Don Haeng [Utah-Inha DDS and Advanced Therapeutics, B-403 Meet-You-All Tower, SongdoTechnopark, 7–50, Songdo-dong, Yeonsu-gu, Incheon 406-840 (Korea, Republic of); Department of Internal Medicine, School of Medicine, Inha University Hospital, Incheon 420-751 (Korea, Republic of); Yang, Su-Geun, E-mail: Sugeun.Yang@Inha.ac.kr [Department of New Drug Development, School of Medicine, Inha University, 2F A-dong, Jeongseok Bldg., Sinheung-dong 3-ga, Jung-gu, Incheon 400-712 (Korea, Republic of)

    2016-04-01

    In this study, we prepared macromolecular MR T1 contrast agent: pullulan-conjugated Gd diethylene triamine pentaacetate (Gd-DTPA-Pullulan) and estimated residual free Gd{sup 3+}, chelation stability in competition with metal ions, plasma and tissue pharmacokinetics, and abdominal MR contrast on rats. Residual free Gd{sup 3+} in Gd-DTPA-Pullulan was measured using colorimetric spectroscopy. The transmetalation of Gd{sup 3+} incubated with Ca{sup 2+} was performed by using a dialysis membrane (MWCO 100–500 Da) and investigated by ICP-OES. The plasma concentration profiles of Gd-DTPA-Pullulan were estimated after intravenous injection at a dose 0.1 mmol/kg of Gd. The coronal-plane abdominal images of normal rats were observed by MR imaging. The content of free Gd{sup 3+}, the toxic residual form, was less than 0.01%. Chelation stability of Gd-DTPA-Pullulan was estimated, and only 0.2% and 0.00045% of Gd{sup 3+} were released from Gd-DTPA-Pullulan after 2 h incubation with Ca{sup 2+} and Fe{sup 2+}, respectively. Gd-DTPA-Pullulan displayed the extended plasma half-life (t{sub 1/2,α} = 0.43 h, t{sub 1/2,β} = 2.32 h), much longer than 0.11 h and 0.79 h of Gd-EOB-DTPA. Abdominal MR imaging showed Gd-DTPA-Pullulan maintained initial MR contrast for 30 min. The extended plasma half-life of Gd-DTPA-Pullulan probably allows the prolonged MR acquisition time in clinic with enhanced MR contrast. - Highlights: • Macromolecule (pullulan) conjugated Gd contrast agent (Gd-DTPA-Pullulan) showed the extended plasma half-life (t{sub 1/2,α} = 0.43 h, t{sub 1/2,β} = 2.32 h) in comparison with Gd-EOB-DTPA • Gd-DTPA-pullulan T1 contrast agent exhibited strong chelation stability against Gd. • The extended blood circulation attributed the enhanced and prolonged MR contrast on abdominal region of rats. • The extended blood circulation may provide prolonged MR acquisition time window in clinics.

  16. Cyber security issues in online games

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  17. Highly stabilized and photoluminescence enhancement of ZnS:Mn2+ nanoparticles in biotin matrix

    Keshari, Ashish K.; Pandey, Avinash C.

    2009-01-01

    We synthesized the ZnS:Mn 2+ nanoparticles passivated by biocompatible layer, namely, biotin by chemical precipitation route and studied their temporal evolution for size, structure, optical, and photoluminescence stability. To monitor the structural and optoelectronic properties of the nanoparticles with time, we have characterized the grown product by x-ray diffraction, small angle x-ray scattering, UV visible, and photoluminescence spectroscopic techniques at a regular interval for a period of three months. Results showed that the properties of nanophosphors capped with biotin are remaining the same even after 3 months. Energy dispersive x-ray analysis of 3 month aged sample shows long time compatibility between ZnS:Mn 2+ nanoparticles and the biotin. This is also confirmed by electron microscopy that the growth of the nanoparticles is strongly arrested by the biotin. X-ray photoelectron spectra were also recorded to show the chemical state of the elements. Enhanced ratio of Zn 2p to Mn 2p peaks in the x-ray photoelectron spectra of ZnS:Mn 2+ nanoparticles shows that the Mn 2+ ions are incorporated within ZnS host matrix. We found that biotin capping will enhance the luminescence from ZnS:Mn 2+ nanoparticles as compared to without capped particles. Absence of biotin will gradually degrade the luminescence upon aging while drastic degradation in luminescence intensity was observed after annealing. Properties show that biotin also protected the nanoparticles from any environmental attack

  18. Surface enhanced Raman spectroscopy platform based on graphene with one-year stability

    Tite, Teddy [Univ Lyon, UJM-Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516, 18 rue Professeur Benoit Lauras, F-42000 Saint-Etienne (France); Barnier, Vincent [Ecole Nationale Supérieure des Mines, CNRS, Laboratoire Georges Friedel UMR 5307, 158 cours Fauriel, F-42023 Saint-Etienne (France); Donnet, Christophe, E-mail: Christophe.Donnet@univ-st-etienne.fr [Univ Lyon, UJM-Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516, 18 rue Professeur Benoit Lauras, F-42000 Saint-Etienne (France); Loir, Anne–Sophie; Reynaud, Stéphanie; Michalon, Jean–Yves; Vocanson, Francis; Garrelie, Florence [Univ Lyon, UJM-Saint-Etienne, CNRS, Laboratoire Hubert Curien UMR 5516, 18 rue Professeur Benoit Lauras, F-42000 Saint-Etienne (France)

    2016-04-01

    We report the synthesis, characterization and use of a robust surface enhanced Raman spectroscopy platform with a stable detection for up to one year of Rhodamine R6G at a concentration of 10{sup −6} M. The detection of aminothiophenol and methyl parathion, as active molecules of commercial insecticides, is further demonstrated at concentrations down to 10{sup −5}–10{sup −6} M. This platform is based on large scale textured few-layer (fl) graphene obtained without any need of graphene transfer. The synthesis route is based on diamond-like carbon films grown by pulsed laser deposition, deposited onto silicon substrates covered by a Ni layer prior to diamond-like carbon deposition. The formation of fl-graphene film, confirmed by Raman spectroscopy and mapping, is obtained by thermal annealing inducing the diffusion of Ni atoms and the concomitant formation of nickel silicide compounds, as identified by Raman and Auger electron spectroscopies. The textured fl-graphene films were decorated with gold nanoparticles to optimize the efficiency of the SERS device to detect organic molecules at low concentrations. - Highlights: • Synthesis of graphene film from amorphous carbon by pulsed laser deposition with nickel catalyst • Large scale textured graphene with nanoscale roughness obtained through nickel silicide formation • Films used for surface enhanced Raman spectroscopy detection of organophosphate compounds • Stability of the SERS platforms over up to one year.

  19. Chitosan nanocomposite films: enhanced electrical conductivity, thermal stability, and mechanical properties.

    Marroquin, Jason B; Rhee, K Y; Park, S J

    2013-02-15

    A novel, high-performance Fe(3)O(4)/MWNT/Chitosan nanocomposite has been prepared by a simple solution evaporation method. A significant synergistic effect of Fe(3)O(4) and MWNT provided enhanced electrical conductivity, mechanical properties, and thermal stability on the nanocomposites. A 5% (wt) loading of Fe(3)O(4)/MWNT in the nanocomposite increased conductivity from 5.34×10(-5) S/m to 1.49×10(-2) S/m compared to 5% (wt) MWNT loadings. The Fe(3)O(4)/MWNT/Chitosan films also exhibited increases in tensile strength and modulus of 70% and 155%, respectively. The integral procedure decomposition temperature (IPDT) was enhanced from 501 °C to 568 °C. These effects resulted from a number of factors: generation of a greater number of conductive channels through interactions between MWNT and Fe(3)O(4) surfaces, a higher relative crystallinity, the antiplasticizing effects of Fe(3)O(4), a restricted mobility and hindrance of depolymerization of the Chitosan chain segments, as well as uniform distribution, improved dispersion, and strong interfacial adhesion between the MWNT and Chitosan matrix. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. Extensions and Enhancements to “the Secure Remote Update Protocol”

    Andrew John Poulter

    2017-09-01

    Full Text Available This paper builds on previous work introducing the Secure Remote Update Protocol (SRUP, a secure communications protocol for Command and Control applications in the Internet of Things, built on top of MQTT. This paper builds on the original protocol and introduces a number of additional message types: adding additional capabilities to the protocol. We also discuss the difficulty of proving that a physical device has an identity corresponding to a logical device on the network and propose a mechanism to overcome this within the protocol.

  1. Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?

    Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar

    2017-08-01

    Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.

  2. Information theoretically secure, enhanced Johnson noise based key distribution over the smart grid with switched filters.

    Gonzalez, Elias; Kish, Laszlo B; Balog, Robert S; Enjeti, Prasad

    2013-01-01

    We introduce a protocol with a reconfigurable filter system to create non-overlapping single loops in the smart power grid for the realization of the Kirchhoff-Law-Johnson-(like)-Noise secure key distribution system. The protocol is valid for one-dimensional radial networks (chain-like power line) which are typical of the electricity distribution network between the utility and the customer. The speed of the protocol (the number of steps needed) versus grid size is analyzed. When properly generalized, such a system has the potential to achieve unconditionally secure key distribution over the smart power grid of arbitrary geometrical dimensions.

  3. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    Rizzo, Davinia [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Blackburn, Mark [Stevens Inst. of Technology, Hoboken, NJ (United States)

    2017-03-01

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper covers the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).

  4. International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation : 60 Years of IAEA and EURATOM

    Abousahl, Said; Plastino, Wolfango

    2018-01-01

    This open access book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensions. Current challenges are discussed and attempts made to identify possible solutions and future improvements. Subsequent sections consider scientific developments that have the potential to increase the effectiveness of implementation of international regimes, particularly in critical areas, technology foresight, and the ongoing evaluation of current capabilities. The closing sections examine scientific and technical challenges and discuss the role of international cooperation and actions of the scientific community in leading the world toward peace and security. The book – which celebrates 60 years of IAEA Atoms for Peace and Development and the EURA...

  5. Transient stability enhancement of modern power grid using predictive Wide-Area Monitoring and Control

    Yousefian, Reza

    This dissertation presents a real-time Wide-Area Control (WAC) designed based on artificial intelligence for large scale modern power systems transient stability enhancement. The WAC using the measurements available from Phasor Measurement Units (PMUs) at generator buses, monitors the global oscillations in the system and optimally augments the local excitation system of the synchronous generators. The complexity of the power system stability problem along with uncertainties and nonlinearities makes the conventional modeling non-practical or inaccurate. In this work Reinforcement Learning (RL) algorithm on the benchmark of Neural Networks (NNs) is used to map the nonlinearities of the system in real-time. This method different from both the centralized and the decentralized control schemes, employs a number of semi-autonomous agents to collaborate with each other to perform optimal control theory well-suited for WAC applications. Also, to handle the delays in Wide-Area Monitoring (WAM) and adapt the RL toward the robust control design, Temporal Difference (TD) is proposed as a solver for RL problem or optimal cost function. However, the main drawback of such WAC design is that it is challenging to determine if an offline trained network is valid to assess the stability of the power system once the system is evolved to a different operating state or network topology. In order to address the generality issue of NNs, a value priority scheme is proposed in this work to design a hybrid linear and nonlinear controllers. The algorithm so-called supervised RL is based on mixture of experts, where it is initialized by linear controller and as the performance and identification of the RL controller improves in real-time switches to the other controller. This work also focuses on transient stability and develops Lyapunov energy functions for synchronous generators to monitor the stability stress of the system. Using such energies as a cost function guarantees the convergence

  6. Enhanced Dynamic Voltage Stability Support by VSC-HVDC for Offshore Wind Applications using Trajectory Sensitivity Analysis

    Liu, Hongzhi; Chen, Zhe; Liu, Leo

    2013-01-01

    The integration of large-scale wind power plants changes the structure, configuration and operation of conventional power systems and brings challenges to the security and stability of power systems. Dynamic voltage stability of power systems with high wind penetration is one of the critical issues....... In this paper, VSC-HVDC transmission system is used to integrate a large-scale wind power plant into the onshore power grid. For different voltage support strategies of VSC-HVDC, a trajectory sensitivity analysisbased approach is proposed to find the minimum onshore VSC capacity with which the VSC-HVDC can...... provide enough support for the improvement of system voltage stability after a disturbance. Sensitivities of reactive power output of VSC to its capacity increase are calculated instead of the sensitivities of bus voltage magnitude towards the reactive power injection variation of VSC. Simulation results...

  7. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  8. Secure open cloud in data transmission using reference pattern and identity with enhanced remote privacy checking

    Vijay Singh, Ran; Agilandeeswari, L.

    2017-11-01

    To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.

  9. Enhancing Research in Networking & System Security, and Forensics, in Puerto Rico

    2015-03-03

    Conference 2014 – Seattle, WA – Travel Scholarship awarded by Google. Celedonio was able to meet Mr. Tony Baylis, a recruiter from the Lawrence...Microsoft, Encase, Avaya, McAfee, Cisco , Department of Homeland Security, Department of Defense, ISACA among others. International Conferences in

  10. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    Abd El-Malek, Ahmed H.; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2017-01-01

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  11. Power allocation and cooperative jamming for enhancing physical layer security in opportunistic relay networks in the presence of interference

    Abd El-Malek, Ahmed H.

    2017-04-18

    In this paper, the impact of cochannel interference on the secrecy performance of dual-hop decode-and-forward relaying is investigated. In particular, the outage and intercept probabilities are obtained for the opportunistic relay selection (ORS) model in the presence of nonidentical interfering signals under a single/multiple passive eavesdropper(s) attack. Moreover, the proposed work enhances physical layer security performance of ORS model using cooperative jamming (CJ) techniques. Therefore, new closed-form expressions are derived for the intercept and outage probabilities of the CJ-ORS model in the presence of interference over Rayleigh fading channels. Moreover, the analyses are generalized to the case of multiple eavesdroppers where closed-form expressions are derived for the intercept probability. To reveal more insights on the proposed work secrecy performance, asymptotic closed-form expressions for the intercept and outage probabilities are obtained. Using these asymptotic expressions, a power allocation optimization problem is formulated and solved for enhancing the system security. The derived analytical formulas herein are supported by numerical and simulation results to clarify the main contributions of the paper. The results show that, although the cochannel interference increases the system outage probability, it might improve the system secrecy performance. Moreover, the proposed CJ-ORS model is shown to enhance the system secrecy performance compared to ORS model.

  12. Late Quaternary Soil Development Enhances Aeolian Landform Stability, Moenkopi Plateau, Southern Colorado Plateau, USA

    Amy L. Ellwein

    2018-04-01

    Full Text Available The Moenkopi dune field in northeastern Arizona covers roughly 1250 km2, but most of the field is inactive. Dune deposits on the Moenkopi Plateau (MP have remained inactive throughout the Holocene despite periods of elevated aridity or historical reductions of vegetation cover by livestock grazing. We argue that this inactivity is not because of any diminishment of driving forces in the aeolian system (e.g., insufficient winds, but rather because of increased cohesion due to soil development that enhances resistance to wind erosion. Abundant aeolian sediments were supplied to the Black Mesa region by the Little Colorado River and its tributaries during the late Pleistocene (MIS 2 and 3, which enabled the development of climbing dunes and transport of sand over the Adeii Eechii Cliffs and onto the MP. These deposits (Qe1 stabilized during the Pleistocene/Holocene climatic transition (~12–7.5 ka because of reduced sediment supply and high dust flux which resulted in rapid soil formation. Erosion of climbing dunes/sand ramps from the Adeii Eechii Cliffs eliminated delivery of large quantities of new sand to the MP during the mid to late Holocene. Soil development within the Qe1 mantle increased sediment cohesion and prevented widespread aeolian reactivation during the Holocene, despite the occurrence of conditions (wind speed, climate, etc. under which dune reactivation would be expected. Drylands comprise roughly 40% of the land cover of earth and climate models predict their expansion. Pedogenic stability is not commonly considered in climate-based models used to predict aeolian activity. To improve predictions of future dune activity in drylands, the degree of soil development in aeolian deposits should be considered when evaluating sediment availability in aeolian systems.

  13. Enhanced conjugation stability and blood circulation time of macromolecular gadolinium-DTPA contrast agent.

    Jenjob, Ratchapol; Kun, Na; Ghee, Jung Yeon; Shen, Zheyu; Wu, Xiaoxia; Cho, Steve K; Lee, Don Haeng; Yang, Su-Geun

    2016-04-01

    In this study, we prepared macromolecular MR T1 contrast agent: pullulan-conjugated Gd diethylene triamine pentaacetate (Gd-DTPA-Pullulan) and estimated residual free Gd(3+), chelation stability in competition with metal ions, plasma and tissue pharmacokinetics, and abdominal MR contrast on rats. Residual free Gd(3+) in Gd-DTPA-Pullulan was measured using colorimetric spectroscopy. The transmetalation of Gd(3+) incubated with Ca(2+) was performed by using a dialysis membrane (MWCO 100-500 Da) and investigated by ICP-OES. The plasma concentration profiles of Gd-DTPA-Pullulan were estimated after intravenous injection at a dose 0.1 mmol/kg of Gd. The coronal-plane abdominal images of normal rats were observed by MR imaging. The content of free Gd(3+), the toxic residual form, was less than 0.01%. Chelation stability of Gd-DTPA-Pullulan was estimated, and only 0.2% and 0.00045% of Gd(3+) were released from Gd-DTPA-Pullulan after 2h incubation with Ca(2+) and Fe(2+), respectively. Gd-DTPA-Pullulan displayed the extended plasma half-life (t1/2,α=0.43 h, t1/2,β=2.32 h), much longer than 0.11h and 0.79 h of Gd-EOB-DTPA. Abdominal MR imaging showed Gd-DTPA-Pullulan maintained initial MR contrast for 30 min. The extended plasma half-life of Gd-DTPA-Pullulan probably allows the prolonged MR acquisition time in clinic with enhanced MR contrast. Copyright © 2016 Elsevier B.V. All rights reserved.

  14. Thermal conductivity enhancement of sodium acetate trihydrate by adding graphite powder and the effect on stability of supercooling

    Johansen, Jakob Berg; Dannemand, Mark; Kong, Weiqiang

    2015-01-01

    . The graphite powder was stabilized using carboxymetyl cellulose and successfully tested in heating and supercooling cycles with no loss of performance. Thermal conductivity enhancing properties of graphite powder was shown in samples. Since the experiments were conducted in small scale, at 200 g per sample......, large scale experiments are required to validate graphite as a thermo conductivity enhancing agent, suitable for use in seasonal heat storage applications utilizing SAT....

  15. Hardware Module for the Security Enhancement of Optical Telecom Network Equipment

    Nadeem; Ali, M.

    2015-01-01

    The telecommunication equipment physical security threats have increased not only in Pakistan but also anywhere in the world and hence, reducing the revenue. This new challenging and alarming situation is created for the telecom network provider. The main focus of this paper is to provide a low cost economical design for reducing the theft of the costly telecommunication equipment like optical network units (ONU). This system is based on instant messaging on the mobile in the event of theft through GSM modem. The proposed security module is dynamic, flexible and can also be integrated in the existing networks and separately having its own independent low power consumption source. The module will continuously work successfully under different scenarios such as completely isolated from other devices by power break down or by fibre cut. (author)

  16. Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing

    James (Jong Hyuk Park

    2016-09-01

    Full Text Available Entropy is a basic and important concept in information theory. It is also often used as a measure of the unpredictability of a cryptographic key in cryptography research areas. Ubiquitous computing (Ubi-comp has emerged rapidly as an exciting new paradigm. In this special issue, we mainly selected and discussed papers related with ore theories based on the graph theory to solve computational problems on cryptography and security, practical technologies; applications and services for Ubi-comp including secure encryption techniques, identity and authentication; credential cloning attacks and countermeasures; switching generator with resistance against the algebraic and side channel attacks; entropy-based network anomaly detection; applied cryptography using chaos function, information hiding and watermark, secret sharing, message authentication, detection and modeling of cyber attacks with Petri Nets, and quantum flows for secret key distribution, etc.

  17. How the United Kingdom seeks to enhance nuclear security with the help of IPPAS

    Fawaz-Huber, May

    2016-01-01

    In October 2011, an IAEA team of international nuclear security experts conducted an International Physical Protection Service mission (IPPAS) to the United Kingdom. They visited the Sellafield civil nuclear site, as well as Barrow Port, which is used for the transport of nuclear material. The IAEA conducted a follow-up mission in February 2016. IPPAS missions provide advice on how to improve the effectiveness of a State’s physical protection regime, either nationally or at facility level. They do so by comparing it with relevant international legal instruments, guidelines and best practices, particularly the 2005 Amendment to the Convention on the Physical Protection of Nuclear Material and the IAEA Nuclear Security Series guidance publications.

  18. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  19. Social Protection for Enhanced Food Security in Sub-Saharan Africa

    Stephen Devereux

    2012-01-01

    This paper identifies several positive synergies between social protection programmes and food security outcomes. One function of social protection is to manage and reduce vulnerability, and several instruments are reviewed – weather-indexed insurance, public works programmes, emergency food aid and buffer stock management – which all contribute to stabilising income and access to food across good and bad years, or between the harvest and the hungry season. Other social protection instruments...

  20. Enhancing Information Security in Cloud Computing Services using SLA based metrics

    , Nia; Mganga, Ramadianti Putri;; Charles, Medard

    2011-01-01

    Context: Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. As an initiative to address such risks, organizations can develop and implement SLA to establish common expectations and goals between the clo...

  1. Leveraging Service Oriented Architecture to Enhance Information Sharing for Surface Transportation Security

    2008-09-01

    Fire and Emergency Management Services, Suffolk County Sheriff’s Department, the U.S. Attorney’s Office, the Bureau of Alcohol, Tobacco and Firearms...mass transit services. These include express and regular bus service, a downtown Skyway monorail , a trolley service and the Stadium Shuttle for various...safety related incidents rather than security, including transportation disruptions due to derailments, accidents, fires , hazardous materials spills

  2. A sequential-move game for enhancing safety and security cooperation within chemical clusters

    Pavlova, Yulia; Reniers, Genserik

    2011-01-01

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided.

  3. A sequential-move game for enhancing safety and security cooperation within chemical clusters.

    Pavlova, Yulia; Reniers, Genserik

    2011-02-15

    The present paper provides a game theoretic analysis of strategic cooperation on safety and security among chemical companies within a chemical industrial cluster. We suggest a two-stage sequential move game between adjacent chemical plants and the so-called Multi-Plant Council (MPC). The MPC is considered in the game as a leader player who makes the first move, and the individual chemical companies are the followers. The MPC's objective is to achieve full cooperation among players through establishing a subsidy system at minimum expense. The rest of the players rationally react to the subsidies proposed by the MPC and play Nash equilibrium. We show that such a case of conflict between safety and security, and social cooperation, belongs to the 'coordination with assurance' class of games, and we explore the role of cluster governance (fulfilled by the MPC) in achieving a full cooperative outcome in domino effects prevention negotiations. The paper proposes an algorithm that can be used by the MPC to develop the subsidy system. Furthermore, a stepwise plan to improve cross-company safety and security management in a chemical industrial cluster is suggested and an illustrative example is provided. Copyright © 2010 Elsevier B.V. All rights reserved.

  4. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  5. Enhanced stabilization of Pb, Zn, and Cd in contaminated soils using oxalic acid-activated phosphate rocks.

    Zhang, Zhuo; Guo, Guanlin; Wang, Mei; Zhang, Jia; Wang, Zhixin; Li, Fasheng; Chen, Honghan

    2018-01-01

    Phosphate amendments, especially phosphate rock (PR), are one of the most commonly used materials to stabilize heavy metals in contaminated soils. However, most of PR reserve consists of low-grade ore, which limits the efficiency of PR for stabilizing heavy metals. This study was to enhance the stabilization of heavy metals through improving the available phosphorous (P) release of PR by oxalic acid activation. Raw PR and activated PR (APR) were characterized by scanning electron microscopy-energy dispersive X-ray spectroscopy (SEM-EDS), X-ray powder diffraction (XRD), Brunauer-Emmett-Teller (BET) surface analysis, and laser diffraction to determine the changes of structure and composition of APR. The stabilization effectiveness of lead (Pb), zinc (Zn), and cadmium (Cd) in soils by APR was investigated through toxicity leaching test and speciation analysis. The results indicated that after treatment by oxalic acid, (1) the crystallinity of the fluorapatite phase of PR transformed into the weddellite phase; (2) the surface area of PR increased by 37%; (3) the particle size of PR became homogenized (20-70 μm); and (4) the available P content in PR increased by 22 times. These changes of physicochemical characteristics of PR induced that APR was more effective to transform soil heavy metals from the non-residual fraction to the residual fraction and enhance the stabilization efficiency of Pb, Zn, and Cd than PR. These results are significant for the future use of low-grade PR to stabilize heavy metals.

  6. Fluoride enhances transfection activity of carbonate apatite by increasing cytoplasmic stability of plasmid DNA

    Chowdhury, E.H.

    2011-01-01

    Highlights: → Cytoplasmic stability of plasmid DNA is enhanced by fluoride incorporation into carbonate apatite carrier. → Fluoridated carbonate apatite promotes a robust increase in transgene expression. → Controlled dissolution of fluoridated carbonate apatite in endosomal acidic environment might buffer the endosomes and prevent degradation of the released DNA. -- Abstract: Intracellular delivery of a functional gene or a nucleic acid sequence to specifically knockdown a harmful gene is a potential approach to precisely treat a critical human disease. The intensive efforts in the last few decades led to the development of a number of viral and non-viral synthetic vectors. However, an ideal delivery tool in terms of the safety and efficacy has yet to be established. Recently, we have developed pH-sensing inorganic nanocrystals of carbonate apatite for efficient and cell-targeted delivery of gene and gene-silencing RNA. Here we show that addition of very low level of fluoride to the particle-forming medium facilitates a robust increase in transgene expression following post-incubation of the particles with HeLa cells. Confocal microscopic observation and Southern blotting prove the cytoplasmic existence of plasmid DNA delivered by likely formed fluoridated carbonate apatite particles while degradation of plasmid DNA presumably by cytoplasmic nucleases was noticed following delivery with apatite particles alone. The beneficial role of fluoride in enhancing carbonate apatite-mediated gene expression might be due to the buffering potential of generated fluoridated apatite in endosomal acidic environment, thereby increasing the half-life of delivered plasmid DNA.

  7. Fluoride enhances transfection activity of carbonate apatite by increasing cytoplasmic stability of plasmid DNA

    Chowdhury, E.H., E-mail: md.ezharul.hoque@med.monash.edu.my [Jeffrey Cheah School of Medicine and Health Sciences, Monash University Sunway Campus, Jalan Lagoon Selatan, Bandar Sunway, Selangor Darul Ehsan (Malaysia)

    2011-06-17

    Highlights: {yields} Cytoplasmic stability of plasmid DNA is enhanced by fluoride incorporation into carbonate apatite carrier. {yields} Fluoridated carbonate apatite promotes a robust increase in transgene expression. {yields} Controlled dissolution of fluoridated carbonate apatite in endosomal acidic environment might buffer the endosomes and prevent degradation of the released DNA. -- Abstract: Intracellular delivery of a functional gene or a nucleic acid sequence to specifically knockdown a harmful gene is a potential approach to precisely treat a critical human disease. The intensive efforts in the last few decades led to the development of a number of viral and non-viral synthetic vectors. However, an ideal delivery tool in terms of the safety and efficacy has yet to be established. Recently, we have developed pH-sensing inorganic nanocrystals of carbonate apatite for efficient and cell-targeted delivery of gene and gene-silencing RNA. Here we show that addition of very low level of fluoride to the particle-forming medium facilitates a robust increase in transgene expression following post-incubation of the particles with HeLa cells. Confocal microscopic observation and Southern blotting prove the cytoplasmic existence of plasmid DNA delivered by likely formed fluoridated carbonate apatite particles while degradation of plasmid DNA presumably by cytoplasmic nucleases was noticed following delivery with apatite particles alone. The beneficial role of fluoride in enhancing carbonate apatite-mediated gene expression might be due to the buffering potential of generated fluoridated apatite in endosomal acidic environment, thereby increasing the half-life of delivered plasmid DNA.

  8. Fullerene (C{sub 60})/CdS nanocomposite with enhanced photocatalytic activity and stability

    Cai, Qiang [Key Laboratory of Advanced Ceramics and Machining Technology, Ministry of Education, School of Materials Science and Engineering, Tianjin University, Tianjin 300072 (China); Hu, Zhuofeng, E-mail: st04hzhf@gmail.com [Department of Chemistry, The Chinese University of Hong Kong, Shatin, New Territories, Hong Kong (China); Zhang, Qian; Li, Boyuan [Key Laboratory of Advanced Ceramics and Machining Technology, Ministry of Education, School of Materials Science and Engineering, Tianjin University, Tianjin 300072 (China); Shen, Zhurui, E-mail: shenzhurui@tju.edu.cn [Key Laboratory of Advanced Ceramics and Machining Technology, Ministry of Education, School of Materials Science and Engineering, Tianjin University, Tianjin 300072 (China)

    2017-05-01

    Highlights: • C{sub 60}/CdS nanocomposite has been fabricated as a novel visible-light-driven photocatalyst. • It exhibits enhanced photocatalytic activity and photostability than that of pure CdS reference. • The C{sub 60} improved the charge separation and transfer of nanocomposite due to its high electron affinity. - Abstract: Herein, the fullerene (C{sub 60})/CdS nanocomposite has been fabricated by a facile one-pot hydrothermal method. Its photocatatlytic hydrogen (H{sub 2}) evolution rate and degradation efficiency of Rhodamine B (Rh B) are evaluated under visible light irradiation (λ ≥ 420 nm). The content of C{sub 60} has been changed from 0.4 wt% to 8 wt%, and the optimal value for photocatalytic activity is determined to be 0.4 wt%. The H{sub 2} evolution rate over this optimal sample reaches 1.73 mmol h{sup −1} g{sup −1} and its apparent degradation rate of Rh B is 0.089 min{sup −1} (degradation efficiency of 97% within 40 min), which is 2.3 times and 1.5 times compared to that of pure CdS reference. Moreover, the photocorrosion of CdS in composite is effectively suppressed, and its photocatalytic activity can be well maintained after three recycles (97.8% retaining for composite vs. 84.4% retaining for CdS). Then, the enhanced photocatalytic activity and stability of C{sub 60}/CdS nanocomposite are further studied by spectroscopic and electrochemical methods. Results show that the C{sub 60} species covering on the surface of CdS can efficiently accelerate the separation and transfer of photoexcited charge carriers, which can improve its activity, and reduce the photocorrosion of CdS.

  9. Experimental Evidence that Hemlock Mortality Enhances Carbon Stabilization in Southern Appalachian Forest Soils

    Fraterrigo, J.; Ream, K.; Knoepp, J.

    2017-12-01

    Forest insects and pathogens (FIPs) can cause uncertain changes in forest carbon balance, potentially influencing global atmospheric carbon dioxide (CO2) concentrations. We quantified the effects of hemlock (Tsuga canadensis L. Carr.) mortality on soil carbon fluxes and pools for a decade following either girdling or natural infestation by hemlock woolly adelgid (HWA; Adelges tsugae) to improve mechanistic understanding of soil carbon cycling response to FIPs. Although soil respiration (Rsoil) was similar among reference plots and plots with hemlock mortality, both girdled and HWA-infested plots had greater activities of β-glucosidase, a cellulose-hydrolyzing extracellular enzyme, and decreased O-horizon mass and fine root biomass from 2005 to 2013. During this period, total mineral soil carbon accumulated at a higher rate in disturbed plots than in reference plots in both the surface (0-10 cm) and subsurface (10-30 cm); increases were predominantly in the mineral-associated fraction of the soil organic matter. In contrast, particulate organic matter carbon accrued slowly in surface soils and declined in the subsurface of girdled plots. δ13C values of this fraction demonstrate that particulate organic matter carbon in the surface soil has become more microbially processed over time, suggesting enhanced decomposition of organic matter in this pool. Together, these findings indicate that hemlock mortality and subsequent forest regrowth has led to enhanced soil carbon stabilization in southern Appalachian forests through the translocation of carbon from detritus and particulate soil organic matter pools to the mineral-associated organic matter pool. These findings have implications for ecosystem management and modeling, demonstrating that forests may tolerate moderate disturbance without diminishing soil carbon storage when there is a compensatory growth response by non-host trees.

  10. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  11. Array-level stability enhancement of 50 nm AlxOy ReRAM

    Iwasaki, Tomoko Ogura; Ning, Sheyang; Yamazawa, Hiroki; Takeuchi, Ken

    2015-12-01

    ReRAM's low voltage and low current programmability are attractive features to solve the scaling issues of conventional floating gate Flash. However, read instability in ReRAM is a critical issue, due to random telegraph noise (RTN), sensitivity to disturb and retention. In this work, the array-level characteristics of read stability in 50 nm AlxOy ReRAM are investigated and a circuit technique to improve stability is proposed and evaluated. First, in order to quantitatively assess memory cell stability, a method of stability characterization is defined. Next, based on this methodology, a proposal to improve read stability, called ;stability check loop; is evaluated. The stability check loop is a stability verification procedure, by which, instability improvement of 7×, and read error rate improvement of 40% are obtained.

  12. Do large heads enhance stability and restore native anatomy in primary total hip arthroplasty?

    Lombardi, Adolph V; Skeels, Michael D; Berend, Keith R; Adams, Joanne B; Franchi, Orlando J

    2011-06-01

    Dislocation remains a serious complication in hip arthroplasty. Resurfacing proponents tout anatomic femoral head restoration as an advantage over total hip arthroplasty. However, advances in bearings have expanded prosthetic head options from traditional sizes of 22, 26, 28, and 32 mm to diameters as large as 60 mm. Large heads reportedly enhance stability owing to increased range of motion before impingement and increased jump distance to subluxation. Available larger diameter material combinations include metal- or ceramic-on-highly crosslinked polyethylene and metal-on-metal, each with distinct advantages and disadvantages. We sought to determine (1) if using larger diameter heads has lowered our dislocation rate; and (2) how closely an anatomic metal-on-metal bearing with diameters to 60 mm replicates native femoral head size. We retrospectively reviewed 2020 primary arthroplasties performed with large heads (≥ 36 mm) in 1748 patients and noted dislocation incidence. In a prospective subset of 89 cases using anatomic heads, native femoral head diameter was measured intraoperatively with calipers by an independent observer and later compared with implanted size. One dislocation has occurred in 2020 hips for an incidence of 0.05%. The prosthetic head averaged 0.7 mm larger than the native head with 68 of 89 (76%) reconstructed to within ± 2 mm of native size. Larger diameter heads have contributed to lower dislocation rates and large-diameter metal-on-metal articulation can provide close anatomic restoration in primary THA.

  13. Polyacrylonitrile nanofibers with added zeolitic imidazolate frameworks (ZIF-7) to enhance mechanical and thermal stability

    Lee, Min Wook [Department of Mechanical and Industrial Engineering, University of Illinois at Chicago, 842 W. Taylor St., Chicago, Illinois 60607-7022 (United States); An, Seongpil; Song, Kyo Yong; Joshi, Bhavana N.; Jo, Hong Seok; Yoon, Sam S., E-mail: skyoon@korea.ac.kr, E-mail: ayarin@uic.edu [School of Mechanical Engineering, Korea University, Seoul 136-713 (Korea, Republic of); Al-Deyab, Salem S. [Department of Chemistry, King Saud University, Riyadh 11451 (Saudi Arabia); Yarin, Alexander L., E-mail: skyoon@korea.ac.kr, E-mail: ayarin@uic.edu [Department of Mechanical and Industrial Engineering, University of Illinois at Chicago, 842 W. Taylor St., Chicago, Illinois 60607-7022 (United States); School of Mechanical Engineering, Korea University, Seoul 136-713 (Korea, Republic of)

    2015-12-28

    Zeolitic imidazolate framework 7/polyacrylonitrile (ZIF-7/PAN) nanofiber mat of high porosity and surface area can be used as a flexible fibrous filtration membrane that is subjected to various modes of mechanical loading resulting in stresses and strains. Therefore, the stress-strain relation of ZIF-7/PAN nanofiber mats in the elastic and plastic regimes of deformation is of significant importance for numerous practical applications, including hydrogen storage, carbon dioxide capture, and molecular sensing. Here, we demonstrated the fabrication of ZIF-7/PAN nanofiber mats via electrospinning and report their mechanical properties measured in tensile tests covering the elastic and plastic domains. The effect of the mat fabrication temperature on the mechanical properties is elucidated. We showed the superior mechanical strength and thermal stability of the compound ZIF-7/PAN nanofiber mats in comparison with that of pure PAN nanofiber mats. Material characterization including scanning electron microscope, energy-dispersive X-ray spectroscopy, tensile tests, differential scanning calorimetry, and Fourier transform infrared spectroscopy revealed the enhanced chemical bonds of the ZIF-7/PAN complex.

  14. Conjugation of curcumin onto alginate enhances aqueous solubility and stability of curcumin.

    Dey, Soma; Sreenivasan, K

    2014-01-01

    Curcumin is a potential drug for various diseases including cancer. Prime limitations associated with curcumin are low water solubility, rapid hydrolytic degradation and poor bioavailability. In order to redress these issues we developed Alginate-Curcumin (Alg-Ccm) conjugate which was characterized by FTIR and (1)H NMR spectroscopy. The conjugate self-assembled in aqueous solution forming micelles with an average hydrodynamic diameter of 459 ± 0.32 nm and negative zeta potential. The spherical micelles were visualized by TEM. The critical micelle concentration (CMC) of Alg-Ccm conjugate was determined. A significant enhancement in the aqueous solubility of curcumin was observed upon conjugation with alginate. Formation of micelles improved the stability of curcumin in water at physiological pH. The cytotoxic activity of Alg-Ccm was quantified by MTT assay using L-929 fibroblast cells and it was found to be potentially cytotoxic. Hence, Alg-Ccm could be a promising drug conjugate as well as a nanosized delivery vehicle. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Controllable Spatial Configuration on Cathode Interface for Enhanced Photovoltaic Performance and Device Stability.

    Li, Jiangsheng; Duan, Chenghao; Wang, Ning; Zhao, Chengjie; Han, Wei; Jiang, Li; Wang, Jizheng; Zhao, Yingjie; Huang, Changshui; Jiu, Tonggang

    2018-05-08

    The molecular structure of cathode interface modification materials can affect the surface morphology of the active layer and key electron transfer processes occurring at the interface of polymer solar cells in inverted structures mostly due to the change of molecular configuration. To investigate the effects of spatial configuration of the cathode interfacial modification layer on polymer solar cells device performances, we introduced two novel organic ionic salts (linear NS2 and three-dimensional (3D) NS4) combined with the ZnO film to fabricate highly efficient inverted solar cells. Both organic ionic salts successfully decreased the surface traps of the ZnO film and made its work function more compatible. Especially NS4 in three-dimensional configuration increased the electron mobility and extraction efficiency of the interfacial film, leading to a significant improvement of device performance. Power conversion efficiency (PCE) of 10.09% based on NS4 was achieved. Moreover, 3D interfacial modification could retain about 92% of its initial PCE over 160 days. It is proposed that 3D interfacial modification retards the element penetration-induced degradation without impeding the electron transfer from the active layer to the ZnO film, which significantly improves device stability. This indicates that inserting three-dimensional organic ionic salt is an efficient strategy to enhance device performance.

  16. Enhanced activity and stability of L-arabinose isomerase by immobilization on aminopropyl glass.

    Zhang, Ye-Wang; Jeya, Marimuthu; Lee, Jung-Kul

    2011-03-01

    Immobilization of Bacillus licheniformis L: -arabinose isomerase (BLAI) on aminopropyl glass modified with glutaraldehyde (4 mg protein g support⁻¹) was found to enhance the enzyme activity. The immobilization yield of BLAI was proportional to the quantity of amino groups on the surface of support. Reducing particle size increased the adsorption capacity (q(m)) and affinity (k(a)). The pH and temperature for immobilization were optimized to be pH 7.1 and 33 °C using response surface methodology (RSM). The immobilized enzyme was characterized and compared to the free enzyme. There is no change in optimal pH and temperature before and after immobilization. However, the immobilized BLAI enzyme achieved 145% of the activity of the free enzyme. Correspondingly, the catalytic efficiency (k(cat)/K(m)) was improved 1.47-fold after immobilization compared to the free enzyme. The thermal stability was improved 138-fold (t₁/₂) increased from 2 to 275 h) at 50 °C following immobilization.

  17. Esterified dendritic TAM radicals with very high stability and enhanced oxygen sensitivity.

    Song, Yuguang; Liu, Yangping; Hemann, Craig; Villamena, Frederick A; Zweier, Jay L

    2013-02-15

    In this work, we have developed a new class of dendritic TAM radicals (TG, TdG, and dTdG) through a convergent method based on the TAM core CT-03 or its deuterated analogue dCT-03 and trifurcated Newkome-type monomer. Among these radicals, dTdG exhibits the best EPR properties with sharpest EPR singlet and highest O(2) sensitivity due to deuteration of both the ester linker groups and the TAM core CT-03. Like the previous dendritic TAM radicals, these new compounds also show extremely high stability toward various reactive species owing to the dendritic encapsulation. The highly charged nature of these molecules resulting from nine carboxylate groups prevents concentration-dependent EPR line broadening at physiological pH. Furthermore, we demonstrate that these TAM radicals can be easily derivatized (e.g., PEGylation) at the nine carboxylate groups and the resulting PEGylated analogue dTdG-PEG completely inhibits the albumin binding, thereby enhancing suitability for in vivo applications. These new dendritic TAM radicals show great potential for in vivo EPR oximetric applications and provide insights on approaches to develop improved and targeted EPR oximetric probes for biomedical applications.

  18. Silicon hollow sphere anode with enhanced cycling stability by a template-free method

    Chen, Song; Chen, Zhuo; Luo, Yunjun; Xia, Min; Cao, Chuanbao

    2017-04-01

    Silicon is a promising alternative anode material since it has a ten times higher theoretical specific capacity than that of a traditional graphite anode. However, the poor cycling stability due to the huge volume change of Si during charge/discharge processes has seriously hampered its widespread application. To address this challenge, we design a silicon hollow sphere nanostructure by selective etching and a subsequent magnesiothermic reduction. The Si hollow spheres exhibit enhanced electrochemical properties compared to the commercial Si nanoparticles. The initial discharge and charge capacities of the Si hollow sphere anode are 2215.8 mAh g-1 and 1615.1 mAh g-1 with a high initial coulombic efficiency (72%) at a current density of 200 mA g-1, respectively. In particular, the reversible capacity is 1534.5 mAh g-1 with a remarkable 88% capacity retention against the second cycle after 100 cycles, over four times the theoretical capacity of the traditional graphite electrode. Therefore, our work demonstrates the considerable potential of silicon structures for displacing commercial graphite, and might open up new opportunities to rationally design various nanostructured materials for lithium ion batteries.

  19. Plasma Creatine Kinetics After Ingestion of Microencapsulated Creatine Monohydrate with Enhanced Stability in Aqueous Solutions.

    Hone, Michelle; Kent, Robert M; Scotto di Palumbo, Alessandro; Bleiel, Sinead B; De Vito, Giuseppe; Egan, Brendan

    2017-07-04

    Creatine monohydrate represents one of the largest sports supplement markets. Enhancing creatine (CRE) stability in aqueous solutions, such as with microencapsulation, represents innovation potential. Ten physically active male volunteers were randomly assigned in a double-blind design to either placebo (PLA) (3-g maltodextrin; n = 5) or microencapsulated CRE (3-g creatine monohydrate; n = 5) conditions. Experimental conditions involved ingestion of the samples in a 70-mL ready-to-drink format. CRE was delivered in a novel microencapsulation matrix material consisting entirely of hydrolyzed milk protein. Three hours after ingestion, plasma creatine concentrations were unchanged during PLA, and averaged ∼45 μM. During CRE, plasma creatine concentration peaked after 30 min at 101.6 ± 14.9 μM (p creatine concentration gradually trended downwards but remained significantly elevated (∼50% above resting levels) 3 hr after ingestion. These results demonstrate that the microencapsulated form of creatine monohydrate reported herein remains bioavailable when delivered in aqueous conditions, and has potential utility in ready-to-drink formulations for creatine supplementation.

  20. Silver-mediated base pairings: towards dynamic DNA nanostructures with enhanced chemical and thermal stability

    Swasey, Steven M; Gwinn, Elisabeth G

    2016-01-01

    The thermal and chemical fragility of DNA nanomaterials assembled by Watson–Crick (WC) pairing constrain the settings in which these materials can be used and how they can be functionalized. Here we investigate use of the silver cation, Ag + , as an agent for more robust, metal-mediated self-assembly, focusing on the simplest duplex building blocks that would be required for more elaborate Ag + –DNA nanostructures. Our studies of Ag + -induced assembly of non-complementary DNA oligomers employ strands of 2–24 bases, with varied base compositions, and use electrospray ionization mass spectrometry to determine product compositions. High yields of duplex products containing narrowly distributed numbers of Ag + can be achieved by optimizing solution conditions. These Ag + -mediated duplexes are stable to at least 60 mM Mg 2+ , higher than is necessary for WC nanotechnology schemes such as tile assemblies and DNA origami, indicating that sequential stages of Ag + -mediated and WC-mediated assembly may be feasible. Circular dichroism spectroscopy suggests simple helical structures for Ag + -mediated duplexes with lengths to at least 20 base pairs, and further indicates that the structure of cytosine-rich duplexes is preserved at high urea concentrations. We therefore propose an approach towards dynamic DNA nanomaterials with enhanced thermal and chemical stability through designs that combine sturdy silver-mediated ‘frames’ with WC paired ‘pictures’. (paper)

  1. Elevated CO2 and water addition enhance nitrogen turnover in grassland plants with implications for temporal stability.

    Dijkstra, Feike A; Carrillo, Yolima; Blumenthal, Dana M; Mueller, Kevin E; LeCain, Dan R; Morgan, Jack A; Zelikova, Tamara J; Williams, David G; Follett, Ronald F; Pendall, Elise

    2018-05-01

    Temporal variation in soil nitrogen (N) availability affects growth of grassland communities that differ in their use and reuse of N. In a 7-year-long climate change experiment in a semi-arid grassland, the temporal stability of plant biomass production varied with plant N turnover (reliance on externally acquired N relative to internally recycled N). Species with high N turnover were less stable in time compared to species with low N turnover. In contrast, N turnover at the community level was positively associated with asynchrony in biomass production, which in turn increased community temporal stability. Elevated CO 2 and summer irrigation, but not warming, enhanced community N turnover and stability, possibly because treatments promoted greater abundance of species with high N turnover. Our study highlights the importance of plant N turnover for determining the temporal stability of individual species and plant communities affected by climate change. © 2018 John Wiley & Sons Ltd/CNRS.

  2. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Guan, Yajing; Wang, Jianchen; Tian, Yixin; Hu, Weimin; Zhu, Liwei; Zhu, Shuijin; Hu, Jin

    2013-01-01

    Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L.) pelleted seed were developed in this paper. Fluorescein (FR), rhodamine B (RB), and magnetic powder (MP) were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85) and Honghua Dajinyuan (HHDJY). Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm). And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm). All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  3. The novel approach to enhance seed security: dual anti-counterfeiting methods applied on tobacco pelleted seeds.

    Yajing Guan

    Full Text Available Seed security is of prime importance for agriculture. To protect true seeds from being faked, more secure dual anti-counterfeiting technologies for tobacco (Nicotiana tabacum L. pelleted seed were developed in this paper. Fluorescein (FR, rhodamine B (RB, and magnetic powder (MP were used as anti-counterfeiting labels. According to their different properties and the special seed pelleting process, four dual-labeling treatments were conducted for two tobacco varieties, MS Yunyan85 (MSYY85 and Honghua Dajinyuan (HHDJY. Then the seed germination and seedling growth status were investigated, and the fluorescence in cracked pellets and developing seedlings was observed under different excitation lights. The results showed that FR, RB, and MP had no negative effects on the germination, seedling growth, and MDA content of the pelleted seeds, and even some treatments significantly enhanced seedling dry weight, vigor index, and shoot height in MS YY85, and increased SOD activity and chlorophyll content in HHDJY as compared to the control. In addition, the cotyledon tip of seedlings treated with FR and MP together represented bright green fluorescence under illumination of blue light (478 nm. And the seedling cotyledon vein treated with RB and MP together showed red fluorescence under green light (546 nm. All seeds pelleted with magnetic powder of proper concentration could be attracted by a magnet. Thus, it indicated that those new dual-labeling methods that fluorescent compound and magnetic powder simultaneously applied in the same seed pellets definitely improved anti-counterfeiting technology and enhanced the seed security. This technology will ensure that high quality seed will be used in the crop production.

  4. Host based internet protocol (IP) packet analysis to enhance network security

    Ahmad, T.; Ahmad, S.Z.; Yasin, M.M.

    2007-01-01

    Data communication in a computer network environment is facing serious security threats from numerous sources such as viruses, worms, Zombies etc. These threats can be broadly characterized as internal or external security threats. Internal threats are mainly attributed to sneaker-nets, utility modems and unauthorized users, which can be minimized by skillful network administration, password management and optimum usage policy definition. The external threats need more serious attention as these attacks are mostly coming from public networks such as Internet. Frequency and complexity of such attacks is much higher as compared to internal attacks. This paper presents a host based network layer screening of external and internal IP packets for logging, analyzing and real-time detection of possible IP spoofing and Denial of Service attacks. This work can also be used in tuning security rules definition for gateway firewalls. Software has been developed which intercepts IP traffic and analyses it with respect to integrity and origin of I P packet. The received IP packets are parsed and analyzed for possible signs of intrusion. The results show that by watching and categorizing composition of various transport protocol such as TCP, UDP, ICMP and others along with verifying the origin of received IP packet can help in devising real-time firewall rule and blocking possible external attack. This is highly desirable for fighting against zero day attacks and can result in a better Mean Time between Failures (MTBF) to increase the survivability of computer network. Used in a right context, packet screening and filtering can be a useful tool for provision of reliable and stable network services. (author)

  5. Examining the Religious Strands of Islamic Terrorists to Enhance U.S. Security

    2012-03-01

    donkey laden with books” (Suras 3:60-74, 5:56, 62:5, 5:16).5 Second, is the teaching known as “An eye for eye...a tooth for a tooth”, and a well...NBC Nightly News MSNBC.com Video , January 30, 2012, http://www.jihadwatch.org/2012/02/post-4html, (accessed February 5, 2012). 21 Ibid. 22 Robert...2010. You Tube, video file, http://secure.afa.net/afa/activism/takeaction.asp?id=384 (accessed January 11, 2012). 31 Mary Habeck, she is the Associate

  6. Enhanced Survey and Proposal to secure the data in Cloud Computing Environment

    MR.S.SUBBIAH; DR.S.SELVA MUTHUKUMARAN; DR.T.RAMKUMAR

    2013-01-01

    Cloud computing have the power to eliminate the cost of setting high end computing infrastructure. It is a promising area or design to give very flexible architecture, accessible through the internet. In the cloud computing environment the data will be reside at any of the data centers. Due to that, some data center may leak the data stored on there, beyond the reach and control of the users. For this kind of misbehaving data centers, the service providers should take care of the security and...

  7. A mobile gateway for medical auscultation : Enhanced Client Certificate Authentication and MTLS Security

    Leijon, Jon

    2016-01-01

      Attempting to re-engineer a telemedicine application, this report sets out to make a cheap yet robust solution that is portable and easy to use. It will be a Inera compliant system using Android that authenticates in a secure way with a .NET server behind F5 full proxy.The report begins with a background to telemedicine, and a technical specification that might fulfill the demands of privacy laws regarding health care records. The focus of the report moves on to inspects the choices for aut...

  8. Fast-Valving of Large Steam Turbine Units as a Means of Power System Security Enhancement

    Bogdan Sobczak; Robert Rink; Rafał Kuczyński; Robert Trębski

    2014-01-01

    Fast-valving assists in maintaining system stability following a severe transmission system fault by reducing the turbine mechanical power. Fast-valving consists in rapid closing and opening of steam valves in an adequate manner to reduce the generator accelerating power following the recognition of a severe fault. FV can be an effective and economical method of meeting the performance requirements of a power system in the presence of an increase in wind and solar generation in the power syst...

  9. Tunable Enzymatic Activity and Enhanced Stability of Cellulase Immobilized in Biohybrid Nanogels.

    Peng, Huan; Rübsam, Kristin; Jakob, Felix; Schwaneberg, Ulrich; Pich, Andrij

    2016-11-14

    This paper reports a facile approach for encapsulation of enzymes in nanogels. Our approach is based on the use of reactive copolymers able to get conjugated with enzyme and build 3D colloidal networks or biohybrid nanogels. In a systematic study, we address the following question: how the chemical structure of nanogel network influences the biocatalytic activity of entrapped enzyme? The developed method allows precise control of the enzyme activity and improvement of enzyme resistance against harsh store conditions, chaotropic agents, and organic solvents. The nanogels were constructed via direct chemical cross-linking of water-soluble reactive copolymers poly(N-vinylpyrrolidone-co-N-methacryloxysuccinimide) with proteins such as enhanced green fluorescent protein (EGFP) and cellulase in water-in-oil emulsion. The water-soluble reactive copolymers with controlled amount of reactive succinimide groups and narrow dispersity were synthesized via reversible addition-fragmentation chain transfer (RAFT) polymerization. Poly(ethylene glycol) bis(3-aminopropyl) and branched polyethylenimine were utilized as model cross-linkers to optimize synthesis of nanogels with different architectures in the preliminary experiments. Biofluorescent nanogels with different loading amount of EGFP and varying cross-linking densities were obtained. We demonstrate that the biocatalytic activity of cellulase-conjugated nanogels (CNG) can be elegantly tuned by control of their cross-linking degrees. Circular dichroism (CD) spectra demonstrated that the secondary structures of the immobilized cellulase were changed in the aspect of α-helix contents. The secondary structures of cellulase in highly cross-linked nanogels were strongly altered compared with loosely cross-linked nanogels. The fluorescence resonance energy transfer (FRET) based study further revealed that nanogels with lower cross-linking degree enable higher substrate transport rate, providing easier access to the active site of

  10. Supporting reputation based trust management enhancing security layer for cloud service models

    Karthiga, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    In the existing system trust between cloud providers and consumers is inadequate to establish the service level agreement though the consumer’s response is good cause to assess the overall reliability of cloud services. Investigators recognized the significance of trust can be managed and security can be provided based on feedback collected from participant. In this work a face recognition system that helps to identify the user effectively. So we use an image comparison algorithm where the user face is captured during registration time and get stored in database. With that original image we compare it with the sample image that is already stored in database. If both the image get matched then the users are identified effectively. When the confidential data are subcontracted to the cloud, data holders will become worried about the confidentiality of their data in the cloud. Encrypting the data before subcontracting has been regarded as the important resources of keeping user data privacy beside the cloud server. So in order to keep the data secure we use an AES algorithm. Symmetric-key algorithms practice a shared key concept, keeping data secret requires keeping this key secret. So only the user with private key can decrypt data.

  11. 17 CFR 240.17a-1 - Recordkeeping rule for national securities exchanges, national securities associations...

    2010-04-01

    ... national securities exchanges, national securities associations, registered clearing agencies and the... Certain Stabilizing Activities § 240.17a-1 Recordkeeping rule for national securities exchanges, national...) Every national securities exchange, national securities association, registered clearing agency and the...

  12. Challenges to the South Caucasus regional security aftermath of Russian–Georgian conflict: Hegemonic stability or new partnership?

    Kornely K. Kakachia

    2011-01-01

    And the question is now how to handle this delicate situation in a strategically and geopolitically important region. So by controlling Georgia (in case Russia reaches abovementioned aims, Russia actually will be able to cut off Central Asia and Caspian resources. It means Russia would be able to isolate and cut off Azerbaijan and Central Asian countries and it will significantly strengthen its energy monopoly over Europe with all results coming out from that fact. So it’s about major shift in the energy policy and major shift in geopolitics based on this energy policy and Russian energy monopoly. The August war in Georgia demonstrated some risks associated with the functioning of the transit energy corridor in the southern Caucasus. It also demonstrated the need for broader security guarantees for a region that is vital to European and global energy security. Paper deals with economic damage inflicted by the Russo-Georgian war in South Caucasus and its implications for regional security.

  13. Securing Financial Stability: Problems and Prospects for New EU Members, Report on the SUERF Seminar jointly organised with the Central Bank of Malta

    Balling, Morten

    2003-01-01

    topics are monetary policy transparency, preservation of investor confidence, the adequacy of the legal framework governing the financial sector, asset price volatility, size and volatility of cross-border capital flows, implications of bank privatisations, increasing market shares of foreign banks......The article gives an overview of twelve contributions to a seminar organised in March 2003 by SUERF in cooperation with the Central Bank of Malta. The contributions analyse from different perspectives the problems related to securing financial stability in the EU accession countries. Important......, integration of European supervisory systems, choice of exchange rate regime and government debt policy. Four of the contributions are country case studies in which the financial stability experiences of countries that have become members of the EMU are described. Udgivelsesdato: July...

  14. Enhanced coercivity thermal stability realized in Nd–Fe–B thin films diffusion-processed by Nd–Co alloys

    Zhong, Hui; Fu, Yanqing [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Department of Physics and Chemistry of Materials, School of Materials Science and Engineering, Northeastern University, Shenyang 110819 (China); Li, Guojian; Liu, Tie [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Cui, Weibin, E-mail: cuiweibin@epm.neu.edu.cn [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China); Department of Physics and Chemistry of Materials, School of Materials Science and Engineering, Northeastern University, Shenyang 110819 (China); Liu, Wei; Zhang, Zhidong [Shenyang National Laboratory for Materials Science, Institute of Metal Research (IMR), Chinese Academy of Sciences (CAS), Shenyang 110016 (China); Wang, Qiang, E-mail: wangq@mail.neu.edu.cn [Key laboratory of electromagnetic processing of materials (EPM), Ministry of Education, Northeastern University, Shenyang 110819 (China)

    2017-03-15

    A proposed Nd{sub 2}Fe{sub 14}B-core/Nd{sub 2}(Fe, Co){sub 14}B-shell microstructure was realized by diffusion-processing textured Nd{sub 14}Fe{sub 77}B{sub 9} single-layer film with Nd{sub 100−x}Co{sub x} (x=10, 20 and 40) alloys to improve the coercivity thermal stability. The ambient coercivity was increased from around 1 T in single-layer film to nearly 2 T in diffusion-processed films, which was due to the Nd-rich grain boundaries as seen from transmission electron microscopy (TEM) images. The coercivity thermal stability was improved by the core/shell microstructure because Nd-rich grain boundaries provided the high ambient coercivity and Co-rich shell provided the improved coercivity stability. - Highlights: • Core–shell microstructure proposed for enhancing the coercivity thermal stability. • Coercivity enhanced to nearly 2 T by diffusion-processing with Nd–Co alloy. • Good squareness and highly textured microstructure obtained. • Nd-rich phases observed by TEM after diffusion process. • Coercivity thermal stability improved with minor Co addition in grain boundary regions.

  15. Application of a combined superconducting fault current limiter and STATCOM to enhancement of power system transient stability

    Mahdad, Belkacem, E-mail: bemahdad@mselab.org; Srairi, K.

    2013-12-15

    Highlights: •A simple interactive model SFCL–STATCOM Controller is proposed to enhance the transient stability. •The STATCOM controller is integrated in coordination with the SFCL to support the excessive reactive power during fault. •Voltage stability index based continuation power flow is used to locate the STATCOM and the SFCL. •The clearing time improved compared to other cases (with only SFCL, with only STATCOM). •The choice of the STATCOM parameters is very important to exploit efficiently the integration of STATCOM Controller. -- Abstract: Stable and reliable operation of the power system network is dependent on the dynamic equilibrium between energy production and power demand under large disturbance such as short circuit or important line tripping. This paper investigates the use of combined model based superconducting fault current limiter (SFCL) and shunt FACTS Controller (STATCOM) for assessing the transient stability of a power system considering the automatic voltage regulator. The combined model located at a specified branch based on voltage stability index using continuation power flow. The main role of the proposed combined model is to achieve simultaneously a flexible control of reactive power using STATCOM Controller and to reduce fault current using superconducting technology based SFCL. The proposed combined model has been successfully adapted within the transient stability program and applied to enhance the transient power system stability of the WSCC9-Bus system. Critical clearing time (CCT) has been used as an index to evaluate and validate the contribution of the proposed coordinated Controller. Simulation results confirm the effectiveness and perspective of this combined Controller to enhance the dynamic power system performances.

  16. Privacy enhancing techniques - the key to secure communication and management of clinical and genomic data.

    De Moor, G J E; Claerhout, B; De Meyer, F

    2003-01-01

    To introduce some of the privacy protection problems related to genomics based medicine and to highlight the relevance of Trusted Third Parties (TTPs) and of Privacy Enhancing Techniques (PETs) in the restricted context of clinical research and statistics. Practical approaches based on two different pseudonymisation models, both for batch and interactive data collection and exchange, are described and analysed. The growing need of managing both clinical and genetic data raises important legal and ethical challenges. Protecting human rights in the realm of privacy, while optimising research potential and other statistical activities is a challenge that can easily be overcome with the assistance of a trust service provider offering advanced privacy enabling/enhancing solutions. As such, the use of pseudonymisation and other innovative Privacy Enhancing Techniques can unlock valuable data sources.

  17. Stability enhancement of an electrically tunable colloidal photonic crystal using modified electrodes with a large electrochemical potential window

    Shim, HongShik [Samsung Advanced Institute of Technology, Yongin-Si, Gyeonggi-do (Korea, Republic of); Department of Chemistry, Seoul National University, Seoul (Korea, Republic of); Gyun Shin, Chang; Heo, Chul-Joon; Jeon, Seog-Jin; Jin, Haishun; Woo Kim, Jung; Jin, YongWan; Lee, SangYoon; Gyu Han, Moon, E-mail: moongyu.han@samsung.com, E-mail: jinklee@snu.ac.kr [Samsung Advanced Institute of Technology, Yongin-Si, Gyeonggi-do (Korea, Republic of); Lim, Joohyun; Lee, Jin-Kyu, E-mail: moongyu.han@samsung.com, E-mail: jinklee@snu.ac.kr [Department of Chemistry, Seoul National University, Seoul (Korea, Republic of)

    2014-02-03

    The color tuning behavior and switching stability of an electrically tunable colloidal photonic crystal system were studied with particular focus on the electrochemical aspects. Photonic color tuning of the colloidal arrays composed of monodisperse particles dispersed in water was achieved using external electric field through lattice constant manipulation. However, the number of effective color tuning cycle was limited due to generation of unwanted ions by electrolysis of the water medium during electrical switching. By introducing larger electrochemical potential window electrodes, such as conductive diamond-like carbon or boron-doped diamond, the switching stability was appreciably enhanced through reducing the number of ions generated.

  18. Study on Enhancement Principle and Stabilization for the Luminol-H2O2-HRP Chemiluminescence System.

    Lihua Yang

    Full Text Available A luminol-H2O2-HRP chemiluminescence system with high relative luminescent intensity (RLU and long stabilization time was investigated. First, the comparative study on the enhancement effect of ten compounds as enhancers to the luminol-H2O2-HRP chemiluminescence system was carried out, and the results showed that 4-(imidazol-1-ylphenol (4-IMP, 4-iodophenol (4-IOP, 4-bromophenol (4-BOP and 4-hydroxy-4'-iodobiphenyl (HIOP had the best performance. Based on the experiment, the four enhancers were dissolved in acetone, acetonitrile, methanol, and dimethylformamide (DMF with various concentrations, the results indicated that 4-IMP, 4-IOP, 4-BOP and HIOP dissolved in DMF with the concentrations of 0.2%, 3.2%, 1.6% and 3.2% could get the highest RLU values. Subsequently, the influences of pH, ionic strength, HRP, 4-IMP, 4-IOP, 4-BOP, HIOP, H2O2 and luminol on the stabilization of the luminol-H2O2-HRP chemiluminescence system were studied, and we found that pH value, ionic strength, 4-IMP, 4-IOP, 4-BOP, HIOP, H2O2 and luminol have little influence on luminescent stabilization, while HRP has a great influence. In different ranges of HRP concentration, different enhancers should be selected. When the concentration is within the range of 0~6 ng/mL, 4-IMP should be selected. When the concentration of HRP ranges from 6 to 25 ng/mL, 4-IOP was the best choice. And when the concentration is within the range of 25~80 ng/mL, HIOP should be selected as the enhancer. Finally, the three well-performing chemiluminescent enhanced solutions (CESs have been further optimized according to the three enhancers (4-IMP, 4-IOP and HIOP in their utilized HRP concentration ranges.

  19. Security enhancement of hand geometry scanners using optical blood flow detection

    Crihalmeanu, Musat C.; Jerabek, Mark A.; Meehan, Kathleen

    2004-08-01

    In today's security conscious society the efficiency of biometric systems has an increasing tendency to replace the classic but less effective keys and passwords. Hand geometry readers are popular biometrics used for acces control and time and attendance applications. One of their weaknesses is vulnerability to spoofing using fake hands (latex, play-doh or dead-hands). The object of this paper is to design a feature to be added to the hand geometry scanner in order to detect vitality in the hand, reducing the possibilities for spoofing. This paper demonstrates how the hand reader was successfully spoofed and shows the implementation of the vitality detection feature through an inexpensive but efficient electronic design. The method used for detection is photo-plethysmography. The Reflectance Sensor built is of original conception. After amplifying, filtering and processing the sensor's signal, a message is shown via an LCD display, concerning the liveness of the hand and the pulse rate.

  20. Synergies between Communicable and Noncommunicable Disease Programs to Enhance Global Health Security.

    Kostova, Deliana; Husain, Muhammad J; Sugerman, David; Hong, Yuling; Saraiya, Mona; Keltz, Jennifer; Asma, Samira

    2017-12-01

    Noncommunicable diseases are the leading cause of death and disability worldwide. Initiatives that advance the prevention and control of noncommunicable diseases support the goals of global health security in several ways. First, in addressing health needs that typically require long-term care, these programs can strengthen health delivery and health monitoring systems, which can serve as necessary platforms for emergency preparedness in low-resource environments. Second, by improving population health, the programs might help to reduce susceptibility to infectious outbreaks. Finally, in aiming to reduce the economic burden associated with premature illness and death from noncommunicable diseases, these initiatives contribute to the objectives of international development, thereby helping to improve overall country capacity for emergency response.

  1. 78 FR 2214 - Enhanced Weapons, Firearms Background Checks, and Security Event Notifications

    2013-01-10

    .... Voluntary Consensus Standards XI. Finding of No Significant Environmental Impact XII. Paperwork Reduction... ML110480470 of Nuclear Energy Institute, on the proposed ``Enhanced Weapons, Firearms Background Checks and... consensus standards. XI. Finding of No Significant Environmental Impact In the proposed rule published on...

  2. Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks

    Wang, Jiong; Zhang, Hua

    2017-09-01

    In recent years, with the development of science and technology and the progress of the times, China's wireless network technology has become increasingly prosperous and it plays an important role in social production and life. In this context, in order to further to enhance the stability of wireless network data transmission and security enhancements, the staff need to focus on routing security and carry out related work. Based on this, this paper analyzes the design of wireless sensor based on secure routing protocol.

  3. Strengthening Local Safety Nets as a Key to Enhancing the Food Security of Pastoralists in East Africa: A Case Study of the Rendille of Northern Kenya

    SUN, Xiaogang

    2017-01-01

    The increase in climate-change-related natural disasters presents a major threat to the food security of pastoralists in East Africa. This paper explores ways of reducing the dependence on food aid and enhancing the food security of pastoralists through a case study of the Rendille in Northern Kenya. Current Rendille food systems have resulted from adapted livestock herding strategies and loss of nomadic lifestyles, as well as dependence on food aid. Although food aid is included in the livel...

  4. Eudragit L/HPMCAS blend enteric-coated lansoprazole pellets: enhanced drug stability and oral bioavailability.

    Fang, Yu; Wang, Guozheng; Zhang, Rong; Liu, Zhihua; Liu, Zhenghua; Wu, Xiaohui; Cao, Deying

    2014-06-01

    The objectives of the present work were to use blends of Eudragit L and hydroxypropyl methylcellulose acetate succinate (HPMCAS) as enteric film coatings for lansoprazole (LSP) pellets. The enteric-coated pellets were prepared with a fluid-bed coater. The influence of the blend ratio, type of plasticizer, plasticizer level, coating level, and curing conditions on gastric stability in vitro drug release and drug stability was evaluated. Furthermore, the bioavailability of the blend-coated pellets in beagle dogs was also performed. The blend-coated pellets exhibited significant improvement of gastric stability and drug stability compared to the pure polymer-coated pellets. Moreover, the AUC values of blend-coated pellets were greater than that of the pure polymer-coated pellets. It was concluded that the using blends of Eudragit L and HPMCAS as enteric film coatings for LSP pellets improved the drug stability and oral bioavailability.

  5. Image combination enhancement method for X-ray compton back-scattering security inspection body scanner

    Wang Huaiying; Zhang Yujin; Yang Lirui; Li Dong

    2011-01-01

    As for X-ray Compton Back-Scattering (CBS) body scanner, image clearness is very important for the performance of detecting the contraband hidden on the body. A new image combination enhancement method is provided based on characteristics of CBS body images and points of human vision. After processed by this method, the CBS image will be obviously improved with clear levels, distinct outline and uniform background. (authors)

  6. Dynamic State Estimation for Multi-Machine Power System by Unscented Kalman Filter With Enhanced Numerical Stability

    Qi, Junjian; Sun, Kai; Wang, Jianhui; Liu, Hui

    2018-03-01

    In this paper, in order to enhance the numerical stability of the unscented Kalman filter (UKF) used for power system dynamic state estimation, a new UKF with guaranteed positive semidifinite estimation error covariance (UKFGPS) is proposed and compared with five existing approaches, including UKFschol, UKF-kappa, UKFmodified, UKF-Delta Q, and the squareroot UKF (SRUKF). These methods and the extended Kalman filter (EKF) are tested by performing dynamic state estimation on WSCC 3-machine 9-bus system and NPCC 48-machine 140-bus system. For WSCC system, all methods obtain good estimates. However, for NPCC system, both EKF and the classic UKF fail. It is found that UKFschol, UKF-kappa, and UKF-Delta Q do not work well in some estimations while UKFGPS works well in most cases. UKFmodified and SRUKF can always work well, indicating their better scalability mainly due to the enhanced numerical stability.

  7. Some Thoughts about Literature as a Means of Advancing Sustainable Unity and Stability in the Contemporary Nigerian State

    Anaso, George Nwaorah; Nwabudike, Christopher Eziafa

    2014-01-01

    An in-depth investigation was conducted on the possibility of literature employed to enhance cohesion, sustainable unity, national stability, and security of lives and property in the contemporary Nigeria. These three elements--unity, national stability, and security of lives and property are considered the key pillars of a modern state, the…

  8. Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy

    Slamanig, Daniel; Stingl, Christian

    In recent years, demographic change and increasing treatment costs demand the adoption of more cost efficient, highly qualitative and integrated health care processes. The rapid growth and availability of the Internet facilitate the development of eHealth services and especially of electronic health records (EHRs) which are promising solutions to meet the aforementioned requirements. Considering actual web-based EHR systems, patient-centric and patient moderated approaches are widely deployed. Besides, there is an emerging market of so called personal health record platforms, e.g. Google Health. Both concepts provide a central and web-based access to highly sensitive medical data. Additionally, the fact that these systems may be hosted by not fully trustworthy providers necessitates to thoroughly consider privacy issues. In this paper we define security and privacy objectives that play an important role in context of web-based EHRs. Furthermore, we discuss deployed solutions as well as concepts proposed in the literature with respect to this objectives and point out several weaknesses. Finally, we introduce a system which overcomes the drawbacks of existing solutions by considering an holistic approach to preserve patient's privacy and discuss the applied methods.

  9. Enhancing Security of Double Random Phase Encoding Based on Random S-Box

    Girija, R.; Singh, Hukum

    2018-06-01

    In this paper, we propose a novel asymmetric cryptosystem for double random phase encoding (DRPE) using random S-Box. While utilising S-Box separately is not reliable and DRPE does not support non-linearity, so, our system unites the effectiveness of S-Box with an asymmetric system of DRPE (through Fourier transform). The uniqueness of proposed cryptosystem lies on employing high sensitivity dynamic S-Box for our DRPE system. The randomness and scalability achieved due to applied technique is an additional feature of the proposed solution. The firmness of random S-Box is investigated in terms of performance parameters such as non-linearity, strict avalanche criterion, bit independence criterion, linear and differential approximation probabilities etc. S-Boxes convey nonlinearity to cryptosystems which is a significant parameter and very essential for DRPE. The strength of proposed cryptosystem has been analysed using various parameters such as MSE, PSNR, correlation coefficient analysis, noise analysis, SVD analysis, etc. Experimental results are conferred in detail to exhibit proposed cryptosystem is highly secure.

  10. Using Differential Evolution to Optimize Learning from Signals and Enhance Network Security

    Harmer, Paul K [Air Force Institute of Technology; Temple, Michael A [Air Force Institute of Technology; Buckner, Mark A [ORNL; Farquhar, Ethan [ORNL

    2011-01-01

    Computer and communication network attacks are commonly orchestrated through Wireless Access Points (WAPs). This paper summarizes proof-of-concept research activity aimed at developing a physical layer Radio Frequency (RF) air monitoring capability to limit unauthorizedWAP access and mprove network security. This is done using Differential Evolution (DE) to optimize the performance of a Learning from Signals (LFS) classifier implemented with RF Distinct Native Attribute (RF-DNA) fingerprints. Performance of the resultant DE-optimized LFS classifier is demonstrated using 802.11a WiFi devices under the most challenging conditions of intra-manufacturer classification, i.e., using emissions of like-model devices that only differ in serial number. Using identical classifier input features, performance of the DE-optimized LFS classifier is assessed relative to a Multiple Discriminant Analysis / Maximum Likelihood (MDA/ML) classifier that has been used for previous demonstrations. The comparative assessment is made using both Time Domain (TD) and Spectral Domain (SD) fingerprint features. For all combinations of classifier type, feature type, and signal-to-noise ratio considered, results show that the DEoptimized LFS classifier with TD features is uperior and provides up to 20% improvement in classification accuracy with proper selection of DE parameters.

  11. Security Enhancement of Knowledge-based User Authentication through Keystroke Dynamics

    Roy Soumen

    2016-01-01

    Full Text Available Keystroke Dynamics is a behavioural biometrics characteristic in Biometric science, which solve the issues in user identification or verification. In Knowledge-based user authentication technique, we compromise with PIN or password which is unsafe due to different type of attacks. It is good to choose password with the combination of upper and lower case letter with some digits and symbols, but which is very hard to remember or generally we forget to distinguish those passwords for different access control systems. Our system not only takes the users’ entered texts but their typing style is also account for. In our experiment, we have not taken hard password type texts, we have chosen some daily used words where users are habituated and comfortable at typing and we obtained the consisting typing pattern. Different distance-based and data mining algorithms we have applied on collected typing pattern and obtained impressive results. As per our experiment, if we use keystroke dynamics in existing knowledge based user authentication system with minimum of five daily used common texts then it increases the security level up to 97.6% to 98.2% (if we remove some of the irrelevant feature sets.

  12. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  13. Enhancing the crumb rubber modified asphalt’s storage stability through the control of its internal network structure

    Mohyeldin Ragab

    2018-01-01

    Full Text Available The current research investigated the effect of the internal network structure developed in the crumb rubber modified asphalt (CRMA on its storage stability. The authors investigated the influence of asphalt-crumb rubber modifier (CRM interaction parameters (interaction time, interaction speed, and interaction temperature on the development of the internal network structure in CRMA. The authors found that the existence of three dimensional (3D network structures in the CRMA enhanced its storage stability. Fourier Transform Infrared (FTIR Spectroscopy was utilized to determine the nature of CRM components responsible for the development of 3D network structure in the liquid phase of CRMA. This was achieved by monitoring the changes of the IR distinctive peaks in the CRMA liquid phase. Dissolution tests and thermo gravimetric analysis (TGA were carried out on the extracted CRM after interaction with asphalt to determine the role of CRM dissolved amounts and released components on the development of 3D network structure in CRMA. The asphalt-CRM interaction parameters were found to be essential to induce the formation of the 3D network structure within the liquid phase of the CRMA through controlling the swelling, dissolution and release of CRM components into the asphalt liquid phase. The existence of 3D network structure in the CRMA had determinant impact on the enhancement of its storage stability. Keywords: Storage stability, Three dimensional (3D network, Crumb rubber modified asphalt

  14. U.S. Security Strategy in the Asia-Pacific: Partnering With Asean to Maintain Stability Within the Region

    Association of Southeast Asian Nations (ASEAN) can serve as a mechanism to strengthen U.S. partnerships in the region while sustaining stability and maintaining the economic growth of the region.... economically in the last few decades. The U.S. has developed key partnerships and alliances in the region and has an obligation to assist its partners in...ensuring that any threats to the social and environmental stability are managed in accordance with the rules of law. The U.S. relies on the region for

  15. Advanced Materials, Technologies, and Complex Systems Analyses: Emerging Opportunities to Enhance Urban Water Security.

    Zodrow, Katherine R; Li, Qilin; Buono, Regina M; Chen, Wei; Daigger, Glen; Dueñas-Osorio, Leonardo; Elimelech, Menachem; Huang, Xia; Jiang, Guibin; Kim, Jae-Hong; Logan, Bruce E; Sedlak, David L; Westerhoff, Paul; Alvarez, Pedro J J

    2017-09-19

    Innovation in urban water systems is required to address the increasing demand for clean water due to population growth and aggravated water stress caused by water pollution, aging infrastructure, and climate change. Advances in materials science, modular water treatment technologies, and complex systems analyses, coupled with the drive to minimize the energy and environmental footprints of cities, provide new opportunities to ensure a resilient and safe water supply. We present a vision for enhancing efficiency and resiliency of urban water systems and discuss approaches and research needs for overcoming associated implementation challenges.

  16. Internet Banking Security Strategy: Securing Customer Trust

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  17. How the EU can contribute to security and stability in South Caucasus? / Harri Kämäräinen

    Kämäräinen, Harri

    2003-01-01

    Ettekanne 22.-23. septembrini 2003 Vilniuses toimunud seminaril "South Caucasus: making the best use of external assistance for stability building and for co-operation with NATO" käsitleb Euroopa Liidu eesmärke ja programme Lõuna-Kaukaasias, mille täitmist koordineerib Euroopa Liidu eriesindaja, suursaadik Heikki Talvitie

  18. Enhanced thermal stability of a polymer solar cell blend induced by electron beam irradiation in the transmission electron microscope

    Bäcke, Olof, E-mail: obacke@chalmers.se [Department of Applied Physics, Chalmers University of Technology, 41296 Göteborg (Sweden); Lindqvist, Camilla; Diaz de Zerio Mendaza, Amaia [Department of Chemistry and Chemical Engineering, Chalmers University of Technology, 41296 Göteborg (Sweden); Gustafsson, Stefan [Department of Applied Physics, Chalmers University of Technology, 41296 Göteborg (Sweden); Wang, Ergang; Andersson, Mats R.; Müller, Christian [Department of Chemistry and Chemical Engineering, Chalmers University of Technology, 41296 Göteborg (Sweden); Kristiansen, Per Magnus [Institute of Polymer Nanotechnology (INKA), FHNW University of Applied Science and Arts Northwestern Switzerland, 5210 Windisch (Switzerland); Laboratory for Micro- and Nanotechnology, Paul Scherrer Institute, 5232 Villigen (Switzerland); Olsson, Eva, E-mail: eva.olsson@chalmers.se [Department of Applied Physics, Chalmers University of Technology, 41296 Göteborg (Sweden)

    2017-05-15

    We show by in situ microscopy that the effects of electron beam irradiation during transmission electron microscopy can be used to lock microstructural features and enhance the structural thermal stability of a nanostructured polymer:fullerene blend. Polymer:fullerene bulk-heterojunction thin films show great promise for use as active layers in organic solar cells but their low thermal stability is a hindrance. Lack of thermal stability complicates manufacturing and influences the lifetime of devices. To investigate how electron irradiation affects the thermal stability of polymer:fullerene films, a model bulk-heterojunction film based on a thiophene-quinoxaline copolymer and a fullerene derivative was heat-treated in-situ in a transmission electron microscope. In areas of the film that exposed to the electron beam the nanostructure of the film remained stable, while the nanostructure in areas not exposed to the electron beam underwent large phase separation and nucleation of fullerene crystals. UV–vis spectroscopy shows that the polymer:fullerene films are stable for electron doses up to 2000 kGy. - Highlights: • Thermal stability of a polymer: fullerne blend is increased using electron irradiation. • Using in-situ transmission electron microscopy the nanostructure is studied. • Electron irradiation stops phase separation between the polymer and fullerene. • Electron irradiation quenches the formation and nucleation of fullerene crystals.

  19. Stability Proxies for Water-in-Oil Emulsions and Implications in Aqueous-based Enhanced Oil Recovery

    Mehrnoosh Moradi

    2011-07-01

    Full Text Available Several researchers have proposed that mobility control mechanisms can positively contribute to oil recovery in the case of emulsions generated in Enhanced-Oil Recovery (EOR operations. Chemical EOR techniques that use alkaline components or/and surfactants are known to produce undesirable emulsions that create operational problems and are difficult to break. Other water-based methods have been less studied in this sense. EOR processes such as polymer flooding and LoSalTM injection require adjustments of water chemistry, mainly by lowering the ionic strength of the solution or by decreasing hardness. The decreased ionic strength of EOR solutions can give rise to more stable water-in-oil emulsions, which are speculated to improve mobility ratio between the injectant and the displaced oil. The first step toward understanding the connection between the emulsions and EOR mechanisms is to show that EOR conditions, such as salinity and hardness requirements, among others, are conducive to stabilizing emulsions. In order to do this, adequate stability proxies are required. This paper reviews commonly used emulsion stability proxies and explains the advantages and disadvantage of methods reviewed. This paper also reviews aqueous-based EOR processes with focus on heavy oil to contextualize in-situ emulsion stabilization conditions. This context sets the basis for comparison of emulsion stability proxies.

  20. Supply Chain Security: U.S. Customs and Border Protection has Enhanced its Partnership with Import Trade Sectors by Challenges Remain in Verifying Security Practices

    Caldwell, Stephen L; Fossett, Christine A; Conrad, Christopher; Berbsteub, Amy; Berry, Fredrick; Camarillo, Yecenia; Cook, Frances; David, Katherine; Dye, Wendy; Gibson, Nkenge

    2008-01-01

    .... For example, between March 2005 and November 2007, CBP established requirements for C-TPAT members in nine trade sectors to meet minimum security criteria for their specific trade sector, including...

  1. Silver nanoparticle colloids with γ-cyclodextrin: enhanced stability and Gibbs–Marangoni flow

    Amiri, Setareh; Duroux, Laurent; Larsen, Kim Lambertsen, E-mail: kll@bio.aau.dk [Aalborg University, Department of Chemistry and Bioscience (Denmark)

    2015-01-15

    Although cyclodextrins (CD) are effective stabilizers for metal nanoparticle colloids, differences between α-, β- and γ-CD in stabilizing such colloids have not been previously reported. In this study, silver nanoparticles (AgNP) were synthesized using NaBH{sub 4} as reducing agent and cyclodextrins as stabilizers. Long-term stability of AgNP colloids in equilibrium conditions showed no marked differences between CD types. Transmission electron microscopy and quantitative image analysis revealed only marginal differences in particle sizes for CD-AgNP, although statistically significant. CD-AgNP colloids showed dispersed particles with average diameters of 7.3 ± 2.2, 6.3 ± 2.9 and 4.9 ± 1.9 nm for α-, β- and γ-CD, respectively, and with similar ζ-potentials about −25 to −30 mV. AgNP without CD showed bigger and aggregated particles of 15.0 ± 2.0 nm with lower ζ-potentials of about −40 mV. When subjected to centrifugal forces, i.e. non-equilibrium conditions, γ-CD was markedly more efficient than α- and β-CD in stabilizing the colloids. Drying patterns of colloid droplets showed a typical self-pinned coffee ring for all but the colloid stabilized by γ-CD, which showed a pattern resulting from a dominant Gibbs–Marangoni flow inside the drying droplet. Calculations using the Derjaguin, Landau, Verwey and Overbeek (DLVO) theory supported the stabilizing effect of CD in equilibrium conditions; it however did not provide clues for the superior stabilization by γ-CD in conditions of hydrodynamic stress.

  2. Silver nanoparticle colloids with γ-cyclodextrin: enhanced stability and Gibbs–Marangoni flow

    Amiri, Setareh; Duroux, Laurent; Larsen, Kim Lambertsen

    2015-01-01

    Although cyclodextrins (CD) are effective stabilizers for metal nanoparticle colloids, differences between α-, β- and γ-CD in stabilizing such colloids have not been previously reported. In this study, silver nanoparticles (AgNP) were synthesized using NaBH 4 as reducing agent and cyclodextrins as stabilizers. Long-term stability of AgNP colloids in equilibrium conditions showed no marked differences between CD types. Transmission electron microscopy and quantitative image analysis revealed only marginal differences in particle sizes for CD-AgNP, although statistically significant. CD-AgNP colloids showed dispersed particles with average diameters of 7.3 ± 2.2, 6.3 ± 2.9 and 4.9 ± 1.9 nm for α-, β- and γ-CD, respectively, and with similar ζ-potentials about −25 to −30 mV. AgNP without CD showed bigger and aggregated particles of 15.0 ± 2.0 nm with lower ζ-potentials of about −40 mV. When subjected to centrifugal forces, i.e. non-equilibrium conditions, γ-CD was markedly more efficient than α- and β-CD in stabilizing the colloids. Drying patterns of colloid droplets showed a typical self-pinned coffee ring for all but the colloid stabilized by γ-CD, which showed a pattern resulting from a dominant Gibbs–Marangoni flow inside the drying droplet. Calculations using the Derjaguin, Landau, Verwey and Overbeek (DLVO) theory supported the stabilizing effect of CD in equilibrium conditions; it however did not provide clues for the superior stabilization by γ-CD in conditions of hydrodynamic stress

  3. Directed surfaces structures and interfaces for enhanced electrocatalyst activity, selectivity, and stability for energy conversion reactions

    Jaramillo, Thomas F. [Stanford Univ., CA (United States). Dept. of Chemical Engineering. Shriram Center

    2016-04-20

    IrO3/IrOx catalyst significantly outperforms rutile IrO2 and RuO2, the only other OER catalysts to have reasonable stability and activity in acidic electrolyte, and in fact demonstrates the best activity for any known OER catalyst measured in either acidic or in alkaline electrolyte. For alkaline conditions we have demonstrated that the combined effect of cerium as a dopant and gold as a metal support, significantly enhances the OER activity of electrodeposited NiOx films. This NiCeOx-Au catalyst delivers high OER activity in alkaline media, and is among the most active OER electrocatalysts reported to date (Nature Energy, accepted 2016). These studies of new catalysts for the OER, both in acid and in base, are fundamental to enabling new technologies of interest for the DOE, including the production of sustainable fuels and chemicals. ORR: One method to significantly reduce the Pt loading in fuel cell devices is to increase the ORR activity of Pt based systems. To this end we have synthesized a high surface area supported meso-structured PtxNi alloy thin film with a double gyroid morphology that both exhibits high activity and stability for the ORR (submitted, 2016). We have furthermore developed a Ru-core, Pt-shell system that improves the per Pt site activity by more than a factor of 2 (ChemElectroChem, 2014). Further refinement, optimizing Pt-shell thickness and reducing particle sintering during processing, enabled us to obtain a mass activity that is 2 times higher than commercial Pt/C from TKK. These are important contributions to the DOE goal of reducing Pt loading since an improved understanding of how to increase mass activity and stability helps enable low Pt content fuel cells.

  4. Stabilization of influenza vaccine enhances protection by microneedle delivery in the mouse skin.

    Fu-Shi Quan

    2009-09-01

    Full Text Available Simple and effective vaccine administration is particularly important for annually recommended influenza vaccination. We hypothesized that vaccine delivery to the skin using a patch containing vaccine-coated microneedles could be an attractive approach to improve influenza vaccination compliance and efficacy.Solid microneedle arrays coated with inactivated influenza vaccine were prepared for simple vaccine delivery to the skin. However, the stability of the influenza vaccine, as measured by hemagglutination activity, was found to be significantly damaged during microneedle coating. The addition of trehalose to the microneedle coating formulation retained hemagglutination activity, indicating stabilization of the coated influenza vaccine. For both intramuscular and microneedle skin immunization, delivery of un-stabilized vaccine yielded weaker protective immune responses including viral neutralizing antibodies, protective efficacies, and recall immune responses to influenza virus. Immunization using un-stabilized vaccine also shifted the pattern of antibody isotypes compared to the stabilized vaccine. Importantly, a single microneedle-based vaccination using stabilized influenza vaccine was found to be superior to intramuscular immunization in controlling virus replication as well as in inducing rapid recall immune responses post challenge.The functional integrity of hemagglutinin is associated with inducing improved protective immunity against influenza. Simple microneedle influenza vaccination in the skin produced superior protection compared to conventional intramuscular immunization. This approach is likely to be applicable to other vaccines too.

  5. Silylated Zeolites With Enhanced Hydrothermal Stability for the Aqueous-Phase Hydrogenation of Levulinic Acid to γ-Valerolactone

    Hue-Tong Vu

    2018-05-01

    Full Text Available A systematic silylation approach using mono-, di-, and trichlorosilanes with different alkyl chain lengths was employed to enhance the hydrothermal stability of zeolite Y. DRIFT spectra of the silylated zeolites indicate that the attachment of the silanes takes place at surface silanol groups. Regarding hydrothermal stability under aqueous-phase processing (APP conditions, i.e., pH ≈ 2, 473 K and autogenous pressure, the selective silylation of the zeolite surface using monochlorosilanes has no considerable influence. By using trichlorosilanes, the hydrothermal stability of zeolite Y can be improved significantly as proven by a stability test in an aqueous solution of 0.2 M levulinic acid (LA and 0.6 M formic acid (FA at 473 K. However, the silylation with trichlorosilanes results in a significant loss of total specific pore volume and total specific surface area, e.g., 0.35 cm3 g−1 and 507 m2 g−1 for the silylated zeolite Y functionalized with n-octadecyltrichlorosilane compared to 0.51 cm3 g−1 and 788 m2 g−1 for the parent zeolite Y. The hydrogenation of LA to γ-valerolactone (GVL was conducted over 3 wt.-% Pt on zeolite Y (3PtY silylated with either n-octadecyltrichlorosilane or methyltrichlorosilane using different reducing agents, e.g., FA or H2. While in the stability test an enhanced hydrothermal stability was found for zeolite Y silylated with n-octadecyltrichlorosilane, its stability in the hydrogenation of LA was far less pronounced. Only by applying an excess amount of methyltrichlorosilane, i.e., 10 mmol per 1 g of zeolite Y, presumably resulting in a high degree of polymerization among the silanes, a recognizable improvement of the stability of the 3 PtY catalyst could be achieved. Nonetheless, the pore blockage found for zeolite Y silylated with an excess amount of methyltrichlorosilane was reflected in a drastically lower GVL yield at 493 K using FA as reducing agent, i.e., 12 vs. 34% for 3PtY after 24 h.

  6. Silylated Zeolites with Enhanced Hydrothermal Stability for the Aqueous-Phase Hydrogenation of Levulinic Acid to γ-Valerolactone

    Vu, Hue-Tong; Harth, Florian M.; Wilde, Nicole

    2018-05-01

    A systematic silylation approach using mono-, di- and trichlorosilanes with different alkyl chain lengths was employed to enhance the hydrothermal stability of zeolite Y. DRIFT spectra of the silylated zeolites indicate that the attachment of the silanes takes place at surface silanol groups. Regarding hydrothermal stability under aqueous-phase processing conditions, i.e., pH ≈ 2, 473 K and autogenous pressure, the selective silylation of the zeolite surface using monochlorosilanes has no considerable influence. By using trichlorosilanes, the hydrothermal stability of zeolite Y can be improved significantly as proven by a stability test in an aqueous solution of 0.6 M levulinic acid (LA) and 0.2 M formic acid (FA) at 473 K. However, the silylation with trichlorosilanes results in a significant loss of total specific pore volume and total specific surface area, e.g., 0.35 cm3 g-1 and 507 m2 g 1 for the silylated zeolite Y functionalized with n octadecyltrichlorosilane compared to 0.51 cm3 g 1 and 788 m2 g-1 for the parent zeolite Y. The hydrogenation of LA to γ valerolactone (GVL) was conducted over 3 wt.-% Pt on zeolite Y (3PtY) silylated with either n octadecyltrichlorosilane or methyltrichlorosilane using different reducing agents, e.g., FA or H2. While in the stability test an enhanced hydrothermal stability was found for zeolite Y silylated with n octadecyltrichlorosilane, its stability in the hydrogenation of LA was far less pronounced. Only by applying an excess amount of methyltrichlorosilane, i.e., 10 mmol per 1 g of zeolite Y, presumably resulting in a high degree of polymerization among the silanes, a recognizable improvement of the stability of the 3 PtY catalyst could be achieved. Nonetheless, the pore blockage found for zeolite Y silylated with an excess amount of methyltrichlorosilane was reflected in a drastically lower GVL yield at 493 K using FA as reducing agent, i.e., 12% vs. 34% for 3PtY after 24 h.

  7. As-grown graphene/copper nanoparticles hybrid nanostructures for enhanced intensity and stability of surface plasmon resonance

    Li, Yun-Fei; Dong, Feng-Xi; Chen, Yang; Zhang, Xu-Lin; Wang, Lei; Bi, Yan-Gang; Tian, Zhen-Nan; Liu, Yue-Feng; Feng, Jing; Sun, Hong-Bo

    2016-11-01

    The transfer-free fabrication of the high quality graphene on the metallic nanostructures, which is highly desirable for device applications, remains a challenge. Here, we develop the transfer-free method by direct chemical vapor deposition of the graphene layers on copper (Cu) nanoparticles (NPs) to realize the hybrid nanostructures. The graphene as-grown on the Cu NPs permits full electric contact and strong interactions, which results in a strong localization of the field at the graphene/copper interface. An enhanced intensity of the localized surface plasmon resonances (LSPRs) supported by the hybrid nanostructures can be obtained, which induces a much enhanced fluorescent intensity from the dye coated hybrid nanostructures. Moreover, the graphene sheets covering completely and uniformly on the Cu NPs act as a passivation layer to protect the underlying metal surface from air oxidation. As a result, the stability of the LSPRs for the hybrid nanostructures is much enhanced compared to that of the bare Cu NPs. The transfer-free hybrid nanostructures with enhanced intensity and stability of the LSPRs will enable their much broader applications in photonics and optoelectronics.

  8. Enhancement of Moisture Protective Properties and Stability of Pectin through Formation of a Composite Film: Effects of Shellac and Plasticizer.

    Luangtana-Anan, Manee; Soradech, Sitthiphong; Saengsod, Suthep; Nunthanid, Jurairat; Limmatvapirat, Sontaya

    2017-12-01

    The aim of this investigation was to develop the high moisture protective ability and stable pectin through the design of composite films based on varying shellac concentrations. A film casting method was applied to prepare a free film. The moisture protective properties and mechanical properties were investigated. The findings was the composite films exhibited the reductions in the hydrophilicity, water vapor permeability, and the moisture content compared with pectin films. The single and composite films were then study for their stability at 40 °C and 75% RH for 90 d. Among the concentrations of shellac, 50% (w/w) could improve stability in terms of moisture protection after 90 d of storage, whereas lower concentrations of shellac (10% to 40%) could not achieve this. However, the higher shellac content also contributed to weaker mechanical properties. The mechanical improvement and stability of composite films with the incorporation of plasticizers were further investigated. Polyethylene glycol 400 and diethyl phthalate at a concentration of 10% were used. The results indicated that both plasticizers could enhance the mechanical characteristics and had a slight effect on moisture protection. The stability of pectin in terms of moisture protective properties could, therefore, be modified through the fabrication of composite films with hydrophobic polymers, that is, shellac and the addition of proper plasticizers to enhance mechanical properties, which could offer wide applications for edible film in food, agro, and pharmaceutical industries. The composite film with 50% shellac could improve moisture protective properties of pectin film. Adding a plasticizer could build up the higher mechanical characteristics of composite film. Stability of pectin could be modified by fabrication of composite films with proper content of shellac and plasticizer. © 2017 Institute of Food Technologists®.

  9. Enhancing the cyber-security of smart grids with applications to synchrophasor data

    Pal, Seemita

    In the power grids, Supervisory Control and Data Acquisition (SCADA) systems are used as part of the Energy Management System (EMS) for enabling grid monitoring, control and protection. In recent times, with the ongoing installation of thousands of Phasor Measurement Units (PMUs), system operators are becoming increasingly reliant on PMU-generated synchrophasor measurements for executing wide-area monitoring and real-time control. The availability of PMU data facilitates dynamic state estimation of the system, thus improving the efficiency and resiliency of the grid. Since the SCADA and PMU data are used to make critical control decisions including actuation of physical systems, the timely availability and integrity of this networked data is of paramount importance. Absence or wrong control actions can potentially lead to disruption of operations, monetary loss, damage to equipments or surroundings or even blackout. This has posed new challenges to information security especially in this age of ever-increasing cyber-attacks. In this thesis, potential cyber-attacks on smart grids are presented and effective and implementable schemes are proposed for detecting them. The focus is mainly on three kinds of cyber-attacks and their detection: (i) gray-hole attacks on synchrophasor systems, (ii) PMU data manipulation attacks and (iii) data integrity attacks on SCADA systems. In the case of gray-hole attacks, also known as packet-drop attacks, the adversary may arbitrarily drop PMU data packets as they traverse the network, resulting in unavailability of time-sensitive data for the various critical power system applications. The fundamental challenge is to distinguish packets dropped by the adversary from those that occur naturally due to network congestion.The proposed gray-hole attack detection technique is based on exploiting the inherent timing information in the GPS time-stamped PMU data packets and using the temporal trends of the latencies to classify the cause of

  10. Surface functionalization of microwave plasma-synthesized silica nanoparticles for enhancing the stability of dispersions

    Sehlleier, Yee Hwa; Abdali, Ali; Schnurre, Sophie Marie; Wiggers, Hartmut; Schulz, Christof

    2014-08-01

    Gas phase-synthesized silica nanoparticles were functionalized with three different silane coupling agents (SCAs) including amine, amine/phosphonate and octyltriethoxy functional groups and the stability of dispersions in polar and non-polar dispersing media such as water, ethanol, methanol, chloroform, benzene, and toluene was studied. Fourier transform infrared spectroscopy showed that all three SCAs are chemically attached to the surface of silica nanoparticles. Amine-functionalized particles using steric dispersion stabilization alone showed limited stability. Thus, an additional SCA with sufficiently long hydrocarbon chains and strong positively charged phosphonate groups was introduced in order to achieve electrosteric stabilization. Steric stabilization was successful with hydrophobic octyltriethoxy-functionalized silica nanoparticles in non-polar solvents. The results from dynamic light scattering measurements showed that in dispersions of amine/phosphonate- and octyltriethoxy-functionalized silica particles are dispersed on a primary particle level. Stable dispersions were successfully prepared from initially agglomerated nanoparticles synthesized in a microwave plasma reactor by designing the surface functionalization.

  11. Ultra-High Pressure Homogenization enhances physicochemical properties of soy protein isolate-stabilized emulsions.

    Fernández-Ávila, C; Escriu, R; Trujillo, A J

    2015-09-01

    The effect of Ultra-High Pressure Homogenization (UHPH, 100-300MPa) on the physicochemical properties of oil-in-water emulsions prepared with 4.0% (w/v) of soy protein isolate (SPI) and soybean oil (10 and 20%, v/v) was studied and compared to emulsions treated by conventional homogenization (CH, 15MPa). CH emulsions were prepared with non-heated and heated (95°C for 15min) SPI dispersions. Emulsions were characterized by particle size determination with laser diffraction, rheological properties using a rotational rheometer by applying measurements of flow curve and by transmission electron microscopy. The variation on particle size and creaming was assessed by Turbiscan® analysis, and visual observation of the emulsions was also carried out. UHPH emulsions showed much smaller d 3.2 values and greater physical stability than CH emulsions. The thermal treatment of SPI prior CH process did not improve physical stability properties. In addition, emulsions containing 20% of oil exhibited greater physical stability compared to emulsions containing 10% of oil. Particularly, UHPH emulsions treated at 100 and 200MPa with 20% of oil were the most stable due to low particle size values (d 3.2 and Span), greater viscosity and partial protein denaturation. These results address the physical stability improvement of protein isolate-stabilized emulsions by using the emerging UHPH technology. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Application of stability enhancing minimum interfacial pressure force model for MARS

    Lee, Won Jae; Lim, Ho Gon; Kim, Kyung Doo; Ha, Kwi Seok

    2001-04-01

    For thermal-hydraulic modeling of two-phase flow systems, two-fluid model, which assumes that the pressures of liquid, vapor and interface are identical, a so-called single-pressure model, is commonly used in codes for nuclear reactor safety analyses. Typical two-phase model with single pressure assumption possesses complex characteristics that result in system being ill-posed. As a result, typical single pressure model may cause the unbounded growth of instabilities. In order to overcome the ill-posedness of single-pressure two-fluid model, a hyperbolic equation system has been developed by introducing an interfacial pressure force into single pressure two-fluid model. The potential impact of the present model on the stability of finite difference solution has been examined by Von-Neumann stability analysis. The obvious improvement in numerical stability has been found when a semi-implicit time advancement scheme is used. Numerical experiments using the pilot code were also performed for the conceptual problems. It was found that the result was consistent with numerical stability test. The new model was implemented to MARS using Two-step approach. Through the conceptual stability test problems and benchmark problems, the applicability of the new model was verified.

  13. Application of stability enhancing minimum interfacial pressure force model for MARS

    Lee, Won Jae; Lim, Ho Gon; Kim, Kyung Doo; Ha, Kwi Seok

    2001-04-01

    For thermal-hydraulic modeling of two-phase flow systems, two-fluid model, which assumes that the pressures of liquid, vapor and interface are identical, a so-called single-pressure model, is commonly used in codes for nuclear reactor safety analyses. Typical two-phase model with single pressure assumption possesses complex characteristics that result in system being ill-posed. As a result, typical single pressure model may cause the unbounded growth of instabilities. In order to overcome the ill-posedness of single-pressure two-fluid model, a hyperbolic equation system has been developed by introducing an interfacial pressure force into single pressure two-fluid model. The potential impact of the present model on the stability of finite difference solution has been examined by Von-Neumann stability analysis. The obvious improvement in numerical stability has been found when a semi-implicit time advancement scheme is used. Numerical experiments using the pilot code were also performed for the conceptual problems. It was found that the result was consistent with numerical stability test. The new model was implemented to MARS using Two-step approach. Through the conceptual stability test problems and benchmark problems, the applicability of the new model was verified

  14. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Dilger, Fred C. [Black Mountain Research, Henderson, NV 81012 (United States); Ballard, James D. [Department of Sociology, California State University, Northridge, CA 91330 (United States); Halstead, Robert J. [State of Nevada Agency for Nuclear Projects, Carson City, NV 80906 (United States)

    2013-07-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  15. Stakeholder Transportation Scorecard: Reviewing Nevada's Recommendations for Enhancing the Safety and Security of Nuclear Waste Shipments - 13518

    Dilger, Fred C.; Ballard, James D.; Halstead, Robert J.

    2013-01-01

    As a primary stakeholder in the Yucca Mountain program, the state of Nevada has spent three decades examining and considering national policy regarding spent nuclear fuel and high-level radioactive waste transportation. During this time, Nevada has identified 10 issues it believes are critical to ensuring the safety and security of any spent nuclear fuel transportation program, and achieving public acceptance. These recommendations are: 1) Ship the oldest fuel first; 2) Ship mostly by rail; 3) Use dual-purpose (transportable storage) casks; 4) Use dedicated trains for rail shipments; 5) Implement a full-scale cask testing program; 6) Utilize a National Environmental Policy Act (NEPA) process for the selection of a new rail spur to the proposed repository site; 7) Implement the Western Interstate Energy Board (WIEB) 'straw man' process for route selection; 8) Implement Section 180C assistance to affected States, Tribes and localities through rulemaking; 9) Adopt safety and security regulatory enhancements proposed states; and 10) Address stakeholder concerns about terrorism and sabotage. This paper describes Nevada's proposals in detail and examines their current status. The paper describes the various forums and methods by which Nevada has presented its arguments and sought to influence national policy. As of 2012, most of Nevada's recommendations have been adopted in one form or another, although not yet implemented. If implemented in a future nuclear waste program, the State of Nevada believes these recommendations would form the basis for a successful national transportation plan for shipments to a geologic repository and/or centralized interim storage facility. (authors)

  16. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  17. Enhancement of the chemical stability in confined δ-Bi2O3

    Sanna, Simone; Esposito, Vincenzo; Andreasen, Jens Wenzel

    2015-01-01

    Bismuth-oxide-based materials are the building blocks for modern ferroelectrics1, multiferroics2, gas sensors3, light photocatalysts4 and fuel cells5,6. Although the cubic fluorite δ-phase of bismuth oxide (δ-Bi2O3) exhibits the highest conductivity of known solid-state oxygen ion conductors5, its...... instability prevents use at low temperature7–10. Here we demonstrate the possibility of stabilizing δ-Bi2O3 using highly coherent interfaces of alternating layers of Er2O3-stabilized δ-Bi2O3 and Gd2O3-doped CeO2. Remarkably, an exceptionally high chemical stability in reducing conditions and redox cycles...

  18. Electrical Grid Stability Enhancement using Smart Home Frequency-response Grid -Friendly Appliance System

    Muawiya A. Kaigama

    2016-03-01

    Full Text Available Load shedding is a powerful scheme used for corrective and preventive measures; corrective to restore system’s stability and preventive to avoid catastrophic failure. However, the affected end users are deprived of power supply absolutely with no choice. This paper presents the design, development, feasibility and merits of Frequency-response Grid -Friendly Appliance System (FRGFAS in a smart home. FRGFAS is a decentralized Adaptive Load Shaving(ALS device that supports grid’s system stability by sensing grid’s frequency deterioration level and turns ON/OFF loads accordingly. The FRGFAS permits end users to carry out load shaving at their scale of preference in smart homes via flexible demand responses and automates outdoor lighting to optimum operational hours. FRGFAS obviate load shedding by shaving loads whenever the system is in distress and reset loads supply to the normal state when it stabilizes, this Consequently increases the end user comfort zone and averts a blackout.

  19. Molecular improvements in microbial α-amylases for enhanced stability and catalytic efficiency.

    Sindhu, Raveendran; Binod, Parameswaran; Madhavan, Aravind; Beevi, Ummalyma Sabeela; Mathew, Anil Kuruvilla; Abraham, Amith; Pandey, Ashok; Kumar, Vinod

    2017-12-01

    α-Amylases is one of the most important industrial enzyme which contributes to 25% of the industrial enzyme market. Though it is produced by plant, animals and microbial source, those from microbial source seems to have potential applications due to their stability and economic viability. However a large number of α-amylases from different sources have been detailed in the literature, only few numbers of them could withstand the harsh industrial conditions. Thermo-stability, pH tolerance, calcium independency and oxidant stability and starch hydrolyzing efficiency are the crucial qualities for α-amylase in starch based industries. Microbes can be genetically modified and fine tuning can be done for the production of enzymes with desired characteristics for specific applications. This review focuses on the native and recombinant α-amylases from microorganisms, their heterologous production and the recent molecular strategies which help to improve the properties of this industrial enzyme. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Fuzzy wavelet plus a quantum neural network as a design base for power system stability enhancement.

    Ganjefar, Soheil; Tofighi, Morteza; Karami, Hamidreza

    2015-11-01

    In this study, we introduce an indirect adaptive fuzzy wavelet neural controller (IAFWNC) as a power system stabilizer to damp inter-area modes of oscillations in a multi-machine power system. Quantum computing is an efficient method for improving the computational efficiency of neural networks, so we developed an identifier based on a quantum neural network (QNN) to train the IAFWNC in the proposed scheme. All of the controller parameters are tuned online based on the Lyapunov stability theory to guarantee the closed-loop stability. A two-machine, two-area power system equipped with a static synchronous series compensator as a series flexible ac transmission system was used to demonstrate the effectiveness of the proposed controller. The simulation and experimental results demonstrated that the proposed IAFWNC scheme can achieve favorable control performance. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Robust Coordinated Design of PSS and TCSC using PSO Technique for Power System Stability Enhancement

    S. Panda

    2007-06-01

    Full Text Available Power system stability improvement by coordinated design of a Power System Stabilizer (PSS and a Thyristor Controlled Series Compensator (TCSC controller is addressed in this paper. Particle Swarm Optimization (PSO technique is employed for optimization of the parameterconstrained nonlinear optimization problem implemented in a simulation environment. The proposed controllers are tested on a weakly connected power system. The non-linear simulation results are presented for wide range of loading conditions with various fault disturbances and fault clearing sequences as well as for various small disturbances. The eigenvalue analysis and simulation results show the effectiveness and robustness of proposed controllers to improve the stability performance of power system by efficient damping of low frequency oscillations under various disturbances.

  2. A decentralised multi-agent approach to enhance the stability of smart microgrids with renewable energy

    Rahman, M. S.; Pota, H. R.; Mahmud, M. A.; Hossain, M. J.

    2016-05-01

    This paper presents the impact of large penetration of wind power on the transient stability through a dynamic evaluation of the critical clearing times (CCTs) by using intelligent agent-based approach. A decentralised multi-agent-based framework is developed, where agents represent a number of physical device models to form a complex infrastructure for computation and communication. They enable the dynamic flow of information and energy for the interaction between the physical processes and their activities. These agents dynamically adapt online measurements and use the CCT information for relay coordination to improve the transient stability of power systems. Simulations are carried out on a smart microgrid system for faults at increasing wind power penetration levels and the improvement in transient stability using the proposed agent-based framework is demonstrated.

  3. Enhancing the stability and performance of a battery cathode using a non-aqueous electrolyte

    Kim, Sung Yeol [Division of Engineering, Brown University, Providence, RI 02912 (United States); Sen, Sujat [Department of Chemistry, Brown University, Providence, RI 02912 (United States); Song, Hyun-Kon [Interdisciplinary School of Green Energy and School of Nano-Biotechnology and Chemical Engineering, Ulsan National Institute of Science and Technology, Banyeon-ri 100, Ulju-gun, Ulsan 689-798 (Korea); Palmore, G. Tayhas R. [Division of Biology and Medicine, Brown University, Providence, RI 02912 (United States)

    2010-06-15

    For conductive polymers to be considered materials for energy storage, both their electroactivity and stability must be optimized. In this study, a non-aqueous electrolyte (0.2 M LiClO{sub 4} in acetonitrile) was studied for its effect on the charge storage capacity and stability of two materials used in batteries developed in our laboratory, polypyrrole (pPy) and poly(3,4-ethylenedioxythiophene) (PEDOT) doped with 2,2'-azino-bis(3-ethylbenzothiaxoline-6-sulfonic acid (ABTS)). The results are compared to the performance of these materials in an aqueous electrolyte (0.2 M HCl/aq). Loss of ABTS dopant was eliminated principally due to the low solubility of ABTS in acetonitrile, resulting in cathode materials with improved stability in terms of load cycling and performance. (author)

  4. Enhancement of thermo-stability and product tolerance of Pseudomonas putida nitrile hydratase by fusing with self-assembling peptide.

    Liu, Yi; Cui, Wenjing; Liu, Zhongmei; Cui, Youtian; Xia, Yuanyuan; Kobayashi, Michihiko; Zhou, Zhemin

    2014-09-01

    Self-assembling amphipathic peptides (SAPs) are the peptides that can spontaneously assemble into ordered nanostructures. It has been reported that the attachment of SAPs to the N- or C-terminus of an enzyme can benefit the thermo-stability of the enzyme. Here, we discovered that the thermo-stability and product tolerance of nitrile hydratase (NHase) were enhanced by fusing with two of the SAPs (EAK16 and ELK16). When the ELK16 was fused to the N-terminus of β-subunit, the resultant NHase (SAP-NHase-2) became an active inclusion body; EAK16 fused NHase in the N-terminus of β-subunit (SAP-NHase-1) and ELK16 fused NHase in the C-terminus of β-subunit (SAP-NHase-10) did not affect NHase solubility. Compared with the deactivation of the wild-type NHase after 30 min incubation at 50°C, SAP-NHase-1, SAP-NHase-2 and SAP-NHase-10 retained 45%, 30% and 50% activity; after treatment in the buffer containing 10% acrylamide, the wild-type retained 30% activity, while SAP-NHase-1, SAP-NHase-2 and SAP-NHase-10 retained 52%, 42% and 55% activity. These SAP-NHases with enhanced thermo-stability and product tolerance would be helpful for further industrial applications of the NHase. Copyright © 2014 The Society for Biotechnology, Japan. Published by Elsevier B.V. All rights reserved.

  5. Renewable Energy Certificate and Perform, Achieve, Trade mechanisms to enhance the energy security for India

    Kumar, Rajesh; Agarwala, Arun

    2013-01-01

    The Renewable Energy Certificate and Perform Achieve Trade mechanisms in India are designed to target energy generation and saving, respectively, in line with Clean Development Mechanism implemented by United Nations Framework Convention on Climate Change. The Renewable Energy Certificate System is a voluntary regulation in India for renewable energy generators and is designed for effective implementation of inter-state transactions by introducing the Renewable Purchase Obligation regulation for consumers and a flexible trading platform for transactions across the country. Another initiative, the Perform Achieve Trade scheme, is an enhanced energy efficiency trading mechanism based on consumption targets that require large energy user sectors to improve efficiency by 1–2% per year. The Perform Achieve Trade programme has introduced mechanisms for the identification of industry sector, designated customer, specific energy consumption and target setting. The Perform Achieve Trade design issues are in test phase in the first cycle of the scheme which will run from 2012 to 2015. This paper discusses key design issues about boundary and target setting for Renewable Energy Certificate and Perform Achieve Trade energy saving certificate (ESCert) A data sharing and trading mechanism for Perform Achieve Trade is also proposed for review and coordination among regulator, designated consumers and traders in the market. - Highlights: ► Renewable Energy Certificate’ and ‘Perform Achieve Trade’ are energy certification programmes. ► REC and PAT programme implementation and the institutional network work are presented. ► The trading and communication network propose for possible linkage between REC, PAT and CDM. ► Independent associations in parallel with CERC and BEE are redefined for two tier review of scheme

  6. Energy Optimization for Distributed Energy Resources Scheduling with Enhancements in Voltage Stability Margin

    Morais, Hugo; Sousa, Tiago; Perez, Angel

    2016-01-01

    to evaluate the resulting multiobjective optimization problem: the sum-weighted Pareto front and an adapted goal programming methodology. With this new methodology, the system operators can consider both the costs and voltage stability. Priority can be assigned to one objective function according...... to the operating scenario. Additionally, it is possible to evaluate the impact of the distributed generation and the electric vehicles in the management of voltage stability in the future electric networks. One detailed case study considering a distribution network with high penetration of distributed energy...

  7. Dynamics of bad-cavity-enhanced interaction with cold Sr atoms for laser stabilization

    Schäffer, S. A.; Christensen, B. T.R.; Henriksen, M. R.

    2017-01-01

    Hybrid systems of cold atoms and optical cavities are promising systems for increasing the stability of laser oscillators used in quantum metrology and atomic clocks. In this paper we map out the atom-cavity dynamics in such a system and demonstrate limitations as well as robustness of the approach....... We investigate the phase response of an ensemble of cold Sr88 atoms inside an optical cavity for use as an error signal in laser frequency stabilization. With this system we realize a regime where the high atomic phase shift limits the dynamical locking range. The limitation is caused by the cavity...

  8. Dual Function Additives: A Small Molecule Crosslinker for Enhanced Efficiency and Stability in Organic Solar Cells

    Rumer, Joseph W.; Ashraf, Raja S.; Eisenmenger, Nancy D.; Huang, Zhenggang; Meager, Iain; Nielsen, Christian B.; Schroeder, Bob C.; Chabinyc, Michael L.; McCulloch, Iain

    2015-01-01

    A bis-azide-based small molecule crosslinker is synthesized and evaluated as both a stabilizing and efficiency-boosting additive in bulk heterojunction organic photovoltaic cells. Activated by a noninvasive and scalable solution processing technique, polymer:fullerene blends exhibit improved thermal stability with suppressed polymer skin formation at the cathode and frustrated fullerene aggregation on ageing, with initial efficiency increased from 6% to 7%. © 2015 The Authors. Published by WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Dual Function Additives: A Small Molecule Crosslinker for Enhanced Efficiency and Stability in Organic Solar Cells

    Rumer, Joseph W.

    2015-02-01

    A bis-azide-based small molecule crosslinker is synthesized and evaluated as both a stabilizing and efficiency-boosting additive in bulk heterojunction organic photovoltaic cells. Activated by a noninvasive and scalable solution processing technique, polymer:fullerene blends exhibit improved thermal stability with suppressed polymer skin formation at the cathode and frustrated fullerene aggregation on ageing, with initial efficiency increased from 6% to 7%. © 2015 The Authors. Published by WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Curcumin-Zn(II) complex for enhanced solubility and stability: an approach for improved delivery and pharmacodynamic effects.

    Sareen, Rashmi; Jain, Nitin; Dhar, K L

    2016-08-01

    The aim of present investigation was to prepare Curcumin-Zn(II) complex in a view to enhance solubility, stability and pharmacodynamic effect in experimentally induced ulcerative colitis. Curcumin-Zn(II) complex was prepared by stirring curcumin with anhydrous zinc chloride at a molar ratio of 1:1. The prepared curcumin metallocomplex was characterized by TLC, FTIR, UV spectroscopy and (1)H NMR. In vitro kinetic degradation and solubility of Curcumin and Curcumin-Zn(II) complex was analyzed spectrophotometrically. Pharmacodynamic evaluation of curcumin and its metal complex was assessed in ulcerative colitis in mice. Curcumin showed chelation with zinc ion as confirmed by the TLC, FTIR, UV spectroscopy and (1)H NMR. The results of TLC [Rf value], IR Spectroscopy [shifting of stretching vibrations of υ(C=C) and υ(C=O)], UV spectra [deconvoluted with absorption band at 432-466.4 nm] of Curcumin-Zn(II) complex compared to curcumin confirmed the formation of metallocomplex. (1)HNMR spectra of Curcumin-Zn(II) showed the upfield shift of Ha and Hb. Kinetic stability studies showed metallocomplex with zinc exhibited good stability. In vivo study revealed significant reduction in severity and extent of colonic damage with Curcumin-Zn(II) which were further confirmed by histopathological study. This study recognizes higher solubility and stability of Curcumin-Zn(II) complex and suggested better pharmacodynamic effects.

  11. Enhanced thermal stability of a polymer solar cell blend induced by electron beam irradiation in the transmission electron microscope.

    Bäcke, Olof; Lindqvist, Camilla; de Zerio Mendaza, Amaia Diaz; Gustafsson, Stefan; Wang, Ergang; Andersson, Mats R; Müller, Christian; Kristiansen, Per Magnus; Olsson, Eva

    2017-05-01

    We show by in situ microscopy that the effects of electron beam irradiation during transmission electron microscopy can be used to lock microstructural features and enhance the structural thermal stability of a nanostructured polymer:fullerene blend. Polymer:fullerene bulk-heterojunction thin films show great promise for use as active layers in organic solar cells but their low thermal stability is a hindrance. Lack of thermal stability complicates manufacturing and influences the lifetime of devices. To investigate how electron irradiation affects the thermal stability of polymer:fullerene films, a model bulk-heterojunction film based on a thiophene-quinoxaline copolymer and a fullerene derivative was heat-treated in-situ in a transmission electron microscope. In areas of the film that exposed to the electron beam the nanostructure of the film remained stable, while the nanostructure in areas not exposed to the electron beam underwent large phase separation and nucleation of fullerene crystals. UV-vis spectroscopy shows that the polymer:fullerene films are stable for electron doses up to 2000kGy. Copyright © 2016 Elsevier B.V. All rights reserved.

  12. Self-Standing Polypyrrole/Black Phosphorus Laminated Film: Promising Electrode for Flexible Supercapacitor with Enhanced Capacitance and Cycling Stability.

    Luo, Shaojuan; Zhao, Jinlai; Zou, Jifei; He, Zhiliang; Xu, Changwen; Liu, Fuwei; Huang, Yang; Dong, Lei; Wang, Lei; Zhang, Han

    2018-01-31

    With the rapid development of portable electronics, solid-state flexible supercapacitors (SCs) are considered as one of the promising energy devices in powering electronics because of their intrinsic advantages. Polypyrrole (PPy) is an ideal electrode material in constructing flexible SCs owing to its high electrochemical activity and inherent flexibility, although its relatively low capacitance and poor cycling stability are still worthy of improvement. Herein, through the innovative introduction of black phosphorus (BP) nanosheets, we developed a laminated PPy/BP self-standing film with enhanced capacitance and cycling stability via a facile one-step electrochemical deposition method. The film exhibits a high capacitance of 497.5 F g -1 (551.7 F cm -3 ) and outstanding cycling stability of 10 000 charging/discharging cycles, thanks to BP nanosheets inducing laminated assembly which hinder dense and disordered stacking of PPy during electrodeposition, consequently providing a precise pathway for ion diffusion and electron transport together with alleviation of the structural deterioration during charge/discharge. The flexible SC fabricated by laminated films delivers a high capacitance of 452.8 F g -1 (7.7 F cm -3 ) besides its remarkable mechanical flexibility and cycling stability. Our facile strategy paves the way to improve the electrochemical performance of PPy-based SC that could serve as promising flexible energy device for portable electronics.

  13. Solubility and stability enhancement of curcumin: Improving drug properties of natural pigment

    M J Ansari

    2016-01-01

    Full Text Available Aim: Water insolubility, low potency, and instability are inherent problems of several herbal medicines. Identity, strength, quality, and purity of herbal products are further compromised during manufacturing and storage. The aim of present work was to evaluate solubility and stability of curcumin, a pigment obtained from dried rhizomes of plant Cucrcuma longa. Materials and Methods: The stoichiometric ratios for inclusion complexation of curcumin with various cyclodextrins (CDs were determined by phase solubility analysis. Grinding, kneading, and freeze-drying were employed to determine optimum complexation. Complexes were evaluated for drug inclusion, solubility, and stability. Results: Stability constants were 11200 M−1 , 1557 M−1 , 2858 M−1 , and 2206 M−1 for α-, β-, γ-CD, and dimethyl β-CD (DIMEB, respectively, thus indicating good complex formation. Theoretical amounts of curcumin in binary products were between 80% and 97% with a maximum of 96.8% in curcumin-β-CD freeze-dried product. The complexation resulted in a marked improvement in the solubility of curcumin up to 60, 55, 56, and 1500 folds by α-, β-, γ-CD, and DIMEB, respectively. Inclusion complexation protected the drug from hydrolytic degradations as only 20-40% degradation was observed at the end of 8 h as opposed to >70% for pure curcumin. Conclusion: A significant improvement in the solubility and stability was observed with curcumin-CD complex as compared to pure curcumin.

  14. Stability Enhancement Based on Virtual Impedance for DC Microgrids with Constant Power Loads

    Lu, Xiaonan; Sun, Kai; Guerrero, Josep M.

    2015-01-01

    In this paper, a converter-based DC microgrid is studied. By considering the impact of each component in DC microgrids on system stability, a multi-stage configuration is employed, which includes the source stage, interface converter stage between buses and common load stage. In order to study th....... It can be seen that by using the proposed stabilizers, the unstable poles induced by the CPLs are forced to move into the stable region. The proposed method is verified by the MATLAB/Simulink model of multi-stage DC microgrids with three distributed power generation units.......In this paper, a converter-based DC microgrid is studied. By considering the impact of each component in DC microgrids on system stability, a multi-stage configuration is employed, which includes the source stage, interface converter stage between buses and common load stage. In order to study...... the overall stability of the above DC microgrid with constant power loads (CPLs), a comprehensive small-signal model is derived by analyzing the interface converters in each stage. The instability issue induced by the CPLs is revealed by using the criteria of impedance matching. Meanwhile, virtual...

  15. Alloy development for the enhanced stability of Ω precipitates in Al-Cu-Mg-Ag alloys

    Gable, B. M.; Shiflet, G. J.; Starke, E. A.

    2006-04-01

    The coarsening resistance and thermal stability of several Ω plate-dominated microstructures were controlled through altering the chemistry and thermomechanical processing of various Al-Cu-Mg-Ag alloys. Quantitative comparisons of Ω nucleation density, particle size, and thermal stability were used to illustrate the effects of alloy composition and processing conditions. The long-term stability of Ω plates was found to coincide with relatively high levels of silver and moderate magnesium additions, with the latter limiting the competition for solute with S-phase precipitation. This analysis revealed that certain microstructures initially dominated by Ω precipitation were found to remain stable through long-term isothermal and double-aging heat treatments, which represents significant improvement over the previous generation of Al-Cu-Mg-Ag alloys, in which Ω plates dissolved sacrificially after long aging times. The quantitative precipitate data, in conjunction with a thermodynamic database for the aluminum-rich corner of the Al-Cu-Mg-Ag quaternary system, were used to estimate the chemistry of the α/Ω-interphase boundary. These calculations suggest that silver is the limiting species at the α/Ω interfacial layer and that Ω plates form with varying interfacial chemistries during the early stages of artificial aging, which is directly related to the overall stability of certain plates.

  16. Enhanced switching stability in Ta2O5 resistive RAM by fluorine doping

    Sedghi, N.; Li, H.; Brunell, I. F.; Dawson, K.; Guo, Y.; Potter, R. J.; Gibbon, J. T.; Dhanak, V. R.; Zhang, W. D.; Zhang, J. F.; Hall, S.; Robertson, J.; Chalker, P. R.

    2017-08-01

    The effect of fluorine doping on the switching stability of Ta2O5 resistive random access memory devices is investigated. It shows that the dopant serves to increase the memory window and improve the stability of the resistive states due to the neutralization of oxygen vacancies. The ability to alter the current in the low resistance state with set current compliance coupled with large memory window makes multilevel cell switching more favorable. The devices have set and reset voltages of <1 V with improved stability due to the fluorine doping. Density functional modeling shows that the incorporation of fluorine dopant atoms at the two-fold O vacancy site in the oxide network removes the defect state in the mid bandgap, lowering the overall density of defects capable of forming conductive filaments. This reduces the probability of forming alternative conducting paths and hence improves the current stability in the low resistance states. The doped devices exhibit more stable resistive states in both dc and pulsed set and reset cycles. The retention failure time is estimated to be a minimum of 2 years for F-doped devices measured by temperature accelerated and stress voltage accelerated retention failure methods.

  17. Enhancement of temozolomide stability by loading in chitosan-carboxylated polylactide-based nanoparticles

    Di Martino, Antonio; Kucharczyk, Pavel; Capakova, Zdenka; Humpolicek, Petr; Sedlarik, Vladimir, E-mail: sedlarik@ft.utb.cz [Tomas Bata University in Zlín, Centre of Polymer Systems, University Institute (Czech Republic)

    2017-02-15

    In the presented work, amphiphilic nanoparticles based on chitosan and carboxy-enriched polylactic acid have been prepared to improve the stability of the pro-drug temozolomide in physiological media by encapsulation. The carrier, with a diameter in the range of 150–180 nm, was able to accommodate up to 800 μg of temozolomide per mg of polymer. The obtained formulation showed good stability in physiological condition and preparation media up to 1 month. Temozolomide loaded inside the carrier exhibited greater stability than the free drug, in particular in simulated physiological solution at pH 7.4 where the hydrolysis in the inactive metabolite was clearly delayed. CS-SPLA nanoparticles demonstrated a pH-dependent TMZ release kinetics with the opportunity to increase or decrease the rate. Mass spectroscopy, UV-Vis analysis, and in vitro cell tests confirmed the improvement in temozolomide stability and effectiveness when loaded into the polymeric carrier, in comparison with the free drug.

  18. Comparison of model reference and map based control method for vehicle stability enhancement

    Baek, S.; Son, M.; Song, J.; Boo, K.; Kim, H.

    2012-01-01

    A map based controller method to improve a vehicle lateral stability is proposed in this study and compared with the conventional method, a model referenced controller. A model referenced controller to determine compensated yaw moment uses the sliding mode method, but the proposed map based

  19. Enhanced thermal stability of the thylakoid membranes from spruce. A comparison with selected angiosperms

    Karlický, Václav; Kurasová, Irena; Ptáčková, B.; Večeřová, Kristýna; Urban, Otmar; Špunda, Vladimír

    2016-01-01

    Roč. 130, 1-3 (2016), s. 357-371 ISSN 0166-8595 R&D Projects: GA MŠk(CZ) LO1415; GA ČR GA13-28093S Institutional support: RVO:67179843 Keywords : Norway spruce * Thermal stability * Circular dichroism * Photosystem II organization * Thylakoid membrane Subject RIV: ED - Physiology Impact factor: 3.864, year: 2016

  20. Cu-based shape memory alloys with enhanced thermal stability and mechanical properties

    Chung, C.Y.; Lam, C.W.H.

    1999-01-01

    Cu-based shape memory alloys were developed in the 1960s. They show excellent thermoelastic martensitic transformation. However the problems in mechanical properties and thermal instability have inhibited them from becoming promising engineering alloys. A new Cu-Zn-Al-Mn-Zr Cu-based shape memory alloy has been developed. With the addition of Mn and Zr, the martensitic transformation behaviour and the grain size ca be better controlled. The new alloys demonstrates good mechanical properties with ultimate tensile strenght and ductility, being 460 MPa and 9%, respectively. Experimental results revealed that the alloy has better thermal stability, i.e. martensite stabilisation is less serious. In ordinary Cu-Zn-Al alloys, martensite stabilisation usually occurs at room temperature. The new alloy shows better thermal stability even at elevated temperature (∝150 C, >A f =80 C). A limited small amount of martensite stabilisation was observed upon ageing of the direct quenched samples as well as the step quenched samples. This implies that the thermal stability of the new alloy is less dependent on the quenching procedure. Furthermore, such minor martensite stabilisation can be removed by subsequent suitable parent phase ageing. The new alloy is ideal for engineering applications because of its better thermal stability and better mechanical properties. (orig.)

  1. Thermal Stability-Enhanced and High-Efficiency Planar Perovskite Solar Cells with Interface Passivation.

    Zhang, Weihai; Xiong, Juan; Jiang, Li; Wang, Jianying; Mei, Tao; Wang, Xianbao; Gu, Haoshuang; Daoud, Walid A; Li, Jinhua

    2017-11-08

    As the electron transport layer (ETL) of perovskite solar cells, oxide semiconductor zinc oxide (ZnO) has been attracting great attention due to its relatively high mobility, optical transparency, low-temperature fabrication, and good environment stability. However, the nature of ZnO will react with the patron on methylamine, which would deteriorate the performance of cells. Although many methods, including high-temperature annealing, doping, and surface modification, have been studied to improve the efficiency and stability of perovskite solar cells with ZnO ETL, devices remain relatively low in efficiency and stability. Herein, we adopted a novel multistep annealing method to deposit a porous PbI 2 film and improved the quality and uniformity of perovskite films. The cells with ZnO ETL were fabricated at the temperature of perovskite film. Interestingly, the PCE of PCBM-passivated cells could reach nearly 19.1%. To our best knowledge, this is the highest PCE value of ZnO-based perovskite solar cells until now. More importantly, PCBM modification could effectively suppress the decomposition of MAPbI 3 and improve the thermal stability of cells. Therefore, the ZnO is a promising candidate of electron transport material for perovskite solar cells in future applications.

  2. Characteristics of thermal hydraulic stability in a HYPER system with enhanced natural circulation potential

    Tak, Nam Il; Park, Won S.; Han, Seok Jung

    1999-06-01

    Pb-Bi eutectic chosen as a coolant of HYPER is an excellent heat transfer medium but requires relatively large pumping power. Thus the mixed cooling concept to increase economy and safety is being considered for HYPER. In this cooling concept, a large fraction of total thermal power is carried by natural circulation. However, the mixed cooling concept has been considered for conceptual designs only an it has never been applied to real reactors. The purpose of the present study is to provide simple tools to analyze mixed flow and to examine fundamental stability characteristics of mixed flow. Conventional one-dimensional approaches using mass, momentum, and energy conservation are used to describe a forced circulating flow affected by a large buoyancy force. The results of simple analysis using preliminary design parameters of HYPER show that cooling by mixed flow is possible only when the total pressure loss of system is sufficiently low. The stability behavior of mixed flow in a simple rectangular loop has been studied using numerical solutions of the governing equations. As in the case of natural circulation, three types of flow regions, such as stable, neutrally stable, and unstable regions, were found. The stability map of mixed flow has been obtained using the results of calculations. Forced flow due to the pump is found to increase the stability of the loop, since the stable portion of the stability map is increased. However, the unstable region of the mixed flow does not completely disappear, even though the pump exists. (author). 37 refs., 4 tabs., 23 figs

  3. Crystalline Ethylene Oxide and Propylene Oxide Triblock Copolymer Solid Dispersion Enhance Solubility, Stability and Promoting Time- Controllable Release of Curcumin.

    Alves, Thais F R; das Neves Lopes, Franciely C C; Rebelo, Marcia A; Souza, Juliana F; da Silva Pontes, Katiusca; Santos, Carolina; Severino, Patricia; Junior, Jose M O; Komatsu, Daniel; Chaud, Marco V

    2018-01-01

    The design and development of an effective medicine are, however, often faced with a number of challenges. One of them is the close relationship of drug's bioavailability with solubility, dissolution rate and permeability. The use of curcumin's (CUR) therapeutic potential is limited by its poor water solubility and low chemical stability. The purpose was to evaluate the effect of polymer and solid dispersion (SD) preparation techniques to enhance the aqueous solubility, dissolution rate and stability of the CUR. The recent patents on curcumin SD were reported as (i) curcumin with polyvinylpyrrolidone (CN20071 32500 20071214, WO2006022012 and CN20151414227 20150715), (ii) curcumin-zinc/polyvinylpyrrolidone (CN20151414227 20150715), (iii) curcumin-poloxamer 188 (CN2008171177 20080605), (iv) curcumin SD prepared by melting method (CN20161626746-20160801). SD obtained by co-preciptation or microwave fusion and the physical mixture of CUR with Poloxamer-407 (P-407), Hydroxypropylmetylcellulose-K4M (HPMC K4M) and Polyvinylpyrrolidone-K30 (PVP-K30) were prepared at the ratios of 1:2; 1:1 and 2:1. The samples were evaluated by solubility, stability, dissolution rate and characterized by SEM, PXRD, DSC and FTIR. The solubility, stability (pH 7.0) and dissolution rate were significantly greater for SD (CUR:P-407 1:2). The PXRD,SEM and DSC indicated a change in the crystalline state of CUR. The enhancement of solubility was dependent on a combination of factors including the weight ratio, preparation techniques and carrier properties. The drug release data fitted well with the Weibull equation, indicating that the drug release was controlled by diffusion, polymer relaxation and erosion occurring simultaneously. Thus, these SDs, specifically CUR:P-407 1:2 w/w, can overcome the barriers of poor bioavailability to reap many beneficial properties. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  4. SS-mPEG chemical modification of recombinant phospholipase C for enhanced thermal stability and catalytic efficiency.

    Fang, Xian; Wang, Xueting; Li, Guiling; Zeng, Jun; Li, Jian; Liu, Jingwen

    2018-05-01

    PEGylation is one of the most promising and extensively studied strategies for improving the properties of proteins as well as enzymic physical and thermal stability. Phospholipase C, hydrolyzing the phospholipids offers tremendous applications in diverse fields. However, the poor thermal stability and higher cost of production have restricted its industrial application. This study focused on improving the stabilization of recombinant PLC by chemical modification with methoxypolyethylene glycol-Succinimidyl Succinate (SS-mPEG, MW 5000). PLC gene from isolate Bacillus cereus HSL3 was fused with SUMO, a novel small ubiquitin-related modifier expression vector and over expressed in Escherichia coli. The soluble fraction of SUMO-PLC reached 80% of the total recombinant protein. The enzyme exhibited maximum catalytic activity at 80 °C and was relatively thermostable at 40-70 °C. It showed extensive substrate specificity pattern and marked activity toward phosphatidylcholine, which made it a typical non-specific PLC for industrial purpose. SS-mPEG-PLC complex exhibited an enhanced thermal stability at 70-80 °C and the catalytic efficiency (K cat /K m ) had increased by 3.03 folds compared with free PLC. CD spectrum of SS-mPEG-PLC indicated a possible enzyme aggregation after chemical modification, which contributed to the higher thermostability of SS-mPEG-PLC. The increase of antiparallel β sheets in secondary structure also made it more stable than parallel β sheets. The presence of SS-mPEG chains on the enzyme molecule surface somewhat changed the binding rate of the substrates, leading to a significant improvement in catalytic efficiency. This study provided an insight into the addition of SS-mPEG for enhancing the industrial applications of phospholipase C at higher temperature. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Cross-correlation enhanced stability in a tumor cell growth model with immune surveillance driven by cross-correlated noises

    Zeng Chunhua; Zhou Xiaofeng; Tao Shufen

    2009-01-01

    The transient properties of a tumor cell growth model with immune surveillance driven by cross-correlated multiplicative and additive noises are investigated. The explicit expression of extinction rate from the state of a stable tumor to the state of extinction is obtained. Based on the numerical computations, we find the following: (i) the intensity of multiplicative noise D and the intensity of additive noise α enhance the extinction rate for the case of λ ≤ 0 (i.e. λ denotes cross-correlation intensity between two noises), but for the case of λ > 0, a critical noise intensity D or α exists at which the extinction rate is the smallest; D and α at first weaken the extinction rate and then enhance it. (ii) The immune rate β and the cross-correlation intensity λ play opposite roles on the extinction rate, i.e. β enhances the extinction rate of the tumor cell, while λ weakens the extinction rate of the tumor cell. Namely, the immune rate can enhance the extinction of the tumor cell and the cross-correlation between two noises can enhance stability of the cancer state.

  6. Noise enhanced stability effect in a metastable system with two different kinds of time delays and cross-correlated noises

    Jia Zhenglin; Mei Dongcheng

    2011-01-01

    We numerically investigate the influences of the time delay τ simultaneously existing in both the deterministic and fluctuating forces, the time delay τ r existing only in the fluctuating force and the cross-correlation strength λ on the enhancement of the mean first-passage time (MFPT) as a function of the additive D and the multiplicative α noise intensities in a metastable system. The results indicate that both the multiplicative and additive noises can induce the noise-enhanced stability (NES) effect. An increase of λ can enhance or weaken the NES effect induced by the additive noise, depending on the value of τ. However, it weakens the NES effect induced by the multiplicative noise with a suppression of the effect of λ caused by increasing τ. The τ-induced critical behavior on both NES effects can be observed, i.e. an increase of τ can enhance or restrain the NES effects induced by the two kinds of noises. With an increase of λ and τ, MFPT versus D shows a transition from one peak to two peaks and finally one peak, implying the multiple NES effect caused by λ and τ. An increase of τ r can enhance the NES effect induced by the additive noise and weaken the NES effect induced by the multiplicative noise.

  7. Uganda; Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on the following topics: Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, and Payment Systems

    International Monetary Fund

    2003-01-01

    This paper presents findings of Uganda’s Financial System Stability Assessment, including Reports on the Observance of Standards and Codes on Monetary and Financial Policy Transparency, Banking Supervision, Securities Regulation, Insurance Regulation, Corporate Governance, and Payment Systems. The banking system in Uganda, which dominates the financial system, is fundamentally sound, more resilient than in the past, and currently poses no threat to macroeconomic stability. A major disruption ...

  8. Combustion Enhancement Via Stabilized Piecewise Nonequilibrium Gliding Arc Plasma Discharge (Postprint)

    Ombrello, Timothy; Qin, Xiao; Ju, Yiguang; Gutsol, Alexander; Fridman, Alexander; Carter, Campbell

    2006-01-01

    ... enhancement of methane-air diffusion flames. The results showed that the new system provided a well-defined flame geometry for the understanding of the basic mechanism of the plasma-flame interaction...

  9. A Simple Approach to Enhance the Water Stability of a Metal-Organic Framework.

    Shih, Yung-Han; Kuo, Yu-Ching; Lirio, Stephen; Wang, Kun-Yun; Lin, Chia-Her; Huang, Hsi-Ya

    2017-01-01

    A facile method to improve the feasibility of water-unstable metal-organic frameworks in an aqueous environment has been developed that involves imbedding in a polymer monolith. The effect of compartment type during polymerization plays a significant role in maintaining the crystalline structure and thermal stability of the MOFs, which was confirmed by powder X-ray diffraction (PXRD) and thermogravimetric analysis (TGA), respectively. The MOF-polymer composite prepared in a narrow compartment (column, ID 0.8 mm) has better thermal and chemical stability than that prepared in a broad compartment (vial, ID 7 mm). The developed MOF-polymer composite was applied as an adsorbent in solid-phase microextraction of nine non-steroidal anti-inflammatory drugs (NSAIDs) and could be used for extraction more than 30 times, demonstrating that the proposed approach has potential for industrial applications. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. Stability enhancement and electronic tunability of two-dimensional SbIV compounds via surface functionalization

    Zhou, Wenhan; Guo, Shiying; Liu, Xuhai; Cai, Bo; Song, Xiufeng; Zhu, Zhen; Zhang, Shengli

    2018-01-01

    We propose a family of hydrogenated- and halogenated-SbIV (SbIVX-2) materials that simultaneously have two-dimensional (2D) structures, high stability and appealing electronic properties. Based on first-principles total-energy and vibrational-spectra calculations, SbIVX-2 monolayers are found both thermally and dynamically stable. Varying IV and X elements can rationally tune the electronic properties of SbIVX-2 monolayers, effectively modulating the band gap from 0 to 3.42 eV. Regarding such superior stability and broad band-gap range, SbIVX-2 monolayers are expected to be synthesized in experiments and taken as promising candidates for low-dimensional electronic and optoelectronic devices, such as blue-to-ultraviolet light-emitting diodes (LED) and photodetectors.

  11. Enhancement of Voltage Stability of DC Smart Grid During Islanded Mode by Load Shedding Scheme

    Nassor, Thabit Salim; Senjyu, Tomonobu; Yona, Atsushi

    2015-10-01

    This paper presents the voltage stability of a DC smart grid based on renewable energy resources during grid connected and isolated modes. During the islanded mode the load shedding, based on the state of charge of the battery and distribution line voltage, was proposed for voltage stability and reservation of critical load power. The analyzed power system comprises a wind turbine, a photovoltaic generator, storage battery as controllable load, DC loads, and power converters. A fuzzy logic control strategy was applied for power consumption control of controllable loads and the grid-connected dual active bridge series resonant converters. The proposed DC Smart Grid operation has been verified by simulation using MATLAB® and PLECS® Blockset. The obtained results show the effectiveness of the proposed method.

  12. An improved direct feedback linearization technique for transient stability enhancement and voltage regulation of power generators

    Kenne, Godpromesse [Laboratoire d' Automatique et d' Informatique Appliquee (LAIA), Departement de Genie Electrique, Universite de Dschang, B.P. 134 Bandjoun, Cameroun; Goma, Raphael; Lamnabhi-Lagarrigue, Francoise [Laboratoire des Signaux et Systemes (L2S), CNRS-SUPELEC, Universite Paris XI, 3 Rue Joliot Curie, 91192 Gif-sur-Yvette (France); Nkwawo, Homere [Departement GEII, Universite Paris XIII, IUT Villetaneuse, 99 Avenue Jean Baptiste Clement, 93430 Villetaneuse (France); Arzande, Amir; Vannier, Jean Claude [Departement Energie, Ecole Superieure d' Electricite-SUPELEC, 3 Rue Joliot Curie, 91192 Gif-sur-Yvette (France)

    2010-09-15

    In this paper, a simple improved direct feedback linearization design method for transient stability and voltage regulation of power systems is discussed. Starting with the classical direct feedback linearization technique currently applied to power systems, an adaptive nonlinear excitation control of synchronous generators is proposed, which is new and effective for engineering. The power angle and mechanical power input are not assumed to be available. The proposed method is based on a standard third-order model of a synchronous generator which requires only information about the physical available measurements of angular speed, active electric power and generator terminal voltage. Experimental results of a practical power system show that fast response, robustness, damping, steady-state and transient stability as well as voltage regulation are all achieved satisfactorily. (author)

  13. Designing a Fuzzy Logic Controller to Enhance Directional Stability of Vehicles under Difficult Maneuvers

    Mehrdad N. Khajavi; Golamhassan Paygane; Ali Hakima

    2009-01-01

    Vehicle which are turning or maneuvering at high speeds are susceptible to sliding and subsequently deviate from desired path. In this paper the dynamics governing the Yaw/Roll behavior of a vehicle has been simulated. Two different simulations have been used one for the real vehicle, for which a fuzzy controller is designed to increase its directional stability property. The other simulation is for a hypothetical vehicle with much higher tire cornering stiffness which is ca...

  14. Enhancement of stability and reactivity of nanosized zero-valent iron with polyhydroxybutyrate

    Waclawek, S.; Chronopoulou, L.; Petrangeli Papini, M.; Vinod, V.T.P.; Palocci, C.; Kupčík, Jaroslav; Černík, M.

    2017-01-01

    Roč. 69, MAR (2017), s. 302-307 ISSN 1944-3994. [EDS Conference on Desalination for the Environment - Clean Water and Energy. Roma, 22.05.2016-26.05.2016] Institutional support: RVO:61388980 Keywords : Cr(VI) * nZVI * PHB * Remediation * Stabilization * VOC Subject RIV: CA - Inorganic Chemistry OBOR OECD: Inorganic and nuclear chemistry Impact factor: 1.631, year: 2016

  15. Lessons Learned on the Application of Vibration Absorbers for Enhanced Cannon Stabilization

    Eric Kathe

    2001-01-01

    Full Text Available This paper will summarize the successful application of muzzle-end vibration absorbers to reduce cannon vibration. This technology constitutes a weapons stabilization approach that focuses on passive mechanical structural modification of the cannon, rather than relying upon an external control law to actively cancel vibrations. Challenges encountered during field testing, non-ideal behavior, and performance evaluation using digital signal processing will be highlighted.

  16. Cu-Ag core–shell nanoparticles with enhanced oxidation stability for printed electronics

    Lee, Changsoo; Kim, Na Rae; Koo, Jahyun; Lee, Yung Jong; Lee, Hyuck Mo

    2015-01-01

    In this work, we synthesized uniform Cu–Ag core–shell nanoparticles using a facile two-step process that consists of thermal decomposition and galvanic displacement methods. The core–shell structure of these nanoparticles was confirmed through characterization using transmission electron microscopy, energy-dispersive spectroscopy, and x-ray diffraction. Furthermore, we investigated the oxidation stability of the Cu–Ag core–shell nanoparticles in detail. Both qualitative and quantitative x-ray photoelectron spectroscopy analyses confirm that the Cu–Ag core–shell nanoparticles have considerably higher oxidation stability than Cu nanoparticles. Finally, we formulated a conductive ink using the synthesized nanoparticles and coated it onto glass substrates. Following the sintering process, we compared the resistivity of the Cu–Ag core–shell nanoparticles with that of the Cu nanoparticles. The results of this study clearly show that the Cu–Ag core–shell nanoparticles can potentially be used as an alternative to Ag nanoparticles because of their superior oxidation stability and electrical properties. (paper)

  17. Weight Multispectral Reconstruction Strategy for Enhanced Reconstruction Accuracy and Stability With Cerenkov Luminescence Tomography.

    Hongbo Guo; Xiaowei He; Muhan Liu; Zeyu Zhang; Zhenhua Hu; Jie Tian

    2017-06-01

    Cerenkov luminescence tomography (CLT) provides a novel technique for 3-D noninvasive detection of radiopharmaceuticals in living subjects. However, because of the severe scattering of Cerenkov light, the reconstruction accuracy and stability of CLT is still unsatisfied. In this paper, a modified weight multispectral CLT (wmCLT) reconstruction strategy was developed which split the Cerenkov radiation spectrum into several sub-spectral bands and weighted the sub-spectral results to obtain the final result. To better evaluate the property of the wmCLT reconstruction strategy in terms of accuracy, stability and practicability, several numerical simulation experiments and in vivo experiments were conducted and the results obtained were compared with the traditional multispectral CLT (mCLT) and hybrid-spectral CLT (hCLT) reconstruction strategies. The numerical simulation results indicated that wmCLT strategy significantly improved the accuracy of Cerenkov source localization and intensity quantitation and exhibited good stability in suppressing noise in numerical simulation experiments. And the comparison of the results achieved from different in vivo experiments further indicated significant improvement of the wmCLT strategy in terms of the shape recovery of the bladder and the spatial resolution of imaging xenograft tumors. Overall the strategy reported here will facilitate the development of nuclear and optical molecular tomography in theoretical study.

  18. Gallic Acid Grafted Chitosan Has Enhanced Oxidative Stability in Bulk Oils.

    Gim, Seo Yeong; Hong, Seungmi; Kim, Mi-Ja; Lee, JaeHwan

    2017-07-01

    Gallic acid (GA) was grafted in chitosan and the effects of GA grafted chitosan (GA-g-CS) on the oxidative stability in bulk oil was tested at 60 and 140 °C. To text oxidative stability in oils, headspace oxygen content, conjugated dienoic acid (CDA) value, p-anisidine value (p-AV), and acid value were determined. Chitosan itself did not show antioxidative or prooxidative effects in oils at 60 °C. However, GA-g-CS and GA acted as antioxidants at 60 °C. At 140 °C heating with moisture supplied condition, different results were observed. GA-g-CS acted as antioxidants based on the results of CDA and p-AV. However, chitosan showed the highest oxidative stability based on results of acid value and brown color formation at 140 °C. This could be due to reduction of moisture content by chitosan. GA was continuously released from GA-g-CS in bulk oil. This might have provided extra antioxidant activities to oils. © 2017 Institute of Food Technologists®.

  19. Enhanced Cycling Stability of Lithium–Sulfur batteries by Electrostatic-Interaction

    Ma, Zhaoling; Huang, Xiaobing; Jiang, Qianqian; Huo, Jia; Wang, Shuangyin

    2015-01-01

    Highlights: • Electrostatic interaction is utilized to hinder the shuttling of polysulfides. • Directly functionalizing SG can better prolong the cycle life of Li–S batteries. • SG/PDDA showed significantly improved capacity retention. - Abstract: Lithiums–sulfur battery is considered as one of the most promising energy storage devices to replace the current Li ion batteries because of its high theoretical capacity of 1675 mA h g −1 . However, the poor cycle stability hinders the further development of this battery system. In order to improve the stability of Li–S batteries, the diffusion of polysulfides from electrodes into electrolyte should be suppressed. Herein, we utilize a positively charged polyelectrolyte to functionalize the electrode materials with the aim to hamper the polysulfides dissolution via electrostatic interaction between strong positively charged polyelectrolyte and negatively charged polysulfides anion. The effect of the functionalization quantity of poly(diallyl dimethylammonium) chloride (PDDA) and functionalization sequence on cycling performances is investigated in detail. It is found that the sulfur–graphene composite (SG) directly functionalized with 10 times PDDA exhibited best cycling stability. At a discharge current density of 0.2 C, much higher capacity retention was realized on the functionalized electrodes than the unfunctionalized (81% vs. 47.3%) after 120 cycles. The as-observed results demonstrate that the electrostatic interaction can effectively prolong the cycling life of Li–S batteries, which provides a new promising strategy for improving the electrochemical performance of Li–S batteries.

  20. Stability Enhancement of Multi machine AC Systems by Synchronverter HVDC control

    Raouia Aouini

    2016-06-01

    Full Text Available This paper investigates the impact of the Synchronverter based HVDC control on power system stability. The study considers multi machine power systems, with realistic parameters. A specific tuning method of the parameters of the regulators is used. The proposed control scheme is based on the sensitivity of the poles of the HVDC neighbor zone to the control parameters, and next, on their placement using residues. The transient stability of the HVDC neighbor zone is a priori taken into account at the design stage. The new tuning method is evaluated in comparison with the standard vector control via simulation tests. Extensive tests are performed using Matlab/Simulink implementation of the IEEE 9 bus/3 machines test system. The results prove the superiority of the proposed control to the classic vector control. The synchronverter control allows to improve not only the local performances of the HVDC link, but also the overall transient stability of the AC zone in which the HVDC is inserted. (where