Science.gov

Sample records for based password hardened

  1. Secure password-based authenticated key exchange for web services

    SciTech Connect

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  2. Keystroke Dynamics-Based Credential Hardening Systems

    NASA Astrophysics Data System (ADS)

    Bartlow, Nick; Cukic, Bojan

    abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.

  3. Novel optical password security technique based on optical fractal synthesizer

    NASA Astrophysics Data System (ADS)

    Wu, Kenan; Hu, Jiasheng; Wu, Xu

    2009-06-01

    A novel optical security technique for safeguarding user passwords based on an optical fractal synthesizer is proposed. A validating experiment has been carried out. In the proposed technique, a user password is protected by being converted to a fractal image. When a user sets up a new password, the password is transformed into a fractal pattern, and the fractal pattern is stored in authority. If the user is online-validated, his or her password is converted to a fractal pattern again to compare with the previous stored fractal pattern. The converting process is called the fractal encoding procedure, which consists of two steps. First, the password is nonlinearly transformed to get the parameters for the optical fractal synthesizer. Then the optical fractal synthesizer is operated to generate the output fractal image. The experimental result proves the validity of our method. The proposed technique bridges the gap between digital security systems and optical security systems and has many advantages, such as high security level, convenience, flexibility, hyper extensibility, etc. This provides an interesting optical security technique for the protection of digital passwords.

  4. Provably Secure Password-based Authentication in TLS

    SciTech Connect

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  5. Password-based authenticated key exchange scheme using smart card

    NASA Astrophysics Data System (ADS)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  6. Design of a Password-Based EAP Method

    NASA Astrophysics Data System (ADS)

    Manganaro, Andrea; Koblensky, Mingyur; Loreti, Michele

    In recent years, amendments to IEEE standards for wireless networks added support for authentication algorithms based on the Extensible Authentication Protocol (EAP). Available solutions generally use digital certificates or pre-shared keys but the management of the resulting implementations is complex or unlikely to be scalable. In this paper we present EAP-SRP-256, an authentication method proposal that relies on the SRP-6 protocol and provides a strong password-based authentication mechanism. It is intended to meet the IETF security and key management requirements for wireless networks.

  7. A framework for password selection. [Password recommendations

    SciTech Connect

    De Alvare', A.M.; Schultz, E.E. Jr.

    1988-01-01

    A major problem in computer security is intrusion into systems due to compromised authentication procedures. This paper focuses on the most commonly used authentication procedure--use of passwords. We have developed a framework for a methodology to estimate the guessability of passwords. We assume that passwords are usually based on a simple rule. If someone discovers one of a series of rule-based passwords, it is easier to guess other passwords. The framework we propose is that computer security experts can conduct guessability studies on a large number of passwords which are candidates for assignment to users. People who attempt to guess what a password is can be provided with cues, such as what a password for another account in the system is or a nickname. Hit rates (the percentage of passwords correctly guessed within a limited number of attempts) can then be obtained. This method can be used to develop metrics for guessability of classes of passwords. A system manager might utilize results of guessability studies by encouraging users to avoid choosing passwords which are closely associated with account names or which have been shown to be highly vulnerable to guessing, or by not assigning passwords which are from vulnerable classes of passwords. A pilot study confirmed the feasibility of this framework. Participants were given 20 attempts to guess an eight-character password which was either a common English word or two unrelated words joined by a control character (eight characters in all). The common English word was vulnerable to guessing, but only when cues about this word were provided. Participants never guessed the other password, however, even when cues were provided. The results not only demonstrate feasibility of our framework, but also suggest guidelines for selecting passwords which are less likely to result in compromised authentication procedures. 6 refs., 1 fig.

  8. Optical image encryption using password key based on phase retrieval algorithm

    NASA Astrophysics Data System (ADS)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-04-01

    A novel optical image encryption system is proposed using password key based on phase retrieval algorithm (PRA). In the encryption process, a shared image is taken as a symmetric key and the plaintext is encoded into the phase-only mask based on the iterative PRA. The linear relationship between the plaintext and ciphertext is broken using the password key, which can resist the known plaintext attack. The symmetric key and the retrieved phase are imported into the input plane and Fourier plane of 4f system during the decryption, respectively, so as to obtain the plaintext on the CCD. Finally, we analyse the key space of the password key, and the results show that the proposed scheme can resist a brute force attack due to the flexibility of the password key.

  9. Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?

    NASA Astrophysics Data System (ADS)

    Yoneyama, Kazuki

    In this paper, we raise a question about existence of secure password-based authenticated key exchange against leakage of internal states (i.e., the passwords and session-specific private information). Toward this question, first, we classify six models of adversary's capabilities about leakage. Next, as a result of considerations for 2-party PAKE, we find two negative answers, but also find a positive answer. More specifically, we show that there exists no scheme which is secure in strong leakage models, but we also show that there exists a scheme which is secure in weak leakage models. Also, we consider the case of 3-party setting which is a special setting of password-based authenticated key exchange, and we find similar impossibilities as 2-party setting.

  10. Improved chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  11. An efficient three-party password-based key agreement protocol using extended chaotic maps

    NASA Astrophysics Data System (ADS)

    Shu, Jian

    2015-06-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399-411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. Project supported by the National Natural Science Foundation of China (Grant No. 61462033).

  12. Chaotic maps-based password-authenticated key agreement using smart cards

    NASA Astrophysics Data System (ADS)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  13. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  14. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    PubMed

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack. PMID:25486891

  15. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    NASA Astrophysics Data System (ADS)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  16. Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols

    NASA Astrophysics Data System (ADS)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Aoki, Kazumaro; Kunihiro, Noboru

    In this paper, we present practical password recovery attacks against two challenge and response authentication protocols using MD4. For attacks on protocols, the number of queries is one of the most important factors because the opportunity where an attacker can ask queries is very limited in real protocols. When responses are computed as MD4(Password||Challenge), which is called prefix approach, previous work needs to ask 237 queries to recover a password. Asking 237 queries in real protocols is almost impossible. In our attack, to recover up to 8-octet passwords, we only need 1 time the amount of eavesdropping, 17 queries, and 234 MD4 off-line computations. To recover up to 12-octet passwords, we only need 210 times the amount of eavesdropping, 210 queries, and 241 off-line MD4 computations. When responses are computed as MD4(Password||Challenge||Password), which is called hybrid approach, previous work needs to ask 263 queries, while in our attack, up to 8-octet passwords are practically recovered by 28 times the amount of eavesdropping, 28 queries, and 239 off-line MD4 computations. Our idea is guessing a part of passwords so that we can simulate values of intermediate chaining variables from observed hash values. This enables us to use a short local collision that occurs with a very high probability, and thus the number of queries becomes practical.

  17. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    SciTech Connect

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  18. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    PubMed

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties. PMID:26743628

  19. A proactive password checker

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    Password selection has long been a difficult issue; traditionally, passwords are either assigned by the computer or chosen by the user. When the computer does the assignment, the passwords are often hard to remember; when the user makes the selection, the passwords are often easy to guess. This paper describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. The technique is site, user, and group compatible, and allows rapid changing of constraints imposed upon the password. Although experience with this technique is limited, it appears to have much promise.

  20. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. PMID:25666924

  1. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity.

    PubMed

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.'s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.'s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  2. An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity

    PubMed Central

    Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian

    2016-01-01

    User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305

  3. Simple quantum password checking

    NASA Astrophysics Data System (ADS)

    Garcia-Escartin, Juan Carlos; Chamorro-Posada, Pedro

    2015-06-01

    We present a quantum password checking protocol where secrecy is protected by the laws of quantum mechanics. The passwords are encoded in quantum systems that can be compared but have a dimension too small to allow reading the encoded bits. We study the protocol under different replay attacks and show it is robust even for poorly chosen passwords. We also describe a possible implementation with conventional optical elements.

  4. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks. PMID:23553734

  5. A beam hardening correction method based on HL consistency

    NASA Astrophysics Data System (ADS)

    Mou, Xuanqin; Tang, Shaojie; Yu, Hengyong

    2006-08-01

    XCT with polychromatic tube spectrum causes artifact called beam hardening effect. The current correction in CT device is carried by apriori polynomial from water phantom experiment. This paper proposes a new beam hardening correction algorithm that the correction polynomial depends on the relativity of projection data in angles, which obeys Helgasson-Ludwig Consistency (HL Consistency). Firstly, a bi-polynomial is constructed to characterize the beam hardening effect based on the physical model of medical x-ray imaging. In this bi-polynomial, a factor r(γ,β) represents the ratio of the attenuation contributions caused by high density mass (bone, etc.) to low density mass (muscle, vessel, blood, soft tissue, fat, etc.) respectively in the projection angle β and fan angle γ. Secondly, let r(γ,β)=0, the bi-polynomial is degraded as a sole-polynomial. The coefficient of this polynomial can be calculated based on HL Consistency. Then, the primary correction is reached, which is also more efficient in theoretical than the correction method in current CT devices. Thirdly, based on the result of a normal CT reconstruction from the corrected projection data, r(γ,β) can be estimated. Fourthly, the coefficient of bi-polynomial can also be calculated based HL Consistency and the final correction are achieved. Experiments of circular cone beam CT indicate this method an excellent property. Correcting beam hardening effect based on HL Consistency, not only achieving a self-adaptive and more precise correction, but also getting rid of regular inconvenient water phantom experiments, will renovate the correction technique of current CT devices.

  6. Anisotropic hardening model based on non-associated flow rule and combined nonlinear kinematic hardening for sheet materials

    NASA Astrophysics Data System (ADS)

    Taherizadeh, Aboozar; Green, Daniel E.; Yoon, Jeong W.

    2013-12-01

    A material model for more effective analysis of plastic deformation of sheet materials is presented in this paper. The model is capable of considering the following aspects of plastic deformation behavior of sheet materials: the anisotropy in yielding stresses in different directions by using a quadratic yield function (based on Hill's 1948 model and stress ratios), the anisotropy in work hardening by introducing non-constant flow stress hardening in different directions, the anisotropy in plastic strains in different directions by using a quadratic plastic potential function and non-associated flow rule (based on Hill's 1948 model and plastic strain ratios, r-values), and finally some of the cyclic hardening phenomena such as Bauschinger's effect and transient behavior for reverse loading by using a coupled nonlinear kinematic hardening (so-called Armstrong-Frederick-Chaboche model). Basic fundamentals of the plasticity of the model are presented in a general framework. Then, the model adjustment procedure is derived for the plasticity formulations. Also, a generic numerical stress integration procedure is developed based on backward-Euler method (so-called multi-stage return mapping algorithm). Different aspects of the model are verified for DP600 steel sheet. Results show that the new model is able to predict the sheet material behavior in both anisotropic hardening and cyclic hardening regimes more accurately. By featuring the above-mentioned facts in the presented constitutive model, it is expected that more accurate results can be obtained by implementing this model in computational simulations of sheet material forming processes. For instance, more precise results of springback prediction of the parts formed from highly anisotropic hardened materials or that of determining the forming limit diagrams is highly expected by using the developed material model.

  7. Robust and efficient biometrics based password authentication scheme for telecare medicine information systems using extended chaotic maps.

    PubMed

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian

    2015-06-01

    The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments. PMID:25900328

  8. What is the password? Female bark beetles (Scolytinae) grant males access to their galleries based on courtship song.

    PubMed

    Lindeman, Amanda A; Yack, Jayne E

    2015-06-01

    Acoustic signals are commonly used by insects in the context of mating, and signals can vary depending on the stage of interaction between a male and female. While calling songs have been studied extensively, particularly in the Orthoptera, much less is known about courtship songs. One outstanding question is how potential mates are differentiated by their courtship signal characteristics. We examined acoustic courtship signals in a new system, bark beetles (Scolytinae). In the red turpentine beetle (Dendroctonus valens) males produce chirp trains upon approaching the entrance of a female's gallery. We tested the hypotheses that acoustic signals are honest indicators of male condition and that females choose males based on signal characteristics. Males generated two distinct chirp types (simple and interrupted), and variability in their prevalence correlated with an indicator of male quality, body size, with larger males producing significantly more interrupted chirps. Females showed a significant preference for males who produced interrupted chirps, suggesting that females distinguish between males on the basis of their chirp performances. We suggest that interrupted chirps during courtship advertise a male's size and/or motor skills, and function as the proverbial 'passwords' that allow him entry to a female's gallery. PMID:25783802

  9. Graphical Passwords as Browser Extension: Implementation and Usability Study

    NASA Astrophysics Data System (ADS)

    Bicakci, Kemal; Yuceel, Mustafa; Erdeniz, Burak; Gurbaslar, Hakan; Atalay, Nart Bedin

    Today, most Internet applications still establish user authentication with traditional text based passwords. Designing a secure as well as a user-friendly password-based method has been on the agenda of security researchers for a long time. On one hand, there are password manager programs which facilitate generating site-specific strong passwords from a single user password to eliminate the memory burden due to multiple passwords. On the other hand, there are studies exploring the viability of graphical passwords as a more secure and user-friendly alternative. In this paper, we present GPEX, a password manager program implemented as a web browser plug-in to enable using graphical passwords to secure Internet applications without any need to change their authentication interface. Experimental results show that GPEX has security and usability advantages over other password manager plug-ins. specifically; we find that with the visual interface of GPEX, users have a more complete and accurate mental model of the system and incorrect login attempts causing security exposures can easily be avoided.

  10. Client-Server Password Recovery

    NASA Astrophysics Data System (ADS)

    Chmielewski, Łukasz; Hoepman, Jaap-Henk; van Rossum, Peter

    Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the password. These protocols can be easily adapted to the personal entropy setting [7], where a user can recover a password only if he can answer a large enough subset of personal questions.

  11. Gamma prime hardened nickel-iron based superalloy

    DOEpatents

    Korenko, Michael K.

    1978-01-01

    A low swelling, gamma prime hardened nickel-iron base superalloy useful for fast reactor duct and cladding applications is described having from about 7.0 to about 10.5 weight percent (wt%) chromium, from about 24 to about 35 wt% nickel, from about 1.7 to about 2.5 wt% titanium, from about 0.3 to about 1.0 wt% aluminum, from about 2.0 to about 3.3 wt% molybdenum, from about 0.05 to about 1.0 wt% silicon, from about 0.03 to about 0.06 wt% carbon, a maximum of about 2 wt% manganese, and the balance iron.

  12. Enhanced visual secret sharing for graphical password authentication

    NASA Astrophysics Data System (ADS)

    Rajendra, A. B.; Sheshadri, H. S.

    2013-03-01

    Password is a very common and widely used authentication method to provide security to valuable data. It is desirable to make password more memorable and easier for people to use. Traditionally passwords are alphanumeric, numbers & symbols. Some problems of normal password appear like stolen the password, forgetting the password, week password. Study shows that text-based passwords suffer with both security and authentication problems. To overcome these problems, Graphical passwords have been developed. Visual secret sharing (VSS) scheme is a secret sharing scheme in which an image is converted into shares. No information can be revealed by observing any share (Dotted image). The information about the original image will be revealed only after stacking sufficient number of shares (Dotted images). In this paper, we have used XNOR operation instead of OR operation and contrast of the decrypted image is clearer than existing Enhanced Visual Secret Sharing (EVSS) scheme. Also, we are presenting new approach to authenticate graphical password image using 2-out-of-2 EVSS scheme. Which can be used to protect machines with additional security.

  13. TwoStep: An Authentication Method Combining Text and Graphical Passwords

    NASA Astrophysics Data System (ADS)

    van Oorschot, P. C.; Wan, Tao

    Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based graphical password schemes alone, in order to offer sufficient security, require a number of rounds of verification, introducing usability issues. We suggest a hybrid user authentication approach combining text passwords, recognition-based graphical passwords, and a two-step process, to provide increased security with fewer rounds than such graphical passwords alone. A variation of this two-step authentication method, which we have implemented and deployed, is in use in the real world.

  14. Non Radiation Hardened Microprocessors in Spaced Based Remote Sensing Systems

    NASA Technical Reports Server (NTRS)

    Decoursey, Robert J.; Estes, Robert F.; Melton, Ryan

    2006-01-01

    The CALIPSO (Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observations) mission is a comprehensive suite of active and passive sensors including a 20Hz 230mj Nd:YAG lidar, a visible wavelength Earth-looking camera and an imaging infrared radiometer. CALIPSO flies in formation with the Earth Observing System Post-Meridian (EOS PM) train, provides continuous, near-simultaneous measurements and is a planned 3 year mission. CALIPSO was launched into a 98 degree sun synchronous Earth orbit in April of 2006 to study clouds and aerosols and acquires over 5 gigabytes of data every 24 hours. The ground track of one CALIPSO orbit as well as high and low intensity South Atlantic Anomaly outlines is shown. CALIPSO passes through the SAA several times each day. Spaced based remote sensing systems that include multiple instruments and/or instruments such as lidar generate large volumes of data and require robust real-time hardware and software mechanisms and high throughput processors. Due to onboard storage restrictions and telemetry downlink limitations these systems must pre-process and reduce the data before sending it to the ground. This onboard processing and realtime requirement load may mean that newer more powerful processors are needed even though acceptable radiation-hardened versions have not yet been released. CALIPSO's single board computer payload controller processor is actually a set of four (4) voting non-radiation hardened COTS Power PC 603r's built on a single width VME card by General Dynamics Advanced Information Systems (GDAIS). Significant radiation concerns for CALIPSO and other Low Earth Orbit (LEO) satellites include the South Atlantic Anomaly (SAA), the north and south poles and strong solar events. Over much of South America and extending into the South Atlantic Ocean the Van Allen radiation belts dip to just 200-800km and spacecraft entering this area are subjected to high energy protons and experience higher than normal Single Event Upset

  15. 'Age-hardened alloy' based on bulk polycrystalline oxide ceramic

    NASA Astrophysics Data System (ADS)

    Gurnani, Luv; Singh, Mahesh Kumar; Bhargava, Parag; Mukhopadhyay, Amartya

    2015-05-01

    We report here for the first time the development of 'age-hardened/toughened' ceramic alloy based on MgO in the bulk polycrystalline form. This route allows for the facile development of a 'near-ideal' microstructure characterized by the presence of nanosized and uniformly dispersed second-phase particles (MgFe2O4) within the matrix grains, as well as along the matrix grain boundaries, in a controlled manner. Furthermore, the intragranular second-phase particles are rendered coherent with the matrix (MgO). Development of such microstructural features for two-phase bulk polycrystalline ceramics is extremely challenging following the powder metallurgical route usually adopted for the development of bulk ceramic nanocomposites. Furthermore, unlike for the case of ceramic nanocomposites, the route adopted here does not necessitate the usage of nano-powder, pressure/electric field-assisted sintering techniques and inert/reducing atmosphere. The as-developed bulk polycrystalline MgO-MgFe2O4 alloys possess considerably improved hardness (by ~52%) and indentation toughness (by ~35%), as compared to phase pure MgO.

  16. Implications of What Children Know about Computer Passwords

    ERIC Educational Resources Information Center

    Coggins, Porter E.

    2013-01-01

    The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…

  17. Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information

    PubMed Central

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  18. Preventing shoulder-surfing attack with the concept of concealing the password objects' information.

    PubMed

    Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin; Chong, Yu Nam; Por, Lip Yee

    2014-01-01

    Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to "shoulder-surfing" attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649

  19. An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system.

    PubMed

    Das, Ashok Kumar; Bruhadeshwar, Bezawada

    2013-10-01

    Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks. PMID:24061705

  20. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 1 2013-04-01 2013-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  1. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 1 2014-04-01 2014-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  2. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  3. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  4. 21 CFR 11.300 - Controls for identification codes/passwords.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11... identification codes/passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls...

  5. nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords

    NASA Astrophysics Data System (ADS)

    Wan, Zhiguo; Deng, Robert H.; Bao, Feng; Preneel, Bart

    Although two-party password-authenticated key exchange (PAKE) protocols have been intensively studied in recent years, group PAKE protocols have received little attention. In this paper, we propose a hierarchical group PAKE protocol nPAKE + protocol under the setting where each party shares an independent password with a trusted server. The nPAKE + protocol is a novel combination of the hierarchical key tree structure and the password-based Diffie-Hellman exchange, and hence it achieves substantial gain in computation efficiency. In particular, the computation cost for each client in our protocol is only O(logn). Additionally, the hierarchical feature of nPAKE + enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

  6. The Effect of Password Management Procedures on the Entropy of User Selected Passwords

    ERIC Educational Resources Information Center

    Enamait, John D.

    2012-01-01

    Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…

  7. Beam hardening effects in grating-based x-ray phase-contrast imaging

    SciTech Connect

    Chabior, Michael; Donath, Tilman; David, Christian; Bunk, Oliver; Schuster, Manfred; Schroer, Christian; Pfeiffer, Franz

    2011-03-15

    Purpose: In this work, the authors investigate how beam hardening affects the image formation in x-ray phase-contrast imaging and consecutively develop a correction algorithm based on the results of the analysis. Methods: The authors' approach utilizes a recently developed x-ray imaging technique using a grating interferometer capable of visualizing the differential phase shift of a wave front traversing an object. An analytical description of beam hardening is given, highlighting differences between attenuation and phase-contrast imaging. The authors present exemplary beam hardening artifacts for a number of well-defined samples in measurements at a compact laboratory setup using a polychromatic source. Results: Despite the differences in image formation, the authors show that beam hardening leads to a similar reduction of image quality in phase-contrast imaging as in conventional attenuation-contrast imaging. Additionally, the authors demonstrate that for homogeneous objects, beam hardening artifacts can be corrected by a linearization technique, applicable to all kinds of phase-contrast methods using polychromatic sources. Conclusions: The evaluated correction algorithm is shown to yield good results for a number of simple test objects and can thus be advocated in medical imaging and nondestructive testing.

  8. Evaluation of radiation hardening in ion-irradiated Fe based alloys by nanoindentation

    NASA Astrophysics Data System (ADS)

    Liu, Xiangbing; Wang, Rongshan; Ren, Ai; Jiang, Jing; Xu, Chaoliang; Huang, Ping; Qian, Wangjie; Wu, Yichu; Zhang, Chonghong

    2014-01-01

    Nanoindentation in combination with ion irradiation offers the possibility to quantify irradiation hardening due to radiation damage. Irradiation experiments for Fe-1.0wt.%Cu alloys, China A508-3 steels, and 16MND5 steels were carried out at about 100 °C by proton and Fe-ions with the energy of 240 keV, 3 MeV respectively. The constant stiffness measurement (CSM) with a diamond Berkovich indenter was used to obtain the depth profile of hardness. The results showed that under 240 keV proton irradiation (peak damage up to 0.5 dpa), Fe-1.0wt.%Cu alloys exhibited the largest hardening (∼55%), 16MND5 steels resided in medium hardening (∼46%), and China A508-3(2) steels had the least hardening (∼10%). Under 3 MeV Fe ions irradiation (peak damage up to 1.37 dpa), both China A508-3(1) and 16MND5 steels showed the same hardening (∼26%). The sequence of irradiation tolerance for these materials is China A508-3(2) > 16MND5 ≈ China A508-3(1) > Fe-1.0wt.%Cu. Based on the determination of the transition depth, the nominal hardness H0irr was also calculated by Kasada method.

  9. Simulation and research on a 4T-cell based duplication redundancy SRAM for SEU radiation hardening

    NASA Astrophysics Data System (ADS)

    Xinhong, Hong; Liyang, Pan; Wendi, Zhang; Dongmei, Ji; Dong, Wu; Chen, Shen; Jun, Xu

    2015-11-01

    A novel 4T-cell based duplication redundancy SRAM is proposed for SEU radiation hardening applications. The memory cell is designed with a 65-nm low leakage process; the operation principle and the SEU radiation hardening mechanism are discussed in detail. The SEE characteristics and failure mechanism are also studied with a 3-D device simulator. The results show that the proposed SRAM structure exhibits high SEU hardening performance with a small cell size.

  10. Joining precipitation-hardened nickel-base alloys by friction welding

    NASA Technical Reports Server (NTRS)

    Moore, T. J.

    1972-01-01

    Solid state deformation welding process, friction welding, has been developed for joining precipitation hardened nickel-base alloys and other gamma prime-strengthened materials which heretofore have been virtually unweldable. Method requires rotation of one of the parts to be welded, but where applicable, it is an ideal process for high volume production jobs.

  11. Password Cracking Using Sony Playstations

    NASA Astrophysics Data System (ADS)

    Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet

    Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.

  12. Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths

    NASA Astrophysics Data System (ADS)

    Jiao, Z. B.; Luan, J. H.; Miller, M. K.; Yu, C. Y.; Liu, C. T.

    2016-02-01

    The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for two interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. The co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications.

  13. Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths

    DOE PAGESBeta

    Jiao, Z. B.; Luan, J. H.; Miller, M. K.; Yu, C. Y.; Liu, C. T.

    2016-02-19

    The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for twomore » interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. Lastly, the co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications.« less

  14. Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths

    PubMed Central

    Jiao, Z. B.; Luan, J. H.; Miller, M. K.; Yu, C. Y.; Liu, C. T.

    2016-01-01

    The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for two interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. The co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications. PMID:26892834

  15. Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths.

    PubMed

    Jiao, Z B; Luan, J H; Miller, M K; Yu, C Y; Liu, C T

    2016-01-01

    The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for two interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. The co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications. PMID:26892834

  16. Laser Hardening Prediction Tool Based On a Solid State Transformations Numerical Model

    SciTech Connect

    Martinez, S.; Ukar, E.; Lamikiz, A.

    2011-01-17

    This paper presents a tool to predict hardening layer in selective laser hardening processes where laser beam heats the part locally while the bulk acts as a heat sink.The tool to predict accurately the temperature field in the workpiece is a numerical model that combines a three dimensional transient numerical solution for heating where is possible to introduce different laser sources. The thermal field was modeled using a kinetic model based on Johnson-Mehl-Avrami equation. Considering this equation, an experimental adjustment of transformation parameters was carried out to get the heating transformation diagrams (CHT). With the temperature field and CHT diagrams the model predicts the percentage of base material converted into austenite. These two parameters are used as first step to estimate the depth of hardened layer in the part.The model has been adjusted and validated with experimental data for DIN 1.2379, cold work tool steel typically used in mold and die making industry. This steel presents solid state diffusive transformations at relative low temperature. These transformations must be considered in order to get good accuracy of temperature field prediction during heating phase. For model validation, surface temperature measured by pyrometry, thermal field as well as the hardened layer obtained from metallographic study, were compared with the model data showing a good adjustment.

  17. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    PubMed Central

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  18. A study on user authentication methodology using numeric password and fingerprint biometric information.

    PubMed

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  19. Final report on LDRD project 52722 : radiation hardened optoelectronic components for space-based applications.

    SciTech Connect

    Hargett, Terry W.; Serkland, Darwin Keith; Blansett, Ethan L.; Geib, Kent Martin; Sullivan, Charles Thomas; Hawkins, Samuel D.; Wrobel, Theodore Frank; Keeler, Gordon Arthur; Klem, John Frederick; Medrano, Melissa R.; Peake, Gregory Merwin; Karpen, Gary D.; Montano, Victoria A.

    2003-12-01

    This report describes the research accomplishments achieved under the LDRD Project 'Radiation Hardened Optoelectronic Components for Space-Based Applications.' The aim of this LDRD has been to investigate the radiation hardness of vertical-cavity surface-emitting lasers (VCSELs) and photodiodes by looking at both the effects of total dose and of single-event upsets on the electrical and optical characteristics of VCSELs and photodiodes. These investigations were intended to provide guidance for the eventual integration of radiation hardened VCSELs and photodiodes with rad-hard driver and receiver electronics from an external vendor for space applications. During this one-year project, we have fabricated GaAs-based VCSELs and photodiodes, investigated ionization-induced transient effects due to high-energy protons, and measured the degradation of performance from both high-energy protons and neutrons.

  20. The console password feature for DEC workstations

    SciTech Connect

    Van Lehn, A.L.

    1993-10-01

    New VAXstations and all DECstations offer a ``hardware`` password feature that, when enabled, restricts unauthorized access to your system console terminal when turned on or restarted. VAXstation 3100s shipped after July, 1989 offer this feature. A description of this feature should be part of the Hardware User Guide for your workstation; however, some of the early systems did not document this security enhancement. This document is based on the author`s investigation as well as information provided by the Digital Equipment Corporation.

  1. A Generalized Anisotropic Hardening Rule Based on the Mroz Multi-Yield-Surface Model for Pressure Insensitive and Sensitive Materials

    SciTech Connect

    Choi, Kyoo Sil; Pan, Jwo

    2009-07-27

    In this paper, a generalized anisotropic hardening rule based on the Mroz multi-yield-surface model is derived. The evolution equation for the active yield surface is obtained by considering the continuous expansion of the active yield surface during the unloading/reloading process. The incremental constitutive relation based on the associated flow rule is then derived for a general yield function. As a special case, detailed incremental constitutive relations are derived for the Mises yield function. The closed-form solutions for one-dimensional stress-plastic strain curves are also derived and plotted for the Mises materials under cyclic loading conditions. The stress-plastic strain curves show closed hysteresis loops under uniaxial cyclic loading conditions and the Masing hypothesis is applicable. A user material subroutine based on the Mises yield function, the anisotropic hardening rule and the constitutive relations was then written and implemented into ABAQUS. Computations were conducted for a simple plane strain finite element model under uniaxial monotonic and cyclic loading conditions based on the anisotropic hardening rule and the isotropic and nonlinear kinematic hardening rules of ABAQUS. The results indicate that the plastic response of the material follows the intended input stress-strain data for the anisotropic hardening rule whereas the plastic response depends upon the input strain ranges of the stress-strain data for the nonlinear kinematic hardening rule.

  2. A new approach for beam hardening correction based on the local spectrum distributions

    NASA Astrophysics Data System (ADS)

    Rasoulpour, Naser; Kamali-Asl, Alireza; Hemmati, Hamidreza

    2015-09-01

    Energy dependence of material absorption and polychromatic nature of x-ray beams in the Computed Tomography (CT) causes a phenomenon which called "beam hardening". The purpose of this study is to provide a novel approach for Beam Hardening (BH) correction. This approach is based on the linear attenuation coefficients of Local Spectrum Distributions (LSDs) in the various depths of a phantom. The proposed method includes two steps. Firstly, the hardened spectra in various depths of the phantom (or LSDs) are estimated based on the Expectation Maximization (EM) algorithm for arbitrary thickness interval of known materials in the phantom. The performance of LSD estimation technique is evaluated by applying random Gaussian noise to transmission data. Then, the linear attenuation coefficients with regarding to the mean energy of LSDs are obtained. Secondly, a correction function based on the calculated attenuation coefficients is derived in order to correct polychromatic raw data. Since a correction function has been used for the conversion of the polychromatic data to the monochromatic data, the effect of BH in proposed reconstruction must be reduced in comparison with polychromatic reconstruction. The proposed approach has been assessed in the phantoms which involve less than two materials, but the correction function has been extended for using in the constructed phantoms with more than two materials. The relative mean energy difference in the LSDs estimations based on the noise-free transmission data was less than 1.5%. Also, it shows an acceptable value when a random Gaussian noise is applied to the transmission data. The amount of cupping artifact in the proposed reconstruction method has been effectively reduced and proposed reconstruction profile is uniform more than polychromatic reconstruction profile.

  3. PASSWORD: Organizing Exits from the Resource Room.

    ERIC Educational Resources Information Center

    Johnson, Linda K.

    1990-01-01

    The article offers a classroom management technique, PASSWORD, that facilitates the smooth transition of handicapped students from the resource room to the regular class. Students are each asked a "code question," usually a review question, the answer to which is the password for leaving the resource room. (DB)

  4. Obtaining metal-based composites with hardening by titanium diboride nanoparticles

    NASA Astrophysics Data System (ADS)

    Bondar', M. P.; Karpov, E. V.

    2014-01-01

    The mechanism of obtaining high-strength mesocomposite materials with a cellular microstructure is studied. It is shown that the formation of the mesocomposite microstructure is determined by the method of pressing characterized by high strains and strain rates, and also by the mesocomposite composition; the high-plasticity matrix and nondeformable particles of the hardening phase, which are not bonded to the mesocomposite matrix, assist in the process of self-organization, i.e., formation of a cellular microstructure. The set of mesocomposite properties is studied to understand the general laws of mesocomposite formation and optimize the composition. A composite with an optimal composition is obtained, which retains high electrical conductivity of copper and sufficiently high plasticity necessary for its effective application; its strength is greater than the base strength by an order of magnitude; moreover, its strength and wear resistance are much higher than those of dispersion-hardened alloys obtained by the method of internal oxidation. The results obtained can be used for creating new composite materials.

  5. Acoustic emission for characterising the crack propagation in strain-hardening cement-based composites (SHCC)

    SciTech Connect

    Paul, S.C.; Pirskawetz, S.; Zijl, G.P.A.G. van; Schmidt, W.

    2015-03-15

    This paper presents the analysis of crack propagation in strain-hardening cement-based composite (SHCC) under tensile and flexural load by using acoustic emission (AE). AE is a non-destructive technique to monitor the development of structural damage due to external forces. The main objective of this research was to characterise the cracking behaviour in SHCC in direct tensile and flexural tests by using AE. A better understanding of the development of microcracks in SHCC will lead to a better understanding of pseudo strain-hardening behaviour of SHCC and its general performance. ARAMIS optical deformation analysis was also used in direct tensile tests to observe crack propagation in SHCC materials. For the direct tensile tests, SHCC specimens were prepared with polyvinyl alcohol (PVA) fibre with three different volume percentages (1%, 1.85% and 2.5%). For the flexural test beam specimens, only a fibre dosage of 1.85% was applied. It was found that the application of AE in SHCC can be a good option to analyse the crack growth in the specimens under increasing load, the location of the cracks and most importantly the identification of matrix cracking and fibre rupture or slippage.

  6. Low beryllium content Zr-based bulk metallic glass composite with plasticity and work hardenability

    SciTech Connect

    Zheng, Q. E-mail: dujuan@nimte.ac.cn; Du, J. E-mail: dujuan@nimte.ac.cn

    2014-01-28

    A modified Zr-based bulk metallic glass matrix composite Zr{sub 47.67}Cu{sub 40}Ti{sub 3.66}Ni{sub 2.66}Be{sub 6} has been produced by increasing the contents of elements of Zr and Cu with higher Poisson ratio and reducing the contents of Ti, Ni, and Be elements with lower Poisson ratio based on famous metallic glass former Vitreloy 1. A compressive yielding strength of 1804 MPa, fracture strength of 1938 MPa and 3.5% plastic strain was obtained for obtained metallic glass composite. Also, work-hardening behavior was observed during compressive experiment which was ascribed to the interaction of the in situ precipitated CuZr phase and shear bands.

  7. Novel masked mercaptans based on thiolacetic acid/diallyl bisphenol a adducts as hardeners for epoxy adhesive systems

    SciTech Connect

    Lehmann, H.; Zahir, S.A.

    1995-12-01

    Epoxy resin formulations based on these masked mercaptans show adhesive properties equivalent to epoxy resin formulations cured with classical hardeners such as dicyandiamide. In addition the use of the masked mercaptans as an epoxy resin hardener leads to adhesive joints which show outstanding resistance to moisture. Thus Al/Al joints cured with a clinical epoxy formulation based on dicyandiamide as hardener (AV 8) failed in 30 days after exposure to water at (90{degrees}C) for 90 days. We believe that chemi-adsorption at the interface between metal/adhesive/metal plays an important role in giving this outstanding hot water resistance. This paper discusses the synthesis, the mechanism of cure with epoxide resins and the adhesive properties of these novel masked mercaptans.

  8. Password-free network security through joint use of audio and video

    NASA Astrophysics Data System (ADS)

    Civanlar, Mehmet R.; Chen, Tsuhan

    1997-01-01

    REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.

  9. A voice password system for access security

    SciTech Connect

    Birnbaum, M.; Cohen, L.A.; Welsh, F.X.

    1986-09-01

    A voice password system for access security using speaker verification technology has been designed for use over dial-up telephone lines. The voice password system (VPS) can provide secure access to telephone networks, computers, rooms, and buildings. It also has application in office automation systems, electric funds transfer, and ''smart cards'' (interactive computers embedded in credit-card-sized packages). As increasing attention is focused on access security in the public, private, and government sectors, the voice password system can provide a timely solution to the security dilemma. The VPS uses modes of communication available to almost everyone (the human voice and the telephone). A user calls the VPS, enters his or her identification number (ID) by touch-tone telephone, and then speaks a password. This is usually a phrase or a sentence of about seven syllables. On initial calls, the VPS creates a model of the user's voice, called a reference template, and labels it with the caller's unique user ID. To gain access later, the user calls the system, enters the proper user ID, and speaks the password phrase. The VPS compares the user's stored reference template with the spoken password and produces a distance score.

  10. An efficient biometric and password-based remote user authentication using smart card for Telecare Medical Information Systems in multi-server environment.

    PubMed

    Maitra, Tanmoy; Giri, Debasis

    2014-12-01

    The medical organizations have introduced Telecare Medical Information System (TMIS) to provide a reliable facility by which a patient who is unable to go to a doctor in critical or urgent period, can communicate to a doctor through a medical server via internet from home. An authentication mechanism is needed in TMIS to hide the secret information of both parties, namely a server and a patient. Recent research includes patient's biometric information as well as password to design a remote user authentication scheme that enhances the security level. In a single server environment, one server is responsible for providing services to all the authorized remote patients. However, the problem arises if a patient wishes to access several branch servers, he/she needs to register to the branch servers individually. In 2014, Chuang and Chen proposed an remote user authentication scheme for multi-server environment. In this paper, we have shown that in their scheme, an non-register adversary can successfully logged-in into the system as a valid patient. To resist the weaknesses, we have proposed an authentication scheme for TMIS in multi-server environment where the patients can register to a root telecare server called registration center (RC) in one time to get services from all the telecare branch servers through their registered smart card. Security analysis and comparison shows that our proposed scheme provides better security with low computational and communication cost. PMID:25371272

  11. Non-radiation hardened microprocessors in space-based remote sensing systems

    NASA Astrophysics Data System (ADS)

    DeCoursey, R.; Melton, Ryan; Estes, Robert R., Jr.

    2006-09-01

    The CALIPSO (Cloud-Aerosol Lidar and Infrared Pathfinder Satellite Observations) mission is a comprehensive suite of active and passive sensors including a 20Hz 230mj Nd:YAG lidar, a visible wavelength Earth-looking camera and an imaging infrared radiometer. CALIPSO flies in formation with the Earth Observing System Post-Meridian (EOS PM) train, provides continuous, near-simultaneous measurements and is a planned 3 year mission. CALIPSO was launched into a 98 degree sun synchronous Earth orbit in April of 2006 to study clouds and aerosols and acquires over 5 gigabytes of data every 24 hours. Figure 1 shows the ground track of one CALIPSO orbit as well as high and low intensity South Atlantic Anomaly outlines. CALIPSO passes through the SAA several times each day. Spaced based remote sensing systems that include multiple instruments and/or instruments such as lidar generate large volumes of data and require robust real-time hardware and software mechanisms and high throughput processors. Due to onboard storage restrictions and telemetry downlink limitations these systems must pre-process and reduce the data before sending it to the ground. This onboard processing and realtime requirement load may mean that newer more powerful processors are needed even though acceptable radiation-hardened versions have not yet been released. CALIPSO's single board computer payload controller processor is actually a set of four (4) voting non-radiation hardened COTS Power PC 603r's built on a single width VME card by General Dynamics Advanced Information Systems (GDAIS). Significant radiation concerns for CALIPSO and other Low Earth Orbit (LEO) satellites include the South Atlantic Anomaly (SAA), the north and south poles and strong solar events. Over much of South America and extending into the South Atlantic Ocean (see figure 1) the Van Allen radiation belts dip to just 200-800km and spacecraft entering this area are subjected to high energy protons and experience higher than

  12. A Modeling Investigation of Thermal and Strain Induced Recovery and Nonlinear Hardening in Potential Based Viscoplasticity

    NASA Technical Reports Server (NTRS)

    Arnold, S. M.; Saleeb, A. F.; Wilt, T. E.

    1993-01-01

    Specific forms for both the Gibb's and the complementary dissipation potentials were chosen such that a complete potential based multiaxial, isothermal, viscoplastic model was obtained. This model in general possesses three internal state variables (two scalars associated with dislocation density and one tensor associated with dislocation motion) both thermal and dynamic recovery mechanisms, and nonlinear kinematic hardening. This general model, although possessing associated flow and evolutionary laws, is shown to emulate three distinct classes of theories found in the literature, by modification of the driving threshold function F. A parametric study was performed on a specialized nondimensional multiaxial form containing only a single tensorial internal state variable (i.e., internal stress). The study was conducted with the idea of examining the impact of including a strain-induced recovery mechanism and the compliance operator, derived from the Gibb's potential, on the uniaxial and multiaxial response. One important finding was that inclusion of strain recovery provided the needed flexibility in modeling stress-strain and creep response of metals at low homologous temperatures, without adversely affecting the high temperature response. Furthermore, for nonproportional loading paths, the inclusion of the compliance operator had a significant influence on the multiaxial response, but had no influence on either uniaxial or proportional load histories.

  13. Quantification of age hardening in maraging steels and an Ni-base superalloy

    SciTech Connect

    Sha, W.

    2000-02-01

    Age hardening process in metallic alloys due to precipitation can be quantified using phase transformation theories. Two ageing stages are of particular interest, for both theory and practice. The early stage of precipitation hardening is under the description of the Johnson-Mehl-Avrami equation. Wilson has recently provided a detailed theoretical analysis for early stages of ageing. Wilson successfully used equations in the quantification of early and over-ageing stages of hardening in an Fe-12Ni-6Mn maraging-type alloy. In the present work, these were applied to further alloys. All the hardness data were taken from published literature. Original references should be consulted for details of materials, testing and characterization.

  14. Goal Structured Notation in a Radiation Hardening Safety Case for COTS-Based Spacecraft

    NASA Technical Reports Server (NTRS)

    Witulski, Arthur; Austin, Rebekah; Reed, Robert; Karsai, Gabor; Mahadevan, Nag; Sierawski, Brian; Evans, John; LaBel, Ken

    2016-01-01

    A systematic approach is presented to constructing a radiation assurance case using Goal Structured Notation (GSN) for spacecraft containing COTS parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat November 2016. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.

  15. Metal Artifact Reduction for Polychromatic X-ray CT Based on a Beam-Hardening Corrector.

    PubMed

    Park, Hyoung Suk; Hwang, Dosik; Seo, Jin Keun

    2016-02-01

    This paper proposes a new method to correct beam hardening artifacts caused by the presence of metal in polychromatic X-ray computed tomography (CT) without degrading the intact anatomical images. Metal artifacts due to beam-hardening, which are a consequence of X-ray beam polychromaticity, are becoming an increasingly important issue affecting CT scanning as medical implants become more common in a generally aging population. The associated higher-order beam-hardening factors can be corrected via analysis of the mismatch between measured sinogram data and the ideal forward projectors in CT reconstruction by considering the known geometry of high-attenuation objects. Without prior knowledge of the spectrum parameters or energy-dependent attenuation coefficients, the proposed correction allows the background CT image (i.e., the image before its corruption by metal artifacts) to be extracted from the uncorrected CT image. Computer simulations and phantom experiments demonstrate the effectiveness of the proposed method to alleviate beam hardening artifacts. PMID:26390451

  16. Cyclic uniaxial and biaxial hardening of type 304 stainless steel modeled by the viscoplasticity theory based on overstress

    NASA Technical Reports Server (NTRS)

    Yao, David; Krempl, Erhard

    1988-01-01

    The isotropic theory of viscoplasticity based on overstress does not use a yield surface or a loading and unloading criterion. The inelastic strain rate depends on overstress, the difference between the stress and the equilibrium stress, and is assumed to be rate dependent. Special attention is paid to the modeling of elastic regions. For the modeling of cyclic hardening, such as observed in annealed Type 304 stainless steel, and additional growth law for a scalar quantity which represents the rate independent asymptotic value of the equilibrium stress is added. It is made to increase with inelastic deformation using a new scalar measure which differentiates between nonproportional and proportional loading. The theory is applied to correlate uniaxial data under two step amplitude loading including the effect of further hardening at the high amplitude and proportional and nonproportional cyclic loadings. Results are compared with corresponding experiments.

  17. Hardness-based plasticity and fracture model for quench-hardenable boron steel (22MnB5)

    SciTech Connect

    Greve, L. Medricky, M. Andres, M.; Eller, T. K.

    2013-12-16

    A comprehensive strain hardening and fracture characterization of different grades of boron steel blanks has been performed, providing the foundation for the implementation into the modular material model (MMM) framework developed by Volkswagen Group Research for an explicit crash code. Due to the introduction of hardness-based interpolation rules for the characterized main grades, the hardening and fracture behavior is solely described by the underlying Vickers hardness. In other words, knowledge of the hardness distribution within a hot-formed component is enough to set up the newly developed computational model. The hardness distribution can be easily introduced via an experimentally measured hardness curve or via hardness mapping from a corresponding hot-forming simulation. For industrial application using rather coarse and computationally inexpensive shell element meshes, the user material model has been extended by a necking/post-necking model with reduced mesh-dependency as an additional failure mode. The present paper mainly addresses the necking/post-necking model.

  18. An Automatic Spring-back Compensation Die Design Method Based on Genetic Algorithm and Isotropic-Kinematic Hardening Laws

    NASA Astrophysics Data System (ADS)

    Li, Xiao-Xing; Hu, Jing; Chung, Kwansoo; Zhou, Guo-Feng; Yao, Rao

    2011-08-01

    We present the study of a finite element method for die contour to compensate spring-back in sheet metal forming process, which is based on the genetic algorithm and isotropic-kinematic hardening laws. The Chaboche type combined isotropic-kinematic hardening law was formulated and used to account for the Bauschinger and transient behavior in the finite element analysis. Using a S shape stretch bending process as an example, it was demonstrated that the new method optimizes the die profile effectively. The good performance of the die profile optimized utilizing the new method was also experimentally verified , confirming that the new method might be more effective in cost reduction than common design practices in practical applications.

  19. Bio-based epoxy/chitin nanofiber composites cured with amine-type hardeners containing chitosan.

    PubMed

    Shibata, Mitsuhiro; Enjoji, Motohiro; Sakazume, Katsumi; Ifuku, Shinsuke

    2016-06-25

    Sorbitol polyglycidyl ether (SPE) which is a bio-based water-soluble epoxy resin was cured with chitosan (CS) and/or a commercial water-soluble polyamidoamine- or polyetheramine-type epoxy hardener (PAA or PEA). Furthermore, biocomposites of the CS-cured SPE (CS-SPE) and CS/PAA- or CS/PEA-cured SPE (SPE-CA or SPE-CE) biocomposites with chitin nanofiber (CNF) were prepared by casting and compression molding methods, respectively. The curing reaction of epoxy and amino groups of the reactants was confirmed by the FT-IR spectral analysis. SPE-CS and SPE-CA were almost transparent films, while SPE-CE was opaque. Transparency of SPE-CS/CNF and SPE-CA/CNF became a little worse with increasing CNF content. The tanδ peak temperature of SPE-CS was higher than those of SPE-PAA and SPE-PEA. SPE-CA or SPE-CE exhibited two tanδ peak temperatures related to glass transitions of the CS-rich and PAA-rich or PEA-rich moieties. The tanδ peak temperatures related to the CS-rich and PAA-rich moieties increased with increasing CNF content. A higher order of tensile strengths and moduli of the cured resins was SPE-CS≫SPE-CA>SPE-CE. The tensile strength and modulus of each sample were much improved by the addition of 3wt% CNF, while further addition of CNF caused a lowering of the strength and modulus. PMID:27083797

  20. Simpler and Safer: One Password Opens Many Online Doors

    ERIC Educational Resources Information Center

    Carnevale, Dan

    2007-01-01

    Going online nowadays often requires more log-ins and passwords than most people can remember. Faculty and staff members will sometimes write their various passwords on yellow sticky notes and post them on their computer monitors--leaving confidential data wide open to any passer-by. What if there were just one password? A single log-on for e-mail…

  1. Effect of silica fume on the fresh and hardened properties of fly ash-based self-compacting geopolymer concrete

    NASA Astrophysics Data System (ADS)

    Memon, Fareed Ahmed; Nuruddin, Muhd Fadhil; Shafiq, Nasir

    2013-02-01

    The effect of silica fume on the fresh and hardened properties of fly ash-based self-compacting geopolymer concrete (SCGC) was investigated in this paper. The work focused on the concrete mixes with a fixed water-to-geopolymer solid (W/Gs) ratio of 0.33 by mass and a constant total binder content of 400 kg/m3. The mass fractions of silica fume that replaced fly ash in this research were 0wt%, 5wt%, 10wt%, and 15wt%. The workability-related fresh properties of SCGC were assessed through slump flow, V-funnel, and L-box test methods. Hardened concrete tests were limited to compressive, splitting tensile and flexural strengths, all of which were measured at the age of 1, 7, and 28 d after 48-h oven curing. The results indicate that the addition of silica fume as a partial replacement of fly ash results in the loss of workability; nevertheless, the mechanical properties of hardened SCGC are significantly improved by incorporating silica fume, especially up to 10wt%. Applying this percentage of silica fume results in 4.3% reduction in the slump flow; however, it increases the compressive strength by 6.9%, tensile strength by 12.8% and flexural strength by 11.5%.

  2. A microstructure-based yield stress and work-hardening model for textured 6xxx aluminium alloys

    NASA Astrophysics Data System (ADS)

    Khadyko, M.; Myhr, O. R.; Dumoulin, S.; Hopperstad, O. S.

    2016-04-01

    The plastic properties of an aluminium alloy are defined by its microstructure. The most important factors are the presence of alloying elements in the form of solid solution and precipitates of various sizes, and the crystallographic texture. A nanoscale model that predicts the work-hardening curves of 6xxx aluminium alloys was proposed by Myhr et al. The model predicts the solid solution concentration and the particle size distributions of different types of metastable precipitates from the chemical composition and thermal history of the alloy. The yield stress and the work hardening of the alloy are then determined from dislocation mechanics. The model was largely used for non-textured materials in previous studies. In this work, a crystal plasticity-based approach is proposed for the work hardening part of the nanoscale model, which allows including the influence of the crystallographic texture. The model is evaluated by comparison with experimental data from uniaxial tensile tests on two textured 6xxx alloys in five temper conditions.

  3. Specific Hardening Function Definition and Characterization of a Multimechanism Generalized Potential-based Viscoelastoplasticity Model

    NASA Technical Reports Server (NTRS)

    Arnold, S. M.; Saleeb, A. F.

    2003-01-01

    Given the previous complete-potential structure framework together with the notion of strain- and stress-partitioning in terms of separate contributions of several submechanisms (viscoelastic and viscoplastic) to the thermodynamic functions (stored energy and dissipation) a detailed viscoelastoplastic multimechanism characterization of a specific hardening functional form of the model is presented and discussed. TIMETAL 21S is the material of choice as a comprehensive test matrix, including creep, relaxation, constant strain-rate tension tests, etc. are available at various temperatures. Discussion of these correlations tests, together with comparisons to several other experimental results, are given to assess the performance and predictive capabilities of the present model particularly with regard to the notion of hardening saturation as well as the interaction of multiplicity of dissipative (reversible/irreversible) mechanisms.

  4. Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft

    NASA Technical Reports Server (NTRS)

    Witulski, Arthur; Austin, Rebekah; Evans, John; Mahadevan, Nag; Karsai, Gabor; Sierawski, Brian; LaBel, Ken; Reed, Robert; Schrimpf, Ron

    2016-01-01

    A systematic approach is presented to constructing a radiation assurance case using Goal Structuring Notation (GSN) for spacecraft containing commercial-off-the-shelf (COTS) parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat November 2016. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.

  5. Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft

    NASA Technical Reports Server (NTRS)

    Witulski, A.; Austin, R.; Evans, J.; Mahadevan, N.; Karsai, G.; Sierawski, B.; LaBel, K.; Reed, R.; Schrimpf, R.

    2016-01-01

    A systematic approach is presented to constructing a radiation assurance case using Goal Structuring Notation (GSN) for spacecraft containing COTS parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat in January 2017. A custom software language for development of a GSN assurance case is under development at Vanderbilt. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.

  6. Structural Relaxation and Nanocrystallization-Induced Laser Surface Hardening of Fe-Based Bulk Amorphous Alloys

    NASA Astrophysics Data System (ADS)

    Singh, Ashish K.; Alavi, S. Habib; Paital, Sameer R.; Dahotre, Narendra B.; Harimkar, Sandip P.

    2014-06-01

    Amorphous metallic alloys or bulk metallic glasses are emerging as promising materials for a range of structural, microelectromechanical systems, and biomedical applications. With the recent developments in spark plasma sintering and superplastic forming of the amorphous alloys, it is likely that the amorphous alloys will find a place in new applications. In this article, surface hardening of spark plasma sintered Fe48Cr15Mo14Y2C15B6 bulk amorphous alloys using a continuous-wave Nd:YAG laser is reported. Depending on the processing parameters, the laser surface irradiation causes structural relaxation (enhanced medium-range ordering and/or annihilation of excess free volume) and nanocrystallization of hard carbides (M23C6 and M7C3), resulting in surface hardening. Detailed investigations on the thermal effects, microstructural modifications, and hardness improvements due to laser surface irradiation with laser fluence in the range of 1.77-2.36 J/mm2 are presented. An increase in hardness in the range of 1360-1560 HV for laser surface-treated alloys compared to 1200 HV for as-sintered alloys over a hardening depth of about 50-80 µm is observed.

  7. Cooling Capacity Optimization: Calculation of Hardening Power of Aqueous Solution Based on Poly(N-Vinyl-2-Pyrrolidone)

    NASA Astrophysics Data System (ADS)

    Koudil, Z.; Ikkene, R.; Mouzali, M.

    2013-11-01

    Polymer quenchants are becoming increasingly popular as substitutes for traditional quenching media in hardening metallic alloys. Water-soluble organic polymer offers a number of environmental, economic, and technical advantages, as well as eliminating the quench-oil fire hazard. The close control of polymer quenchant solutions is essential for their successful applications, in order to avoid the defects of structure of steels, such as shrinkage cracks and deformations. The aim of the present paper is to evaluate and optimize the experimental parameters of polymer quenching bath which gives the best behavior quenching process and homogeneous microstructure of the final work-piece. This study has been carried out on water-soluble polymer based on poly(N-vinyl-2-pyrrolidone) PVP K30, which does not exhibit inverse solubility phenomena in water. The studied parameters include polymer concentration, bath temperature, and agitation speed. Evaluation of cooling power and hardening performance has been measured with IVF SmartQuench apparatus, using standard ISO Inconel-600 alloy. The original numerical evaluation method has been introduced in the computation software called SQ Integra. The heat transfer coefficients were used as input data for calculation of microstructural constituents and the hardness profile of cylindrical sample.

  8. Pass or fail: A new test for password legitimacy

    SciTech Connect

    Cherry, A.; Henderson, M.W.; Nickless, W.K.; Olson, R.; Rackow, G.

    1992-09-25

    While other programs check for bad passwords after the fact, it in important to have good passwords at all times, not just after the latest Crack run. To this end we have modified Larry Wall's Perl password program and added, among other features, the ability to check a sorted list of all the bad passwords'' that Crack will generate, given all the dictionaries that we could get our hands on (107 MB of unique words, so far). The combination of improvements has turned publicly available code into a powerful tool that can aid sites in the maintenance of local security.

  9. Pass or fail: A new test for password legitimacy

    SciTech Connect

    Cherry, A.; Henderson, M.W.; Nickless, W.K.; Olson, R.; Rackow, G.

    1992-09-25

    While other programs check for bad passwords after the fact, it in important to have good passwords at all times, not just after the latest Crack run. To this end we have modified Larry Wall`s Perl password program and added, among other features, the ability to check a sorted list of all the ``bad passwords`` that Crack will generate, given all the dictionaries that we could get our hands on (107 MB of unique words, so far). The combination of improvements has turned publicly available code into a powerful tool that can aid sites in the maintenance of local security.

  10. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems.

    PubMed

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao

    2014-09-01

    Telecare medicine information system (TMIS) is widely used for providing a convenient and efficient communicating platform between patients at home and physicians at medical centers or home health care (HHC) organizations. To ensure patient privacy, in 2013, Hao et al. proposed a chaotic map based authentication scheme with user anonymity for TMIS. Later, Lee showed that Hao et al.'s scheme is in no provision for providing fairness in session key establishment and gave an efficient user authentication and key agreement scheme using smart cards, in which only few hashing and Chebyshev chaotic map operations are required. In addition, Jiang et al. discussed that Hao et al.'s scheme can not resist stolen smart card attack and they further presented an improved scheme which attempts to repair the security pitfalls found in Hao et al.'s scheme. In this paper, we found that both Lee's and Jiang et al.'s authentication schemes have a serious security problem in that a registered user's secret parameters may be intentionally exposed to many non-registered users and this problem causing the service misuse attack. Therefore, we propose a slight modification on Lee's scheme to prevent the shortcomings. Compared with previous schemes, our improved scheme not only inherits the advantages of Lee's and Jiang et al.'s authentication schemes for TMIS but also remedies the serious security weakness of not being able to withstand service misuse attack. PMID:24997858

  11. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    PubMed Central

    Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229

  12. Phenomenological modeling of hardening and thermal recovery in metals

    NASA Technical Reports Server (NTRS)

    Chan, K. S.; Lindholm, U. S.; Bodner, S. R.

    1988-01-01

    Modeling of hardening and thermal recovery in metals is considered within the context of unified elastic-viscoplastic theories. Specifically, the choices of internal variables and hardening measures, and the resulting hardening response obtained by incorporating saturation-type evolution equations into two general forms of the flow law are examined. Based on the analytical considerations, a procedure for delineating directional and isotropic hardening from uniaxial hardening data has been developed for the Bodner-Partom model and applied to a nickel-base superalloy, B1900 + Hf. Predictions based on the directional hardening properties deduced from the monotonic loading data are shown to be in good agreement with results of cyclic tests.

  13. Group Management Method of RFID Passwords for Privacy Protection

    NASA Astrophysics Data System (ADS)

    Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa

    When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.

  14. Friction Stir Welding of Age-Hardenable Aluminum Alloys: A Parametric Approach Using RSM Based GRA Coupled With PCA

    NASA Astrophysics Data System (ADS)

    Vijayan, D.; Rao, V. S.

    2014-04-01

    Age-hardenable aluminum alloys, primarily used in the aerospace, automobile and marine industries (2×××, 6××× and 7×××), can be welded using solid-state welding techniques. Friction stir welding is an emerging solid-state welding technique used to join both similar and dissimilar materials. The strength of a friction stir welded joint depends on the joining process parameters. Therefore, a combination of the statistical techniques of a response surface methodology based on a grey relational analysis coupled to a principal component analysis was proposed to select the process parameters suitable for joining AA 2024 and AA 6061 aluminum alloys via friction stir welding. The significant process parameters, such as rotational speed, welding speed, axial load and pin shapes (PS) were considered during the statistical experiment. The results indicate that the square PS plays a vital role and yields an ultimate tensile strength of 141 MPa for an elongation of 12 % versus cylinder and taper pin profiles. The root cause for joint strength loss and fracture mode was analyzed using scanning electron microscopy. Severe material flow during macro defects, such as pin holes and porosity, degrades the joint strength by approximately 44 % for AA 2024 and 51 % for AA 6061 fabricated FS-welded aluminum alloys relative to the base material. The results of this approach are useful for accurately controlling the response and optimize the process parameters.

  15. Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)

    NASA Astrophysics Data System (ADS)

    Koishibayev, Timur; Umarova, Zhanat

    2016-04-01

    This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.

  16. HPAKE : Password Authentication Secure against Cross-Site User Impersonation

    NASA Astrophysics Data System (ADS)

    Boyen, Xavier

    We propose a new kind of asymmetric mutual authentication from passwords with stronger privacy against malicious servers, lest they be tempted to engage in "cross-site user impersonation" to each other.

  17. The Use of Passwords for Controlled Access to Computer Resources. Computer Science & Technology.

    ERIC Educational Resources Information Center

    Wood, Helen M.

    This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…

  18. Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft

    NASA Technical Reports Server (NTRS)

    Witulski, A.; Austin, R.; Evans, J.; Mahadevan, N.; Karsai, G.; Sierawski, B.; LaBel, K.; Reed, R.

    2016-01-01

    The attached presentation is a summary of how mission assurance is supported by model-based representations of spacecraft systems that can define sub-system functionality and interfacing, reliability parameters, as well as detailing a new paradigm for assurance, a model-centric and not document-centric process.

  19. [Hardening of dental instruments].

    PubMed

    Gerasev, G P

    1981-01-01

    The possibility of prolonging the service life of stomatological instruments by the local hardening of their working parts is discussed. Such hardening should be achieved by using hard and wear-resistant materials. The examples of hardening dental elevators and hard-alloy dental drills are given. New trends in the local hardening of instruments are the treatment of their working parts with laser beams, the application of coating on their surface by the gas-detonation method. The results of research work and trials are presented. PMID:7300627

  20. Active radiation hardening of Tm-doped silica fiber based on pump bleaching.

    PubMed

    Xing, Ying-bin; Zhao, Nan; Liao, Lei; Wang, Yi-bo; Li, Hai-qing; Peng, Jing-gang; Yang, Lv-yun; Dai, Neng-li; Li, Jin-yan

    2015-09-21

    Tm-doped fiber laser or amplifier can be applied in varied adverse environments. In this work, we demonstrate the pump bleaching of Tm-doped silica fiber with 793nm pump source under gamma-ray irradiation in the range 50Gy-675Gy. The recovery time, the fiber slope efficiency and the fiber cladding absorption spectra after irradiation and bleaching have been measured. It is found that the recovery time and radiation induce absorption are positively associated with doses, however, the fiber slope efficiency of irradiated TDF and bleached TDF are both negatively correlated with doses. Based on the simulation of the fiber core temperature, the probable mechanism of pump bleaching is also discussed. PMID:26406629

  1. Liquation Microfissuring in the Weld Heat-Affected Zone of an Overaged Precipitation-Hardened Nickel-Base Superalloy

    NASA Astrophysics Data System (ADS)

    Ojo, O. A.; Chaturvedi, M. C.

    2007-02-01

    The effect of preweld overaging heat treatment on the microstructural response in the heat-affected zone (HAZ) of a precipitation-hardened nickel-base superalloy INCONEL 738LC subjected to the welding thermal cycle ( i.e., rapid) was investigated. The overaging heat treatment resulted in the formation of an interfacial microconstituent containing M23X6 particles and coarsening of primary and secondary γ' precipitates. The HAZ microstructures around welds in the overaged alloy were simulated using the Gleeble thermomechanical simulation system. Microstructural examination of simulated HAZs and those present in tungsten inert gas (TIG) welded specimens showed the occurrence of extensive grain boundary liquation involving liquation reaction of the interfacial microconstituents containing M23X6 particles and MC-type carbides. In addition, the coarsened γ' precipitate particles present in the overaged alloy persisted well above their solvus temperature to temperatures where they constitutionally liquated and contributed to considerable liquation of grain boundaries, during continuous rapid heating. Intergranular HAZ microfissuring, with resolidified product formed mostly on one side of the microfissures, was observed in welded specimens. This suggested that the HAZ microfissuring generally occurred by decohesion across one of the solid-liquid interfaces during the grain boundary liquation stage of the weld thermal cycle. Correlation of simulated HAZ microstructures with hot ductility properties of the alloy revealed that the temperature at which the alloy exhibited zero ductility during heating was within the temperature range at which grain boundary liquation was observed. The on-cooling ductility of the alloy was significantly damaged by the on-heating liquation reaction, as reflected by the considerably low ductility recovery temperature (DRT). Important characteristics of the intergranular liquid that could influence HAZ microfissuring of the alloy in overaged

  2. Passwords: If We're So Smart, Why Are We Still Using Them?

    NASA Astrophysics Data System (ADS)

    Herley, Cormac; van Oorschot, P. C.; Patrick, Andrew S.

    While a lot has changed in Internet security in the last 10 years, a lot has stayed the same - such as the use of alphanumeric passwords. Passwords remain the dominant means of authentication on the Internet, even in the face of significant problems related to password forgetting and theft. In fact, despite large numbers of proposed alternatives, we must remember more passwords than ever before. Why is this? Will alphanumeric passwords still be ubiquitous in 2019, or will adoption of alternative proposals be commonplace? What must happen in order to move beyond passwords? This note pursues these questions, following a panel discussion at Financial Cryptography and Data Security 2009.

  3. A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    At Indocrypt 2005, Viet et al., [21] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for client's password-based authentication and anonymity against a passive server, who does not deviate the protocol. In this paper, we first point out that their threshold construction is completely insecure against off-line dictionary attacks. For the threshold t > 1, we propose a secure threshold anonymous PAKE (for short, TAP) protocol with the number of clients n upper-bounded, such that n\\leq 2 \\sqrt{N-1} -1, where N is a dictionary size of passwords. We rigorously prove that the TAP protocol has semantic security of session keys in the random oracle model by showing the reduction to the computational Diffie-Hellman problem. In addition, the TAP protocol provides unconditional anonymity against a passive server. For the threshold t=1, we propose an efficient anonymous PAKE protocol that significantly improves efficiency in terms of computation costs and communication bandwidth compared to the original (not threshold) anonymous PAKE protocol [21].

  4. Cyclic hardening mechanisms in Nimonic 80A

    NASA Technical Reports Server (NTRS)

    Lerch, B. A.; Gerold, V.

    1987-01-01

    A nickel base superalloy was fatigued under constant plastic strain range control. The hardening response was investigated as a function of plastic strain range and particle size of the gamma prime phase. Hardening was found to be a function of the slip band spacing. Numerous measurements of the slip band spacing and other statistical data on the slip band structures were obtained. Interactions between intersecting slip systems were shown to influence hardening. A Petch-Hall model was found to describe best this relationship between the response stress and the slip band spacing.

  5. Hardening of the arteries

    MedlinePlus

    Atherosclerosis; Arteriosclerosis; Plaque buildup - arteries; Hyperlipidemia - atherosclerosis; Cholesterol - atherosclerosis ... Hardening of the arteries often occurs with aging. As you grow older, ... narrows your arteries and makes them stiffer. These changes ...

  6. Scintillation-Hardened GPS Receiver

    NASA Technical Reports Server (NTRS)

    Stephens, Donald R.

    2015-01-01

    CommLargo, Inc., has developed a scintillation-hardened Global Positioning System (GPS) receiver that improves reliability for low-orbit missions and complies with NASA's Space Telecommunications Radio System (STRS) architecture standards. A software-defined radio (SDR) implementation allows a single hardware element to function as either a conventional radio or as a GPS receiver, providing backup and redundancy for platforms such as the International Space Station (ISS) and high-value remote sensing platforms. The innovation's flexible SDR implementation reduces cost, weight, and power requirements. Scintillation hardening improves mission reliability and variability. In Phase I, CommLargo refactored an open-source GPS software package with Kalman filter-based tracking loops to improve performance during scintillation and also demonstrated improved navigation during a geomagnetic storm. In Phase II, the company generated a new field-programmable gate array (FPGA)-based GPS waveform to demonstrate on NASA's Space Communication and Navigation (SCaN) test bed.

  7. Finding passwords by random walks: how long does it take?

    NASA Astrophysics Data System (ADS)

    Kabatiansky, G.; Oshanin, G.

    2009-10-01

    We compare the efficiency of a deterministic 'lawnmower' and random search strategies for finding a prescribed sequence of letters (a password) of length M in which all letters are taken from the same Q-ary alphabet. We show that, at best, a random search takes two times longer than a 'lawnmower' search.

  8. How secure is your information system? An investigation into actual healthcare worker password practices.

    PubMed

    Cazier, Joseph A; Medlin, B Dawn

    2006-01-01

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366

  9. How Secure Is Your Information System? An Investigation into Actual Healthcare Worker Password Practices

    PubMed Central

    Cazier, Joseph A; Medlin, B. Dawn

    2006-01-01

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366

  10. A dual redundancy radiation-hardened flip—flop based on a C-element in a 65 nm process

    NASA Astrophysics Data System (ADS)

    Gang, Chen; Bo, Gao; Min, Gong

    2013-09-01

    A radiation-hardened flip—flop is proposed to mitigate the single event upset (SEU) effect. Immunity was achieved through the use of C-elements and redundant storage elements. It takes advantage of the property of a C-element in which it enters a high impedance mode when its inputs are of different logic values. Redundant storage nodes are then used to drive the C-elements so that a single upset pulse in any storage will be prevented from altering the state of the output of the flip—flop. The flip—flop was implemented using 48 transistors and occupied an area of 30.78 μm2, using 65 nm CMOS process. It consumed 22.6% fewer transistors as compared to the traditional SEU resilient TMR flip—flop.

  11. 42. INTERIOR VIEW OF THE NAIL HARDENER USED TO HARDEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    42. INTERIOR VIEW OF THE NAIL HARDENER USED TO HARDEN AND TEMPER THE NAILS; WEST TUBES IN FOREGRPUND AND DRAWBACK TUBE IN THE CENTER - LaBelle Iron Works, Thirtieth & Wood Streets, Wheeling, Ohio County, WV

  12. Passwords Usage and Human Memory Limitations: A Survey across Age and Educational Background

    PubMed Central

    Pilar, Denise Ranghetti; Jaeger, Antonio; Gomes, Carlos F. A.; Stein, Lilian Milnitsky

    2012-01-01

    The present article reports a survey conducted to identify the practices on passwords usage, focusing particularly on memory limitations and the use of passwords across individuals with different age and education backgrounds. A total of 263 participants were interviewed, with ages ranging from 18 to 93 years, and education level ranging from grade school to graduate degree. Contrary to our expectations, effects of cognitive decline due to aging were not observed on memory performance for passwords. The results suggested instead, that the number of password uses was the most influential factor on memory performance. That is, as the number of circumstances in which individuals utilized passwords increased, the incidence of forgotten and mixed-up passwords also increased. The theoretical significance of these findings and their implications for good practices on password usage are discussed. PMID:23227232

  13. Passwords usage and human memory limitations: a survey across age and educational background.

    PubMed

    Pilar, Denise Ranghetti; Jaeger, Antonio; Gomes, Carlos F A; Stein, Lilian Milnitsky

    2012-01-01

    The present article reports a survey conducted to identify the practices on passwords usage, focusing particularly on memory limitations and the use of passwords across individuals with different age and education backgrounds. A total of 263 participants were interviewed, with ages ranging from 18 to 93 years, and education level ranging from grade school to graduate degree. Contrary to our expectations, effects of cognitive decline due to aging were not observed on memory performance for passwords. The results suggested instead, that the number of password uses was the most influential factor on memory performance. That is, as the number of circumstances in which individuals utilized passwords increased, the incidence of forgotten and mixed-up passwords also increased. The theoretical significance of these findings and their implications for good practices on password usage are discussed. PMID:23227232

  14. Quantitative experimental determination of the solid solution hardening potential of rhenium, tungsten and molybdenum in single-crystal nickel-based superalloys

    DOE PAGESBeta

    Fleischmann, Ernst; Miller, Michael K.; Affeldt, Ernst; Glatzel, Uwe

    2015-01-31

    Here, the solid-solution hardening potential of the refractory elements rhenium, tungsten and molybdenum in the matrix of single-crystal nickel-based superalloys was experimentally quantified. Single-phase alloys with the composition of the nickel solid-solution matrix of superalloys were cast as single crystals, and tested in creep at 980 °C and 30–75 MPa. The use of single-phase single-crystalline material ensures very clean data because no grain boundary or particle strengthening effects interfere with the solid-solution hardening. This makes it possible to quantify the amount of rhenium, tungsten and molybdenum necessary to reduce the creep rate by a factor of 10. Rhenium is moremore » than two times more effective for matrix strengthening than either tungsten or molybdenum. The existence of rhenium clusters as a possible reason for the strong strengthening effect is excluded as a result of atom probe tomography measurements. If the partitioning coefficient of rhenium, tungsten and molybdenum between the γ matrix and the γ' precipitates is taken into account, the effectiveness of the alloying elements in two-phase superalloys can be calculated and the rhenium effect can be explained.« less

  15. Quantitative experimental determination of the solid solution hardening potential of rhenium, tungsten and molybdenum in single-crystal nickel-based superalloys

    SciTech Connect

    Fleischmann, Ernst; Miller, Michael K.; Affeldt, Ernst; Glatzel, Uwe

    2015-01-31

    Here, the solid-solution hardening potential of the refractory elements rhenium, tungsten and molybdenum in the matrix of single-crystal nickel-based superalloys was experimentally quantified. Single-phase alloys with the composition of the nickel solid-solution matrix of superalloys were cast as single crystals, and tested in creep at 980 °C and 30–75 MPa. The use of single-phase single-crystalline material ensures very clean data because no grain boundary or particle strengthening effects interfere with the solid-solution hardening. This makes it possible to quantify the amount of rhenium, tungsten and molybdenum necessary to reduce the creep rate by a factor of 10. Rhenium is more than two times more effective for matrix strengthening than either tungsten or molybdenum. The existence of rhenium clusters as a possible reason for the strong strengthening effect is excluded as a result of atom probe tomography measurements. If the partitioning coefficient of rhenium, tungsten and molybdenum between the γ matrix and the γ' precipitates is taken into account, the effectiveness of the alloying elements in two-phase superalloys can be calculated and the rhenium effect can be explained.

  16. Authorizing multiple chemical passwords by a combinatorial molecular keypad lock.

    PubMed

    Rout, Bhimsen; Milko, Petr; Iron, Mark A; Motiei, Leila; Margulies, David

    2013-10-16

    A combinatorial fluorescent molecular sensor operates as a highly efficient molecular security system. The ability of a pattern-generating molecule to process diverse sets of chemical inputs, discriminate among their concentrations, and form multivalent and kinetically stable complexes is demonstrated as a powerful tool for processing a wide range of chemical "passwords" of different lengths. This system thus indicates the potential for obtaining unbreakable combination locks at the molecular scale. PMID:24088016

  17. Theoretical bases of the surface layer formation in the finishing and hardening treatment of details by SPD in flexible granular environment

    NASA Astrophysics Data System (ADS)

    Tamarkin, M. A.; Tishchenko, E. E.; Fedorov, V. P.

    2016-04-01

    The article presents results of theoretical studies of the surface layer formation during finishing and hardening treatment of details by SPD in flexible granular environment. The dependencies are fixed for determining the surface roughness, processing time, the depth of the hardened layer and the degree of hardening for different methods of treatment by SPD in flexible granular environment. The process of residual stresses formation is researched.

  18. RHOBOT: Radiation hardened robotics

    SciTech Connect

    Bennett, P.C.; Posey, L.D.

    1997-10-01

    A survey of robotic applications in radioactive environments has been conducted, and analysis of robotic system components and their response to the varying types and strengths of radiation has been completed. Two specific robotic systems for accident recovery and nuclear fuel movement have been analyzed in detail for radiation hardness. Finally, a general design approach for radiation-hardened robotics systems has been developed and is presented. This report completes this project which was funded under the Laboratory Directed Research and Development program.

  19. Precipitation hardening austenitic superalloys

    DOEpatents

    Korenko, Michael K.

    1985-01-01

    Precipitation hardening, austenitic type superalloys are described. These alloys contain 0.5 to 1.5 weight percent silicon in combination with about 0.05 to 0.5 weight percent of a post irradiation ductility enhancing agent selected from the group of hafnium, yttrium, lanthanum and scandium, alone or in combination with each other. In addition, when hafnium or yttrium are selected, reductions in irradiation induced swelling have been noted.

  20. Radiation Hardened Electronics for Space Environments (RHESE)

    NASA Technical Reports Server (NTRS)

    Keys, Andrew S.; Adams, James H.; Frazier, Donald O.; Patrick, Marshall C.; Watson, Michael D.; Johnson, Michael A.; Cressler, John D.; Kolawa, Elizabeth A.

    2007-01-01

    Radiation Environmental Modeling is crucial to proper predictive modeling and electronic response to the radiation environment. When compared to on-orbit data, CREME96 has been shown to be inaccurate in predicting the radiation environment. The NEDD bases much of its radiation environment data on CREME96 output. Close coordination and partnership with DoD radiation-hardened efforts will result in leveraged - not duplicated or independently developed - technology capabilities of: a) Radiation-hardened, reconfigurable FPGA-based electronics; and b) High Performance Processors (NOT duplication or independent development).

  1. Nuclear effects hardened shelters

    NASA Astrophysics Data System (ADS)

    Lindke, Paul

    1990-11-01

    The Houston Fearless 76 Government Projects Group has been actively engaged for more than twenty-five years as a sub-contractor and currently as a prime contractor in the design, manufacture, repair and logistics support of custom mobile ground stations and their equipment accommodations. Other associated products include environmental control units (ECU's), mobilizers for shelters and a variety of mobile power generation units (MPU's). Since 1984, Houston Fearless 76 has designed and manufactured four 8' x 8' x 22' nuclear hardened mobile shelters. These shelters were designed to contain electronic data processing/reduction equipment. One shelter is currently being operated by the Air Force as a Defense Intelligence Agency (DIA) approved and certified Special Corrpartmented Information Facility (SCIF). During the development and manufacturing process of the shelters, we received continual technical assistance and design concept evaluations from Science Applications International Corporation (SAIC) Operations Analysis and Logistics Engineering Division and the Nondestructive Inspection Lab at McClellan AFB. SAIC was originally employed by the Air Force to design the nuclear hardening specifications applied to these shelters. The specific levels of hardening to which the shelters were designed are classified and will not be mentioned during this presentation.

  2. Implementing a mandatory password change policy at an academic medical institution.

    PubMed

    Brogan, Michael W; Lin, Ching-Ping; Pai, Rakesh; Kalet, Ira J

    2007-01-01

    UW Medicine implemented a new policy requiring users to change passwords at least once every 120 days. In the first two password change cycles, many users did not take action upon notification, and their passwords expired, causing high help desk loads. Compliance and support loads improved in subsequent cycles. We conclude that policy changes requiring user behavior modification should be seen as a cultural change, and the implementation strategy should consider socio-technical factors. PMID:18693985

  3. Security enhanced optical one-time password authentication method by using digital holography

    NASA Astrophysics Data System (ADS)

    Gil, Sang Keun; Jeon, Seok Hee; Jeong, Jong Rae

    2015-03-01

    We propose a new optical one-time password(OTP) authentication method by using digital holography, which enhances security strength in the cryptosystem compared to the conventional electronic OTP method. In this paper, a challenge-response optical OTP authentication based on two-factor authentication is presented by 2-step quadrature phase-shifting digital holography using orthogonal polarization, and two-way authentication is also performed using the challenge-response handshake in both directions. The ID (identification), PW (password) and OTP information are encrypted with a shared key by applying phase-shifting digital holography, and these encrypted information are verified each other by the shared key. Because the encrypted digital holograms which are transmitted to the other party are expressed as random distribution, it guards against a replay attack and results in higher security level. Optically, encrypted digital hologram in our method is Fourier transform hologram and is recorded on CCD with 256 gray-level quantized intensities. The proposed method has an advantage that it does not need a time-synchronized OTP and can be applied to various security services. Computer experiments show that the proposed method is suitable for high secure OTP authentication.

  4. Voice Biometrics as a Way to Self-service Password Reset

    NASA Astrophysics Data System (ADS)

    Hohgräfe, Bernd; Jacobi, Sebastian

    Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.

  5. Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

    PubMed Central

    Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697

  6. Improving computer security for authentication of users: influence of proactive password restrictions.

    PubMed

    Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel

    2002-05-01

    Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed. PMID:12109007

  7. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    PubMed

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697

  8. Modeling of anisotropic hardening of sheet metals

    NASA Astrophysics Data System (ADS)

    Yoshida, Fusahito; Hamasaki, Hiroshi; Uemori, Takeshi

    2013-12-01

    To describe the evolution of anisotropy of sheet metals, in terms of both r-values and stresses, the present paper proposes anisotropic hardening models, where the shape of yield surface changes with increasing plastic strain. In this framework of modeling, any types of yield functions are able to be used. The evolution of anisotropy is expressed by updating the yield function as an interpolation between two yield functions defined at two different effective plastic strains. In this paper, two types of interpolation models, i.e., nonlinear interpolation model and piecewise interpolation model are presented. These models are validated by comparing the experimental data on 3003-O aluminum sheet (after Hu, Int J Plasticity 23, 620-639, 2007). To describe the Bauschinger effect, the combined anisotropic-kinematic hardening model is formulated based on Yoshida-Uemori kinematic hardening model.

  9. Thermoelastic constitutive equations for chemically hardening materials

    NASA Technical Reports Server (NTRS)

    Shaffer, B. W.; Levitsky, M.

    1974-01-01

    Thermoelastic constitutive equations are derived for a material undergoing solidification or hardening as the result of a chemical reaction. The derivation is based upon a two component model whose composition is determined by the degree of hardening, and makes use of strain-energy considerations. Constitutive equations take the form of stress rate-strain rate relations, in which the coefficients are time-dependent functions of the composition. Specific results are developed for the case of a material of constant bulk modulus which undergoes a transition from an initial liquidlike state into an isotropic elastic solid. Potential applications are discussed.

  10. Observation and quantification of water penetration into Strain Hardening Cement-based Composites (SHCC) with multiple cracks by means of neutron radiography

    NASA Astrophysics Data System (ADS)

    Zhang, P.; Wittmann, F. H.; Zhao, T. J.; Lehmann, E. H.; Tian, L.; Vontobel, P.

    2010-08-01

    Durability of reinforced concrete structures has become a crucial issue with respect to economy, ecology and sustainability. One major reason for durability problems of concrete structures is the limited strain capacity of cement-based materials under imposed tensile stress. By adding PVA fibers, a new material named Strain Hardening Cement-based Composites (SHCC) with high strain capacity can be produced. Due to the formation of multiple micro-cracks, wide cracks can be avoided in SHCC under an imposed strain. The high strain capacity, however, is beneficial with respect to durability only if the multi-crack formation in SHCC does not lead to significantly increased water penetration. If water and aggressive chemical compounds such as chlorides and sulfates dissolved in water penetrate into the cement-based matrix and reach the steel reinforcement service-life of reinforced concrete structures will be reduced significantly. In this project, neutron radiography was applied to observe and quantify the process of water penetration into uncracked SHCC and after the multi-crack formation. In addition, water penetration into integral water repellent cracked and uncracked SHCC, which has been produced by adding a silane-based water repellent agent to the fresh SHCC mortar has been investigated. Results will be discussed with respect to durability.

  11. Practical aspects of systems hardening

    SciTech Connect

    Shepherd, W.J.

    1989-01-01

    Applications of hardening technology in a practical system require a balance between the factors governing affordability, producibility, and survivability of the finished design. Without careful consideration of the top-level system operating constraints, a design engineer may find himself with a survivable but overweight, unproductive, expensive design. This paper explores some lessons learned in applying hardening techniques to several laser communications programs and is intended as an introductory guide to novice designers faced with the task of hardening a space system.

  12. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  13. Anonymous Three-Party Password-Authenticated Key Exchange Scheme for Telecare Medical Information Systems

    PubMed Central

    Xie, Qi; Hu, Bin; Dong, Na; Wong, Duncan S.

    2014-01-01

    Telecare Medical Information Systems (TMIS) provide an effective way to enhance the medical process between doctors, nurses and patients. For enhancing the security and privacy of TMIS, it is important while challenging to enhance the TMIS so that a patient and a doctor can perform mutual authentication and session key establishment using a third-party medical server while the privacy of the patient can be ensured. In this paper, we propose an anonymous three-party password-authenticated key exchange (3PAKE) protocol for TMIS. The protocol is based on the efficient elliptic curve cryptosystem. For security, we apply the pi calculus based formal verification tool ProVerif to show that our 3PAKE protocol for TMIS can provide anonymity for patient and doctor while at the same time achieves mutual authentication and session key security. The proposed scheme is secure and efficient, and can be used in TMIS. PMID:25047235

  14. New analytical approach for neutron beam-hardening correction.

    PubMed

    Hachouf, N; Kharfi, F; Hachouf, M; Boucenna, A

    2016-01-01

    In neutron imaging, the beam-hardening effect has a significant effect on quantitative and qualitative image interpretation. This study aims to propose a linearization method for beam-hardening correction. The proposed method is based on a new analytical approach establishing the attenuation coefficient as a function of neutron energy. Spectrum energy shift due to beam hardening is studied on the basis of Monte Carlo N-Particle (MCNP) simulated data and the analytical data. Good agreement between MCNP and analytical values has been found. Indeed, the beam-hardening effect is well supported in the proposed method. A correction procedure is developed to correct the errors of beam-hardening effect in neutron transmission, and therefore for projection data correction. The effectiveness of this procedure is determined by its application in correcting reconstructed images. PMID:26609685

  15. Multipurpose hardened spacecraft insulation

    NASA Technical Reports Server (NTRS)

    Steimer, Carlos H.

    1990-01-01

    A Multipurpose Hardened Spacecraft Multilayer Insulation (MLI) system was developed and implemented to meet diverse survivability and performance requirements. Within the definition and confines of a MLI assembly (blanket), the design: (1) provides environmental protection from natural and induced nuclear, thermal, and electromagnetic radiation; (2) provides adequate electrostatic discharge protection for a geosynchronous satellite; (3) provides adequate shielding to meet radiated emission needs; and (4) will survive ascent differential pressure loads between enclosed volume and space. The MLI design is described which meets these requirements and design evolution and verification is discussed. The application is for MLI blankets which closeout the area between the laser crosslink subsystem (LCS) equipment and the DSP spacecraft cabin. Ancillary needs were implemented to ease installation at launch facility and to survive ascent acoustic and vibration loads. Directional venting accommodations were also incorporated to avoid contamination of LCS telescope, spacecraft sensors, and second surface mirrors (SSMs).

  16. System-Level Radiation Hardening

    NASA Technical Reports Server (NTRS)

    Ladbury, Ray

    2014-01-01

    Although system-level radiation hardening can enable the use of high-performance components and enhance the capabilities of a spacecraft, hardening techniques can be costly and can compromise the very performance designers sought from the high-performance components. Moreover, such techniques often result in a complicated design, especially if several complex commercial microcircuits are used, each posing its own hardening challenges. The latter risk is particularly acute for Commercial-Off-The-Shelf components since high-performance parts (e.g. double-data-rate synchronous dynamic random access memories - DDR SDRAMs) may require other high-performance commercial parts (e.g. processors) to support their operation. For these reasons, it is essential that system-level radiation hardening be a coordinated effort, from setting requirements through testing up to and including validation.

  17. Explosive Surface Hardening of Austenitic Stainless Steel

    NASA Astrophysics Data System (ADS)

    Kovacs-Coskun, T.

    2016-04-01

    In this study, the effects of explosion hardening on the microstructure and the hardness of austenitic stainless steel have been studied. The optimum explosion hardening technology of austenitic stainless steel was researched. In case of the explosive hardening used new idea mean indirect hardening setup. Austenitic stainless steels have high plasticity and can be easily cold formed. However, during cold processing the hardening phenomena always occurs. Upon the explosion impact, the deformation mechanism indicates a plastic deformation and this deformation induces a phase transformation (martensite). The explosion hardening enhances the mechanical properties of the material, includes the wear resistance and hardness. In case of indirect hardening as function of the setup parameters specifically the flayer plate position the hardening increased differently. It was find a relationship between the explosion hardening setup and the hardening level.

  18. What Is the PE Password? Incorporating Vocabulary in Your Elementary PE Program

    ERIC Educational Resources Information Center

    Robelee, Margaret E.

    2016-01-01

    This article describes a novel program for third through fifth grade called "What is the PE Password?" that teaches vocabulary words and concepts without sacrificing activity time in order to support Common Core learning.

  19. The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs

    NASA Astrophysics Data System (ADS)

    Laptyeva, T. V.; Flach, S.; Kladko, K.

    2011-09-01

    Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak-password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors, we design an algorithm that strengthens the security of passwords. The core idea of our simple method is to split a long and secure password into two components. The first component is memorized by the user. The second component is transformed into a CAPTCHA image and then protected using the evolution of a two-dimensional dynamical system close to a phase transition, in such a way that standard brute-force attacks become ineffective. We expect our approach to have wide applications for authentication and encryption technologies.

  20. Construction procedures using self hardening fly ash

    NASA Astrophysics Data System (ADS)

    Thornton, S. I.; Parker, D. G.

    1980-07-01

    Fly ash produced in Arkansas from burning Wyoming low sulfur coal is self-hardening and can be effective as a soil stabilizing agent for clays and sands. The strength of soil-self hardening fly ash develops rapidly when compacted immediately after mixing. Seven day unconfined compressive strengths up to 1800 psi were obtained from 20% fly ash and 80% sand mixtures. A time delay between mixing the fly ash with the soil and compaction of the mixture reduced the strength. With two hours delay, over a third of the strength was lost and with four hours delay, the loss was over half. Gypsum and some commercial concrete retarders were effective in reducing the detrimental effect of delayed compaction. Adequate mixing of the soil and fly ash and rapid compaction of the mixtures were found to be important parameters in field construction of stabilized bases.

  1. Effect of reinforcing particle type on morphology and age-hardening behavior of Al–4.5 wt.% Cu based nanocomposites synthesized through mechanical milling

    SciTech Connect

    Mostaed, A.; Saghafian, H.; Mostaed, E.; Shokuhfar, A.; Rezaie, H.R.

    2013-02-15

    The effects of reinforcing particle type (SiC and TiC) on morphology and precipitation hardening behavior of Al–4.5%Cu based nanocomposites synthesized via mechanical milling were investigated in the current work. In order to study the microstructure and morphology of mechanically milled powder, X-ray diffraction technique, scanning electron microscopy and high resolution transmission electron microscopy were utilized. Results revealed that at the early stages of mechanical milling, when reinforcing particles are polycrystal, the alloying process is enhanced more in the case of using the TiC particles as reinforcement. But, at the final stages of mechanical milling, when reinforcing particles are single crystal, the alloying process is enhanced more in the case of using the SiC ones. Transmission electron microscopy results demonstrated that Al–4.5 wt.%Cu based nanocomposite powders were synthesized and confirmed that the mutual diffusion of aluminum and copper occurs through the interfacial plane of (200). The hardness results showed that not only does introducing 4 vol.% of reinforcing particles (SiC or TiC) considerably decrease the porosity of the bulk composite samples, but also it approximately doubles the hardness of Al–4.5 wt.%Cu alloy (53.4 HB). Finally, apart from TEM and scanning electron microscopy observation which are localized, a decline in hardness in the TiC and SiC contained samples, respectively, after 1.5 and 2 h aging time at 473 K proves the fact that the size of SiC particles is smaller than the size of the TiC ones. - Highlights: ► HRTEM results show mutual diffusion of Al and Cu occurs through the (200) planes. ► TiC particles enhance alloying process more than the SiC ones at the early stages of MM. ► SiC particles enhance alloying process more than the TiC ones at the final stages of MM.

  2. Ultimate bending capacity of strain hardening steel pipes

    NASA Astrophysics Data System (ADS)

    Chen, Yan-fei; Zhang, Juan; Zhang, Hong; Li, Xin; Zhou, Jing; Cao, Jing

    2016-04-01

    Based on Hencky's total strain theory of plasticity, ultimate bending capacity of steel pipes can be determined analytically assuming an elastic-linear strain hardening material, the simplified analytical solution is proposed as well. Good agreement is observed when ultimate bending capacities obtained from analytical solutions are compared with experimental results from full-size tests of steel pipes. Parametric study conducted as part of this paper indicates that the strain hardening effect has significant influence on the ultimate bending capacity of steel pipes. It is shown that pipe considering strain hardening yields higher bending capacity than that of pipe assumed as elastic-perfectly plastic material. Thus, the ignorance of strain hardening effect, as commonly assumed in current codes, may underestimate the ultimate bending capacity of steel pipes. The solutions proposed in this paper are applicable in the design of offshore/onshore steel pipes, supports of offshore platforms and other tubular structural steel members.

  3. Stage IV work hardening in cubic metals

    SciTech Connect

    Rollett, A.D.; Kocks, U.F.; Doherty, R.D.

    1986-01-01

    The work hardening of fcc metals at large strains is discussed with reference to the linear stress-strain behavior often observed at large strains and known as Stage IV. The experimental evidence shows that Stage IV is a work hardening phenomenon that is found quite generally, even in pure fcc metals subjected to homogeneous deformation. A simple model for Stage IV in pure metals is presented, based on the accumulation of dislocation debris. Experiments are described for large strain torsion tests on four aluminum alloys. The level and extent of Stage IV scaled with the saturation stress that would represent the end of Stage III in the absence of a Stage IV. Reversing the torsion after large prestrains produced transient reductions in the work hardening. The strain rate sensitivity was also measured before and during the transient and found not to vary significantly. The microstructure observed at large strains in an Mg alloy suggest that Stage IV can occur in the absence of microband formation. Previous proposals for the cause of Stage IV are reviewed and found to be not supported by recent experimental data.

  4. Work hardening: occupational therapy in industrial rehabilitation.

    PubMed

    Matheson, L N; Ogden, L D; Violette, K; Schultz, K

    1985-05-01

    Work hardening, presented in this paper as a "new" service for the industrially injured, is actually well grounded in the traditional models and practices of occupational therapy. From the profession's early roots in industrial therapy to the development of a variety of programs for the industrially injured through the 1950s and 1960s, the historical and philosophical bases of occupational therapy support the use of work as an evaluative and therapeutic medium. What is actually new is the adoption of terminology, technology, and a program format that fits in with the needs of consumers in the 1980s. Recent developments that created the need for the specialized services that occupational therapists are uniquely qualified to provide include growth of private sector vocational rehabilitation, changes in workers' compensation laws, and increasing costs of vocational rehabilitation. This paper describes work hardening in its present form. A case example is given that demonstrates how work hardening can be a cost-effective and time-saving bridge which spans the gap between curative medicine and the return to work. PMID:4014411

  5. Onycholysis induced by nail hardener.

    PubMed

    Helsing, Per; Austad, Joar; Talberg, Hans Jørgen

    2007-10-01

    Nail hardeners appeared in the market during the 1960s. They were basically solutions of formaldehyde. The first adverse effects were published in 1966 (1). Reactions were onycholysis, chromonychia, subungual haemorrhage, and hyperkeratosis. Onycholysis may be non-inflammatory or inflammatory, and is accompanied by throbbing pain. Inflammatory reactions are followed by paronychia and occasional dermatitis on the digital pulpa. PMID:17868227

  6. Life on the Hardened Border

    ERIC Educational Resources Information Center

    Miller, Bruce Granville

    2012-01-01

    The many Coast Salish groups distributed on both sides of the United States-Canada border on the Pacific coast today face significant obstacles to cross the international border, and in some cases are denied passage or intimidated into not attempting to cross. The current situation regarding travel by Aboriginal people reflects the "hardening" of…

  7. On the feasibility of nonlinear assessment of fatigue damage in hardened IN718 specimens based on non-collinear shear wave mixing

    NASA Astrophysics Data System (ADS)

    Zhang, Ziyin; Nagy, Peter B.; Hassan, Waled

    2016-02-01

    Recent studies have shown that various ultrasonic wave mixing techniques can be exploited for assessing the nonlinearity of both intact and damaged materials. It has been reported that one particular type of ultrasonic wave mixing, non-collinear shear wave mixing, is sensitive to the excess nonlinearity caused by plastic deformation and low-cycle fatigue in Al2014-T4 aluminum alloy. In this study we investigated the feasibility of using the same non-collinear shear wave mixing technique to detect plastic deformation and fatigue damage in fully hardened IN718 engine alloy specimens. We implemented numerous technical improvements over the earlier developed non-collinear shear wave mixing system to improve its detection sensitivity and image resolution. In spite of these enhancements, we found that in fully hardened IN718 this technique is sensitive only to plastic deformation and, to a much lesser degree, to highly accelerated low-cycle fatigue, but it is not sensitive to either typical low-cycle fatigue or high-cycle fatigue. These observations highlight a potential deficiency in our current understanding of nonlinear material-wave interaction and suggest that further research is needed to explain why certain classes of dislocation networks remain hidden from this type of inspection.

  8. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    PubMed Central

    Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.

    2016-01-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566

  9. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.

    PubMed

    Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M

    2016-01-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566

  10. Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing

    NASA Astrophysics Data System (ADS)

    Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.

    2016-07-01

    Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).

  11. General analytical shakedown solution for structures with kinematic hardening materials

    NASA Astrophysics Data System (ADS)

    Guo, Baofeng; Zou, Zongyuan; Jin, Miao

    2016-04-01

    The effect of kinematic hardening behavior on the shakedown behaviors of structure has been investigated by performing shakedown analysis for some specific problems. The results obtained only show that the shakedown limit loads of structures with kinematic hardening model are larger than or equal to those with perfectly plastic model of the same initial yield stress. To further investigate the rules governing the different shakedown behaviors of kinematic hardening structures, the extended shakedown theorem for limited kinematic hardening is applied, the shakedown condition is then proposed, and a general analytical solution for the structural shakedown limit load is thus derived. The analytical shakedown limit loads for fully reversed cyclic loading and non-fully reversed cyclic loading are then given based on the general solution. The resulting analytical solution is applied to some specific problems: a hollow specimen subjected to tension and torsion, a flanged pipe subjected to pressure and axial force and a square plate with small central hole subjected to biaxial tension. The results obtained are compared with those in literatures, they are consistent with each other. Based on the resulting general analytical solution, rules governing the general effects of kinematic hardening behavior on the shakedown behavior of structure are clearly.

  12. Surface Fatigue Resistance with Induction Hardening

    NASA Technical Reports Server (NTRS)

    Townsend, Dennis; Turza, Alan; Chapman, Mike

    1996-01-01

    Induction hardening has been used for some years to harden the surface and improve the strength and service life of gears and other components. Many applications that employ induction hardening require a relatively long time to finish the hardening process and controlling the hardness of the surface layer and its depth often was a problem. Other surface hardening methods, ie., carbonizing, take a very long time and tend to cause deformations of the toothing, whose elimination requires supplementary finishing work. In double-frequency induction hardening, one uses a low frequency for the preheating of the toothed wheel and a much higher frequency for the purpose of rapidly heating the surface by way of surface hardening.

  13. Effects of alloying elements on radiation hardening based on loop formation of electron-irradiated light water reactor pressure vessel model steels

    NASA Astrophysics Data System (ADS)

    Nishi, Takakuni; Hashimoto, N.; Ohnuki, S.; Yamamoto, T.; Odette, G. R.

    2011-10-01

    Electron irradiations using a high voltage electron microscope were conducted on several reactor pressure vessel model alloys in order to investigate the effects of alloying elements on the formation and development of defect clusters. In addition, the effects of alloying elements on yield stress change after irradiation were considered, comparing the mean size and number density of dislocation loops with the irradiation-induced hardening. High Cu alloys formed Cu and Mn-Ni-Si rich clusters, and these are important in determining the yield stress increase. High Ni alloys formed a high density of small dislocation loops and probably Mn-Ni-Si rich cluster, which have the effect of increasing the yield stress. High P enhanced radiation-induced segregation on grain boundary, helping prevent dislocation movement.

  14. Tensile and Fatigue Testing and Material Hardening Model Development for 508 LAS Base Metal and 316 SS Similar Metal Weld under In-air and PWR Primary Loop Water Conditions

    SciTech Connect

    Mohanty, Subhasish; Soppet, William; Majumdar, Saurin; Natesan, Ken

    2015-09-01

    This report provides an update on an assessment of environmentally assisted fatigue for light water reactor components under extended service conditions. This report is a deliverable in September 2015 under the work package for environmentally assisted fatigue under DOE’s Light Water Reactor Sustainability program. In an April 2015 report we presented a baseline mechanistic finite element model of a two-loop pressurized water reactor (PWR) for systemlevel heat transfer analysis and subsequent thermal-mechanical stress analysis and fatigue life estimation under reactor thermal-mechanical cycles. In the present report, we provide tensile and fatigue test data for 508 low-alloy steel (LAS) base metal, 508 LAS heat-affected zone metal in 508 LAS–316 stainless steel (SS) dissimilar metal welds, and 316 SS-316 SS similar metal welds. The test was conducted under different conditions such as in air at room temperature, in air at 300 oC, and under PWR primary loop water conditions. Data are provided on materials properties related to time-independent tensile tests and time-dependent cyclic tests, such as elastic modulus, elastic and offset strain yield limit stress, and linear and nonlinear kinematic hardening model parameters. The overall objective of this report is to provide guidance to estimate tensile/fatigue hardening parameters from test data. Also, the material models and parameters reported here can directly be used in commercially available finite element codes for fatigue and ratcheting evaluation of reactor components under in-air and PWR water conditions.

  15. The Classroom Password: A Class-Wide Intervention to Increase Academic Engagement

    ERIC Educational Resources Information Center

    Dart, Evan H.; Radley, Keith C.; Battaglia, Allison A.; Dadakhodjaeva, Komila; Bates, Kayla E.; Wright, Sarah J.

    2016-01-01

    The present study investigated the effectiveness of a novel class-wide intervention, the Classroom Password, for increasing the academic engaged behavior of middle school students. The effectiveness of an independent group contingency was evaluated using a concurrent multiple baseline design across three seventh- and eighth-grade classrooms.…

  16. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2014-04-01 2014-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  17. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2012-04-01 2011-04-01 true What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  18. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2011-04-01 2011-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  19. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  20. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2013-04-01 2013-04-01 false What security controls must I use for identification codes and passwords? 73.12 Section 73.12 Alcohol, Tobacco Products and Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES...

  1. A password for species recognition in a brood-parasitic bird.

    PubMed

    Hauber, M E; Russo, S A; Sherman, P W

    2001-05-22

    Recognition of conspecifics is an essential precursor of sexual reproduction. Most mammals and birds learn salient features of their parents or siblings early in ontogeny and later recognize individuals whose phenotypes match the mental image (template) of relatives closely enough as conspecifics. However, the young of brood parasites are reared among heterospecifics, so social learning will yield inappropriate species recognition templates. Initially, it was inferred that conspecific recognition in brood parasites depended on genetically determined templates. More recently it was demonstrated that learning plays a critical role in the development of parasites' social preferences. Here we propose a mechanism that accommodates the interaction of learned and genetic components of recognition. We suggest that conspecific recognition is initiated when a young parasite encounters some unique species-specific signal or "password" (e.g. a vocalization, behaviour or other characteristic) that triggers learning of additional aspects of the password-giver's phenotype. We examined the possibility that nestlings of the obligately brood-parasitic brown-headed cowbird (Molothrus ater) could use a species-specific vocalization, the "chatter", as a password. We found that six-day-old nestlings responded (begged) significantly more frequently to playbacks of chatters than to other avian sounds and that two-month-old fledglings approached playbacks of chatters more quickly than vocalizations of heterospecifics. Free-living cowbird fledglings and adults also approached playbacks of chatters more often than control sounds. Passwords may be involved in the ontogeny of species recognition in brood parasites generally. PMID:11375088

  2. Statistical thermodynamics of strain hardening in polycrystalline solids

    SciTech Connect

    Langer, James S.

    2015-09-18

    This paper starts with a systematic rederivation of the statistical thermodynamic equations of motion for dislocation-mediated plasticity proposed in 2010 by Langer, Bouchbinder, and Lookman. The paper then uses that theory to explain the anomalous rate-hardening behavior reported in 1988 by Follansbee and Kocks and to explore the relation between hardening rate and grain size reported in 1995 by Meyers et al. A central theme is the need for physics-based, nonequilibrium analyses in developing predictive theories of the strength of polycrystalline materials.

  3. Statistical thermodynamics of strain hardening in polycrystalline solids

    SciTech Connect

    Langer, James S.

    2015-01-01

    This paper starts with a systematic rederivation of the statistical thermodynamic equations of motion for dislocation-mediated plasticity proposed in 2010 by Langer, Bouchbinder, and Lookman. The paper then uses that theory to explain the anomalous rate-hardening behavior reported in 1988 by Follansbee and Kocks and to explore the relation between hardening rate and grain size reported in 1995 by Meyers et al. A central theme is the need for physics-based, nonequilibrium analyses in developing predictive theories of the strength of polycrystalline materials.

  4. Modelling work hardening of aluminium alloys containing dispersoids

    NASA Astrophysics Data System (ADS)

    Zhao, Qinglong; Holmedal, Bjørn

    2013-08-01

    The influence of dispersoids on tensile deformation behaviour has been studied by comparison of aluminium alloys containing different dispersoid densities. It was found that a fine dispersion of non-shearable particles led to an increased work hardening at the initial plastic deformation, but the effect was opposite at higher strains. The reason has been attributed to the generation of geometrically necessary dislocations (GNDs). A new model has been proposed for the evolution of GNDs based on a balance of storage and dynamic recovery of GNDs. The model predicts a rapid saturation of GNDs and a reduced work hardening at small strains, consistent with the experimental results.

  5. Statistical thermodynamics of strain hardening in polycrystalline solids

    NASA Astrophysics Data System (ADS)

    Langer, J. S.

    2015-09-01

    This paper starts with a systematic rederivation of the statistical thermodynamic equations of motion for dislocation-mediated plasticity proposed in 2010 by Langer, Bouchbinder, and Lookman [Acta Mat. 58, 3718 (2010), 10.1016/j.actamat.2010.03.009]. It then uses that theory to explain the anomalous rate-hardening behavior reported in 1988 by Follansbee and Kocks and to explore the relation between hardening rate and grain size reported in 1995 by Meyers et al. A central theme is the need for physics-based, nonequilibrium analyses in developing predictive theories of the strength of polycrystalline materials.

  6. Hardened Client Platforms for Secure Internet Banking

    NASA Astrophysics Data System (ADS)

    Ronchi, C.; Zakhidov, S.

    We review the security of e-banking platforms with particular attention to the exploitable attack vectors of three main attack categories: Man-in-the-Middle, Man-in-the-PC and Man-in-the-Browser. It will be shown that the most serious threats come from combination attacks capable of hacking any transaction without the need to control the authentication process. Using this approach, the security of any authentication system can be bypassed, including those using SecureID Tokens, OTP Tokens, Biometric Sensors and Smart Cards. We will describe and compare two recently proposed e-banking platforms, the ZTIC and the USPD, both of which are based on the use of dedicated client devices, but with diverging approaches with respect to the need of hardening the Web client application. It will be shown that the use of a Hardened Browser (or H-Browser) component is critical to force attackers to employ complex and expensive techniques and to reduce the strength and variety of social engineering attacks down to physiological fraud levels.

  7. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    PubMed Central

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  8. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    PubMed

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  9. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... my TreasuryDirect ® account using my password? 363.17 Section 363.17 Money and Finance: Treasury... using my password? You are solely responsible for the confidentiality and use of your account number, password, and any other form(s) of authentication we may require. We will treat any transactions...

  10. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost,...

  11. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost,...

  12. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost,...

  13. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... accesses my TreasuryDirect ® account using my password? 363.17 Section 363.17 Money and Finance: Treasury... using my password? You are solely responsible for the confidentiality and use of your account number, password, and any other form(s) of authentication we may require. We will treat any transactions...

  14. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... my TreasuryDirect ® account using my password? 363.17 Section 363.17 Money and Finance: Treasury... using my password? You are solely responsible for the confidentiality and use of your account number, password, and any other form(s) of authentication we may require. We will treat any transactions...

  15. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accesses my TreasuryDirect ® account using my password? 363.17 Section 363.17 Money and Finance: Treasury... using my password? You are solely responsible for the confidentiality and use of your account number, password, and any other form(s) of authentication we may require. We will treat any transactions...

  16. 31 CFR 363.17 - Who is liable if someone else accesses my TreasuryDirect ® account using my password?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... my TreasuryDirect ® account using my password? 363.17 Section 363.17 Money and Finance: Treasury... using my password? You are solely responsible for the confidentiality and use of your account number, password, and any other form(s) of authentication we may require. We will treat any transactions...

  17. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost,...

  18. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost,...

  19. Development of a compact radiation-hardened low-noise front-end readout ASIC for CZT-based hard X-ray imager

    NASA Astrophysics Data System (ADS)

    Gao, W.; Gan, B.; Li, X.; Wei, T.; Gao, D.; Hu, Y.

    2015-04-01

    In this paper, we present the development and performances of a radiation-hardened front-end readout application-specific integrated circuit (ASIC) dedicated to CZT detectors for a hard X-ray imager in space applications. The readout channel consists of a charge sensitive amplifier (CSA), a CR-RC shaper, a fast shaper, a discriminator and a driving buffer. With the additional digital filtering, the readout channel can achieve very low noise performances and low power dissipation. An eight-channel prototype ASIC is designed and fabricated in 0.35 μm CMOS process. The energy range of the detected X-rays is evaluated as 1.45 keV to 281 keV. The gain is larger than 100 mV/fC. The equivalent noise charge (ENC) of the ASIC is 53 e- at zero farad plus 10 e- per picofarad. The power dissipation is less than 4.4 mW/channel. Through the measurement with a CZT detector, the energy resolution is less than 3.45 keV (FWHM) under the irradiation of the radioactive source 241Am. The radiation effect experiments indicate that the proposed ASIC can resist the total ionization dose (TID) irradiation of higher than 200 krad (Si).

  20. DISPERSION HARDENING OF URANIUM METAL

    DOEpatents

    Arbiter, W.

    1963-01-15

    A method of hardening U metal involves the forming of a fine dispersion of UO/sub 2/. This method consists of first hydriding the U to form a finely divided powder and then exposing the powder to a very dilute O gas in an inert atmosphere under such pressure and temperature conditions as to cause a thin oxide film to coat each particle of the U hydride, The oxide skin prevents agglomeration of the particles as the remaining H is removed, thus preserving the small particle size. The oxide skin coatings remain as an oxide dispersion. The resulting product may be workhardened to improve its physical characteristics. (AEC)

  1. Energy-Efficient Thermomagnetic and Induction Hardening

    SciTech Connect

    2009-02-01

    This factsheet describes a research project that will develop and test a hybrid thermomagnetic and induction hardening technology to replace conventional heat treatment processes in forging applications.

  2. Radiation Hardened Electronics for Extreme Environments

    NASA Technical Reports Server (NTRS)

    Keys, Andrew S.; Watson, Michael D.

    2007-01-01

    The Radiation Hardened Electronics for Space Environments (RHESE) project consists of a series of tasks designed to develop and mature a broad spectrum of radiation hardened and low temperature electronics technologies. Three approaches are being taken to address radiation hardening: improved material hardness, design techniques to improve radiation tolerance, and software methods to improve radiation tolerance. Within these approaches various technology products are being addressed including Field Programmable Gate Arrays (FPGA), Field Programmable Analog Arrays (FPAA), MEMS Serial Processors, Reconfigurable Processors, and Parallel Processors. In addition to radiation hardening, low temperature extremes are addressed with a focus on material and design approaches.

  3. COSMIC-RAY HELIUM HARDENING

    SciTech Connect

    Ohira, Yutaka; Ioka, Kunihito

    2011-03-01

    Recent observations by the CREAM and ATIC-2 experiments suggest that (1) the spectrum of cosmic-ray (CR) helium is harder than that of CR protons below the knee energy, 10{sup 15}eV, and (2) all CR spectra become hard at {approx}>10{sup 11}eV nucleon{sup -1}. We propose a new idea, that higher energy CRs are generated in a more helium-rich region, to explain the hardening without introducing different sources for CR helium. The helium-to-proton ratio at {approx}100 TeV exceeds the Big Bang abundance Y = 0.25 by several times, and the different spectrum is not reproduced within the diffusive shock acceleration theory. We argue that CRs are produced in a chemically enriched region, such as a superbubble, and the outward-decreasing abundance naturally leads to the hard spectrum of CR helium if CRs escape from the supernova remnant shock in an energy-dependent way. We provide a simple analytical spectrum that also fits well the hardening due to the decreasing Mach number in the hot superbubble with {approx}10{sup 6} K. Our model predicts hard and concave spectra for heavier CR elements.

  4. Forming an age hardenable aluminum alloy with intermediate annealing

    NASA Astrophysics Data System (ADS)

    Wang, Kaifeng; Carsley, John E.; Stoughton, Thomas B.; Li, Jingjing; Zhang, Lianhong; He, Baiyan

    2013-12-01

    A method to improve formability of aluminum sheet alloys by a two-stage stamping process with intermediate annealing was developed for a non-age hardenable Al-Mg alloy where the annealing heat treatment provided recovery of cold work from the initial stamping and recrystallization of the microstructure to enhance the forming limits of the material. This method was extended to an age hardenable, Al-Mg-Si alloy, which is complicated by the competing metallurgical effects during heat treatment including recovery (softening effect) vs. precipitation (hardening effect). An annealing heat treatment process condition was discovered wherein the stored strain energy from an initial plastic deformation can be sufficiently recovered to enhance formability in a second deformation; however, there is a deleterious effect on subsequent precipitation hardening. The improvement in formability was quantified with uniaxial tensile tests as well as with the forming limit diagram. Since strain-based forming limit curves (FLC) are sensitive to pre-strain history, both stress-based FLCs and polar-effective-plastic-strain (PEPS) FLCs, which are path-independent, were used to evaluate the forming limits after preform annealing. A technique was developed to calculate the stress-based FLC in which a residual-effective-plastic-strain (REPS) was determined by overlapping the hardening curve of the pre-strained and annealed material with that of the simply-annealed- material. After converting the strain-based FLCs using the constant REPS method, it was found that the stress-based FLCs and the PEPS FLCs of the post-annealed materials were quite similar and both tools are applicable for evaluating the forming limits of Al-Mg-Si alloys for a two-step stamping process with intermediate annealing.

  5. Evaluation of Springback for DP980 S Rail Using Anisotropic Hardening Models

    NASA Astrophysics Data System (ADS)

    Choi, Jisik; Lee, Jinwoo; Bae, Gihyun; Barlat, Frederic; Lee, Myoung-Gyu

    2016-07-01

    The effect of anisotropic hardening models on springback of an S-rail part was investigated. Two advanced constitutive models based on distortional and kinematic hardening, which captured the Bauschinger effect, transient hardening, and permanent softening during strain path change, were implemented in a finite element (FE) code. In-plane compression-tension tests were performed to identify the model parameters. The springback of the S-rail after forming a 980 MPa dual-phase steel sheet sample was measured and analyzed using different hardening models. The comparison between experimental and FE results demonstrated that the advanced anisotropic hardening models, which are particularly suitable for non-proportional loading, significantly improved the springback prediction capability of an advanced high strength steel.

  6. Consistency condition for isotropic-kinematic hardening of anisotropic yield functions

    NASA Astrophysics Data System (ADS)

    Chung, Kwansoo

    2013-05-01

    For the combined type isotropic-kinematic hardening law to account for the Bauschinger, transient and permanent softening behaviors observed in reverse loading, formulations have been initially developed for isotropic yield functions, mainly based on the von Mises criterion, and then later extended for anisotropic yield functions. Among the efforts to introduce anisotropic yield functions to the combined type hardening formulation, however, some inconsistency has been encountered in manipulating the kinematic hardening law, especially for the nonlinear type law, even though their von Mises yield function versions have been consistent. Therefore, theoretical clarification and clearance of such inconsistency were attempted in this work by imposing the following (consistency) condition: the combined type hardening law is expected to behave the same as the full isotropic hardening for monotonously proportional loading, regardless of (anisotropic) yield functions coupled with the combined type hardening law. An example to account for the anisotropic hardening of an anisotropic yield function utilizing the combined type hardening law, but for which the consistency condition was partially released, was also demonstrated.

  7. Improved hardening theory for cyclic plasticity.

    NASA Technical Reports Server (NTRS)

    Vos, R. G.; Armstrong, W. H.

    1973-01-01

    A temperature-dependent version of a combined hardening theory, including isotropic and kinematic hardening, is presented within the framework of recent plasticity formulations. This theory has been found to be especially useful in finite-element analysis of aerospace vehicle engines under conditions of large plastic strain and low-cycle fatigue.

  8. Kinematic hardening of a porous limestone

    NASA Astrophysics Data System (ADS)

    Cheatham, J. B.; Allen, M. B.; Celle, C. C.

    1984-10-01

    A concept for a kinematic hardening yield surface in stress space for Cordova Cream limestone (Austin Chalk) developed by Celle and Cheatham (1981) has been improved using Ziegler's modification of Prager's hardening rule (Ziegler, 1959). Data to date agree with the formulated concepts. It is shown how kinematic hardening can be used to approximate the yield surface for a wide range of stress states past the initial yield surface. The particular difficulty of identifying the yield surface under conditions of unloading or extension is noted. A yield condition and hardening rule which account for the strain induced anisotropy in Cordova Cream Limestone were developed. Although the actual yield surface appears to involve some change of size and shape, it is concluded that true kinematic hardening provides a basis for engineering calculations.

  9. Challenges in hardening technologies using shallow-trench isolation

    SciTech Connect

    Shaneyfelt, M.R.; Dodd, P.E.; Draper, B.L.; Flores, R.S.

    1998-02-01

    Challenges related to radiation hardening CMOS technologies with shallow-trench isolation are explored. Results show that trench hardening can be more difficult than simply replacing the trench isolation oxide with a hardened field oxide.

  10. Beam hardening correction for sparse-view CT reconstruction

    NASA Astrophysics Data System (ADS)

    Liu, Wenlei; Rong, Junyan; Gao, Peng; Liao, Qimei; Lu, HongBing

    2015-03-01

    Beam hardening, which is caused by spectrum polychromatism of the X-ray beam, may result in various artifacts in the reconstructed image and degrade image quality. The artifacts would be further aggravated for the sparse-view reconstruction due to insufficient sampling data. Considering the advantages of the total-variation (TV) minimization in CT reconstruction with sparse-view data, in this paper, we propose a beam hardening correction method for sparse-view CT reconstruction based on Brabant's modeling. In this correction model for beam hardening, the attenuation coefficient of each voxel at the effective energy is modeled and estimated linearly, and can be applied in an iterative framework, such as simultaneous algebraic reconstruction technique (SART). By integrating the correction model into the forward projector of the algebraic reconstruction technique (ART), the TV minimization can recover images when only a limited number of projections are available. The proposed method does not need prior information about the beam spectrum. Preliminary validation using Monte Carlo simulations indicates that the proposed method can provide better reconstructed images from sparse-view projection data, with effective suppression of artifacts caused by beam hardening. With appropriate modeling of other degrading effects such as photon scattering, the proposed framework may provide a new way for low-dose CT imaging.

  11. Nanoscale characterization of the biomechanical hardening of bovine zona pellucida.

    PubMed

    Boccaccio, Antonio; Frassanito, Maria Cristina; Lamberti, Luciano; Brunelli, Roberto; Maulucci, Giuseppe; Monaci, Maurizio; Papi, Massimiliano; Pappalettere, Carmine; Parasassi, Tiziana; Sylla, Lakamy; Ursini, Fulvio; De Spirito, Marco

    2012-11-01

    The zona pellucida (ZP) is an extracellular membrane surrounding mammalian oocytes. The so-called zona hardening plays a key role in fertilization process, as it blocks polyspermy, which may also be caused by an increase in the mechanical stiffness of the ZP membrane. However, structural reorganization mechanisms leading to ZP's biomechanical hardening are not fully understood yet. Furthermore, a correct estimate of the elastic properties of the ZP is still lacking. Therefore, the aim of the present study was to investigate the biomechanical behaviour of ZP membranes extracted from mature and fertilized bovine oocytes to better understand the mechanisms involved in the structural reorganization of the ZP that may lead to the biomechanical hardening of the ZP. For that purpose, a hybrid procedure is developed by combining atomic force microscopy nanoindentation measurements, nonlinear finite element analysis and nonlinear optimization. The proposed approach allows us to determine the biomechanical properties of the ZP more realistically than the classical analysis based on Hertz's contact theory, as it accounts for the nonlinearity of finite indentation process, hyperelastic behaviour and material heterogeneity. Experimental results show the presence of significant biomechanical hardening induced by the fertilization process. By comparing various hyperelastic constitutive models, it is found that the Arruda-Boyce eight-chain model best describes the biomechanical response of the ZP. Fertilization leads to an increase in the degree of heterogeneity of membrane elastic properties. The Young modulus changes sharply within a superficial layer whose thickness is related to the characteristic distance between cross-links in the ZP filamentous network. These findings support the hypothesis that biomechanical hardening of bovine ZP is caused by an increase in the number of inter-filaments cross-links whose density should be higher in the ZP inner side. PMID:22675161

  12. Alloy solution hardening with solute pairs

    DOEpatents

    Mitchell, John W.

    1976-08-24

    Solution hardened alloys are formed by using at least two solutes which form associated solute pairs in the solvent metal lattice. Copper containing equal atomic percentages of aluminum and palladium is an example.

  13. Fatigue hardening in niobium single crystals.

    NASA Technical Reports Server (NTRS)

    Doner, M.; Diprimio, J. C.; Salkovitz, E. I.

    1973-01-01

    Nb single crystals of various orientations were cyclically deformed in tension-compression under strain control. At low strain amplitudes all crystals oriented for single slip and some oriented for multiple slip showed a two stage hardening. When present, the first stage was characterized with almost no cyclic work hardening. The rate of hardening in the second stage increased with strain amplitude and the amount of secondary slip. In crystals oriented for single slip kink bands developed on their side faces during rapid hardening stage which resulted in considerable amount of asterism in Laue spots. A cyclic stress-strain curve independent of prior history was found to exist which was also independent of crystal orientation. Furthermore, this curve differed only slightly from that of polycrystalline Nb obtained from data in literature.

  14. Process for hardening the surface of polymers

    DOEpatents

    Mansur, L.K.; Lee, E.H.

    1992-07-14

    Hard surfaced polymers and the method for making them is generally described. Polymers are subjected to simultaneous multiple ion beam bombardment, that results in a hardening of the surface and improved wear resistance. 1 figure.

  15. Process for hardening the surface of polymers

    DOEpatents

    Mansur, Louis K.; Lee, Eal H.

    1992-01-01

    Hard surfaced polymers and the method for making them is generally described. Polymers are subjected to simultaneous multiple ion beam bombardment, that results in a hardening of the surface and improved wear resistance.

  16. Decline in Radiation Hardened Microcircuit Infrastructure

    NASA Technical Reports Server (NTRS)

    LaBel, Kenneth A.

    2015-01-01

    Two areas of radiation hardened microcircuit infrastructure will be discussed: 1) The availability and performance of radiation hardened microcircuits, and, and 2) The access to radiation test facilities primarily for proton single event effects (SEE) testing. Other areas not discussed, but are a concern include: The challenge for maintaining radiation effects tool access for assurance purposes, and, the access to radiation test facilities primarily for heavy ion single event effects (SEE) testing. Status and implications will be discussed for each area.

  17. 7 CFR 58.641 - Hardening and storage.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 3 2014-01-01 2014-01-01 false Hardening and storage. 58.641 Section 58.641... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended container it shall be placed in a hardening tunnel or hardening room to continue the freezing process....

  18. 7 CFR 58.641 - Hardening and storage.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 3 2012-01-01 2012-01-01 false Hardening and storage. 58.641 Section 58.641... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended container it shall be placed in a hardening tunnel or hardening room to continue the freezing process....

  19. 7 CFR 58.641 - Hardening and storage.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 3 2013-01-01 2013-01-01 false Hardening and storage. 58.641 Section 58.641... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended container it shall be placed in a hardening tunnel or hardening room to continue the freezing process....

  20. 7 CFR 58.641 - Hardening and storage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Hardening and storage. 58.641 Section 58.641... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended container it shall be placed in a hardening tunnel or hardening room to continue the freezing process....

  1. 7 CFR 58.641 - Hardening and storage.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 3 2011-01-01 2011-01-01 false Hardening and storage. 58.641 Section 58.641... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended container it shall be placed in a hardening tunnel or hardening room to continue the freezing process....

  2. Laser Surface Hardening of AISI 1045 Steel

    NASA Astrophysics Data System (ADS)

    Li, Ruifeng; Jin, Yajuan; Li, Zhuguo; Qi, Kai

    2014-09-01

    The study investigates laser surface hardening in the AISI 1045 steel using two different types of industrial laser: a high-power diode laser (HPDL) and a CO2 laser, respectively. The effect of process parameters such as beam power, travel speed on structure, case depth, and microhardness was examined. In most cases, a heat-affected zone (HAZ) formed below the surface; a substantial increase in surface hardness was achieved. In addition, big differences were found between the hardened specimens after HPDL surface hardening and CO2 laser surface hardening. For HPDL, depths of the HAZ were almost equal in total HAZ o, without surface melting. For CO2 laser, the depths changed a lot in the HAZ, with surface melting in the center. To better understand the difference of laser hardening results when use these two types of laser, numerical (ANSYS) analysis of the heat conduction involved in the process was also studied. For HPDL method, a rectangular beam spot and uniform energy distribution across the spot were assumed, while for CO2 laser, a circular beam spot and Gaussian energy distribution were assumed. The results showed that the energy distribution variety altered the thermal cycles of the HAZ dramatically. The rectangular HPDL laser beam spot with uniform energy distribution is much more feasible for laser surface hardening.

  3. Extracting material response from simple mechanical tests on hardening-softening-hardening viscoplastic solids

    NASA Astrophysics Data System (ADS)

    Mohan, Nisha

    Compliant foams are usually characterized by a wide range of desirable mechanical properties. These properties include viscoelasticity at different temperatures, energy absorption, recoverability under cyclic loading, impact resistance, and thermal, electrical, acoustic and radiation-resistance. Some foams contain nano-sized features and are used in small-scale devices. This implies that the characteristic dimensions of foams span multiple length scales, rendering modeling their mechanical properties difficult. Continuum mechanics-based models capture some salient experimental features like the linear elastic regime, followed by non-linear plateau stress regime. However, they lack mesostructural physical details. This makes them incapable of accurately predicting local peaks in stress and strain distributions, which significantly affect the deformation paths. Atomistic methods are capable of capturing the physical origins of deformation at smaller scales, but suffer from impractical computational intensity. Capturing deformation at the so-called meso-scale, which is capable of describing the phenomenon at a continuum level, but with some physical insights, requires developing new theoretical approaches. A fundamental question that motivates the modeling of foams is `how to extract the intrinsic material response from simple mechanical test data, such as stress vs. strain response?' A 3D model was developed to simulate the mechanical response of foam-type materials. The novelty of this model includes unique features such as the hardening-softening-hardening material response, strain rate-dependence, and plastically compressible solids with plastic non-normality. Suggestive links from atomistic simulations of foams were borrowed to formulate a physically informed hardening material input function. Motivated by a model that qualitatively captured the response of foam-type vertically aligned carbon nanotube (VACNT) pillars under uniaxial compression [2011,"Analysis of

  4. Prediction of Path Deviation in Robot Based Incremental Sheet Metal Forming by Means of a New Solid-Shell Finite Element Technology and a Finite Elastoplastic Model with Combined Hardening

    NASA Astrophysics Data System (ADS)

    Kiliclar, Yalin; Laurischkat, Roman; Vladimirov, Ivaylo N.; Reese, Stefanie

    2011-08-01

    The presented project deals with a robot based incremental sheet metal forming process, which is called roboforming and has been developed at the Chair of Production Systems. It is characterized by flexible shaping using a freely programmable path-synchronous movement of two industrial robots. The final shape is produced by the incremental infeed of the forming tool in depth direction and its movement along the part contour in lateral direction. However, the resulting geometries formed in roboforming deviate several millimeters from the reference geometry. This results from the compliance of the involved machine structures and the springback effects of the workpiece. The project aims to predict these deviations caused by resiliences and to carry out a compensative path planning based on this prediction. Therefore a planning tool is implemented which compensates the robots's compliance and the springback effects of the sheet metal. The forming process is simulated by means of a finite element analysis using a material model developed at the Institute of Applied Mechanics (IFAM). It is based on the multiplicative split of the deformation gradient in the context of hyperelasticity and combines nonlinear kinematic and isotropic hardening. Low-order finite elements used to simulate thin sheet structures, such as used for the experiments, have the major problem of locking, a nonphysical stiffening effect. For an efficient finite element analysis a special solid-shell finite element formulation based on reduced integration with hourglass stabilization has been developed. To circumvent different locking effects, the enhanced assumed strain (EAS) and the assumed natural strain (ANS) concepts are included in this formulation. Having such powerful tools available we obtain more accurate geometries.

  5. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  6. A pedagogical example of second-order arithmetic sequences applied to the construction of computer passwords by upper elementary grade students

    NASA Astrophysics Data System (ADS)

    Coggins, Porter E.

    2015-04-01

    The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.

  7. Strain-hardening in nano-structured single phase steels: mechanisms and control.

    PubMed

    Bouaziz, O; Barbier, D

    2012-11-01

    The detrimental effect of grain size refinement on the strain hardening is highlighted in single phase steels. A physical based approach for understanding the underlying mechanisms is presented. In order to overcome this limitation a promising metallurgical route exploiting the thermal stability of mechanically induced twins in austenitic steels has been successfully applied to a stainless grade confirming the opportunity to get nano-structured alloys exhibiting high yield stress with high strain-hardening. PMID:23421275

  8. Age hardening of 6061/alumina-silica fiber composite

    SciTech Connect

    Khangaonkar, P.R.; Shamsul, J.B.; Azmi, R.

    1994-12-31

    Continuous alumina-silica fiber (Altex of Sumitomo) which yields high performance composites with some aluminium alloys was tried for squeeze cast 6061 based composites with volume fractions of 0.5 and 0.32, and the matrix microhardness and resistivity changes during age hardening were studied. The matrix in the composites hardened much more than the unreinforced alloy. Microhardness increases of up to 70 VPN above the solution treated condition at various aging temperatures were observed. The resistivity variation indicated an appreciable state of internal stress which continued to persist even when hardness fell by overaging. Energy dispersive X-ray analysis indicated that the regions close to the fibers had a higher silicon content than the matrix, and amorphous silica in the fiber may have a role in the formation of an enriched layer which may help the bonding and strength in the composite.

  9. Design concepts for hardened communications structures

    NASA Astrophysics Data System (ADS)

    Flathau, William J.; Smith, William G.

    1990-03-01

    An important component of any hardened command and control structure is the antenna system that provides communication with the outside world. Two types of antennae were considered; i.e., the whip type and the directional. The whip type is for short range communication and the directional is for use primarily with satellites. In the super high frequency range, the use of directional antennae having parabolic dishes greater than 8 feet in diameter are common. In the very extra high frequency range, dishes that are 2 to 3 feet in diameter are used. The whip type antenna should extend up to, say, 60 feet in the air. Based on this background, a family of structures was designed that can protect whip and directional antennae from the blast and shock effects from a 1-MT device for ground surface overpressure ranging from 15,000 to 500 psi. As the antennae, transmitters, receivers, power supplies, and lifting mechanisms will be located within such structures, appropriate shock spectra plots were developed to determine if the fragility level of pertinent equipment will be exceeded and for use in designing shock isolation systems. Button up periods of 1 and 4 weeks were considered.

  10. Cyber situational awareness and differential hardening

    NASA Astrophysics Data System (ADS)

    Dwivedi, Anurag; Tebben, Dan

    2012-06-01

    The advent of cyber threats has created a need for a new network planning, design, architecture, operations, control, situational awareness, management, and maintenance paradigms. Primary considerations include the ability to assess cyber attack resiliency of the network, and rapidly detect, isolate, and operate during deliberate simultaneous attacks against the network nodes and links. Legacy network planning relied on automatic protection of a network in the event of a single fault or a very few simultaneous faults in mesh networks, but in the future it must be augmented to include improved network resiliency and vulnerability awareness to cyber attacks. Ability to design a resilient network requires the development of methods to define, and quantify the network resiliency to attacks, and to be able to develop new optimization strategies for maintaining operations in the midst of these newly emerging cyber threats. Ways to quantify resiliency, and its use in visualizing cyber vulnerability awareness and in identifying node or link criticality, are presented in the current work, as well as a methodology of differential network hardening based on the criticality profile of cyber network components.

  11. Monitoring of hardening and hygroscopic induced strains in a calcium phosphate bone cement using FBG sensor.

    PubMed

    Bimis, A; Karalekas, D; Bouropoulos, N; Mouzakis, D; Zaoutsos, S

    2016-07-01

    This study initially deals with the investigation of the induced strains during hardening stage of a self-setting calcium phosphate bone cement using fiber-Bragg grating (FBG) optical sensors. A complementary Scanning Electron Microscopy (SEM) investigation was also conducted at different time intervals of the hardening period and its findings were related to the FBG recordings. From the obtained results, it is demonstrated that the FBG response is affected by the microstructural changes taking place when the bone cement is immersed into the hardening liquid media. Subsequently, the FBG sensor was used to monitor the absorption process and hygroscopic response of the hardened and dried biocement when exposed to a liquid/humid environment. From the FBG-based calculated hygric strains as a function of moisture concentration, the coefficient of moisture expansion (CME) of the examined bone cement was obtained, exhibiting two distinct linear regions. PMID:26807773

  12. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    PubMed

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956

  13. Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks

    PubMed Central

    Nam, Junghyun; Choo, Kim-Kwang Raymond

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956

  14. Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

    NASA Astrophysics Data System (ADS)

    Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki

    An anonymous password-authenticated key exchange (anonymous PAKE) protocol is designed to provide both password-only authentication and user anonymity against a semi-honest server, who follows the protocol honestly. Very recently, Yang and Zhang [25] have proposed a new anonymous PAKE (NAPAKE) protocol that is claimed efficient compared to the previous constructions. In this paper, we propose a very-efficient anonymous PAKE (called, VEAP) protocol that provides the most efficiency among their kinds in terms of computation and communication costs. The VEAP protocol guarantees semantic security of session keys in the random oracle model under the chosen target CDH problem, and unconditional user anonymity against a semi-honest server. If the pre-computation is allowed, both the user and the server are required to compute only one modular exponentiation, respectively. Surprisingly, this is the same computation cost of the well-known Diffie-Hellman protocol that does not provide authentication at all. In addition, we extend the VEAP protocol in two ways: the first is designed to reduce the communication costs of the VEAP protocol and the second shows that stripping off anonymity parts from the VEAP protocol results in a new PAKE protocol.

  15. A molecular keypad lock: a photochemical device capable of authorizing password entries.

    PubMed

    Margulies, David; Felder, Clifford E; Melman, Galina; Shanzer, Abraham

    2007-01-17

    This paper describes a new concept in the way information can be protected at the molecular scale. By harnessing the principles of molecular Boolean logic, we have designed a molecular device that mimics the operation of an electronic keypad lock, e.g., a common security circuit used for numerous applications, in which access to an object or data is to be restricted to a limited number of persons. What distinguishes this lock from a simple molecular logic gate is the fact that its output signals are dependent not only on the proper combination of the inputs but also on the correct order by which these inputs are introduced. In other words, one needs to know the exact passwords that open this lock. The different password entries are coded by a combination of two chemical and one optical input signals, which can activate, separately, blue or green fluorescence output channels from pyrene or fluorescein fluorophores. The information in each channel is a single-bit light output signal that can be used to authorize a user, to verify authentication of a product, or to initiate a higher process. This development not only opens the way for a new class of molecular decision-making devices but also adds a new dimension of protection to existing defense technologies, such as cryptography and steganography, previously achieved with molecules. PMID:17212414

  16. Control technology for surface treatment of materials using induction hardening

    SciTech Connect

    Kelley, J.B.; Skocypec, R.D.

    1997-04-01

    In the industrial and automotive industries, induction case hardening is widely used to provide enhanced strength, wear resistance, and toughness in components made from medium and high carbon steels. The process uses significantly less energy than competing batch process, is environmentally benign, and is a very flexible in-line manufacturing process. As such, it can directly contribute to improved component reliability, and the manufacture of high-performance lightweight parts. However, induction hardening is not as widely used as it could be. Input material and unexplained process variations produce significant variation in product case depth and quality. This necessitates frequent inspection of product quality by destructive examination, creates higher than desired scrap rates, and causes de-rating of load stress sensitive components. In addition, process and tooling development are experience-based activities, accomplished by trial and error. This inhibits the use of induction hardening for new applications, and the resultant increase in energy efficiency in the industrial sectors. In FY96, a Cooperative Research and Development Agreement under the auspices of the Technology Transfer Initiative and the Partnership for a New Generation of Vehicles was completed. A multidisciplinary team from Sandia National Labs and Delphi Saginaw Steering Systems investigated the induction hardening by conducting research in the areas of process characterization, computational modeling, materials characterization, and high speed data acquisition and controller development. The goal was to demonstrate the feasibility of closed-loop control for a specific material, geometry, and process. Delphi Steering estimated annual savings of $2-3 million per year due to reduced scrap losses, inspection costs, and machine down time if reliable closed-loop control could be achieved. A factor of five improvement in process precision was demonstrated and is now operational on the factory floor.

  17. Reduction of metal artifacts: beam hardening and photon starvation effects

    NASA Astrophysics Data System (ADS)

    Yadava, Girijesh K.; Pal, Debashish; Hsieh, Jiang

    2014-03-01

    The presence of metal-artifacts in CT imaging can obscure relevant anatomy and interfere with disease diagnosis. The cause and occurrence of metal-artifacts are primarily due to beam hardening, scatter, partial volume and photon starvation; however, the contribution to the artifacts from each of them depends on the type of hardware. A comparison of CT images obtained with different metallic hardware in various applications, along with acquisition and reconstruction parameters, helps understand methods for reducing or overcoming such artifacts. In this work, a metal beam hardening correction (BHC) and a projection-completion based metal artifact reduction (MAR) algorithms were developed, and applied on phantom and clinical CT scans with various metallic implants. Stainless-steel and Titanium were used to model and correct for metal beam hardening effect. In the MAR algorithm, the corrupted projection samples are replaced by the combination of original projections and in-painted data obtained by forward projecting a prior image. The data included spine fixation screws, hip-implants, dental-filling, and body extremity fixations, covering range of clinically used metal implants. Comparison of BHC and MAR on different metallic implants was used to characterize dominant source of the artifacts, and conceivable methods to overcome those. Results of the study indicate that beam hardening could be a dominant source of artifact in many spine and extremity fixations, whereas dental and hip implants could be dominant source of photon starvation. The BHC algorithm could significantly improve image quality in CT scans with metallic screws, whereas MAR algorithm could alleviate artifacts in hip-implants and dentalfillings.

  18. Description of full-range strain hardening behavior of steels.

    PubMed

    Li, Tao; Zheng, Jinyang; Chen, Zhiwei

    2016-01-01

    Mathematical expression describing plastic behavior of steels allows the execution of parametric studies for many purposes. Various formulas have been developed to characterize stress strain curves of steels. However, most of those formulas failed to describe accurately the strain hardening behavior of steels in the full range which shows various distinct stages. For this purpose, a new formula is developed based on the well-known Ramberg-Osgood formula to describe the full range strain hardening behavior of steels. Test results of all the six types of steels show a three-stage strain hardening behavior. The proposed formula can describe such behavior accurately in the full range using a single expression. The parameters of the formula can be obtained directly and easily through linear regression analysis. Excellent agreements with the test data are observed for all the steels tested. Furthermore, other formulas such as Ludwigson formula, Gardner formula, UGent formula are also applied for comparison. Finally, the proposed formula is considered to have wide suitability and high accuracy for all the steels tested. PMID:27563511

  19. Obtaining strong zirconia ceramic by hardening and tempering

    SciTech Connect

    Pliner, S.Y.; Dabizha, A.A.; Komolikov, Y.I.; Rutman, D.S.; Toropov, Y.S.

    1985-07-01

    To determine whether it is possible to strengthen ceramics by means of hardening and tempering, the authors selected a solid solution pf 3.4% of Y/sub 2/O/sub 3/ (molar fraction) in ZrO/sub 2/. The solution was synthesized by combined precipitation of the compounds from an aqueous solution of chlorides. The filtered residue of hydroxides was dried and calcined at about 900/sup 0/C. The calcined material was milled for 80 h in an iron ball mill by the wet method with a ratio of materials: balls: water of 1:2:1. The material was then purified to remove tramp iron by treatment with HC1 with an addition of hydrogen peroxide, followed by decantation with distilled water. The specimens were heated to 2250-2300/sup 0/C in a furnace with a straight-through vertical channel of diameter 20 mm, a heating element made of stabilized zirconia, and high-temperature heat insulation made of porous ceramic-concrete based on ZrO/sub 2/. The hardening of the specimens at this temperature was done at a rate ensuring practically complete preservation of the cubic phase of ZrO/sub 2/. The tempering of the hardened specimens was done by the furnace with a silit heaters at 1400/sup 0/C over different times (0-85 h).

  20. Influence of slip system hardening assumptions on modeling stress dependence of work hardening

    NASA Astrophysics Data System (ADS)

    Miller, Matthew; Dawson, Paul

    1997-11-01

    Due to the discrete directional nature of processes such as crystallographic slip, the orientation of slip planes relative to a fixed set of loading axes has a direct effect on the magnitude of the external load necessary to induce dislocation motion (yielding). The effect such geometric or textural hardening has on the macroscopic flow stress can be quantified in a polycrystal by the average Taylor factor M¯. Sources of resistance to dislocation motion such as interaction with dislocation structures, precipitates, and grain boundaries, contribute to the elevation of the critically resolved shear strength τcrss. In continuum slip polycrystal formulations, material hardening phenomena are reflected in the slip system hardness equations. Depending on the model, the hardening equations and the mean field assumption can both affect geometric hardening through texture evolution. In this paper, we examine continuum slip models and focus on how the slip system hardening model and the mean field assumption affect the stress-strain response. Texture results are also presented within the context of how the texture affects geometric hardening. We explore the effect of employing slip system hardnesses averaged over different size scales. We first compare a polycrystal simulation employing a single hardness per crystal to one using a latent hardening formulation producing distinct slip system hardnesses. We find little difference between the amplitude of the single hardness and a crystal-average of the latent hardening values. The geometric hardening is different due to the differences in the textures predicted by each model. We also find that due to the high degree of symmetry in an fcc crystal, macroscopic stress-strain predictions using simulations employing crystal- and aggregateaveraged hardnesses are nearly identical. We find this to be true for several different mean field assumptions. An aggregate-averaged hardness may be preferred in light of the difficulty

  1. Modeling of Irradiation Hardening of Polycrystalline Materials

    SciTech Connect

    Li, Dongsheng; Zbib, Hussein M.; Garmestani, Hamid; Sun, Xin; Khaleel, Mohammad A.

    2011-09-14

    High energy particle irradiation of structural polycrystalline materials usually produces irradiation hardening and embrittlement. The development of predict capability for the influence of irradiation on mechanical behavior is very important in materials design for next generation reactors. In this work a multiscale approach was implemented to predict irradiation hardening of body centered cubic (bcc) alpha-iron. The effect of defect density, texture and grain boundary was investigated. In the microscale, dislocation dynamics models were used to predict the critical resolved shear stress from the evolution of local dislocation and defects. In the macroscale, a viscoplastic self-consistent model was applied to predict the irradiation hardening in samples with changes in texture and grain boundary. This multiscale modeling can guide performance evaluation of structural materials used in next generation nuclear reactors.

  2. Segmentation-free empirical beam hardening correction for CT

    SciTech Connect

    Schüller, Sören; Sawall, Stefan; Stannigel, Kai; Hülsbusch, Markus; Ulrici, Johannes; Hell, Erich; Kachelrieß, Marc

    2015-02-15

    Purpose: The polychromatic nature of the x-ray beams and their effects on the reconstructed image are often disregarded during standard image reconstruction. This leads to cupping and beam hardening artifacts inside the reconstructed volume. To correct for a general cupping, methods like water precorrection exist. They correct the hardening of the spectrum during the penetration of the measured object only for the major tissue class. In contrast, more complex artifacts like streaks between dense objects need other techniques of correction. If using only the information of one single energy scan, there are two types of corrections. The first one is a physical approach. Thereby, artifacts can be reproduced and corrected within the original reconstruction by using assumptions in a polychromatic forward projector. These assumptions could be the used spectrum, the detector response, the physical attenuation and scatter properties of the intersected materials. A second method is an empirical approach, which does not rely on much prior knowledge. This so-called empirical beam hardening correction (EBHC) and the previously mentioned physical-based technique are both relying on a segmentation of the present tissues inside the patient. The difficulty thereby is that beam hardening by itself, scatter, and other effects, which diminish the image quality also disturb the correct tissue classification and thereby reduce the accuracy of the two known classes of correction techniques. The herein proposed method works similar to the empirical beam hardening correction but does not require a tissue segmentation and therefore shows improvements on image data, which are highly degraded by noise and artifacts. Furthermore, the new algorithm is designed in a way that no additional calibration or parameter fitting is needed. Methods: To overcome the segmentation of tissues, the authors propose a histogram deformation of their primary reconstructed CT image. This step is essential for the

  3. 'Work-Hardenable' Ductile Bulk Metallic Glass

    SciTech Connect

    Das, Jayanta; Eckert, Juergen; Tang Meibo; Wang Weihua; Kim, Ki Buem; Baier, Falko; Theissmann, Ralf

    2005-05-27

    Usually, monolithic bulk metallic glasses undergo inhomogeneous plastic deformation and exhibit poor ductility (<1%) at room temperature. We present a new class of bulk metallic glass, which exhibits high strength of up to 2265 MPa together with extensive 'work hardening' and large ductility of 18%. Significant increase in the flow stress was observed during deformation. The 'work-hardening' capability and ductility of this class of metallic glass is attributed to a unique structure correlated with atomic-scale inhomogeneity, leading to an inherent capability of extensive shear band formation, interactions, and multiplication of shear bands.

  4. Irradiation hardening of reduced activation martensitic steels

    NASA Astrophysics Data System (ADS)

    Kimura, A.; Morimura, T.; Narui, M.; Matsui, H.

    1996-10-01

    Irradiation response on the tensile properties of 9Cr2W steels has been investigated following FFTF/MOTA irradiations at temperatures between 646 and 873 K up to doses between 10 and 59 dpa. The largest irradiation hardening accompanied by the largest decrease in the elongation is observed for the specimens irradiated at 646 K at doses between 10 and 15 dpa. The irradiation hardening appears to saturate at a dose of around 10 dpa at the irradiation temperature. No hardening but softening was observed in the specimens irradiated at above 703 K to doses of 40 and 59 dpa. Microstructural observation by transmission electron microscope (TEM) revealed that the dislocation loops with the a<100> type Burgers vector and small precipitates which were identified to be M 6C type carbides existed after the irradiation at below 703 K. As for the void formation, the average size of voids increased with increasing irradiation temperature from 646 to 703 K. No voids were observed above 703 K. Irradiation softening was attributed to the enhanced recovery of martensitic structure under the irradiation. Post-irradiation annealing resulted in hardening by the annealing at 673 K and softening by the annealing at 873 K.

  5. SEU hardening of CMOS memory circuit

    NASA Technical Reports Server (NTRS)

    Whitaker, S.; Canaris, J.; Liu, K.

    1990-01-01

    This paper reports a design technique to harden CMOS memory circuits against Single Event Upset (SEU) in the space environment. A RAM cell and Flip Flop design are presented to demonstrate the method. The Flip Flop was used in the control circuitry for a Reed Solomon encoder designed for the Space Station.

  6. Extraordinary strain hardening by gradient structure

    PubMed Central

    Wu, XiaoLei; Jiang, Ping; Chen, Liu; Yuan, Fuping; Zhu, Yuntian T.

    2014-01-01

    Gradient structures have evolved over millions of years through natural selection and optimization in many biological systems such as bones and plant stems, where the structures change gradually from the surface to interior. The advantage of gradient structures is their maximization of physical and mechanical performance while minimizing material cost. Here we report that the gradient structure in engineering materials such as metals renders a unique extra strain hardening, which leads to high ductility. The grain-size gradient under uniaxial tension induces a macroscopic strain gradient and converts the applied uniaxial stress to multiaxial stresses due to the evolution of incompatible deformation along the gradient depth. Thereby the accumulation and interaction of dislocations are promoted, resulting in an extra strain hardening and an obvious strain hardening rate up-turn. Such extraordinary strain hardening, which is inherent to gradient structures and does not exist in homogeneous materials, provides a hitherto unknown strategy to develop strong and ductile materials by architecting heterogeneous nanostructures. PMID:24799688

  7. Embryonic learning of vocal passwords in superb fairy-wrens reveals intruder cuckoo nestlings.

    PubMed

    Colombelli-Négrel, Diane; Hauber, Mark E; Robertson, Jeremy; Sulloway, Frank J; Hoi, Herbert; Griggio, Matteo; Kleindorfer, Sonia

    2012-11-20

    How do parents recognize their offspring when the cost of making a recognition error is high? Avian brood parasite-host systems have been used to address this question because of the high cost of parasitism to host fitness. We discovered that superb fairy-wren (Malurus cyaneus) females call to their eggs, and upon hatching, nestlings produce begging calls with key elements from their mother's "incubation call." Cross-fostering experiments showed highest similarity between foster mother and nestling calls, intermediate similarity with genetic mothers, and least similarity with parasitic Horsfield's bronze-cuckoo (Chalcites basalis) nestlings. Playback experiments showed that adults respond to the begging calls of offspring hatched in their own nest and respond less to calls of other wren or cuckoo nestlings. We conclude that wrens use a parent-specific password learned embryonically to shape call similarity with their own young and thereby detect foreign cuckoo nestlings. PMID:23142041

  8. 'Fire hardening' spear wood does slightly harden it, but makes it much weaker and more brittle.

    PubMed

    Ennos, Antony Roland; Chan, Tak Lok

    2016-05-01

    It is usually assumed that 'fire hardening' the tips of spears, as practised by hunter-gatherers and early Homo spp., makes them harder and better suited for hunting. This suggestion was tested by subjecting coppiced poles of hazel to a fire-hardening process and comparing their mechanical properties to those of naturally seasoned poles. A Shore D hardness test showed that fire treatment slightly increased the hardness of the wood, but flexural and impact tests showed that it reduced the strength and work of fracture by 30% and 36%, respectively. These results suggest that though potentially slightly sharper and more durable, fire-hardened tips would actually be more likely to break off when used, as may have been the case with the earliest known wooden tool, the Clacton spear. Fire might first have been used to help sharpen the tips of spears, and fire-hardening would have been a mostly negative side effect, not its primary purpose. PMID:27194289

  9. Deformation in metals after low temperature irradiation: Part II - Irradiation hardening, strain hardening, and stress ratios

    SciTech Connect

    Byun, Thak Sang; Li, Meimei

    2008-03-01

    Effects of irradiation at temperatures 200oC on tensile stress parameters are analyzed for dozens of bcc, fcc, and hcp pure metals and alloys, focusing on irradiation hardening, strain hardening, and relationships between the true stress parameters. Similar irradiation-hardening rates are observed for all the metals irrespective of crystal type; typically, the irradiation-hardening rates are large, in the range 100 - 1000 GPa/dpa, at the lowest dose of <0.0001 dpa and decrease with dose to a few tens of MPa/dpa or less at about 10 dpa. However, average irradiation-hardening rates over the dose range of 0 dpa − (the dose to plastic instability at yield) are considerably lower for stainless steels due to their high uniform ductility. It is shown that whereas low temperature irradiation increases the yield stress, it does not significantly change the strain-hardening rate of metallic materials; it decreases the fracture stress only when non-ductile failure occurs. Such dose independence in strain hardening behavior results in strong linear relationships between the true stress parameters. Average ratios of plastic instability stress to unirradiated yield stress are about 1.4, 3.9, and 1.3 for bcc metals (and precipitation hardened IN718 alloy), annealed fcc metals (and pure Zr), and Zr-4 alloy, respectively. Ratios of fracture stress to plastic instability stress are calculated to be 2.2, 1.7, and 2.1, respectively. Comparison of these values confirms that the annealed fcc metals and other soft metals have larger uniform ductility but smaller necking ductility when compared to other materials.

  10. 7 CFR 58.622 - Hardening and storage rooms.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 3 2012-01-01 2012-01-01 false Hardening and storage rooms. 58.622 Section 58.622 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be...

  11. 7 CFR 58.622 - Hardening and storage rooms.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 3 2013-01-01 2013-01-01 false Hardening and storage rooms. 58.622 Section 58.622 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be...

  12. 7 CFR 58.622 - Hardening and storage rooms.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 3 2014-01-01 2014-01-01 false Hardening and storage rooms. 58.622 Section 58.622 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be...

  13. 7 CFR 58.622 - Hardening and storage rooms.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Hardening and storage rooms. 58.622 Section 58.622 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be...

  14. 7 CFR 58.622 - Hardening and storage rooms.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 3 2011-01-01 2011-01-01 false Hardening and storage rooms. 58.622 Section 58.622 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be...

  15. Surface hardening of cutting elements agricultural machinery vibro arc plasma

    NASA Astrophysics Data System (ADS)

    Sharifullin, S. N.; Adigamov, N. R.; Adigamov, N. N.; Solovev, R. Y.; Arakcheeva, K. S.

    2016-01-01

    At present, the state technical policy aimed at the modernization of worn equipment, including agriculture, based on the use of high-performance technology called nanotechnology. By upgrading worn-out equipment meant restoring it with the achievement of the above parameters passport. The existing traditional technologies are not suitable for the repair of worn-out equipment modernization. This is especially true of imported equipment. Out here alone - is the use of high-performance technologies. In this paper, we consider the use of vibro arc plasma for surface hardening of cutting elements of agricultural machinery.

  16. Radiation-Hardened Software for Space Flight Science Applications

    NASA Astrophysics Data System (ADS)

    Mehlitz, P. C.; Penix, J. J.; Markosian, L. Z.

    2005-12-01

    Hardware faults caused by radiation-induced Single Event Effects (SEEs) are a serious issue in space flight, especially affecting scientific missions in earth orbits crossing the poles or the South Atlantic Anomaly. Traditionally, SEEs are treated as a hardware problem, for example mitigated by radiation-hardened processors and shielding. Rad-hardened processors are expensive, exhibit a decade performance gap compared to COTS technology, have a larger form factor and require more power. Shielding is ineffective for high energy particles and increases launch weight. Hardware approaches cannot dynamically adapt protection levels for different radiation scenarios depending on solar activity and flight phase. Future hardware will exacerbate the problem due to higher chip densities and lower power levels. An alternative approach is to use software to mitigate SEEs. This "Radiation Hardened Software" (RHS) approach has two components: (1) RHS library and application design guidelines To increase robustness, we combine SEE countermeasures in three areas: prevention and detection; recovery; and reconfiguration. Prevention and detection includes an application- and heap-aware memory scanner, and dynamically adapted software Error Correction Codes to handle cache and multi-bit errors. Recovery mechanisms include exception firewalls and transaction-based software design patterns, to minimize data loss. Reconfiguration includes a heap manager to avoid damaged memory areas. (2) Software-based SEE Simulation Probabilistic effects require extensive simulation, with test environments that do not require original flight hardware and can simulate various SEE profiles. We use processor emulation software, interfaced to a debugger, to analyze SEE propagation and optimize RHS mechanisms. The simulator runs unmodified binary flight code, enables injecting randomized transient and permanent memory errors, providing execution traces and precise failure reproduction. The goal of RHS is to

  17. Effectiveness of hardening threaded parts by plastic deformation

    SciTech Connect

    Pyshkin, V.A.; Belai, S.V.; Dyad'kova, I.G.

    1983-03-01

    The rules of hardening threaded parts by roller burning the root of the inner diameter of a thread are studied. The effectiveness of hardening increases where the allowance for the inner diameter increases. By equations, a change in the inner diameter can be used to determine the depth of work hardening residual compressive stress, fatigue limit, and the mechanical properties of the threaded part. The effective stress concentration factor, increase in transmission load, and average tensile stress in cyclic loading, are also calculated. Equations help to determine the depth of hardening necessary; the optimum conditions of burnishing; and the maximum increase in fatigue strength, with optimum hardening conditions.

  18. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    PubMed

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior. PMID:26252928

  19. Determination of Constant Parameters of Copper as Power-Law Hardening Material at Different Test Conditions

    NASA Astrophysics Data System (ADS)

    Kowser, Md. A.; Mahiuddin, Md.

    2014-11-01

    In this paper a technique has been developed to determine constant parameters of copper as a power-law hardening material by tensile test approach. A work-hardening process is used to describe the increase of the stress level necessary to continue plastic deformation. A computer program is used to show the variation of the stress-strain relation for different values of stress hardening exponent, n and power-law hardening constant, α . Due to its close tolerances, excellent corrosion resistance and high material strength, in this analysis copper (Cu) has been selected as the material. As a power-law hardening material, Cu has been used to compute stress hardening exponent, n and power-law hardening constant, α from tensile test experiment without heat treatment and after heat treatment. A wealth of information about mechanical behavior of a material can be determined by conducting a simple tensile test in which a cylindrical specimen of a uniform cross-section is pulled until it ruptures or fractures into separate pieces. The original cross sectional area and gauge length are measured prior to conducting the test and the applied load and gauge deformation are continuously measured throughout the test. Based on the initial geometry of the sample, the engineering stress-strain behavior (stress-strain curve) can be easily generated from which numerous mechanical properties, such as the yield strength and elastic modulus, can be determined. A universal testing machine is utilized to apply the load in a continuously increasing (ramp) manner according to ASTM specifications. Finally, theoretical results are compared with these obtained from experiments where the nature of curves is found similar to each other. It is observed that there is a significant change of the value of n obtained with and without heat treatment it means the value of n should be determined for the heat treated condition of copper material for their applications in engineering fields.

  20. Modeling the Case Hardening of Automotive Components

    NASA Astrophysics Data System (ADS)

    Munikamal, Tiruttani; Sundarraj, Suresh

    2013-04-01

    A generalized framework has been developed within ABAQUS to model the surface hardening heat treatment processes for automotive steel components. The macro-scale heat transfer and stress calculations during the heating and quenching are coupled with the microstructural phase calculations, defined through a user routine, to estimate key process parameters such as case depth and surface hardness. This model has been applied to predict these parameters in two key industrial processes, i.e., case hardening of crankshafts and case carburization of gears. The results of the case depth and hardness calculations have been validated with the literature and in-house plant data. The effect of varying quench conditions on the overall stress distribution changes within the component has been outlined.

  1. Radiation-hardened transistor and integrated circuit

    DOEpatents

    Ma, Kwok K.

    2007-11-20

    A composite transistor is disclosed for use in radiation hardening a CMOS IC formed on an SOI or bulk semiconductor substrate. The composite transistor has a circuit transistor and a blocking transistor connected in series with a common gate connection. A body terminal of the blocking transistor is connected only to a source terminal thereof, and to no other connection point. The blocking transistor acts to prevent a single-event transient (SET) occurring in the circuit transistor from being coupled outside the composite transistor. Similarly, when a SET occurs in the blocking transistor, the circuit transistor prevents the SET from being coupled outside the composite transistor. N-type and P-type composite transistors can be used for each and every transistor in the CMOS IC to radiation harden the IC, and can be used to form inverters and transmission gates which are the building blocks of CMOS ICs.

  2. Pulsed laser surface hardening of ferrous alloys.

    SciTech Connect

    Xu, Z.; Reed, C. B.; Leong, K. H.; Hunter, B. V.

    1999-09-30

    A high power pulsed Nd:YAG laser and special optics were used to produce surface hardening on 1045 steel and gray cast iron by varying the process parameters. Unlike CO{sub 2} lasers, where absorptive coatings are required, the higher absorptivity of ferrous alloys at the Nd:YAG laser wavelength eliminates the necessity of applying a coating before processing. Metallurgical analysis of the treated tracks showed that very fine and hard martensitic microstructure (1045 steel) or inhomogeneous martensite (gray cast iron) were obtained without surface melting, giving maximum hardness of HRC 61 and HRC 40 for 1045 steel and gray cast iron respectively. The corresponding maximum case depths for both alloys at the above hardness are 0.6 mm. Gray cast iron was more difficult to harden without surface melting because of its lower melting temperature and a significantly longer time-at-temperature required to diffuse carbon atoms from the graphite flakes into the austenite matrix during laser heating. The thermal distortion was characterized in term of flatness changes after surface hardening.

  3. Dislocation Multi-junctions and Strain Hardening

    SciTech Connect

    Bulatov, V; Hsiung, L; Tang, M; Arsenlis, A; Bartelt, M; Cai, W; Florando, J; Hiratani, M; Rhee, M; Hommes, G; Pierce, T; Diaz de la Rubia, T

    2006-06-20

    At the microscopic scale, the strength of a crystal derives from the motion, multiplication and interaction of distinctive line defects--dislocations. First theorized in 1934 to explain low magnitudes of crystal strength observed experimentally, the existence of dislocations was confirmed only two decades later. Much of the research in dislocation physics has since focused on dislocation interactions and their role in strain hardening: a common phenomenon in which continued deformation increases a crystal's strength. The existing theory relates strain hardening to pair-wise dislocation reactions in which two intersecting dislocations form junctions tying dislocations together. Here we report that interactions among three dislocations result in the formation of unusual elements of dislocation network topology, termed hereafter multi-junctions. The existence of multi-junctions is first predicted by Dislocation Dynamics (DD) and atomistic simulations and then confirmed by the transmission electron microscopy (TEM) experiments in single crystal molybdenum. In large-scale Dislocation Dynamics simulations, multi-junctions present very strong, nearly indestructible, obstacles to dislocation motion and furnish new sources for dislocation multiplication thereby playing an essential role in the evolution of dislocation microstructure and strength of deforming crystals. Simulation analyses conclude that multi-junctions are responsible for the strong orientation dependence of strain hardening in BCC crystals.

  4. Case depth verification of hardened samples with Barkhausen noise sweeps

    NASA Astrophysics Data System (ADS)

    Santa-aho, Suvi; Hakanen, Merja; Sorsa, Aki; Vippola, Minnamari; Leiviskä, Kauko; Lepistö, Toivo

    2014-02-01

    An interesting topic of recent Barkhausen noise (BN) method studies is the application of the method to case depth evaluation of hardened components. The utilization of BN method for this purpose is based on the difference in the magnetic properties between the hardened case and the soft core. Thus, the detection of case depth with BN can be achieved. The measurements typically have been carried out by using low magnetizing frequencies which have deeper penetration to the ferromagnetic samples than the conventional BN measurement. However, the penetration depth is limited due to eddy current damping of the signal. We introduce here a newly found sweep measurement concept for the case depth evaluation. In this study sweep measurements were carried out with various magnetizing frequencies and magnetizing voltages to detect the effect of different frequency and voltage and their correspondence to the actual case depth values verified from destructive characterization. Also a BN measurement device that has an implemented sweep analysis option was utilised. The samples were either induction or case-hardened samples and sample geometry contained both rod samples and gear axle samples with different case depth values. Samples were also further characterized with Xray diffraction to study the residual stress state of the surface. The detailed data processing revealed that also other calculated features than the maximum slope division of the 1st derivative of the BN signal could hold the information about the case depth value of the samples. The sweep method was able to arrange the axles into correct order according to the case depth value even though the axles were used.

  5. Case depth verification of hardened samples with Barkhausen noise sweeps

    SciTech Connect

    Santa-aho, Suvi; Vippola, Minnamari; Lepistö, Toivo; Hakanen, Merja; Sorsa, Aki; Leiviskä, Kauko

    2014-02-18

    An interesting topic of recent Barkhausen noise (BN) method studies is the application of the method to case depth evaluation of hardened components. The utilization of BN method for this purpose is based on the difference in the magnetic properties between the hardened case and the soft core. Thus, the detection of case depth with BN can be achieved. The measurements typically have been carried out by using low magnetizing frequencies which have deeper penetration to the ferromagnetic samples than the conventional BN measurement. However, the penetration depth is limited due to eddy current damping of the signal. We introduce here a newly found sweep measurement concept for the case depth evaluation. In this study sweep measurements were carried out with various magnetizing frequencies and magnetizing voltages to detect the effect of different frequency and voltage and their correspondence to the actual case depth values verified from destructive characterization. Also a BN measurement device that has an implemented sweep analysis option was utilised. The samples were either induction or case-hardened samples and sample geometry contained both rod samples and gear axle samples with different case depth values. Samples were also further characterized with Xray diffraction to study the residual stress state of the surface. The detailed data processing revealed that also other calculated features than the maximum slope division of the 1st derivative of the BN signal could hold the information about the case depth value of the samples. The sweep method was able to arrange the axles into correct order according to the case depth value even though the axles were used.

  6. Radiation-hardened microwave system

    SciTech Connect

    Smith, S.F.; Bible, D.W.; Crutcher, R.I.; Moore, J.A.; Nowlin, C.H.; Vandermolen, R.I.

    1990-01-01

    In order to develop a wireless communication system to meet the stringent requirements for a nuclear hot cell and similar environments, including control of advanced servomanipulators, a microwave signal transmission system development program was established to produce a demonstration prototype for the Consolidated Fuel Reprocessing Program at the Oak Ridge National Laboratory. Proof-of-principle tests in a partially metal lined enclosure at ORNL successfully demonstrated the feasibility of directed microwave signal transmission techniques for remote systems applications. The potential for much more severe RF multipath propagation conditions in fully metal lined cells led to a programmatic decision to conduct additional testing in more typical hot-cell environments at other sites. Again, the test results were excellent. Based on the designs of the earlier systems, an advanced MSTS configuration was subsequently developed that, in highly reflective environments, will support both high-performance video channels and high band-rate digital data links at total gamma dose tolerance levels exceeding 10{sup 7} rads and at elevated ambient temperatures. 3 refs., 4 figs.

  7. On the Spectral Hardening at gsim300 keV in Solar Flares

    NASA Astrophysics Data System (ADS)

    Li, G.; Kong, X.; Zank, G.; Chen, Y.

    2013-05-01

    It has long been noted that the spectra of observed continuum emissions in many solar flares are consistent with double power laws with a hardening at energies gsim300 keV. It is now widely believed that at least in electron-dominated events, the hardening in the photon spectrum reflects an intrinsic hardening in the source electron spectrum. In this paper, we point out that a power-law spectrum of electrons with a hardening at high energies can be explained by the diffusive shock acceleration of electrons at a termination shock with a finite width. Our suggestion is based on an early analytical work by Drury et al., where the steady-state transport equation at a shock with a tanh profile was solved for a p-independent diffusion coefficient. Numerical simulations with a p-dependent diffusion coefficient show hardenings in the accelerated electron spectrum that are comparable with observations. One necessary condition for our proposed scenario to work is that high-energy electrons resonate with the inertial range of the MHD turbulence and low-energy electrons resonate with the dissipation range of the MHD turbulence at the acceleration site, and the spectrum of the dissipation range ~k -2.7. A ~k -2.7 dissipation range spectrum is consistent with recent solar wind observations.

  8. Effect of strain rate on bake hardening response of BH220 steel

    NASA Astrophysics Data System (ADS)

    Das, Anindya; Tarafder, Soumitro; Sivaprasad, S.; Chakrabarti, Debalay

    2015-09-01

    This study aims at understanding the bake hardening ability of ultra low carbon BH220 steel at different strain rates. The as-received material has been pre-strained to four different levels and then deformed in tension under (a) as pre-strained state and (b) after baking at 170 ∘C for 20 minutes, at three different strain rates of 0.001, 0.1 and 100/s. In both the conditions, yield stress increased with pre-strain and strain rate, but bake hardening ability was found to decrease when strain rate was increased. The strain rate sensitivity of the material was also found to decrease with bake hardening. Generation of dislocation forests and their subsequent immobility during baking treatment enables them to act as long range obstacles during further deformation. At higher strain rates, less amount of dislocations are produced which can interact with themselves and produce hardening, because of which bake hardening ability and the strain rate drops. A dislocation based strengthening model, as proposed by Larour et al. 2011 [7], was used to predict the yield stress values obtained at different conditions. The equation produced excellent co-relation with the experimental data.

  9. Identifying Deformation and Strain Hardening Behaviors of Nanoscale Metallic Multilayers Through Nano-wear Testing

    DOE PAGESBeta

    Economy, David Ross; Mara, Nathan A.; Schoeppner, R.; Schultz, Bradley M.; Unocic, Raymond R.; Kennedy, Marian S.

    2016-01-13

    In complex loading conditions (e.g. sliding contact), mechanical properties, such as strain hardening and initial hardness, will dictate the long-term performance of materials systems. With this in mind, the strain hardening behaviors of Cu/Nb nanoscale metallic multilayer systems were examined by performing nanoindentation tests within nanoscratch wear boxes and undeformed, as-deposited regions. Both the architecture and substrate influence were examined by utilizing three different individual layer thicknesses (2, 20, and 100 nm) and two total film thicknesses (1 and 10 μm). After nano-wear deformation, multilayer systems with thinner layers showed less volume loss as measured by laser scanning microscopy. Additionally,more » the hardness of the deformed regions significantly rose with respect to the as-deposited measurements, which further increased with greater wear loads. Strain hardening exponents for multilayers with thinner layers (2 and 20 nm, n ≈ 0.018 and n ≈ 0.022 respectively) were less than was determined for 100 nm systems (n ≈ 0.041). These results suggest that singledislocation based deformation mechanisms observed for the thinner systems limit the extent of achievable strain hardening. This conclusion indicates that impacts of both architecture strengthening and strain hardening must be considered to accurately predict multilayer performance during sliding contact across varying length scales.« less

  10. ON THE SPECTRAL HARDENING AT {approx}>300 keV IN SOLAR FLARES

    SciTech Connect

    Li, G.; Kong, X.; Zank, G.; Chen, Y.

    2013-05-20

    It has long been noted that the spectra of observed continuum emissions in many solar flares are consistent with double power laws with a hardening at energies {approx}>300 keV. It is now widely believed that at least in electron-dominated events, the hardening in the photon spectrum reflects an intrinsic hardening in the source electron spectrum. In this paper, we point out that a power-law spectrum of electrons with a hardening at high energies can be explained by the diffusive shock acceleration of electrons at a termination shock with a finite width. Our suggestion is based on an early analytical work by Drury et al., where the steady-state transport equation at a shock with a tanh profile was solved for a p-independent diffusion coefficient. Numerical simulations with a p-dependent diffusion coefficient show hardenings in the accelerated electron spectrum that are comparable with observations. One necessary condition for our proposed scenario to work is that high-energy electrons resonate with the inertial range of the MHD turbulence and low-energy electrons resonate with the dissipation range of the MHD turbulence at the acceleration site, and the spectrum of the dissipation range {approx}k {sup -2.7}. A {approx}k {sup -2.7} dissipation range spectrum is consistent with recent solar wind observations.