Science.gov

Sample records for detect relay attacks

  1. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  4. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.; JOHNS, B.R.

    1999-12-21

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  5. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    JOHNS, B.R.

    1999-05-05

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  6. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.

    2000-02-28

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping Instrumentation and Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  7. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    JOHNS, B.R.; KOCH, M.R.

    2000-01-28

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping Instrumentation and Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  8. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.

    1999-10-26

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  9. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  10. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  12. Method for detecting sophisticated cyber attacks

    SciTech Connect

    Potok, Thomas E.

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  13. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  14. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  15. Detection of hydrogen attack in base metal and weld HAZ

    SciTech Connect

    Birring, A.S.; Elliot, J.; Hsiao, C.P.

    1995-12-01

    Hydrogen attack is known to occur in C-1/2Mo steels operating at high temperature and pressure in the hydrogen environment. The attack occurs in the base metal as well as in the weld heat affected zone (HAZ) of vessels and pipes. Hydrogen attack reduces the strength and toughness of steel and, if left undetected, can lead to component failure. Failures can be avoided by timely application of reliable and sensitive nondestructive techniques. Ultrasonic techniques were developed and applied to detect hydrogen attack in both the base metal and weld HAZ attack. Ultrasonic backscatter and velocity ratio techniques were applied for detection of base metal attack. These techniques are, however, not suitable for detection of HAZ attack. Conventional shear wave examination is currently used for HAZ inspection. This method can detect large cracks but is not sensitive to detect microcracks produced by hydrogen attack. A combination of two techniques was developed for detection of HAZ attack. These techniques are: contact focused angle beam S-wave and pitch-catch L-wave. The first technique focuses the beam using an acoustic lens while the second technique uses the intersection point of the two pitch-catch beam axes to illuminate the HAZ zone. Both the focused and pitch-catch techniques were applied on samples with simulated HAZ attack. The techniques were successful in detecting simulated attack.

  16. Real time testing of intelligent relays for synchronous distributed generation islanding detection

    NASA Astrophysics Data System (ADS)

    Zhuang, Davy

    As electric power systems continue to grow to meet ever-increasing energy demand, their security, reliability, and sustainability requirements also become more stringent. The deployment of distributed energy resources (DER), including generation and storage, in conventional passive distribution feeders, gives rise to integration problems involving protection and unintentional islanding. Distributed generators need to be islanded for safety reasons when disconnected or isolated from the main feeder as distributed generator islanding may create hazards to utility and third-party personnel, and possibly damage the distribution system infrastructure, including the distributed generators. This thesis compares several key performance indicators of a newly developed intelligent islanding detection relay, against islanding detection devices currently used by the industry. The intelligent relay employs multivariable analysis and data mining methods to arrive at decision trees that contain both the protection handles and the settings. A test methodology is developed to assess the performance of these intelligent relays on a real time simulation environment using a generic model based on a real-life distribution feeder. The methodology demonstrates the applicability and potential advantages of the intelligent relay, by running a large number of tests, reflecting a multitude of system operating conditions. The testing indicates that the intelligent relay often outperforms frequency, voltage and rate of change of frequency relays currently used for islanding detection, while respecting the islanding detection time constraints imposed by standing distributed generator interconnection guidelines.

  17. DDoS Attack Detection Algorithms Based on Entropy Computing

    NASA Astrophysics Data System (ADS)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  18. Transmission line relay mis-operation detection based on time-synchronized field data

    SciTech Connect

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such, it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.

  19. Transmission line relay mis-operation detection based on time-synchronized field data

    DOE PAGESBeta

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such,more » it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.« less

  20. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  1. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  2. Patrol detection for replica attacks on wireless sensor networks.

    PubMed

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  3. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  4. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  5. Improved signal detection for two-way wireless relaying networks under imperfect time synchronisation

    NASA Astrophysics Data System (ADS)

    O El Astal, Mohammed Taha; Olivier, Jan Corné

    2014-12-01

    Most research on two-way wireless relaying networks (TWRNs) assumes perfect time synchronisation between the terminals and among the relays. This is, however, difficult to accomplish as the terminals and relays are randomly located. The lack of synchronisation causes inter-symbol interference which introduces a serious impairment and negatively impacts the network's performance. In this article, an enhanced interference cancellation (EIC)-based detector is proposed to mitigate the experienced performance degradation while maintaining low complexity. It uses an innovative iterative approach and also benefits of interference components of currently detected symbols using a modified maximum likelihood (ML) scheme. As a result, it shows significant performance improvement compared to the conventional detector under different conditions of imperfect synchronisation. In addition, two existing interference cancellation detectors that are originally proposed for one-way WRNs are extended to TWRNs, even though the timing error among the terminals is a unique issue for TWRNs and never occurs in one-way networks. Unlike the existing literature, the proposed detectors apply to networks with an arbitrary number of multiple-antenna relays. Numerical simulation is provided in terms of bit error rate, to show the improvement in performance when compared to the conventional detector. Moreover, it is shown that the EIC detector outperforms the extended detectors and provides 3 to 4 dB gain under moderate condition of imperfect synchronisation.

  6. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  7. Relayed 13C magnetization transfer: Detection of malate dehydrogenase reaction in vivo

    NASA Astrophysics Data System (ADS)

    Yang, Jehoon; Shen, Jun

    2007-02-01

    Malate dehydrogenase catalyzes rapid interconversion between dilute metabolites oxaloacetate and malate. Both oxaloacetate and malate are below the detection threshold of in vivo MRS. Oxaloacetate is also in rapid exchange with aspartate catalyzed by aspartate aminotransferase, the latter metabolite is observable in vivo using 13C MRS. We hypothesized that the rapid turnover of oxaloacetate can effectively relay perturbation of magnetization between malate and aspartate. Here, we report indirect observation of the malate dehydrogenase reaction by saturating malate C2 resonance at 71.2 ppm and detecting a reduced aspartate C2 signal at 53.2 ppm due to relayed magnetization transfer via oxaloacetate C2 at 201.3 ppm. Using this strategy the rate of the cerebral malate dehydrogenase reaction was determined to be 9 ± 2 μmol/g wet weight/min (means ± SD, n = 5) at 11.7 Tesla in anesthetized adult rats infused with [1,6- 13C 2]glucose.

  8. Reliability-aware iterative detection scheme (RAID) for distributed IDM space-time codes in relay systems

    NASA Astrophysics Data System (ADS)

    Lenkeit, Florian; Wübben, Dirk; Dekorsy, Armin

    2013-12-01

    In this article, distributed interleave-division multiplexing space-time codes (dIDM-STCs) are applied for multi-user two-hop decode-and-forward (DF) relay networks. In case of decoding errors at the relays which propagate to the destination, severe performance degradations can occur as the original detection scheme for common IDM-STCs does not take any reliability information about the first hop into account. Here, a novel reliability-aware iterative detection scheme (RAID) for dIDM-STCs is proposed. This new detection scheme takes the decoding reliability of the relays for each user into account for the detection at the destination. Performance evaluations show that the proposed RAID scheme clearly outperforms the original detection scheme and that in certain scenarios even a better performance than for adaptive relaying schemes can be achieved.

  9. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  10. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  11. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  12. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  13. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    PubMed

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  14. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  15. An effective Denial of Service Attack Detection Method in Wireless Mesh Networks

    NASA Astrophysics Data System (ADS)

    Luan, Liangyu; Fu, Yingfang; Xiao, Peng

    In order to detect the DoS attack (Denial-of-Service attack) when wireless mesh networks adopt AODV routing protocol of Ad Hoc networks. Such technologies as an end-to-end authentication, utilization rate of cache memory, two pre-assumed threshold value and distributed voting are used in this paper to detect DoS attacker, which is on the basic of hierarchical topology structure in wireless mesh networks. Through performance analysis in theory and simulations experiment, the scheme would improve the flexibility and accuracy of DoS attack detection, and would obviously improve its security in wireless mesh networks.

  16. Detection of chemical or biological artillery attacks using a seismic/acoustic sensor: preliminary results

    NASA Astrophysics Data System (ADS)

    Baker, Vincent J.; Walter, Paul A.

    2004-04-01

    Chemical and biological weapons pose a serious threat to the United States armed forces. Early detection of a chemical or biological attack is critical to the safety of soldiers in the field. The Edgewood Chemical and Biological Center (ECBC) is conducting a study using currently fielded seismic and acoustic sensors to detect chemical and biological attacks. This paper presents some preliminary results.

  17. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  18. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  19. Distance Relaying with Power Swing Detection based on Voltage and Reactive Power Sensitivity

    NASA Astrophysics Data System (ADS)

    Patel, Ujjaval J.; Chothani, Nilesh G.; Bhatt, Praghnesh J.

    2016-02-01

    Sudden changes in loading or configuration of an electrical network causes power swing which may result in an unwanted tripping of the distance relay. Hence, it becomes utmost necessary to rapidly and reliably discriminate between actual fault and power swing conditions in order to prevent instability in power network due to mal operation of distance relay. This paper proposes a novel method for the discrimination between fault and power swing based on rate of change of voltage and reactive power measured at relay location. The effectiveness of the proposed algorithm is evaluated by simulating series of power swing conditions in PSCAD/EMTDC® software for different disturbances such as change in mechanical power input to synchronous generator, tripping of parallel line due to fault and sudden application of heavy load. It is revealed that the distance relay gives successful tripping in case of different fault conditions and remains inoperative for power swing with the implementation of the proposed algorithm. Moreover, the proposed scheme has ability to distinguish the symmetrical and asymmetrical fault occurrence during power swing condition.

  20. IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Du, Ping; Abe, Shunji

    Denial of service (DoS) attacks have become one of the most serious threats to the Internet. Enabling detection of attacks in network traffic is an important and challenging task. However, most existing volume-based schemes can not detect short-term attacks that have a minor effect on traffic volume. On the other hand, feature-based schemes are not suitable for real-time detection because of their complicated calculations. In this paper, we develop an IP packet size entropy (IPSE)-based DoS/DDoS detection scheme in which the entropy is markedly changed when traffic is affected by an attack. Through our analysis, we find that the IPSE-based scheme is capable of detecting not only long-term attacks but also short-term attacks that are beyond the volume-based schemes' ability to detect. Moreover, we test our proposal using two typical Internet traffic data sets from DARPA and SINET, and the test results show that the IPSE-based detection scheme can provide detection of DoS/DDoS attacks not only in a local area network (DARPA) and but also in academic backbone network (SINET).

  1. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  2. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  3. The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems

    NASA Astrophysics Data System (ADS)

    Chan-Tin, Eric; Feldman, Daniel; Hopper, Nicholas; Kim, Yongdae

    A network coordinate system assigns Euclidean “virtual” coordinates to every node in a network to allow easy estimation of network latency between pairs of nodes that have never contacted each other. These systems have been implemented in a variety of applications, most notably the popular Azureus/Vuze BitTorrent client. Zage and Nita-Rotaru (CCS 2007) and independently, Kaafar et al. (SIGCOMM 2007), demonstrated that several widely-cited network coordinate systems are prone to simple attacks, and proposed mechanisms to defeat these attacks using outlier detection to filter out adversarial inputs. We propose a new attack, Frog-Boiling, that defeats anomaly-detection based defenses in the context of network coordinate systems, and demonstrate empirically that Frog-Boiling is more disruptive than the previously known attacks. Our results suggest that a new approach is needed to solve this problem: outlier detection alone cannot be used to secure network coordinate systems.

  4. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. PMID:26073643

  5. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  7. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  8. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  9. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  10. Magnetoresistor monitors relay performance

    NASA Technical Reports Server (NTRS)

    Krebs, D. Q.

    1966-01-01

    Magnetoresistor monitors the action of relays without disturbing circuit parameters or degrading relay performance. The magnetoresistor measures the relay magnetic flux produced under transient conditions to establish the characteristic signature of the relay.

  11. Autonomous mobile communication relays

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Everett, Hobart R.; Manouk, Narek; Verma, Ambrish

    2002-07-01

    Maintaining a solid radio communication link between a mobile robot entering a building and an external base station is a well-recognized problem. Modern digital radios, while affording high bandwidth and Internet-protocol-based automatic routing capabilities, tend to operate on line-of-sight links. The communication link degrades quickly as a robot penetrates deeper into the interior of a building. This project investigates the use of mobile autonomous communication relay nodes to extend the effective range of a mobile robot exploring a complex interior environment. Each relay node is a small mobile slave robot equipped with sonar, ladar, and 802.11b radio repeater. For demonstration purposes, four Pioneer 2-DX robots are used as autonomous mobile relays, with SSC-San Diego's ROBART III acting as the lead robot. The relay robots follow the lead robot into a building and are automatically deployed at various locations to maintain a networked communication link back to the remote operator. With their on-board external sensors, they also act as rearguards to secure areas already explored by the lead robot. As the lead robot advances and RF shortcuts are detected, relay nodes that become unnecessary will be reclaimed and reused, all transparent to the operator. This project takes advantage of recent research results from several DARPA-funded tasks at various institutions in the areas of robotic simulation, ad hoc wireless networking, route planning, and navigation. This paper describes the progress of the first six months of the project.

  12. Entropy Based Detection of DDoS Attacks in Packet Switching Network Models

    NASA Astrophysics Data System (ADS)

    Lawniczak, Anna T.; Wu, Hao; di Stefano, Bruno

    Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect “natural” spatio-temporal packet traffic patterns, i.e. “natural distributions” of packets passing through the routers. Thus, they affect “natural” information entropy profiles, a sort of “fingerprints”, of normal packet traffic. We study if by monitoring information entropy of packet traffic through selected routers one may detect DDoS attacks or anomalous packet traffic in packet switching network (PSN) models. Our simulations show that the considered DDoS attacks of “ping” type cause shifts in information entropy profiles of packet traffic monitored even at small sets of routers and that it is easier to detect these shifts if static routing is used instead of dynamic routing. Thus, network-wide monitoring of information entropy of packet traffic at properly selected routers may provide means for detecting DDoS attacks and other anomalous packet traffics.

  13. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  14. Node ID based detection of Sybil attack in mobile wireless sensor network

    NASA Astrophysics Data System (ADS)

    Sharmila, S.; Umamaheswari, G.

    2013-10-01

    Security is the major issue in wireless sensor networks and many defence mechanisms have been developed to secure the network from these alarming attacks by detecting the malicious nodes which hinder the performance of the network. Sybil attack can make the network vulnerable. Sybil attack means a node which illegitimately claims multiple identities. This attack threatens wireless sensor network in routing, voting system, fair resource allocation, data aggregation and misbehaviour detection. Hence, the research is carried out to prevent the Sybil attack and improve the network performance. The node ID-based scheme is proposed, where the detection is based on node registration, consisting of two phases and the assignment of ID to the node is done dynamically. The ID's corresponding to the nodes registered is at the base station and the node active time is monitored, any abnormalities in the above phases confirm the presence of Sybil nodes in the network. The scheme is simulated using NS2. The energy consumed for this algorithm is 2.3 J. The proposed detection scheme is analysed based on the network's PDR and found that the throughput has improved, which prove that this scheme may be used in the environment where security is needed.

  15. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  16. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  17. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dongil; Soh, Wooyoung; Kim, Seoksoo

    Botnet-based cyber attacks cause large-scale damage with increasingly intelligent tools, which has called for varied research on bot detection. In this study, we developed a method of monitoring behaviors of host-based processes from the point that a bot header attempts to make zombie PCs, detecting cyber attack precursor symptoms. We designed an algorithm that figures out characteristics of botnet which attempts to launch malicious behaviors by means of signature registration, which is for process/reputation/network traffic/packet/source analysis and a white list, as a measure to respond to bots from the end point.

  18. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hussain, Sajid; Rahman, Md Shafayat

    2009-04-01

    With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-middle attacks. We analyze the feasibility of using received signal strength indicator (RSSI) values measured at the receiver node to detect these kinds of attacks. As RSSI value is readily available for every message received by a node, a successful utilization of this information in security breach detection can be a very important contribution.

  19. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  20. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank

  1. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  2. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  3. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    SciTech Connect

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O'Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  4. Group Testing Based Detection of Web Service DDoS Attackers

    NASA Astrophysics Data System (ADS)

    Nashat, Dalia; Jiang, Xiaohong; Kameyama, Michitaka

    The Distributed Denial of Service attack (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. Recently, an efficient approach Live Baiting was proposed for detecting the identities of DDoS attackers in web service using low state overhead without requiring either the models of legitimate requests nor anomalous behavior. However, Live Baiting has two limitations. First, the detection algorithm adopted in Live Baiting starts with a suspects list containing all clients, which leads to a high false positive probability especially for large web service with a huge number of clients. Second, Live Baiting adopts a fixed threshold based on the expected number of requests in each bucket during the detection interval without the consideration of daily and weekly traffic variations. In order to address the above limitations, we first distinguish the clients activities (Active and Non-Active clients during the detection interval) in the detection process and then further propose a new adaptive threshold based on the Change Point Detection method, such that we can improve the false positive probability and avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted on real Web trace to demonstrate the detection efficiency of the proposed scheme in comparison with the Live Baiting detection scheme.

  5. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    PubMed

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold. PMID:25247205

  6. Wind generated by an attacking bat: anemometric measurements and detection by the praying mantis cercal system.

    PubMed

    Triblehorn, Jeffrey D; Yager, David D

    2006-04-01

    The wind-sensitive cercal system, well-known for mediating terrestrial escape responses, may also mediate insect aerial bat-avoidance responses triggered by wind generated by the approaching bat. One crucial question is whether enough time exists between detection and capture for the insect to perform a successful evasive maneuver. A previous study estimated this time to be 16 ms, based on cockroach behavioral latencies and a prediction for the detection time derived from a simulated predator moving toward a simulated prey. However, the detection time may be underestimated since both the simulated predator and prey lacked certain characteristics present in the natural situation. In the present study, actual detection times are measured by recording from wind-sensitive interneurons of a tethered praying mantis that serves as the target for a flying, attacking bat. Furthermore, using hot-wire anemometry, we describe and quantify the wind generated by an attacking bat. Anemometer measurements revealed that the velocity of the bat-generated wind consistently peaks early with a high acceleration component (an important parameter for triggering wind-mediated terrestrial responses). The physiological recordings determined that the mantis cercal system detected an approaching bat 74 ms before contact, which would provide the insect with 36 ms to perform a maneuver before capture. This should be sufficient time for the mantis to respond. Although it probably would not have time for a full response that completely evades the bat, even a partial response might alter the mantid's trajectory enough to cause the bat to mishandle the insect, allowing it to escape. PMID:16574803

  7. Seismic ruggedness of relays

    SciTech Connect

    Merz, K.L. )

    1991-08-01

    This report complements EPRI report NP-5223 Revision 1, February 1991, and presents additional information and analyses concerning generic seismic ruggedness of power plant relays. Existing and new test data have been used to construct Generic Equipment Ruggedness Spectra (GERS) which can be used in identifying rugged relays during seismic re-evaluation of nuclear power plants. This document is an EPRI tier 1 report. The results of relay fragility tests for both old and new relays are included in an EPRI tier 2 report with the same title. In addition to the presentation of relay GERS, the tier 2 report addresses the applicability of GERS to relays of older vintage, discusses the important identifying nomenclature for each relay type, and examines relay adjustment effects on seismic ruggedness. 9 refs., 3 figs, 1 tab.

  8. A configurable-hardware document-similarity classifier to detect web attacks.

    SciTech Connect

    Ulmer, Craig D.; Gokhale, Maya

    2010-04-01

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to reconfigurable hardware. The TFIDF classifier is used to detect web attacks in HTTP data. In our reconfigurable hardware approach, we design a streaming, real-time classifier by simplifying an existing sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. We have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires two orders of magnitude less memory than the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  9. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1). PMID:26748366

  10. Efficient live face detection to counter spoof attack in face recognition systems

    NASA Astrophysics Data System (ADS)

    Biswas, Bikram Kumar; Alam, Mohammad S.

    2015-03-01

    Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.

  11. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  12. Protective relaying performance reporting

    SciTech Connect

    Taylor, R.P.; Ingelson, J.W.; Arnold, P.F.; Babcock, G.; Burzese, A.A.; Cornelison, J.R.; Drum, P.R.; Hasenwinkle, I.; Johnson, R.; Marsh, W. J. Jr.

    1992-10-01

    This paper reports on the performance of protective relaying systems which is an issue within the electric power industry which has received inadequate attention. The wide variations in relaying types and styles and applications, as well as differences in company structures and industry terminology, have hindered the adoption of a standardized system for the evaluation of protective relaying system performance. Such a system, if adopted by a significant portion of the industry, would provide suppliers and users better information with which to improve the product and its application and operation. The Protective Relaying Performance Criteria Working Group of the IEEE Power System Relaying Committee has generated this paper for the purpose of defining a standardized protective relaying performance reporting system.

  13. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    PubMed

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes. PMID:27189623

  14. Optimised secure transmission through untrusted AF relays using link adaptation

    NASA Astrophysics Data System (ADS)

    Taki, Mehrdad; Sadeghi, Mohammad

    2016-05-01

    A new transmission scheme is presented for a two-hop relay network including two AF relays, considering physical layer security where relays are not able to detect signal with an acceptable bit error rate (BER) but the combined received signal is detected with an acceptable BER at the final receiver. It is assumed that there is no direct path between the transmitter and the receiver (relay network without diversity). Adaptive modulation and coding is utilised at the transmitter and transmission powers of the transmitter and of the relays are continuously adapted provisioning individual average power constraint for each node. Numerical evaluations show that an acceptable performance degradation is seen by the proposed secure relaying scheme compared to the optimum relay selection scheme without security constraint.

  15. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  16. A Simple Cooperative Relaying with Alamouti Coded Transmission

    NASA Astrophysics Data System (ADS)

    Yamaoka, Tomoya; Hara, Yoshitaka; Fukui, Noriyuki; Kubo, Hiroshi; Yamazato, Takaya

    Cooperative diversity using space-time codes offers effective space diversity with low complexity, but the scheme needs the space-time coding process in the relay nodes. We propose a simple cooperative relay scheme that uses space-time coding. In the scheme, the source node transmits the Alamouti coded signal sequences and the sink node receives the signal sequence via the two coordinated relay nodes. At the relay nodes, the operation procedure is just permutation and forwarding of the signal sequence. In the proposed scheme, none of the relay nodes need quadrature detection and space-time coding and the simple relay process offers effective space diversity. Moreover, simulations show the effectiveness of the proposed relay process by some simulations.

  17. MAVEN Relay Operations Concept

    NASA Technical Reports Server (NTRS)

    Chamberlain, Neil; Gladden, Roy; Bruvold, Kris

    2012-01-01

    The Mars Atmosphere and Volatile EvolutioN (MAVEN) mission will launch in late 2013 and following a 10 month cruise to Mars, will study the upper atmosphere of the planet. In addition to the science instruments, the MAVEN spacecraft is equipped with an Electra UHF transceiver to support relay communication with landed assets. This paper describes how UHF relay service is provisioned by MAVEN. The discussion includes a description of the Electra payload, the process by which relay activities are coordinated and accounted for, the process of a typical relay session, including uplink and downlink, as well as special commands to calibrate and verify relay performance. The operational processes for providing these services are inherited largely from prior Mars missions and take advantage of existing infrastructure and lessons learned from those missions. Preliminary data volume return capabilities using adaptive data rates and low-density parity check channel coding are presented.

  18. Relay Sequence Generation Software

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Khanampompan, Teerapat

    2009-01-01

    Due to thermal and electromagnetic interactivity between the UHF (ultrahigh frequency) radio onboard the Mars Reconnaissance Orbiter (MRO), which performs relay sessions with the Martian landers, and the remainder of the MRO payloads, it is required to integrate and de-conflict relay sessions with the MRO science plan. The MRO relay SASF/PTF (spacecraft activity sequence file/ payload target file) generation software facilitates this process by generating a PTF that is needed to integrate the periods of time during which MRO supports relay activities with the rest of the MRO science plans. The software also generates the needed command products that initiate the relay sessions, some features of which are provided by the lander team, some are managed by MRO internally, and some being derived.

  19. Development of means-of-detection for remote attacks on computer network hosts

    NASA Astrophysics Data System (ADS)

    Vilchevsky, Nikita O.; Gaydar, Michael B.; Klavdiev, Vladimir E.

    2004-04-01

    In this contribution we report on a problem of defense construction against an attack, with "Substitution of one of the TCP-connection subjects in the Internet (hijacking)," carried out for the first time by Kevin Mitnik (December 12, 1994) and which remains its potential danger till now. In this work the mathematical models of the remote attacks represented in earlier publications are expanded and specified.

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  1. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  2. Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system.

    PubMed

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S V

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  3. Multifunction protective relay

    NASA Astrophysics Data System (ADS)

    Harlow, J.; Yalla, M.; Kantor, J.

    1991-11-01

    Since the enactment of the National Energy Act of 1979, many private energy producers have been planning and building small generation and cogeneration facilities in order to sell power to the local utility. Many of the non-utility generators built after 1979 are connected directly to the closest utility distribution circuit. Aware of the problems associated with connecting generators in this manner, electric utilities across the country developed specifications and standards to allow safe and reliable interconnection. The report describes a malfunction protective relay which uses state-of-the-art digital signal processing procedures to accomplish the objective of providing most of the relay requirements of utility electrical interconnections. The relay has been demonstrated to be suitable for this critical application through extensive laboratory and in-service field testing. The relay, incorporating thirteen distinct protection functions affords the user the savings of the initial capital cost plus simplicity of installation and use.

  4. Fully relayed regenerative amplifier

    DOEpatents

    Glass, Alexander J.

    1981-01-01

    A regenerative laser apparatus and method using the optical relay concept to maintain high fill factors, to suppress diffraction effects, and to minimize phase distortions in a regenerative amplifier.

  5. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  6. Heart attack

    MedlinePlus

    ... infarction; Non-ST-elevation myocardial infarction; NSTEMI; CAD-heart attack; Coronary artery disease-heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  7. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  8. Advance of the Ground Relay of the Line Protection

    NASA Astrophysics Data System (ADS)

    Inukai, Michihiko; Nishida, Tadashi; Noro, Jun; Matsuda, Akihiro

    This paper describes the advance of the ground relay of the line protection. First of all, we examined the ground fault in a resistively grounded power system. The protective relay detects the ground fault by the zero phase current in the system. There are two methods for the current input to the relay. One uses the residual circuit of CT secondary winding, and the other uses the CT tertiary winding. When the ground current is insufficient in the residual circuit, the CT tertiary winding is used. In order to omit the CT tertiary winding and to get more reliability, we reviewed the full-scale of relay and evaluating the error of CT. As result, almost all transmission lines could omit the CT tertiary winding. Next, we examined the ground fault with high fault resistance in a solidly grounded power system. When that fault occurs in the system, the PCM current differential relay acts by fault current. So, this relay possibly mal-operates when the CT secondary circuit is disconnected. Therefore, it uses a special CT to raise the reliability. Nowadays GIS has become small and the CT installation space has been decreased, it is needed to reduce these CT cores. In order to omit the special CT, we utilized the combination of the power relay and the rate of change of relay current. As a result, there is a prospect that the relay would not need the special CT. These improvements are effective to reduce cost too.

  9. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  10. Latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes at least one permanent magnet and at least one electromagnet. The respective sections are, generally, arranged in separate locations or cavities in the assembly. The switch is latched by a permanent magnet assembly and selectively switched by an overriding electromagnetic assembly.

  11. Improved relay chatter detector

    NASA Technical Reports Server (NTRS)

    Reynolds, R. K.

    1971-01-01

    Detector provides go/no-go sensing of momentary relay or contact opening during vibration testing. Device compares duration of unwanted openings to calibrated standard and lights indicator if standard is exceeded. Stability and reliability are higher than in any other comparable device.

  12. Internet Relay Chat.

    ERIC Educational Resources Information Center

    Simpson, Carol

    2000-01-01

    Describes Internet Relay Chats (IRCs), electronic conversations over the Internet that allow multiple users to write messages, and their applications to educational settings such as teacher collaboration and conversations between classes. Explains hardware and software requirements, IRC organization into nets and channels, and benefits and…

  13. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  14. System response to relay chatter

    SciTech Connect

    Antaki, G.A.; Radder, J.A.

    1992-01-01

    An important aspect of the qualification of safety related systems, is the assessment of the possibility and consequences of seismic or vibration induced relay chatter. The current rules, contained in ANSI/IEEE C37.98 and the SQUG GIP, consider as seismic induced failure'' of a relay, a chatter contact in excess of 2 milliseconds. While this rule is clear in defining failure'' of single relay, the definition of failure'' becomes more problematic when we consider the alignment of an assembly of relays in series or parallel, and the effects of chatter on the function of the system in which the relays are mounted. In this paper, we report a method, based on system test and probabilities analysis, used to assess failure'' by relay chatter in an assembly of relays which control an electric motor. 2 refs.

  15. System response to relay chatter

    SciTech Connect

    Antaki, G.A.; Radder, J.A.

    1992-05-01

    An important aspect of the qualification of safety related systems, is the assessment of the possibility and consequences of seismic or vibration induced relay chatter. The current rules, contained in ANSI/IEEE C37.98 and the SQUG GIP, consider as seismic induced ``failure`` of a relay, a chatter contact in excess of 2 milliseconds. While this rule is clear in defining ``failure`` of single relay, the definition of ``failure`` becomes more problematic when we consider the alignment of an assembly of relays in series or parallel, and the effects of chatter on the function of the system in which the relays are mounted. In this paper, we report a method, based on system test and probabilities analysis, used to assess ``failure`` by relay chatter in an assembly of relays which control an electric motor. 2 refs.

  16. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  17. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Taeghyoon; Choi, Seokjin; Lee, Cheolwon

    Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

  18. Relaying an optical wavefront

    DOEpatents

    Sweatt, William C.; Vawter, G. Allen

    2007-03-06

    A wavefront rely devices samples an incoming optical wavefront at different locations, optically relays the samples while maintaining the relative position of the samples and the relative phase between the samples. The wavefront is reconstructed due to interference of the samples. Devices can be designed for many different wavelengths, including for example the ultraviolet, visible, infrared and even longer wavelengths such as millimeter waves. In one application, the device function as a telescope but with negligible length.

  19. Detection of the sarin hydrolysis product in formalin-fixed brain tissues of victims of the Tokyo subway terrorist attack.

    PubMed

    Matsuda, Y; Nagao, M; Takatori, T; Niijima, H; Nakajima, M; Iwase, H; Kobayashi, M; Iwadate, K

    1998-06-01

    One of the hydrolysis products of sarin (isopropyl methylphosphonofluoridate) was detected in formalin-fixed brain tissues of victims poisoned in the Tokyo subway terrorist attack. Part of this procedure, used for the detection of sarin hydrolysis products in erythrocytes of sarin victims, has been described previously. The test materials were four individual cerebellums, which had been stored in formalin fixative for about 2 years. Sarin-bound acetylcholinesterase (AChE) was solubilized from these cerebellums, purified by immunoaffinity chromatography, and digested with trypsin. Then the sarin hydrolysis products bound to AChE were released by alkaline phosphatase digestion, subjected to trimethylsilyl derivatization (TMS), and detected by gas chromatography-mass spectrometry. Peaks at m/z 225 and m/z 240, which are indicative of TMS-methylphosphonic acid, were observed within the retention time range of authentic methylphosphonic acid. However, no isopropyl methylphosphonic acid was detected in the formalin-fixed cerebellums of these 4 sarin victims, probably because the isopropoxy group of isopropyl methylphosphonic acid underwent chemical hydrolysis during storage. This procedure will be useful for the forensic diagnosis of poisoning by protein-bound, highly toxic agents, such as sarin, which are easily hydrolysed. This appears to be the first time that intoxication by a nerve agent has been demonstrated by analyzing formalin-fixed brains obtained at autopsy. PMID:9653062

  20. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    NASA Astrophysics Data System (ADS)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  1. Detection of beamsplitting attack in a quantum cryptographic channel based on photon number statistics monitoring

    NASA Astrophysics Data System (ADS)

    Gaidash, A. A.; Egorov, V. I.; Gleim, A. V.

    2014-10-01

    Quantum cryptography in theory allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source. In order to overcome this possibility, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. We present an alternative method based on monitoring photon number statistics after detection. This method can therefore be used with any existing protocol.

  2. Heart attack

    MedlinePlus

    ... a heart attack take part in a cardiac rehabilitation program. ... al. eds. Braunwald's Heart Disease: A Textbook of Cardiovascular Medicine . 10th ed. Philadelphia, PA: Elsevier Saunders; 2014: ...

  3. Relay mirror experiment

    NASA Astrophysics Data System (ADS)

    Begley, David L.

    1996-04-01

    Originating out of a SDIO-funded, Phase 1 study effort, two ground systems and an orbiting EO payload/spacecraft were the primary equipment for the RME. The RME was originally conceived to be a shuttle deployed experiment. Shortly after program start, the Challenger disaster occurred, with the promise of extensive delays. A completely new space segment was to be designed incorporating a free-flying spacecraft. During the midphase of the program, a variety of launch vehicles were envisioned to replace the shuttle, requiring the BASD team to design accommodations for Delta, Atlas, and Titan, with a Delta launch being the final solution. The ground systems tracked the spacecraft and illuminated it with green and blue beacon lasers. The Payload Experiment Package (PEP) housed the bisection tracker, a key innovation central to the experiment. The bisection tracker acquired both beacons and controlled steerable mirrors to accomplish fine tracking of the two cooperative beacons. In the process, the relay mirror was precisely positioned to enable a successful relay of a third infrared laser between the two ground sites via the orbiting spacecraft. Many of the key technologies employed in the PEP were originally developed for Ball laser communications research and development programs and other laser pointing efforts. The WAVE sensor package, built by ATA and integrated by Ball, measured the vibrations of the optical base structure on which it was mounted. These spacecraft vibration data are critical to the accurate pointing of space laser communication terminals.

  4. Characteristics of Vector Surge Relays for Distributed Synchronous Generator Protection

    SciTech Connect

    Freitas, Walmir; Xu, Wilsun; Huang, Zhenyu; Vieira, Jose C.

    2007-02-28

    This work presented a detailed investigation on the performance characteristics if vector surge relays to detect islanding of distributed synchronous generators. A detection time versus active power imbalance curve is proposed to evaluate the relay performance. Computer simulations are used to obtain the performance curves. The concept of critical active power imbalance is introduced based on these curves. Main factors affecting the performance of the relays are analyzed. The factors investigated are voltage-dependent loads, load power factor, inertia constant of the generator, generator excitation system control mode, feeder length and R/X ratio as well as multi-distributed generators. The results are a useful guideline to evaluate the effectiveness of anti-islanding schemes based on vector surge relays for distributed generation applications.

  5. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  6. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  7. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  8. Radio Relays Improve Wireless Products

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  9. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  10. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  11. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  12. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  13. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  14. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... warning system shall be tested at least once every four years. (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with soft iron magnetic structure shall be tested at least once every two years. (2) Alternating current centrifugal type relays shall be tested at least...

  15. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... of train operations, shall be tested at least once every four years except: (a) Alternating current centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type relay and direct current polar type relay shall be tested at least once every 2 years; and (c) Relay...

  16. Laser Relay: Improving Space Communications

    NASA Video Gallery

    The Laser Communications Relay Demonstration mission proposes to revolutionize the way we send and receive data, video and other information, using lasers to encode and transmit data at rates 10 to...

  17. The power relay satellite

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  18. PHOTOSENSITIVE RELAY CONTROL CIRCUIT

    DOEpatents

    Martin, C.F.

    1958-01-14

    adapted for the measurement of the time required for an oscillating member to pass through a preselected number of oscillations, after being damped to a certain maximum amplitude of oscillation. A mirror is attached to the moving member and directs light successively to a photocell which is part of a trigger unit and to first and second photocells which are part of a starter unit, as the member swings to its maximum amplitude. The starter and trigger units comprise thyratrons and relays so interconnected that the trigger circuit, although generating a counter pulse, does not register a count in the counter when the light traverses both photocells of the starter unit. When the amplitude of oscillation of the member decreases to where the second photocell is not transversed, the triggei pulse is received by the counter. The counter taen operates to register the desired number of oscillations and initiates and terminates a timer for measuring the time irterval for the preselected number of oscillations.

  19. Heart Attack

    MedlinePlus

    ... have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get help immediately. It's ... few hours causes the affected heart muscle to die. NIH: National Heart, Lung, and Blood Institute

  20. Formulas for predicting the dynamic performance of ROCOF relays for embedded generation applications

    SciTech Connect

    Vieira, J.C. M.; Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun; Morelato, A.

    2006-07-13

    A set of formulas directly predict the performance of rate-of-change-of-frequency (ROCOF) relays used to detect islanding of embedded synchronous generators. The formulas are analytically derived from the dynamic model of the generator and relay. Dynamic simulation results obtained using a representative distribution system confirm the validity and accuracy. The formulas presented are a useful tool for protection engineers; they can be used, for example, to assess the effectiveness of anti-islanding schemes based on ROCOF relays, or to assist the selection of relay settings, significantly reducing the number of repeated dynamic simulations necessary to carry out such studies.

  1. EAGLE: relay mirror technology development

    NASA Astrophysics Data System (ADS)

    Hartman, Mary; Restaino, Sergio R.; Baker, Jeffrey T.; Payne, Don M.; Bukley, Jerry W.

    2002-06-01

    EAGLE (Evolutionary Air & Space Global Laser Engagement) is the proposed high power weapon system with a high power laser source, a relay mirror constellation, and the necessary ground and communications links. The relay mirror itself will be a satellite composed of two optically-coupled telescopes/mirrors used to redirect laser energy from ground, air, or space based laser sources to distant points on the earth or space. The receiver telescope captures the incoming energy, relays it through an optical system that cleans up the beam, then a separate transmitter telescope/mirror redirects the laser energy at the desired target. Not only is it a key component in extending the range of DoD's current laser weapon systems, it also enables ancillary missions. Furthermore, if the vacuum of space is utilized, then the atmospheric effects on the laser beam propagation will be greatly attenuated. Finally, several critical technologies are being developed to make the EAGLE/Relay Mirror concept a reality, and the Relay Mirror Technology Development Program was set up to address them. This paper will discuss each critical technology, the current state of the work, and the future implications of this program.

  2. Sealed reed relay limit switches

    NASA Astrophysics Data System (ADS)

    Ivanov, I. P.; Svintsov, G. P.; Yefimova, M. A.; Lebedev, A. V.; Samsonov, Y. P.

    1986-01-01

    Sealed reed relay limit switches are described which overcome the inherent deficiencies traditionally present in these devices: high material, labor consumption, and difficult operation. Series VSG limit switches developed at the All-Union Scientific Research and Technological Planning Institute for Relay Engineering (Cheboksary) for use in buildings are described. The VSG1 has a single switching contact, the VSG2 a single normally open contact, and the VSG3 a single normally closed contact. The VSG1 employs type MKS-27103 sealed reed relays, while the VSG2 and VSG3 employ KEM-1 reed relays. The magnet system, which consists of magnets and a plate, and the sealed reed relay are contained in a nonmagnetic casing with a slit in it. The mathematical expression defining the geometric dimensions of the magnet system is given. The basic parameteres of all three types of switches are tabulated. The VSG series switches can be used to replace VBK and BVK switches, thus saving electricity, labor, and materials, including silver.

  3. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  4. Satellite Relaying of Geophysical Data

    NASA Technical Reports Server (NTRS)

    Allenby, R. J.

    1977-01-01

    Data Collection Platforms (DCPs) for transmitting surface data to an orbiting satellite for relaying to a central data distribution center are being used in a number of geophysical applications. "Off-the-shelf" DCP's, transmitting through Landsat or GOES satellites, are fully capable of relaying data from low-data-rate instruments, such as tiltmeters or tide gauges. In cooperation with the Lamont-Doherty Geological Observatory, Goddard has successfully installed DCP systems on a tide gauge and tiltmeter array on Anegada, British Virgin Islands. Because of the high-data-rate requirements, a practical relay system capable of handling seismic information is not yet available. Such a system could become the basis of an operational hazard prediction system for reducing losses due to major natural catastrophies such as earthquakes, volcanic eruptions, landslides or tsunamis.

  5. Rotation frequency relay for hydrogenerator

    SciTech Connect

    Matveev, V.V.

    1980-09-01

    The rotation frequency relay (RFR) is one of the most critical elements of automatic control system of the hydrogenerators. Accurate fixing of braking, subsynchronous and acceleration angular speeds contribute to operational reliability of many units of mechanical and electrical parts of the hydrogenerator and vise versa. Both experimental and theoretical investigations were performed on hydrogenerators. It was concluded that the rotation frequency relay, where an integrated voltage of the regulator generator is used as reference voltage and the elements of comparison are executed on the operating amplifiers, has a fairly high accuracy and stability of settings, and practically does not require regulation for manufacture and operation.

  6. Performance limitations of relay neurons.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2012-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. For example, the visual thalamus contains relay neurons that receive driving inputs from the retina that encode a visual image, and modulating inputs from reticular activating system and layer 6 of visual cortex that control what aspects of the image will be relayed back to visual cortex for perception. What gets relayed depends on several factors such as attentional demands and a subject's goals. In this paper, we analyze a biophysical based model of a relay cell and use systems theoretic tools to construct analytic bounds on how well the cell transmits a driving input as a function of the neuron's electrophysiological properties, the modulating input, and the driving signal parameters. We assume that the modulating input belongs to a class of sinusoidal signals and that the driving input is an irregular train of pulses with inter-pulse intervals obeying an exponential distribution. Our analysis applies to any [Formula: see text] order model as long as the neuron does not spike without a driving input pulse and exhibits a refractory period. Our bounds on relay reliability contain performance obtained through simulation of a second and third order model, and suggest, for instance, that if the frequency of the modulating input increases or the DC offset decreases, then relay increases. Our analysis also shows, for the first time, how the biophysical properties of the neuron (e.g. ion channel dynamics) define the oscillatory patterns needed in the modulating input for appropriately timed relay of sensory information. In our discussion, we describe how our bounds predict experimentally observed neural activity in the basal ganglia in (i) health, (ii) in Parkinson's disease (PD), and (iii) in PD during therapeutic deep

  7. Integral testing of relays and circuit breakers

    SciTech Connect

    Bandyopadhyay, K.K.

    1993-12-31

    Among all equipment types considered for seismic qualification, relays have been most extensively studied through testing due to a wide variation of their designs and seismic capacities. A temporary electrical discontinuity or ``chatter`` is the common concern for relays. A chatter duration of 2 milliseconds is typically used as an acceptance criterion to determine the seismic capability of a relay. Many electrical devices, on the other hand, receiving input signals from relays can safely tolerate a chatter level much greater than 2 ms. In Phase I of a test program, Brookhaven National Laboratory performed testing of many relay models using the 2-ms chatter criterion. In Phase II of the program, the factors influencing the relay chatter criterion, and impacts of relay chatter on medium and low voltage circuit breakers and lockout relays were investigated. This paper briefly describes the Phase II tests and presents the important observations.

  8. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending on spring tension to return contacts to deenergized position in noncoded continuous inductive...

  9. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending on spring tension to return contacts to deenergized position in noncoded continuous inductive...

  10. Heart Attack Risk Assessment

    MedlinePlus

    ... Pressure Tools & Resources Stroke More Heart Attack Risk Assessment Updated:May 31,2016 We're sorry, but ... Can You Recognize a Heart Attack? Quiz Risk Assessment Patient Information Sheets: Heart Attack Heart Attack Personal ...

  11. STBC AF relay for unmanned aircraft system

    NASA Astrophysics Data System (ADS)

    Adachi, Fumiyuki; Miyazaki, Hiroyuki; Endo, Chikara

    2015-01-01

    If a large scale disaster similar to the Great East Japan Earthquake 2011 happens, some areas may be isolated from the communications network. Recently, unmanned aircraft system (UAS) based wireless relay communication has been attracting much attention since it is able to quickly re-establish the connection between isolated areas and the network. However, the channel between ground station (GS) and unmanned aircraft (UA) is unreliable due to UA's swing motion and as consequence, the relay communication quality degrades. In this paper, we introduce space-time block coded (STBC) amplify-and-forward (AF) relay for UAS based wireless relay communication to improve relay communication quality. A group of UAs forms single frequency network (SFN) to perform STBC-AF cooperative relay. In STBC-AF relay, only conjugate operation, block exchange and amplifying are required at UAs. Therefore, STBC-AF relay improves the relay communication quality while alleviating the complexity problem at UAs. It is shown by computer simulation that STBC-AF relay can achieve better throughput performance than conventional AF relay.

  12. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out. PMID:24237838

  13. The magic of relay mirrors

    NASA Astrophysics Data System (ADS)

    Duff, Edward A.; Washburn, Donald C.

    2004-09-01

    Laser weapon systems would be significantly enhanced with the addition of high altitude or space-borne relay mirrors. Such mirrors, operating alone with a directed energy source, or many in a series fashion, can be shown to effectively move the laser source to the last, so-called fighting mirror. This "magically" reduces the range to target and offers to enhance the performance of directed energy systems like the Airborne Laser and even ground-based or ship-based lasers. Recent development of high altitude airships will be shown to provide stationary positions for such relay mirrors thereby enabling many new and important applications for laser weapons. The technical challenges to achieve this capability are discussed.

  14. Energy efficient circuit design using nanoelectromechanical relays

    NASA Astrophysics Data System (ADS)

    Venkatasubramanian, Ramakrishnan

    Nano-electromechanical (NEM) relays are a promising class of emerging devices that offer zero off-state leakage and behave like an ideal switch. Recent advances in planar fabrication technology have demonstrated that microelectromechanical (MEMS) scale miniature relays could be manufactured reliably and could be used to build fully functional, complex integrated circuits. The zero leakage operation of relays has renewed the interest in relay based low power logic design. This dissertation explores circuit architectures using NEM relays and NEMS-CMOS heterogeneous integration. Novel circuit topologies for sequential logic, memory, and power management circuits have been proposed taking into consideration the NEM relay device properties and optimizing for energy efficiency and area. In nanoscale electromechanical devices, dispersion forces like Van der Waals' force (vdW) affect the pull-in stability of the relay devices significantly. Verilog-A electromechanical model of the suspended gate relay operating at 1V with a nominal air gap of 5 - 10nm has been developed taking into account all the electrical, mechanical and dispersion effects. This dissertation explores different relay based latch and flip-flop topologies. It has been shown that as few as 4 relay cells could be used to build flip-flops. An integrated voltage doubler based flip flop that improves the performance by 2X by overdriving Vgb has been proposed. Three NEM relay based parallel readout memory bitcell architectures have been proposed that have faster access time, and remove the reliability issues associated with previously reported serial readout architectures. A paradigm shift in design of power switches using NEM relays is proposed. An interesting property of the relay device is that the ON state resistance (Ron) of the NEM relay switch is constant and is insensitive to the gate slew rate. This coupled with infinite OFF state resistance (Roff ) offers significant area and power advantages over CMOS

  15. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  16. Experimental evaluation of earthquake induced relay chattering

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Shteyngart, S.

    1990-01-01

    An experimental evaluation of relay performance under vibratory environments is discussed in this paper. Single frequency excitation was used for most tests. Limited tests were performed with random multifrequency inputs. The capacity of each relay was established based on a two-millisecond chatter criterion. The experimental techniques are described and the effects of parameters in controlling the relay capacity levels are illustrated with test data. A wide variation of the capacity levels was observed due to the influence of parameters related to the design of the relay and nature of the input motion. 3 refs., 15 figs.

  17. Inhomogeneity induces relay synchronization in complex networks

    NASA Astrophysics Data System (ADS)

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  18. The Laser Communications Relay and the Path to the Next Generation Near Earth Relay

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2015-01-01

    NASA Goddard Space Flight Center is currently developing the Laser Communications Relay Demonstration (LCRD) as a Path to the Next Generation Near Earth Space Communication Network. The current NASA Space Network or Tracking and Data Relay Satellite System is comprised of a constellation of Tracking and Data Relay Satellites (TDRS) in geosynchronous orbit and associated ground stations and operation centers. NASA is currently targeting a next generation of relay capability on orbit in the 2025 timeframe.

  19. A multi-data source surveillance system to detect a bioterrorism attack during the G8 Summit in Scotland.

    PubMed

    Meyer, N; McMenamin, J; Robertson, C; Donaghy, M; Allardice, G; Cooper, D

    2008-07-01

    In 18 weeks, Health Protection Scotland (HPS) deployed a syndromic surveillance system to early-detect natural or intentional disease outbreaks during the G8 Summit 2005 at Gleneagles, Scotland. The system integrated clinical and non-clinical datasets. Clinical datasets included Accident & Emergency (A&E) syndromes, and General Practice (GPs) codes grouped into syndromes. Non-clinical data included telephone calls to a nurse helpline, laboratory test orders, and hotel staff absenteeism. A cumulative sum-based detection algorithm and a log-linear regression model identified signals in the data. The system had a fax-based track for real-time identification of unusual presentations. Ninety-five signals were triggered by the detection algorithms and four forms were faxed to HPS. Thirteen signals were investigated. The system successfully complemented a traditional surveillance system in identifying a small cluster of gastroenteritis among the police force and triggered interventions to prevent further cases. PMID:17678556

  20. A fuzzy-set approach to fault-type identification in digital relaying

    SciTech Connect

    Ferrero, A.; Sangiovanni, S.; Zappitelli, E.

    1995-01-01

    Sometime the operations that a relay is required to perform cannot be easily described in a deterministic way. A significant example of this situation is given by the operations a line relay must perform in order to detect the type of fault line-to-ground, line-to-line, line-to-line involving ground. Recently, the mathematical theory of fuzzy sets featured many practical applications, mainly in industrial controls, and fuzzy-set processors are available to allow real time applications. This paper shows that a fuzzy-set approach can be useful even in digital relaying, whenever ``fuzzy`` decisions have to be undertaken. A possible application to the detection of the type of fault when symmetrical component relaying techniques are adopted is proposed and the results of simulation tests are given.

  1. Trisphere spark gap actuates overvoltage relay

    NASA Technical Reports Server (NTRS)

    Camacho, S. L.

    1966-01-01

    Trisphere spark gap and high voltage relay provides a positive, fast response, high current capacity device that will sense an overvoltage condition and remove power from the circuit before insulation breakdown. When an overvoltage occurs, the spark gap breaks down and conducts an actuating current to the relay which removes power from the circuit.

  2. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  3. G. Marconi: A Data Relay Satellite for Mars Communications

    NASA Astrophysics Data System (ADS)

    Dionisio, C.; Marcozzi, M.; Landriani, C.

    2002-01-01

    Mars has always been a source of intrigue and fascination. Recent scientific discoveries have stimulated this longstanding interest, leading to a renaissance in Mars exploration. Future missions to Mars will be capable of long-distance surface mobility, hyperspectral imaging, subsurface exploration, and even life-detection. Manned missions and, eventually, colonies may follow. No mission to the Red Planet stands alone. New scientific and technological knowledge is passed on from one mission to the next, not only improving the journey into space, but also providing benefits here on Earth. The Mars Relay Network, an international constellation of Mars orbiters with relay radios, directly supports other Mars missions by relaying communications between robotic vehicles at Mars and ground stations on Earth. The ability of robotic visitors from Earth to explore Mars will take a gigantic leap forward in 2007 with the launch of the Guglielmo Marconi Orbiter (GMO), the first spacecraft primarily dedicated to providing communication relay, navigation and timing services at Mars. GMO will be the preeminent node of the Mars Relay Network. GMO will relay communications between Earth and robotic vehicles near Mars. GMO will also provide navigation services to spacecraft approaching Mars. GMO will receive transmissions from ground stations on Earth at X-band and will transmit to ground stations on Earth at X- and Ka-bands. GMO will transmit to robotic vehicles at Mars at UHF and receive from these vehicles at UHF and X-band. GMO's baseline 4450 km circular orbit provides complete coverage of the planet for telecommunication and navigation support. GMO will arrive at Mars in mid-2008, just before the NetLander and Mars Scout missions that will be its first users. GMO is designed for a nominal operating lifetime of 10 years and will support nominal commanding and data acquisition, as well as mission critical events such as Mars Orbit Insertion, Entry, Descent and Landing, and Mars

  4. Evolution of a radio communication relay system

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  5. Attacks on public telephone networks: technologies and challenges

    NASA Astrophysics Data System (ADS)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  6. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  7. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  8. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  9. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  11. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack. Causes Two types of pericarditis can occur after ...

  12. ESA's advanced relay and technology mission

    NASA Astrophysics Data System (ADS)

    Lechte, H.; Bird, A. G.; van Holtz, L.; Oppenhauser, G.

    1990-05-01

    The Advanced Relay and Technology Mission is discussed. The objective of the mission is to develop, launch, and operate a single geostationary satellite. The proposed satellite includes advanced communications payloads with data-relay, mobile, and fixed-service applications. The semiconductor laser intersatellite link experiment (Silex), which is aimed at developing an optical communications data-relay system, is described. The Silex configuration is designed for LEO or GEO applications and has a 65 Mbit/s data rate over the optical return link. Consideration is given to the phased-array technology utilized in the S-band data-relay payload; the L-band land mobile payload; diagnostics and propagation packages; and technology experiments for improving the platform.

  13. Speech-to-Speech Relay Service

    MedlinePlus

    ... all forms of TRS, STS uses Communications Assistants (CAs) – to relay the conversation back and forth between ... and the other party to the call. STS CAs are operators who are specifically trained in understanding ...

  14. Trend of EMC Standards for Protective Relays

    NASA Astrophysics Data System (ADS)

    Matsumoto, Toshio; Suga, Noriyoshi; Seki, Masaya

    JEC-2501, a future JEC standard for protective relays' EMC environment is now under creation in conformance with related IEC's EMC standards and existing Japanese EMC standards. This paper describes history of EMC related standards for protective relays in Japan, Structure and meanings of IEC's EMC standards referred by JEC-2501, relation between EMC standards of IEC and those of Japan, and finally desirable way of creating future EMC standard in Japan.

  15. Airborne Relay-Based Regional Positioning System

    PubMed Central

    Lee, Kyuman; Noh, Hongjun; Lim, Jaesung

    2015-01-01

    Ground-based pseudolite systems have some limitations, such as low vertical accuracy, multipath effects and near-far problems. These problems are not significant in airborne-based pseudolite systems. However, the monitoring of pseudolite positions is required because of the mobility of the platforms on which the pseudolites are mounted, and this causes performance degradation. To address these pseudolite system limitations, we propose an airborne relay-based regional positioning system that consists of a master station, reference stations, airborne relays and a user. In the proposed system, navigation signals are generated from the reference stations located on the ground and are relayed via the airborne relays. Unlike in conventional airborne-based systems, the user in the proposed system sequentially estimates both the locations of airborne relays and his/her own position. Therefore, a delay due to monitoring does not occur, and the accuracy is not affected by the movement of airborne relays. We conducted several simulations to evaluate the performance of the proposed system. Based on the simulation results, we demonstrated that the proposed system guarantees a higher accuracy than airborne-based pseudolite systems, and it is feasible despite the existence of clock offsets among reference stations. PMID:26029953

  16. Relay testing parametric investigation of seismic fragility

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1989-01-01

    The seismic capacity of most electrical equipment is governed by malfunction of relays. An evaluation of the existing relay test data base at Brookhaven National Laboratory (BNL) has indicated that the seismic fragility of a relay may depend on various parameters related to the design or the input motion. In particular, the electrical mode, contact state, adjustment, chatter duration acceptance limit, and the frequency and the direction of the vibration input have been considered to influence the relay fragility level. For a particular relay type, the dynamics of its moving parts depends on the exact model number and vintage and hence, these parameters may also influence the fragility level. In order to investigate the effect of most of these parameters on the seismic fragility level, BNL has conducted a relay test program. The testing has been performed at Wyle Laboratories. Establishing the correlation between the single frequency fragility test input and the corresponding multifrequency response spectrum (TRS) is also an objective of this test program. This paper discusses the methodology used for testing and presents a brief summary of important test results. 1 ref., 10 figs.

  17. Physical Layer Security Using Two-Path Successive Relaying

    PubMed Central

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  18. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  19. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (ESTSC)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  20. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    SciTech Connect

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We

  1. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  2. Ground wave emergency network environmental assessment for northwestern Colorado relay node site number RN 8C924CO

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  3. COMPASS Final Report: Lunar Relay Satellite (LRS)

    NASA Technical Reports Server (NTRS)

    Oleson, Steven R.; McGuire, Melissa L.

    2012-01-01

    The Lunar Relay Satellite (LRS) COllaborative Modeling and Parametric Assessment of Space Systems (COMPASS) session was tasked to design a satellite to orbit in an elliptical lunar polar orbit to provide relay communications between lunar South Pole assets and the Earth. The design included a complete master equipment list, power requirement list, configuration design, and brief risk assessment and cost analysis. The LRS is a half-TDRSS sized box spacecraft, which provides communications and navigation relay between lunar outposts (via Lunar Communications Terminals (LCT)) or Sortie parties (with user radios) and large ground antennas on Earth. The LRS consists of a spacecraft containing all the communications and avionics equipment designed by NASA Jet Propulsion Laboratory s (JPL) Team X to perform the relay between lunar-based assets and the Earth. The satellite design is a standard box truss spacecraft design with a thermal control system, 1.7 m solar arrays for 1 kWe power, a 1 m diameter Ka/S band dish which provides relay communications with the LCT, and a Q-band dish for communications to/from the Earth based assets. While JPL's Team X and Goddard Space Flight Center s (GSFC) I M Design Center (IMDC) have completed two other LRS designs, this NASA Glenn Research Center (GRC) COMPASS LRS design sits between them in terms of physical size and capabilities.

  4. A fuzzy-set approach to fault-type identification in digital relaying

    SciTech Connect

    Ferrero, A.; Sangiovanni, S.; Zappitelli, E.

    1994-12-31

    Sometime the operations that a relay is required to perform cannot be easily described in a deterministic way. A significant example of this situation is given by the operations a line really must perform in order to detect the type of fault (line-to-ground, line-to-line, line-to-line involving ground). Recently, the mathematical theory of fuzzy sets featured many practical applications, mainly in industrial controls, and fuzzy-set processors are available to allow real time applications. This paper shows that a fuzzy-set approach can be useful even in digital relaying, whenever ``fuzzy`` decisions have to be undertaken. A possible application to the detection of the type of fault when symmetrical component relaying techniques are adopted is proposed and the results of simulation tests are given.

  5. Bacteriophage as models for virus removal from Pacific oysters (Crassostrea gigas) during re-laying.

    PubMed Central

    Humphrey, T. J.; Martin, K.

    1993-01-01

    A study was undertaken to examine the feasibility of using naturally-occurring bacteriophages to assess the impact of re-laying on levels of viral contamination in Crassostrea gigas, the Pacific oyster. Two phages were chosen. One, male-specific (F+), was enumerated using Salmonella typhimurium. The other, a somatic phage, was detected using an, as yet, uncharacterized Escherichia coli. Investigations, using a variety of re-laying sites, demonstrated that numbers of F+ phage in oyster tissue declined more rapidly than those of somatic phage. For example, in oysters placed in commercially-used sea water ponds, F+ phage reached undetectable levels within 2-3 weeks, whereas somatic phage could still be detected 5 weeks after re-laying. The studies suggest that F+ phage may not be a suitable indicator for virus removal and that somatic phage may be better suited to this role. PMID:8405159

  6. Optical deep space communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Gagliardi, R. M.; Vilnrotter, V. A.; Dolinar, S. J., Jr.

    1981-01-01

    The possible use of an optical for high rate data transmission from a deep space vehicle to an Earth-orbiting relay satellite while RF links are envisioned for the relay to Earth link was studied. A preliminary link analysis is presented for initial sizing of optical components and power levels, in terms of achievable data rates and feasible range distances. Modulation formats are restricted to pulsed laser operation, involving bot coded and uncoded schemes. The advantage of an optical link over present RF deep space link capabilities is shown. The problems of acquisition, pointing and tracking with narrow optical beams are presented and discussed. Mathematical models of beam trackers are derived, aiding in the design of such systems for minimizing beam pointing errors. The expected orbital geometry between spacecraft and relay satellite, and its impact on beam pointing dynamics are discussed.

  7. Multiantenna Relay Beamforming Design for QoS Discrimination in Two-Way Relay Networks

    PubMed Central

    Xiong, Ke; Zhang, Yu; Li, Dandan; Zhong, Zhangdui

    2013-01-01

    This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method. PMID:24391459

  8. Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Mckenzie, J.; Vanek, C.

    1991-01-01

    The DSN (Deep Space Network) mission support requirements for the Tracking and Data Relay Satellite System (TDRSS) are summarized. The TDRSS consists of four identical satellites in geosynchronous orbits (35,800 km) and a dedicated ground station. The payload of each satellite is a telecommunications service system that relays communication signals between low earth-orbiting user spacecraft and the TDRSS ground terminal. Mission objectives are outlined and the DSN support requirements are defined through the presentation of tables and narratives describing the spacecraft flight profile; DSN support coverage; frequency assignments; support parameters for telemetry, command and support systems; and tracking support responsibility.

  9. Optimum satellite relay positions with application to a TDRS-1 Indian Ocean relay

    NASA Technical Reports Server (NTRS)

    Jackson, A. H.; Christopher, P.

    1994-01-01

    An Indian Ocean satellite relay is examined. The relay satellite position is optimized by minimizing the sum of downlink and satellite to satellite link losses. Osculating orbital elements are used for fast intensive orbital computation. Integrated Van Vleck gaseous attenuation and a Crane rain model are used for downlink attenuation. Circular polarization losses on the satellite to satellite link are found dynamically. Space to ground link antenna pointing losses are included as a function of yaw ans spacecraft limits. Relay satellite positions between 90 to 100 degrees East are found attractive for further study.

  10. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  11. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  12. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... § 90.35(b)(3), each mobile relay station, regardless of the frequency or frequencies of the signal by... 47 Telecommunication 5 2011-10-01 2011-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations....

  13. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... § 90.35(b)(3), each mobile relay station, regardless of the frequency or frequencies of the signal by... 47 Telecommunication 5 2014-10-01 2014-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations....

  14. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  15. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  16. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  17. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  18. Double-layer video transmission over decode-and-forward wireless relay networks using hierarchical modulation.

    PubMed

    Nguyen, Tu V; Cosman, Pamela C; Milstein, Laurence B

    2014-04-01

    We consider a wireless relay network with a single source, a single destination, and a multiple relay. The relays are half-duplex and use the decode-and-forward protocol. The transmit source is a layered video bitstream, which can be partitioned into two layers, a base layer (BL) and an enhancement layer (EL), where the BL is more important than the EL in terms of the source distortion. The source broadcasts both layers to the relays and the destination using hierarchical 16-QAM. Each relay detects and transmits successfully decoded layers to the destination using either hierarchical 16-QAM or QPSK. The destination can thus receive multiple signals, each of which can include either only the BL or both the BL and the EL. We derive the optimal linear combining method at the destination, where the uncoded bit error rate is minimized. We also present a suboptimal combining method with a closed-form solution, which performs very close to the optimal. We use the proposed double-layer transmission scheme with our combining methods for transmitting layered video bitstreams. Numerical results show that the double-layer scheme can gain 2-2.5 dB in channel signal-to-noise ratio or 5-7 dB in video peak signal-to-noise ratio, compared with the classical single-layer scheme using conventional modulation. PMID:24808347

  19. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  20. Cable Television Service; Cable Television Relay Service.

    ERIC Educational Resources Information Center

    Federal Register, 1972

    1972-01-01

    The rules and regulations of the Federal Communications Commission (FCC) concerning cable television service and cable relay service are presented along with the comments of the National Cable Television Association, the National Association of Broadcasters, the Association of Maximum Service Telecasters, and a major group of program suppliers.…

  1. Distribution Line Protection Relaying Scheme Based on Complex Number Operation

    NASA Astrophysics Data System (ADS)

    Tsuji, Kouichi

    In Japan, operational principles from the mechanical-type era, such as the directional ground relay (DG) and overcurrent relay (OC), are still used without modification for the protection of distribution lines. We are now facing various problems, such as ground faults with high fault resistance in systems isolated from the ground. A new operational principle to solve the above problems is summarized below. ·A fault is simulated by replacing a branched distribution line with a one-section single distribution line, in which loads are concentrated at its terminals. ·Lines with a one-line to ground fault are detected on the basis of the relationship between the fault-phase voltage E before the fault and the fault current using Ho and Thevenin's theorem. ·Faults are assumed to occur at both terminals in the section. If the signs of the obtained fault reactance Xf at the two terminals are opposite, it is judged that a fault point where Xf = 0 holds exists within the section. As a result of the simulation using the program we developed, it was confirmed that no errors in the detection of the internal and external ground faults with a high fault resistance of 0-30kΩ were observed.

  2. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  3. Exact Outage Probability of Cognitive Underlay DF Relay Networks with Best Relay Selection

    NASA Astrophysics Data System (ADS)

    Bao, Vo Nguyen Quoc; Duong, Trung Quang

    In this letter, we address the performance analysis of underlay selective decode-and-forward (DF) relay networks in Rayleigh fading channels with non-necessarily identical fading parameters. In particular, a novel result on the outage probability of the considered system is presented. Monte Carlo simulations are performed to verify the correctness of our exact closed-form expression. Our proposed analysis can be adopted for various underlay spectrum sharing applications of cognitive DF relay networks.

  4. Using a micromachined magnetostatic relay in commutating a DC motor

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor); Lilienthal, Gerald (Inventor)

    2004-01-01

    A DC motor is commutated by rotating a magnetic rotor to induce a magnetic field in at least one magnetostatic relay in the motor. Each relay is activated in response to the magnetic field to deliver power to at least one corresponding winding connected to the relay. In some cases, each relay delivers power first through a corresponding primary winding and then through a corresponding secondary winding to a common node. Specific examples include a four-pole, three-phase motor in which each relay is activated four times during one rotation of the magnetic rotor.

  5. Seismic testing and evaluation of relays past and future

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.

    1990-01-01

    Brookhaven National Laboratory (BNL) is conducting a special study on relays. The primary objective of the first series of relay tests was to study systematically the influence of relay design and input motion on seismic capability. The second test series will address some fundamental questions regarding the relay chatter acceptance criteria in addition to the chatter tolerance behavior of a breaker circuit. The characteristics of each relay model as observed from the single frequency test data of the first test series and an outline of the plans for the second test series are described in this paper. 3 refs., 1 tab.

  6. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  7. Pericarditis - after heart attack

    MedlinePlus

    Dressler syndrome; Post-MI pericarditis; Post-cardiac injury syndrome; Postcardiotomy pericarditis ... Two types of pericarditis can occur after a heart attack . Early pericarditis: This form most occurs within ...

  8. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  9. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  10. Solar concentrator with a toroidal relay module.

    PubMed

    Lin, Jhe-Syuan; Liang, Chao-Wen

    2015-10-01

    III-V multijunction solar cells require solar concentrators with a high concentration ratio to reduce per watt cost and to increase solar energy transforming efficiency. This paper discusses a novel solar concentrator design that features a high concentration ratio, high transfer efficiency, thin profile design, and a high solar acceptance angle. The optical design of the concentrator utilizes a toroidal relay module, which includes both the off-axis relay lens and field lens design in a single concentric toroidal lens shape. The optical design concept of the concentrator is discussed and the simulation results are shown. The given exemplary design has an aspect ratio of 0.24, a high averaged optical concentration ratio 1230×, a maximum efficiency of 76.8%, and the solar acceptance angle of ±0.9°. PMID:26479646

  11. Spaceborne centrifugal relays for spacecraft propulsion

    NASA Technical Reports Server (NTRS)

    Ouzidane, Malika

    1991-01-01

    Acceleration using centrifugal relays is a recently discovered method for the acceleration of spaceborne payloads to high velocity at high thrust. Centrifugal relays are moving rotors which progressively accelerate reaction mass to higher velocities. One important engineering problem consists of accurately tracking the position of the projectiles and rotors and guiding each projectile exactly onto the appropriate guide tracks on each rotor. The topics of this research are the system kinematics and dynamics and the computerized guidance system which will allow the projectile to approach each rotor with exact timing with respect to the rotor rotation period and with very small errors in lateral positions. Kinematics studies include analysis of rotor and projectile positions versus time and projectile/rotor interactions. Guidance studies include a detailed description of the tracking mechanism (interrupt of optical beams) and the aiming mechanism (electromagnetic focusing) including the design of electromagnetic deflection coils and the switching circuitry.

  12. Non-latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A non-latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes a permanent magnet and an electromagnet. The respective sections are arranged in separate locations or cavities in the assembly. The switch has a "normal" position and is selectively switched by an overriding electromagnetic assembly. The switch returns to the "normal" position when the overriding electromagnetic assembly is inactive.

  13. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  14. Adjustable electronic load-alarm relay

    DOEpatents

    Mason, Charles H.; Sitton, Roy S.

    1976-01-01

    This invention is an improved electronic alarm relay for monitoring the current drawn by an AC motor or other electrical load. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage.

  15. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  16. Relay test program. Series 2 tests: Integral testing of relays and circuit breakers

    SciTech Connect

    Bandyopadhyay, K.K.; Kunkel, C.; Shteyngart, S.

    1994-02-01

    This report presents the results of a relay test program conducted by Brookhaven National Laboratory (BNL) under the sponsorship of the US Nuclear Regulatory Commission (NRC). The program is a continuation of an earlier test program the results of which were published in NUREG/CR-4867. The current program was carried out in two phases: electrical testing and vibration testing. The objective was primarily to focus on the electrical discontinuity or continuity of relays and circuit breaker tripping mechanisms subjected to electrical pulses and vibration loads. The electrical testing was conducted by KEMA-Powertest Company and the vibration testing was performed at Wyle Laboratories, Huntsville, Alabama. This report discusses the test procedures, presents the test data, includes an analysis of the data and provides recommendations regarding reliable relay testing.

  17. A fatal elephant attack.

    PubMed

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. PMID:22085093

  18. Using TACS functions within EMTP to teach protective relaying fundamentals

    SciTech Connect

    Wall, R.W.; Johnson, B.K.

    1997-02-01

    The purpose of this discussion is to provide an educational tool for investigating relaying concepts by modeling digital relays using TACS functions within EMTP in a closed-loop manner. Various elements of digital protection systems are identified and organized to generate an systematic approach to modeling the actual hardware of relay systems. Discussion is limited to conventional relaying systems that monitor the vitality of the 60 Hz voltages and/or currents. TACS functions for transport delay and pulse generators are used to model dynamics associated with analog to digital conversion and sampling systems. DSP algorithms convert a sequence of sampled data into a sequence of values for magnitude and phase components. A simple example of a time overcurrent relay is developed to demonstrate the techniques to implement relay control in EMTP with TACS and illustrates the kinds of phenomena that can be studied using these techniques.

  19. Partial processing satellite relays for frequency-hop antijam communications

    NASA Astrophysics Data System (ADS)

    Sussman, S. M.; Kotiveeriah, P.

    1982-08-01

    Jamming effects on the uplink and downlink are combined to derive the earth station-to-earth station performance. In the linear dehop-rehop transponder (DRT), the retransmitted uplink noise and jamming for various ratios of relay bandwidth to data rate are taken into account, and a new end-to-end SNR relation is obtained. The symbol regenerative processor (SRP) analysis is based on the appropriate combining of uplink and downlink error probabilities to yield the end-to-end error probability. The jammer is assumed to employ either full-band noise or optimum partial band jamming, and several combinations of these two jamming strategies are evaluated. The relationship between uplink and downlink SNR are obtained for specified end-to-end SNR or error probability, and drawn between the DRT and the SRP. The analysis treats M-ary orthogonal frequency shift typing with incoherent combining and detection of multiple frequency hops per symbol.

  20. Automation of servicibility of radio-relay station equipment

    NASA Astrophysics Data System (ADS)

    Uryev, A. G.; Mishkin, Y. I.; Itkis, G. Y.

    1985-03-01

    Automation of the serviceability of radio relay station equipment must ensure central gathering and primary processing of reliable instrument reading with subsequent display on the control panel, detection and recording of failures soon enough, advance enough warning based on analysis of detertioration symptoms, and correct remote measurement of equipment performance parameters. Such an inspection will minimize transmission losses while reducing nonproductive time and labor spent on documentation and measurement. A multichannel automated inspection system for this purpose should operate by a parallel rather than sequential procedure. Digital data processing is more expedient in this case than analog method and, therefore, analog to digital converters are required. Spepcial normal, above limit and below limit test signals provide means of self-inspection, to which must be added adequate interference immunization, stabilization, and standby power supply. Use of a microcomputer permits overall refinement and expansion of the inspection system while it minimizes though not completely eliminates dependence on subjective judgment.

  1. Programming A Molecular Relay for Ultrasensitive Biodetection through 129 Xe NMR

    SciTech Connect

    Wang, Yanfei; Roose, Benjamin W.; Philbin, John P.; Doman, Jordan L.; Dmochowski, Ivan J.

    2015-12-21

    We reported a supramolecular strategy for detecting specific proteins in complex media by using hyperpolarized 129Xe NMR. A cucurbit[6]uril (CB[6])-based molecular relay was programmed for three sequential equilibrium conditions by designing a two-faced guest (TFG) that initially binds CB[6] and blocks the CB[6]–Xe interaction. Moreover, the protein analyte recruits the TFG and frees CB[6] for Xe binding. TFGs containing CB[6]- and carbonic anhydrase II (CAII)-binding domains were synthesized in one or two steps. X-ray crystallography confirmed TFG binding to Zn2+ in the deep CAII active-site cleft, which precludes simultaneous CB[6] binding. The molecular relay was reprogrammed to detect avidin by using a different TFG. Finally, Xe binding by CB[6] was detected in buffer and in E. coli cultures expressing CAII through ultrasensitive 129Xe NMR spectroscopy.

  2. Internet Relaying of Total Solar Eclipse on 11 August,1999

    NASA Astrophysics Data System (ADS)

    Nagai, T.; Takahashi, N.; Okyudo, M.; Suginaka, M.; Matsumoto, N.; Team Of Live! Eclipse

    The total solar eclipse was relayed live through the Internet from Siberia, Russia, on 9 March 1997. Subsequently, the total solar eclipse was relayed from Venezuela and Guadeloupe in the Caribbean Sea in 26 February 1998, the annular solar eclipse from Malaysia on 21 August 1998, and the annular solar eclipse from Australia on 16 February 1999. The Internet was used to relay the total solar eclipse to be seen in Europe, Rumania, Turkey, and Iran. We succeeded in transmitting images from Turkey.

  3. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  4. Ground wave emergency network final operational capability: Environmental assessment for southern Nevada relay node site number RN 8W918NV

    NASA Astrophysics Data System (ADS)

    1993-03-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  5. Ground wave emergency network final operational capability: Environmental assessment for northwestern Nebraska relay node, site number RN 8C930NE

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in northwestern Nebraska, consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  6. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  7. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    ... to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent The content in this library is for educational purposes only, and therefore is not intended to be a substitute for professional medical advice, diagnosis or treatment.

  8. High-performance inkjet-printed four-terminal microelectromechanical relays and inverters.

    PubMed

    Chung, Seungjun; Ul Karim, Muhammed Ahosan; Kwon, Hyuk-Jun; Subramanian, Vivek

    2015-05-13

    We report the first demonstration of inkjet-printed 4-terminal microelectromechanical (MEM) relays and inverters with hyper-abrupt switching that exhibit excellent electrical and mechanical characteristics. This first implementation of a printed 4-terminal device is critically important, since it allows for the realization of full complementary logic functions. The floated fourth terminal (body electrode), which allows the gate switching voltage to be adjusted, is bonded to movable channel beams via a printed epoxy layer in a planar structure, which can move downward together via the electrostatic force between the gate electrodes and body such that the channel can also actuate downward and touch the drain electrode. Because the body, channel, and drain electrodes are completely electrically separated, no detectable leakage or electrical interference between the electrodes is observed. The printed MEM relay exhibited an on-state resistance of only 3.48 Ω, immeasurable off-state leakage, subthreshold swing <1 mV/dec, and a stable operation over 10(4) cycles with a switching delay of 47 μs, and the relay inverter exhibits abrupt transitions between on/off states. The operation of the printed 4-terminal MEM relay was also verified against the results of a 3-dimensional (3D) finite element simulation. PMID:25830693

  9. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  10. Relay testing at Brookhaven National Laboratory

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.

    1989-01-01

    Brookhaven National Laboratory (BNL) is conducting a seismic test program on relays. The purpose of the test program is to investigate the influence of various designs, electrical and vibration parameters on the seismic capacity levels. The first series of testing has been completed and performed at Wyle Laboratories. The major part of the test program consisted of single axis, single frequency sine dwell tests. Random multiaxis, multifrequency tests were also performed. Highlights of the test results as well as a description of the testing methods are presented in this paper. 10 figs.

  11. Galileo probe relay receiver - Acquisition and tracking

    NASA Technical Reports Server (NTRS)

    Von Der Embse, U. A.

    1983-01-01

    The probe-to-orbiter data link for the Jovian mission uses a Manchester encoded BPSK waveform which is demodulated by the Galileo probe relay receiver. Signal acquisition and tracking consists of a sequential probability ratio signal search, frequency acquisition with a least-squares estimator, wide-band phase lock acquisition, and a self-regulating mode control. A discrete Fourier transform serves as the basic mechanism to generate the algorithms that provide this orderly transition to phase tracking. Acquisition and tracking is addressed in this paper with emphasis on key algorithms, rationale, and theoretical/measured performance.

  12. Neural network classifier of attacks in IP telephony

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  13. Detecting Sirex noctilio grey-attacked and lightning-struck pine trees using airborne hyperspectral data, random forest and support vector machines classifiers

    NASA Astrophysics Data System (ADS)

    Abdel-Rahman, Elfatih M.; Mutanga, Onisimo; Adam, Elhadi; Ismail, Riyad

    2014-02-01

    The visual progression of sirex (Sirex noctilio) infestation symptoms has been categorized into three distinct infestation phases, namely the green, red and grey stages. The grey stage is the final stage which leads to almost complete defoliation resulting in dead standing trees or snags. Dead standing pine trees however, could also be due to the lightning damage. Hence, the objective of the present study was to distinguish amongst healthy, sirex grey-attacked and lightning-damaged pine trees using AISA Eagle hyperspectral data, random forest (RF) and support vector machines (SVM) classifiers. Our study also presents an opportunity to look at the possibility of separating amongst the previously mentioned pine trees damage classes and other landscape classes on the study area. The results of the present study revealed the robustness of the two machine learning classifiers with an overall accuracy of 74.50% (total disagreement = 26%) for RF and 73.50% (total disagreement = 27%) for SVM using all the remaining AISA Eagle spectral bands after removing the noisy ones. When the most useful spectral bands as measured by RF were exploited, the overall accuracy was considerably improved; 78% (total disagreement = 22%) for RF and 76.50% (total disagreement = 24%) for SVM. There was no significant difference between the performances of the two classifiers as demonstrated by the results of McNemar's test (chi-squared; χ2 = 0.14, and 0.03 when all the remaining ASIA Eagle wavebands, after removing the noisy ones and the most important wavebands were used, respectively). This study concludes that AISA Eagle data classified using RF and SVM algorithms provide relatively accurate information that is important to the forest industry for making informed decision regarding pine plantations health protocols.

  14. A Geosynchronous Orbit Optical Communications Relay Architecture

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2014-01-01

    NASA is planning to fly a Next Generation Tracking and Data Relay Satellite (TDRS) next decade. While the requirements and architecture for that satellite are unknown at this time, NASA is investing in communications technologies that could be deployed on the satellite to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in December 2017 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the Next Generation TDRS. While it is obvious that a small to medium sized optical communications terminal could be flown on a GEO satellite to provide support to Near Earth missions, it is also possible to deploy a large terminal on the satellite to support Deep Space missions. Onboard data processing and Delay Tolerant Networking (DTN) are two additional technologies that could be used to optimize optical communications link services and enable additional mission and network operations. This paper provides a possible architecture for the optical communications augmentation of a Next Generation TDRS and touches on the critical technology work currently being done at NASA. It will also describe the impact of clouds on such an architecture and possible mitigation techniques.

  15. The data-relay preparatory programme

    NASA Astrophysics Data System (ADS)

    Dickinson, A.

    1990-02-01

    The data-relay preparatory program establishes and defines the preferred configuration for the data-relay system (DRS) space and ground segments, information-transmission, telemetry, telecommand and ranging sevices for foreseen European space programs, including Columbus, Ariane-5, Hermes and advanced earth-observation systems. This program has been conducted in two main areas: system studies and technological development. The system study has been divided in three main phases: (1) system design, i.e., configuration of the ground and spaceborne elements (1988); (2) definition of configuration and capacity of DRS satellites (1989); and (3) design of satellites and ground-segment facilities on the subsystem level (1990). As a result of the study, the DRS configuration will provide two operational satellites in geostationary orbit with orbital position of 44 deg W and 59 deg E which will allow almost full global coverage. The European DRS will be served by independent user earth terminals, with mission control center (MCC) in Darmstadt. The first system is planned to be fully operational in 1996.

  16. An economically viable space power relay system

    NASA Astrophysics Data System (ADS)

    Bekey, Ivan; Boudreault, Richard

    1999-09-01

    This paper describes and analyzes the economics of a power relay system that takes advantage of recent technological advances to implement a system that is economically viable. A series of power relay systems are described and analyzed which transport power ranging from 1,250 megawatts to 5,000 megawatts, and distribute it to receiving sites at transcontinental distances. Two classes of systems are discussed—those with a single reflector and delivering all the power to a single rectenna, and a second type which has multiple reflectors and distributes it to 10 rectenna sites, sharing power among them. It is shown that when offering electricity at prices competitive to those prevalent in developed cities in the US that a low IRR is inevitable, and economic feasibility of a business is unlikely. However, when the target market is Japan where the prevalent electricity prices are much greater, that an IRR exceeding 65% is readily attainable. This is extremely attractive to potential investors, making capitalization of a venture likely. The paper shows that the capital investment required for the system can be less than 1 per installed watt, contributing less than 0.02 /KW-hr to the cost of energy provision. Since selling prices in feasible regions range from 0.18 to over 030 $/kW-hr, these costs are but a small fraction of the operating expenses. Thus a very large IRR is possible for such a business.

  17. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  18. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  19. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  20. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  1. MaROS Strategic Relay Planning and Coordination Interfaces

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  2. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  3. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  4. Relay studies: Existing data, current testing and cabinet amplification

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1988-01-01

    The seismic fragility of most electrical equipment is governed by the malfunction of relays. This paper discusses the combined study being performed at BNL by evaluating existing fragility test data, conducting a new relay test program and estimating the cabinet amplification at relay locations. Existing test data for relays have been collected and evaluated at BNL. The data base consists of results from a wide variety of test programs - single frequency, single axis, multifrequency, multiaxis tests. For most relays, the non-operating condition controls the chatter fragility limit. In order to characterize the effect of various parameters on the relay seismic capacity, a test program has been initiated at BNL. Selected test specimens will be tested to determine the influence of frequency of vibration, direction of motion, adjustments of relay parts, among others, on the relay capacities. The amplification study involves computing dynamic amplification factors at various device locations in motor control centers and switchgear cabinets. Fragility and high level qualification data have been used for this purpose. This paper includes a summary of the amplification results. 4 refs., 6 figs., 1 tab.

  5. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  6. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart. PMID:26399945

  7. Effects of relay chatter in seismic probabilistic safety analysis

    SciTech Connect

    Reed, J.W.; Shiu, K.K.

    1985-01-01

    In the Zion and Indian Point Probabilistic Safety Studies, relay chatter was dismissed as a credible event and hence was not formally included in the analyses. Although little discussion is given in the Zion and Indian Point PSA documentation concerning the basis for this decision, it has been expressed informally that it was assumed that the operators will be able to reset all relays in a timely manner. Currently, it is the opinion of many professionals that this may be an oversimplification. The three basic areas which must be considered in addressing relay chatter include the fragility of the relays per se, the reliability of the operators to reset the relays and finally the systems response aspects. Each of these areas is reviewed and the implications for seismic PSA are discussed. Finally, recommendations for future research are given.

  8. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  9. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  10. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  11. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  12. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  13. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Signal control circuits, selection through track relays or devices functioning as track relays and through signal mechanism contacts and time releases at automatic interlocking. 236.311 Section 236.311 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL...

  14. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  15. A European advanced data relay system

    NASA Astrophysics Data System (ADS)

    de Agostini, Agostino; Puccio, Antonio; Zanotti, Glullo

    1990-10-01

    The purpose of the study is to select the most attractive configuration(s) for an advanced data relay system to be employed at the beginning of the next century. A users scenario with such user classes as a manned in-orbit infrastructure and related support, launchers/transit vehicles, earth observation spacecraft, automatic microgravity free flyers, and scientific spacecraft is considered. System architecture is discussed in terms of configuration analysis and resources definition. The analysis of the space segment contains the definition of link requirements and payloads, as well as mass/power budget and accommodations on space platforms, and the ground segment is assessed from the system-facility and user earth-terminal points of view. Cost analysis and trade-offs are presented, and the key parameters such as the zone of exclusion, service availability, service continuity, intersatellite link implementation, feeder link, platform configuration, ground infrastructure, and economic viability are considered.

  16. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  17. Satellite data-relay activities in Arizona

    USGS Publications Warehouse

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  18. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  19. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; Schratz, Brian C.; Shihabi, Mazen M.; Srinivasan, Jeffrey M.; Varghese, Phillip; Sanders, Stephen S.; Denis, Michel

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  20. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  1. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  2. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  3. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  4. 18. VIEW OF URBAN DISPATCH RELAY ROOM, FIRST FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. VIEW OF URBAN DISPATCH - RELAY ROOM, FIRST FLOOR (THIS IS THE CONTROL CENTER FOR TRACK SWITCHES) - Pennsylvania Railroad, Harrisburg Station & Trainshed, Market & South Fourth Streets, Harrisburg, Dauphin County, PA

  5. Reliable quantum communication over a quantum relay channel

    SciTech Connect

    Gyongyosi, Laszlo; Imre, Sandor

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  6. 34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER P.H. #3, JUNE 23, 1943. SCE drawing no. 413187-1. - Santa Ana River Hydroelectric System, SAR-3 Powerhouse, San Bernardino National Forest, Redlands, San Bernardino County, CA

  7. 15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  8. 14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  9. 10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS Baltimore ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS - Baltimore & Potomac Interlocking Tower, Adjacent to AMTRAK railroad tracks in block bounded by Howard Street, Jones Falls Expressway, Maryland Avenue & Falls Road, Baltimore, Independent City, MD

  10. 8. North elevation of electric relay station showing electrical cable ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. North elevation of electric relay station showing electrical cable connection to tower. - New York, New Haven, & Hartford Railroad, Shell Interlocking Tower, New Haven Milepost 16, approximately 100 feel east of New Rochelle Junction, New Rochelle, Westchester County, NY

  11. 130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  12. 129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  13. 111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL, UMBILICAL MAST PUMP ROOM (109), LSB (BLDG. 770) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 West, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  14. Orbiting deep space relay station. Volume 3: Implementation plan

    NASA Technical Reports Server (NTRS)

    Hunter, J. A.

    1979-01-01

    An implementation plan for the Orbiting Deep Space Relay Station (ODSRS) is described. A comparison of ODSRS life cycle costs to other configuration options meeting future communication requirements is presented.

  15. 75 FR 16913 - Transmission Relay Loadability Reliability Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ...\\ Transmission Relay Loadability Reliability Standard, Notice of Proposed Rulemaking, 74 FR 35830 (Jul. 21, 2009...: 115 of the highest emergency rating of the series capacitor 115 of the maximum power...

  16. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  17. The importance of upgrading power stations with numerical protection relays

    NASA Astrophysics Data System (ADS)

    Vilceanu, Radu-Constantin; Surianu, Flavius-Dan

    2016-06-01

    In this paper we present the importance of upgrading power stations with numerical protection relays. We will study the gravity and the economic impact of a power system fault when it appears and it is not cleared by old protection devices. Also we will compare how an old protection scheme works when it clears a power fault with how modern numerical protection relays work. The trip decision and the actual circuit breaker open times will be compared and analyzed.

  18. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  19. Preamble-based channel estimation in single-relay networks using FBMC/OQAM

    NASA Astrophysics Data System (ADS)

    Mavrokefalidis, Christos; Kofidis, Eleftherios; Rontogiannis, Athanasios A.; Theodoridis, Sergios

    2014-12-01

    Preamble-based channel estimation in filter bank-based multicarrier (FBMC) systems using offset quadrature amplitude modulation (OQAM) has been extensively studied in the last few years, due to the many advantages this modulation scheme can offer over cyclic prefix (CP)-based orthogonal frequency division multiplexing (OFDM) and in view of the interesting challenges posed on the channel estimator by the interference effect inherent in such an FBMC system. In particular, preambles of short duration and of both the block ( full) and comb ( sparse) types were designed so as to minimize the channel estimation mean squared error (MSE) subject to a given transmit energy. In the light of the important role that relay-based cooperative networks are expected to play in future wireless communication systems, it is of interest to consider FBMC/OQAM, and in particular questions associated to preamble-based channel estimation, in such a context as well. The goal of this paper is to address these problems and come up with optimal solutions that extend existing results in a single relay-based cooperative network. Both low and medium frequency selective channels are considered. In addition to optimal preamble and estimator design, the equalization/detection task is studied, shedding light to a relay-generated interference effect and proposing a simple way to come over it. The reported simulation results corroborate the analysis and reveal interesting behavior with respect to channel frequency selectivity and signal-to-noise ratio.

  20. Thrombolytic drugs for heart attack

    MedlinePlus

    ... attack URL of this page: //medlineplus.gov/ency/article/007488.htm Thrombolytic drugs for heart attack To use the sharing features on this page, ... the management of patients with non-ST-elevation acute coronary syndromes: a report ... myocardial infarction: a report of the American College of Cardiology ...

  1. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network. PMID:25768550

  2. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  3. Relays from Mars demonstrate international interplanetary networking

    NASA Astrophysics Data System (ADS)

    2004-08-01

    On 4 August at 14:24 CEST, as Mars Express flew over one of NASA’s Mars exploration rovers, Opportunity, it successfully received data previously collected and stored by the rover. The data, including 15 science images from the rover's nine cameras, were then downlinked to ESA’s European Space Operations Centre in Darmstadt (Germany) and immediately relayed to the Mars Exploration Rovers team based at the Jet Propulsion Laboratory in Pasadena, USA. NASA orbiters Mars Odyssey and Mars Global Surveyor have so far relayed most of the data produced by the rovers since they landed in January. Communication compatibility between Mars Express and the rovers had already been demonstrated in February, although at a low rate that did not convey much data. The 4 August session, at a transmit rate of 42.6 megabits in about six minutes, set a new mark for international networking around another planet. The success of this demonstration is the result of years of groundwork and was made possible because both Mars Express and the Mars rovers use the same communication protocol. This protocol, called Proximity-1, was developed by the international Consultative Committee for Space Data Systems, an international partnership for standardising techniques for handling space data. Mars Express was 1400 kilometres above the Martian surface during the 4 August session with Opportunity, with the goal of a reliable transfer of lots of data. Engineers for both agencies plan to repeat this display of international cooperation today, 10 August, with another set of Opportunity images. “We're delighted how well this has been working, and thankful to have Mars Express in orbit,” said Richard Horttor of NASA's Jet Propulsion Laboratory, Pasadena, California, project manager for NASA's role in Mars Express. JPL engineer Gary Noreen of the Mars Network Office said: “the capabilities that our international teamwork is advancing this month could be important in future exploration of Mars

  4. Mobility-Based Mobile Relay Selection in MANETs

    NASA Astrophysics Data System (ADS)

    Kim, Gilnam; Lee, Hyoungjoo; Lee, Kwang Bok

    The future wireless mobile communication networks are expected to provide seamless wireless access and data exchange to mobile users. In particular, it is expected that the demand for ubiquitous data exchange between mobile users will increase with the widespread use of various wireless applications of the intelligent transportation system (ITS) and intelligent vehicles. Mobile ad hoc networks (MANETs) are one of the representative research areas pursuing the technology needed to satisfy the increasing mobile communication requirements. However, most of the works on MANET systems do not take into account the continuous and dynamic changes of nodal mobility to accommodate system design and performance evaluation. The mobility of nodes limits the reliability of communication between the source and the destination node since a link between two continuously moving nodes is established only when one node enters the transmission range of the other. To alleviate this problem, mobile relay has been studied. In particular, it is shown that relay selection is an efficient way to support nodal mobility in MANET systems. In this paper, we propose a mobility-based relay selection algorithm for the MANET environment. Firstly, we define the lifetime as the maximum link duration for which the link between two nodes remains active. Therefore, the lifetime indicates the reliability of the relay link which measures its capability to successfully support relayed communication when requested by the source node. Furthermore, we consider a series of realistic scenarios according to the randomness of nodal mobility. Thus, the proposed algorithm can be easily applied in practical MANET systems by choosing the appropriate node mobility behavior. The numerical results show that the improved reliability of the proposed algorithm's relayed communication is achieved with a proper number of mobile relay nodes rather than with the conventional selection algorithm. Lastly, we show that random

  5. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  6. Exact Average SER Performance Analysis for the Nth Best Opportunistic Amplify-and-Forward Relay Systems

    NASA Astrophysics Data System (ADS)

    Nam, Sangho; Ko, Kyunbyoung; Hong, Daesik

    This letter presents a method for obtaining an exact average symbol error rate (ASER) of M-phase shift keying (M-PSK) transmission for the Nth best opportunistic amplify-and-forward (OAF) relay systems over Rayleigh fading channels. This approach begins with deriving the relay selection probability when a relay is selected as the Nth best one with respect to the received signal-to-noise ratio. We then derive the modified moment generating function (MGF) for the Nth best OAF relay systems by taking the given Nth best-relay selection probability into consideration. Based on the modified MGF, we derive the exact ASER which accurately explicates the Nth best OAF relay system characteristics. Simulation results confirm the exactness of the analysis results for M-PSK transmission with respect to the number of relays, the Nth best relay selection, and the relay position.

  7. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  8. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  9. A study on the improvement of protective relay system for the utility application of HTS power cable

    NASA Astrophysics Data System (ADS)

    Kim, J. H.; Park, M.; Park, I. K.; Lee, S. R.; Park, J. D.; Kwon, Y. K.; Yu, I. K.

    2009-10-01

    In this paper, the analysis and improvement of protective relay systems are performed with respect to HTS (High Temperature Superconducting) power cable applied in a model power system. The over current relay and differential relay with proposed new decision making algorithm are implemented under a couple of fault conditions, a single line-to-ground fault and three phase short circuit. According to the analysis results, there is not a particular aspect for the protection system of HTS power cable, but the impedance variation of HTS power cable should be taken into account under the fault conditions. In the case of the differential relay system, the induced current ratio based fault detection scheme is proposed and applied for the bus to bus connection of HTS power cable protection. The circuit breaker operates according to the proposed algorithm well. The results obtained through the analysis of the simulation would provide more useful data for the protection system design of HTS power cables and their installation in power systems.

  10. Development Report for Islanded System Automatic Synchronizer and Predictive Step Out Prevention Relay System using Power Flow Parameters

    NASA Astrophysics Data System (ADS)

    Yasuda, Tadaaki; Nishi, Tetsuya; Inukai, Michihiko; Miura, Shogo

    This is the development report for our new type relay systems, Islanded System Automatic Synchronizer (ISAS) and the predictive step out prevention relay system using power flow parameters. ISAS is a kind of device for self-healing. It performs emergency system re-synchronize operation automatically when the islanded system is separated from the main grid. TEPCO applied some ISAS devices in Tokyo metropolitan area and resulted that reliability in the area was much improved. The predictive step out prevention relay system mentioned above is a kind of special protection scheme, which predicts generator step out and calculates how much amount of generator should be tripped to stabilize the power system when the fault on the transmission lines is detected. A New predicteve step out calculation algorithm using power flow parameters was developped so that it can be applied for the complex power system. TEPCO applied the new relay system to the area where TEPCO's criteria was not satisfied due to transient instability problem and resulted that the stability was improved enough to meet TEPCO's criteria.

  11. Analysis and visualization of large complex attack graphs for networks security

    NASA Astrophysics Data System (ADS)

    Chen, Hongda; Chen, Genshe; Blasch, Erik; Kruger, Martin; Sityar, Irma

    2007-04-01

    In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on network hardening to prevent attacks, (2) perform real-time attack event correlation during active attacks, and (3) formulate post-attack responses. We show that it is possible to visualize the complex graphs, including all possible network attack paths while still keeping complexity manageable. The proposed analysis and visualization tool provides an efficient and effective solution for predicting potential attacks upon observed intrusion evidence, as well as interactive multi-resolution views such that an analyst can first obtain high-level overviews quickly, and then drill down to specific details.

  12. Commercialization and Standardization Progress Towards an Optical Communications Earth Relay

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2015-01-01

    NASA is planning to launch the next generation of a space based Earth relay in 2025 to join the current Space Network, consisting of Tracking and Data Relay Satellites in space and the corresponding infrastructure on Earth. While the requirements and architecture for that relay satellite are unknown at this time, NASA is investing in communications technologies that could be deployed to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in 2018 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the next generation space based relay. This paper will describe NASA efforts in the on-going commercialization of optical communications and the development of inter-operability standards. Both are seen as critical to making optical communications a reality on future NASA science and exploration missions. Commercialization is important because NASA would like to eventually be able to simply purchase an entire optical communications terminal from a commercial provider. Inter-operability standards are needed to ensure that optical communications terminals developed by one vendor are compatible with the terminals of another. International standards in optical communications would also allow the space missions of one nation to use the infrastructure of another.

  13. Energy efficiency analysis of relay-assisted cellular networks

    NASA Astrophysics Data System (ADS)

    Yu, Huan; Li, Yunzhou; Kountouris, Marios; Xu, Xibin; Wang, Jing

    2014-12-01

    To meet the demand for higher throughput, improved coverage and enhanced reliability, future wireless cellular networks face significant technical challenges. One promising solution is to place relay stations between transmitters and receivers in the cellular network. Meanwhile, as energy consumption reduction has been an important concern for the wireless industry, energy-efficient communications is of prime interest for future networks. In this paper, we study whether and how relays can improve the energy efficiency of cellular networks. Specifically, the energy efficiency of relay-assisted cellular networks is analyzed using tools of stochastic geometry. We first derive the coverage probability for the macro base station (MBS) to user (UE), the MBS to relay station (RS), and the RS to UE links, and then we model the power consumption at the MBS and RS. Based on the analytical model and expressions, the energy efficiency of relay-assisted cellular networks is then evaluated and is shown to be strictly quasi-concave on the transmit power for MBS to UE link or the RS to UE link. Numerical results show that the energy efficiency first improves while it hits a ceiling as the MBS density increases.

  14. Relay Implementation in WiMAX System Level Simulator

    NASA Astrophysics Data System (ADS)

    Mumtaz, Shahid; Tu, Le Thanh; Sadeghi, Rasool; Gamerio, Atilio

    Future wireless communication systems are expected to provide more stable and higher data rate transmissions in the whole network. WiMAX is one of the technologies to cover diverse geographic regions. WiMAX covers the high dense urban areas and provide access over large geographic regions in remote rural area. However, in both scenarios it is challenging to cover the entire service area. In both cases relays are foreseen to extend the range of the BS and to increase the system throughput allowing for a cost-efficient deployment and service. As multi-hop/relay has complex interactions between the routing and medium access control decisions, the extent to which analytical expressions can be used to explore its benefits are limited. Consequently simulations tend to be the preferred way of assessing the performance of relays. In this paper, we explain, how to deploy fixed-relays by using computer simulation in WiMAX system and we consistently observed that the throughput is increased and the outage is decreased in the relay-augmented WiMAX network, which is converted to range extension without any capacity penalty, for the realistic range of values of the propagation and other system parameters investigated.

  15. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  16. Relay communications strategies for Mars exploration through 2020

    NASA Astrophysics Data System (ADS)

    Edwards, C. D., Jr.; Arnold, B.; Depaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2006-07-01

    Mars exploration poses significant telecommunications challenges, including the return of large data volumes from high-resolution surface instruments, highly constrained mass, power, and energy for surface spacecraft, frequent telemetry and command sessions for supporting complex surface operations, and high-risk mission events such as entry, descent, and landing for which the capture of engineering telemetry is deemed critical. Relay telecommunication via Mars-orbiting spacecraft offers significant advantages in meeting these challenges, relative to conventional direct-to-Earth communications. NASA's Mars Global Surveyor and Mars Odyssey orbiters, along with ESA's Mars Express orbiter, represent an initial relay telecommunications infrastructure that has successfully supported the Spirit and Opportunity rovers. With the arrival of the Mars Reconnaissance Orbiter in 2006, this expanded relay network will provide key support to the 2007 Phoenix Lander and 2009 Mars Science Laboratory missions later this decade. Second-decade mission concepts will introduce new communications challenges; the provision of relay payloads on science orbiters provides a cost-effective means to sustain and evolve the Mars relay network.

  17. Attack vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Holme, Petter; Kim, Beom Jun; Yoon, Chang No; Han, Seung Kee

    2002-05-01

    We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.

  18. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  19. Multistability and hidden attractors in a relay system with hysteresis

    NASA Astrophysics Data System (ADS)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.; Nabokov, Roman A.

    2015-06-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the neighborhood of that cycle. We show how the equilibrium point of a relay system disappears in a boundary-equilibrium bifurcation as the system enters the region of autonomous switching dynamics and demonstrate experimentally how a relay system can exhibit large amplitude chaotic oscillations at high values of the supply voltage. By investigating a four-dimensional model of the experimental relay system we finally show how a variety of hidden periodic, quasiperiodic and chaotic attractors arise, transform and disappear through different bifurcations.

  20. Bilayer Protograph Codes for Half-Duplex Relay Channels

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; VanNguyen, Thuy; Nosratinia, Aria

    2013-01-01

    Direct to Earth return links are limited by the size and power of lander devices. A standard alternative is provided by a two-hops return link: a proximity link (from lander to orbiter relay) and a deep-space link (from orbiter relay to Earth). Although direct to Earth return links are limited by the size and power of lander devices, using an additional link and a proposed coding for relay channels, one can obtain a more reliable signal. Although significant progress has been made in the relay coding problem, existing codes must be painstakingly optimized to match to a single set of channel conditions, many of them do not offer easy encoding, and most of them do not have structured design. A high-performing LDPC (low-density parity-check) code for the relay channel addresses simultaneously two important issues: a code structure that allows low encoding complexity, and a flexible rate-compatible code that allows matching to various channel conditions. Most of the previous high-performance LDPC codes for the relay channel are tightly optimized for a given channel quality, and are not easily adapted without extensive re-optimization for various channel conditions. This code for the relay channel combines structured design and easy encoding with rate compatibility to allow adaptation to the three links involved in the relay channel, and furthermore offers very good performance. The proposed code is constructed by synthesizing a bilayer structure with a pro to graph. In addition to the contribution to relay encoding, an improved family of protograph codes was produced for the point-to-point AWGN (additive white Gaussian noise) channel whose high-rate members enjoy thresholds that are within 0.07 dB of capacity. These LDPC relay codes address three important issues in an integrative manner: low encoding complexity, modular structure allowing for easy design, and rate compatibility so that the code can be easily matched to a variety of channel conditions without extensive

  1. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; Thomas, Reid C.; Varghese, Phil; Signori, Gina; Schmitz, Peter

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  2. Baiting Inside Attackers Using Decoy Documents

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  3. Overview and Status of the Laser Communication Relay Demonstration

    NASA Technical Reports Server (NTRS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-01-01

    NASA is presently developing first all optical high data rate satellite relay system, LCRD. To be flown on commercial geosynchronous satellite, it will communicate at DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory and another on Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments. In this paper we will report on the current state of LCRD system development, planned operational scenarios and expected system performance.

  4. Time-delayed operation of a telerobot via geosynchronous relay

    NASA Technical Reports Server (NTRS)

    Wilcox, Brian H.

    1988-01-01

    Operation of a telerobot is compromised if a time delay of more than a few hundred milliseconds exists between the operator and remote manipulator. However, the most economically attractive way to perform telerobotic functions such as assembly, maintenance, and repair in Earth orbit is via geosynchronous relay satellites to a ground-based operator. This induces loop delays from one-half to two seconds, depending on how many relays are involved. Such large delays makes direct master-slave, force-reflecting teleoperated systems infeasible. Research at JPL on a useful telerobot that operates with such time delays is described.

  5. Overview and status of the laser communication relay demonstration

    NASA Astrophysics Data System (ADS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-03-01

    NASA is presently developing the first all-optical high data rate satellite relay system, LCRD. To be flown on a geosynchronous satellite, it will communicate with DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory, and another on a Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments.

  6. New approach to improve interconnection relaying for IPPs

    SciTech Connect

    Hartmann, W.G.; Mirchandani, H.; Callender, M.

    1999-11-01

    This paper discusses the interconnection protective relaying practices of Independent Power Producers (IPPs) with the utility grid. Specifically addressed are smaller IPPs in the kW and lower MW range (typically less than 10 MW), where relaying at the interconnection may function without the aid of sophisticated and expensive communication links to the utility substation. A novel protection tactic employing frequency rate-of-change is introduced as a possible method of increasing the security, reliability and speed of the IPP interconnection protection.

  7. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  8. Secure relay selection based on learning with negative externality in wireless networks

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  9. 47 CFR 64.6040 - Rates for Telecommunications Relay Service (TRS) calling.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 3 2014-10-01 2014-10-01 false Rates for Telecommunications Relay Service (TRS....6040 Rates for Telecommunications Relay Service (TRS) calling. No Provider shall levy or collect any... Charges for any form of TRS call....

  10. 78 FR 21929 - Transmission Relay Loadability Reliability Standard; Notice of Compliance Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Energy Regulatory Commission Transmission Relay Loadability Reliability Standard; Notice of Compliance Filing Take notice that on February 19, 2013, the North American Electric Reliability Corporation... utilities in three Interconnections. \\1\\ Transmission Relay Loadability Reliability Standard, Order No....

  11. The countermeasures against the blinding attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jindong; Wang, Hong; Qin, Xiaojuan; Wei, Zhengjun; Zhang, Zhiming

    2016-01-01

    It has been shown that the single photon detectors (SPDs) based on the avalanche photodiode (APD) can be blinded and controlled by the bright light and short trigger pulses. Eavesdropper can get the full information without causing additional quantum bit error rate. Hence, in order to guarantee the security of the quantum key distribution (QKD) systems, some countermeasures, by changing the characteristic of the SPD or monitoring the parameters of the detector, are presented by some research groups. In this paper, we provide a new and effective countermeasure against the blinding attack based on improving the optical scheme of the decoding unit in the QKD system rather than only considering the characteristic of the SPD. In our proposal we use a coupler with asymmetric splitting ratio to distinguish the detection characteristic of the SPD with blinding attack from that without blinding attack. The detailed analysis shows that the proposed scheme is feasible to defense the blinding attack.

  12. Prevention of Tunneling Attack in endairA

    NASA Astrophysics Data System (ADS)

    Fanaei, Mohammad; Fanian, Ali; Berenjkoub, Mehdi

    endairA is one of the most secure on-demand ad hoc network source routing protocols which provides several defense mechanisms against so many types of attacks. In this paper, we prove the vulnerability of endairA to the tunneling attack by presenting an attack scenario against it. We also propose a new security mechanism to defend it against the tunneling attack by the utilization of the delay between receiving and sending its control packets computed locally by all intermediate nodes. Our proposed security mechanism can detect probable tunnels in the route as well as approximate locations of the adversarial nodes. It needs no time synchronization between mobile nodes of the network. It also does not change the number of control packets involved in endairA and only modifies the RREP messages slightly.

  13. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  14. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-05-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  15. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  16. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  17. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  18. Development of a Relay Performance Web Tool for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.

  19. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  20. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  1. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  2. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  3. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  4. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. 32. View of relay assembly group and interconnecting group electronic ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. View of relay assembly group and interconnecting group electronic modules located on second floor of transmitter building no. 102 in MIP area. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  6. The Tracking & Data Relay Satellite System. The New Space Network.

    ERIC Educational Resources Information Center

    Froehlich, Walter

    This publication describes the giant-capacity space communications installation called the "Tracking and Data Relay Satellite System" (TDRSS). Chapters include: (1) "A New Communications Bridge to Orbit" (illustrating what it is and how it looks); (2) "TDRSS Goes to Work" (describing how it functions); (3) "The Ground Segment" (discussing the…

  7. Procedure for evaluating nuclear power plant relay seismic functionality

    SciTech Connect

    Betlack, J.; Carritte, R.; Schmidt, W. )

    1990-12-01

    This procedure has been prepared for use in evaluating relays as part of plant specific resolution of USI A-46. It is also expected to be generally applicable in other seismic evaluations, such as seismic margins determinations. 11 refs., 2 figs.

  8. Spacecraft Orbits for Earth/Mars-Lander Radio Relay

    NASA Technical Reports Server (NTRS)

    Noreen, Gary; Diehl, Roger; Neelon, Joseph

    2004-01-01

    A report discusses a network of spacecraft, in orbit around Mars, used to relay radio communications between Earth stations and mobile exploratory robots (rovers) as well as stationary scientific instruments that have been landed on the Mars surface. The relay spacecraft include two already in orbit plus several others planned to arrive at Mars in the years 2004 through 2008. A major portion of the report is devoted to the orbit of the G. Macroni Orbiter, which is in the midst of an iterative design process and is intended to be the first Mars orbiter designed primarily for radio relay. Candidate orbits are analyzed with a view toward choosing one that maximizes the amount of time available for communication with surface units, taking account of visibility as a function of position, the limit on communication distance at low power, and the fact that surface units can transmit more easily when they are in sunlight. Two promising new orbits for Mars relay satellites are identified: a 1/2-sol apoapsis-at-constant-time-of-day equatorial orbit and a 1/4-sol apoapsis-at-constant-time-of-day, critical-inclination orbit.

  9. 9. Detail of electrical cables from relay station to upper ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. Detail of electrical cables from relay station to upper floor of tower. Note the penetrations in the wall, right of center where cables formerly passed into the control room. - New York, New Haven, & Hartford Railroad, Shell Interlocking Tower, New Haven Milepost 16, approximately 100 feel east of New Rochelle Junction, New Rochelle, Westchester County, NY

  10. Usefulness of relay-information-transfer for radar QPE

    NASA Astrophysics Data System (ADS)

    Kim, Jungho; Yoo, Chulsang; Lim, Sanghun; Choi, Jeongho

    2015-12-01

    This study proposes a method of relay-information-transfer for radar QPE (quantitative precipitation estimation) to overcome the limitation of the current QPE in Korea. The Z-R relationship was selected as the QPE information to be transferred. To examine the applicability of the proposed method, three different cases of relay-information-transfer were considered: (1) from the sea to inland, (2) from inland to another inland location, and (3) over a long distance. The results were: (1) Between the two parameters of the Z-R relationship, the parameter A was found to have an explanatory power of more than 70% of the Z-R relationship from one radar to the other. (2) All three cases showed that the relay-information-transfer of the parameter A was highly applicable, especially in the initial period of a storm. (3) Areal average rainfall and the root mean square error of the radar rain rate also confirmed that the relay-information-transfer method resulted in more reasonable estimates of the parameter A in the initial period of a storm. After the initial period, however, both the conventional method and the method proposed in this study were found to provide similar and reasonable estimates.

  11. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Automatic Train Stop, Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay... power-supply voltage or other variable factors in the circuit shall not be compensated for by...

  12. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... TRS Fund. See VoIP TRS Order, published at 72 FR 43546, August 6, 2007. The NPRM proposes to extend...- interconnected VoIP service to participate in and contribute to the Telecommunications Relay Services (TRS) Fund... Portable Document Format (PDF) at http://www.fcc.gov/cgb/dro/trs.html#orders . To request materials...

  13. 76 FR 72124 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-22

    ... at 76 FR 59511, September 27, 2011. If you have any comments on the burden estimates listed below, or..., published at 76 FR 59551, September 27, 2011, adopting final rules--containing information collection... Telecommunications Relay Service (iTRS). Specifically, the final rules, described below are designed to promote...

  14. 77 FR 20553 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... requirement in 47 CFR 64.610(f)(2), published at 76 FR 26641, May 9, 2011, has not been approved by the Office..., Notice, published at 77 FR 18813, March 28, 2012. In addition, the Commission notes that pursuant to the... Relay Services for Deaf-Blind Individuals, Report and Order, document FCC 11-56, published at 76...

  15. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... required to take any action. 21. In the TRS Contribution NPRM, published at 76 FR 18490, April 4, 2011, the... the Telecommunications Relay Services Fund, Notice of Proposed Rulemaking, published at 76 FR 18490... established in the CPE Bundling Order for allocating revenues, published at 66 FR 19398, April 6, 2001....

  16. Real-time digital simulator for protective relay testing

    SciTech Connect

    Kezunovic, M. ); McKenna, M.

    1994-07-01

    Analog power system simulators have been used for a long time in performing relay testing. A number of new transient simulator designs have been introduced in which improved performance and lower cost were the major goals. The most recent approaches are to use digital technology to implement protective relay testing simulators utilizing power system and fault modeling capabilities of electromagnetic transient programs. This approach offers modeling accuracy and user flexibility. First such designs were introduced by GEC Alshom Measurements in England in the early 1980s and by Bonneville Power Administration in the US in the mid-1980s. The use of these simulators has demonstrated some major advantages in meeting complex relay testing requirements, such as fault studies on series compensated lines. However, the main disadvantage of early digital designs was difficulty in providing any meaningful interaction between the relay and the simulation computer. The numerical techniques implemented in the existing electromagnetic transient programs did not allow for the required real-time switching of system configurations as often needed for fault simulations. This article describes a new digital simulator design which is aimed at providing the real-time operation not available in the previous designs while preserving the accuracy and the flexibility already demonstrated by the digital implementations. This is achieved by using low-cost commercial hardware and system software as well as custom-designed user interface and real-time application software.

  17. Hydrologic data relay by satellite from remote areas

    NASA Technical Reports Server (NTRS)

    Halliday, R. A. (Principal Investigator)

    1977-01-01

    The author has identified the following significant results. Experimental use of LANDSAT data collection system and the GOES system has demonstrated the feasibility of using this technology to relay hydrologic data from remote areas on a near real time basis. The system has proved to be accurate, reliable, and cost effective.

  18. Orbit determination with the tracking data relay satellite system

    NASA Technical Reports Server (NTRS)

    Argentiero, P.; Loveless, F.

    1977-01-01

    The possibility of employing the tracking data relay satellite system to satisfy the orbit determination demands of future applications missions is investigated. It is shown that when the relay satellites are continuously and independently tracked from ground stations it is possible, using six hour data arcs, to recover user satellite state with an average error of about 25 m radially, 260 m along track, and 20 m cross track. For this arc length, range sum data and range sum rate data are equally useful in determining orbits. For shorter arc lengths (20 min), range sum rate data is more useful than range sum data. When relay satellites are not continuously tracked, user satellite state can be recovered with an average error of about 140 m radially, 515 m along track, and 110 m cross track. These results indicate that the TDRS system can be employed to satisfy the orbit determination demands of applications missions, such as the MAGSAT and potential gradiometer missions, provided the relay satellites are continuously and independently tracked.

  19. Staged-Fault Testing of Distance Protection Relay Settings

    NASA Astrophysics Data System (ADS)

    Havelka, J.; Malarić, R.; Frlan, K.

    2012-01-01

    In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay protection devices can be properly set up. Once the accuracy of the simulation model had been confirmed, a series of simulations were performed in order to obtain the optimal fault location to test the protection system. The simulation results were used to specify the test sequence definitions for the end-to-end relay testing using advanced testing equipment with GPS synchronization for secondary injection in protection schemes based on communication. The objective of the end-to-end testing was to perform field validation of the protection settings, including verification of the circuit breaker operation, telecommunication channel time and the effectiveness of the relay algorithms. Once the end-to-end secondary injection testing had been completed, the induced fault testing was performed with three-end lines loaded and in service. This paper describes and analyses the test procedure, consisting of CAPE simulations, end-to-end test with advanced secondary equipment and staged-fault test of a three-end power line in the Croatian transmission system.

  20. A scheduling model for the aerial relay system

    NASA Technical Reports Server (NTRS)

    Ausrotas, R. A.; Liu, E. W.

    1980-01-01

    The ability of the Aerial Relay System to handle the U.S. transcontinental large hub passenger flow was analyzed with a flexible, interactive computer model. The model incorporated city pair time of day demand and a demand allocation function which assigned passengers to their preferred flights.

  1. Spatial organisation and biomass development after relaying of mussel seed

    NASA Astrophysics Data System (ADS)

    Capelle, Jacob J.; Wijsman, Jeroen W. M.; Schellekens, Tim; van Stralen, Marnix R.; Herman, Peter M. J.; Smaal, Aad C.

    2014-01-01

    It is not known whether and by what factors spatial heterogeneity in mussels (Mytilus edulis L.) affects mussel production in human-created mussel beds. In a field experiment, the same number of mussels was relayed on four different areas within plots of the same size, resulting in four treatments with different mussel densities. Density, individual weight and spatial structure of mussels were followed per treatment. The uniformly placed mussels on different areas redistributed into new patches, but mussels did not spread out over a larger area. Initial mussel density affected redistribution and mussel survival. At high densities mussels redistributed into a uniform matrix or in a few larger patches, that showed larger losses than at low densities, where mussels redistributed into a high number of patches. Growth rate and condition index of the mussels did not differ between treatments and no relation was found between treatment and number of foraging shore crabs, which was the major predator of mussels in this experiment. We hypothesise that the relation between initial mussel density and mussel loss after relaying is associated with redistribution, with less competition for space when mussels are positioned at the edge of a mussel patch. The very high mussel losses that we observed in the experiment within four weeks after relaying were the major factor in biomass development. Mussel bed formation concerns mussel growers and managers involved in natural mussel bed restoration. Initial mussel survival determines the success of these activities. The present study shows the effects of mussel relaying on spatial redistribution for the first time under field conditions, and underlines the importance of edge effects in understanding mussel loss in redistribution. Mussel survival after relaying will be higher when the mussels are distributed homogeneously and in relatively low density.

  2. Failure analysis of blistered gold plating on spot welded electrical relays

    NASA Technical Reports Server (NTRS)

    Sokolowski, Witold; O'Donnell, Tim

    1989-01-01

    Gold-plated stainless-steel sideplates, part of a JPL Galileo spacecraft electronic-relay assembly, exhibited blistering after resistance spot welding. Unacceptable relays had heavy nonuniform gold electrodeposited layers with thicknesses 4.5-11.5 microns. SEM and metallographic investigations indicated much higher heat input generated during the resistance spot welding in unacceptable relays. The attributes of acceptable welded relays are contrasted with unacceptable relays; the possible mechanism of laminar formation of polymeric material in the gold plating is discussed; and some recommendations are provided to prevent similar problems.

  3. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  4. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  5. 57 Word Attack Skill Games.

    ERIC Educational Resources Information Center

    Mara, Patricia; Sorenson, Juanita

    These 57 game cards were developed to help teachers build their resource files for word-attack skills. Cards are keyed to skills suggested by the Wisconsin Design for Reading Skill Development and are color-coded according to their appropriateness for children in kindergarten through grade three. The front of each card gives the name of the skill,…

  6. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  7. Attack Coverage in High-Level Men's Volleyball: Organization on the Edge of Chaos?

    PubMed

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-09-29

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men's volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer's V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  8. A novel type II relay-assisted retransmission scheme for uplink of LTE-advanced system

    NASA Astrophysics Data System (ADS)

    Li, Anxin; Nagata, Satoshi; Harada, Atsushi; Suda, Hirohito

    2013-12-01

    Relay, which enables coverage extension and throughput enhancement, is a very promising technique for future wireless communication systems. Among different types of relay, type II relay is one kind of inband relays and is hotly discussed in LTE-Advanced system for throughput enhancement. In order to support type II relay, many challenges must be overcome. In this article, we focus on relay-assisted uplink data retransmission and propose a novel joint design of reference signal and data precoding for type II relay. The proposed method not only solves the problem of channel estimation mismatch for control information, but also achieves cooperative diversity gain for data transmission. Simulation results show the effectiveness of the proposed method over existing schemes.

  9. Point Relay Scanner Utilizing Ellipsoidal Mirrors

    NASA Technical Reports Server (NTRS)

    Manhart, Paul K. (Inventor); Pagano, Robert J. (Inventor)

    1997-01-01

    A scanning system uses a polygonal mirror assembly with each facet of the polygon having an ellipsoidal mirror located thereon. One focal point of each ellipsoidal mirror is located at a common point on the axis of rotation of the polygonal mirror assembly. As the mirror assembly rotates. a second focal point of the ellipsoidal mirrors traces out a scan line. The scanner can be utilized for scanned output display of information or for scanning information to be detected.

  10. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  11. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  12. Value of ABCD2-F in Predicting Cerebral Ischemic Attacks: Three Months Follow-Up after the Primary Attack.

    PubMed

    Chardoli, Mojtaba; Firoozabadi, Nader H; Nouri, Mohsen; Rahimi-Movaghar, Vafa

    2016-06-01

    Cerebrovascular attack (CVA) and transient ischemic attack (TIA) are major causes of emergency department visits around the globe. A significant number of these patients may experience repeat attacks if left untreated. Several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. ABCD2 is based on age, blood pressure, clinical status, diabetes mellitus, and duration of symptoms and is used commonly for this purpose. In this study, we were to enhance its sensitivity and specificity with the addition of another criterion namely atrial fibrillation and making ABCD2-F. A prospective study in two hospitals was performed and 138 patients diagnosed with TIA/CVA were enrolled. Demographic, clinical, and paraclinical data of all patients were registered. All patients were followed for three months for any sign or symptom of a recurrent ischemic attack. Recurrent ischemic attacks happened in 9.4% of the patients. None of the criteria of ABCD2-F was associated with higher chance of ischemic attacks. Similarly, ABCD2-F was not different between patients with or without repeat cerebral ischemia. The addition of atrial fibrillation to ABCD2 did not enhance the accuracy of this scoring system to detect patients high risk for repeat cerebral ischemia. More studies in the future to improve sensitivity and specificity of this test are warranted. PMID:27306346

  13. A novel flavone-based fluorescent probe for relay recognition of HSO3(-) and Al(3+).

    PubMed

    Xu, Shuai; Tang, Ruiren; Wang, Zhen; Zhou, Yin; Yan, Rui

    2015-10-01

    In this work, a new flavone-based fluorescent probe 3-hydroxy-3'-formylflavone (3HFF) was designed to achieve highly selective relay recognition of HSO3(-) and Al(3+) in DMSO-H2O (2:8, v/v) solution. 3HFF displayed a highly selective response to HSO3(-) with a green fluorescence appearing at 524 nm. Moreover, the in situ generated 3HFF+HSO3(-) system demonstrated eminent relay recognition capability for Al(3+) with a blue fluorescence appearing at 453 nm by the formation of a 1:1 complex between 3HFF and Al(3+) in DMSO-H2O (2:8, v/v) solution. However, only slight change was observed in emission intensity with addition of Al(3+) to 3HFF, and indicated HSO3(-) was essential for the sensing of Al(3+). This work achieves the detection of HSO3(-) and Al(3+) by only one probe and provides another example for this rare combination (anion/metal). PMID:25965168

  14. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... waivers of certain Telecommunications Relay Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP Relay). The waived TRS mandatory minimum standards are: One... requirement for default Internet-based TRS providers that are unable to meet such standards for...

  15. Generic attack approaches for industrial control systems.

    SciTech Connect

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  16. The Case for Deep Space Telecommunications Relay Stations

    NASA Technical Reports Server (NTRS)

    Chandler, Charles W.; Miranda, Felix A. (Technical Monitor)

    2004-01-01

    Each future mission to Jupiter and beyond must carry the traditional suite of telecommunications systems for command and control and for mission data transmission to earth. The telecommunications hardware includes the large antenna and the high-power transmitters that enable the communications link. Yet future spacecraft will be scaled down from the hallmark missions of Galileo and Cassini to Jupiter and Saturn, respectively. This implies that a higher percentage of the spacecraft weight and power must be dedicated to telecommunications system. The following analysis quantifies this impact to future missions and then explores the merits of an alternative approach using deep space relay stations for the link back to earth. It will be demonstrated that a telecommunications relay satellite would reduce S/C telecommunications weight and power sufficiently to add one to two more instruments.

  17. Phase switching in Hindmarsh-Rose relay neurons

    NASA Astrophysics Data System (ADS)

    Thounaojam, Umeshkanta Singh; Sharma, Pooja Rani; Shrimali, Manish Dev

    2016-02-01

    A system of Hindmarsh-Rose relay neurons with time delay coupling is considered in which the relay (central) neuron has an additional feedback term that represents the interaction activity with a local environment. The strength of environmental coupling with the central neuron plays an important role in inducing synchronization and de-synchronization between the outer neurons. The strength of feedback developed from the environmental coupling has created a gradual quenching in the oscillations of the central neuron. At a higher feedback coupling strength, oscillation of the central neuron is suppressed drastically and a transition from a regime of synchronization to out-of-phase synchronization take place between the oscillations of the two outer neurons.

  18. Measurements of the Lunar Gravity Field using a Relay Subsatellite

    NASA Astrophysics Data System (ADS)

    Namiki, Noriyuki; Hanada, H.; Kawano, N.; Heki, K.; Iwata, T.; Ogawa, M.; Takano, T.

    1998-01-01

    Space and Astronautical Science (ISAS). Two spacecraft, a main orbiter and a relay subsatellite, constitute the SELENE. The SELENE is scheduled to be launched in 2003. After the SELENE is injected into an elliptical polar orbit of 1 00-km periapsis altitude and 2424-km apoapsis altitude, the relay subsatellite is separated from the main orbiter. Then the main orbiter gradually decreases the eccentricity to a circular orbit in which altitude and inclination are 100 km and 950, respectively. When the mission instruments, including a relay subsatellite transponder for the gravity measurement (RSAT), complete global mapping after a nominal I -year period, the propulsion module of the main orbiter is deorbited to land on the Moon. A differential VLBI experiment by two radio sources on the relay subsatellite and the propulsion module (VRAD-1 and 2) continues until the relay subsatellite will fall on to the lunar surface approximately two months later [6]. RSAT Mission: RSAT is a communication subsystem on the relay subsatellite [7] for four-way Doppler tracking among the main orbiter, the relay subsatellite, and the Usuda Deep Space Center of ISAS (UDSC) [8], as well as two-way range and Doppler measurements, between the relay subsatellite and UDSC (Fig. 1). At the same time, the Tracking and Communication Stations (TACS) of NASDA conduct conventional two-way ranging and Doppler observations of the main orbiter when the main orbiter is visible from Earth.

  19. ESTL tracking and data relay satellite /TDRSS/ simulation system

    NASA Technical Reports Server (NTRS)

    Kapell, M. H.

    1980-01-01

    The Tracking Data Relay Satellite System (TDRSS) provides single access forward and return communication links with the Shuttle/Orbiter via S-band and Ku-band frequency bands. The ESTL (Electronic Systems Test Laboratory) at Lyndon B. Johnson Space Center (JSC) utilizes a TDRS satellite simulator and critical TDRS ground hardware for test operations. To accomplish Orbiter/TDRSS relay communications performance testing in the ESTL, a satellite simulator was developed which met the specification requirements of the TDRSS channels utilized by the Orbiter. Actual TDRSS ground hardware unique to the Orbiter communication interfaces was procured from individual vendors, integrated in the ESTL, and interfaced via a data bus for control and status monitoring. This paper discusses the satellite simulation hardware in terms of early development and subsequent modifications. The TDRS ground hardware configuration and the complex computer interface requirements are reviewed. Also, special test hardware such as a radio frequency interference test generator is discussed.

  20. Data relay system specifications for ERTS image interpretation

    NASA Technical Reports Server (NTRS)

    Daniel, J. F.

    1970-01-01

    Experiments with the Data Collection System (DCS) of the Earth Resources Technology Satellites (ERTS) have been developed to stress ERTS applications in the Earth Resources Observation Systems (EROS) Program. Active pursuit of this policy has resulted in the design of eight specific experiments requiring a total of 98 DCS ground-data platforms. Of these eight experiments, six are intended to make use of DCS data as an aid in image interpretation, while two make use of the capability to relay data from remote locations. Preliminary discussions regarding additional experiments indicate a need for at least 150 DCS platforms within the EROS Program for ERTS experimentation. Results from the experiments will be used to assess the DCS suitability for satellites providing on-line, real-time, data relay capability. The rationale of the total DCS network of ground platforms and the relationship of each experiment to that rationale are discussed.

  1. Research on space communication equipment technology: Study on relay system

    NASA Astrophysics Data System (ADS)

    1992-08-01

    An overview of the research on space communication equipment technology, especially relay technology, are presented. Low Noise Amplifier (LNA) design review was conducted and the temporal tendency of the noise factors are shown. Design study on Solid State Power Amplifier (SSPA), characterized in small size, low weight, low deformation, and high reliability, was conducted and SSPA development tendency is shown. The results of the review on advanced communication systems are summarized.

  2. Security of quantum key distribution using a simplified trusted relay

    NASA Astrophysics Data System (ADS)

    Stacey, William; Annabestani, Razieh; Ma, Xiongfeng; Lütkenhaus, Norbert

    2015-01-01

    We propose a QKD protocol for trusted node relays. Our protocol shifts the communication and computational weight of classical postprocessing to the end users by reassigning the roles of error correction and privacy amplification, while leaving the exchange of quantum signals untouched. We perform a security analysis for this protocol based on the Bennett-Brassard 1984 protocol on the level of infinite key formulas, taking into account weak coherent implementations involving decoy analysis.

  3. Science Hybrid Orbiter and Lunar Relay (SCHOLR) Architecture and Design

    NASA Technical Reports Server (NTRS)

    Trase, Kathryn K.; Barch, Rachel A.; Chaney, Ryan E.; Coulter, Rachel A.; Gao, Hui; Huynh, David P.; Iaconis, Nicholas A.; MacMillan, Todd S.; Pitner, Gregory M.; Schwab, Devin T.

    2011-01-01

    Considered both a stepping-stone to deep space and a key to unlocking the mysteries of planetary formation, the Moon offers a unique opportunity for scientific study. Robotic precursor missions are being developed to improve technology and enable new approaches to exploration. Robots, lunar landers, and satellites play significant roles in advancing science and technologies, offering close range and in-situ observations. Science and exploration data gathered from these nodes and a lunar science satellite is intended to support future human expeditions and facilitate future utilization of lunar resources. To attain a global view of lunar science, the nodes will be distributed over the lunar surface, including locations on the far side of the Moon. Given that nodes on the lunar far side do not have direct line-of-sight for Earth communications, the planned presence of such nodes creates the need for a lunar communications relay satellite. Since the communications relay capability would only be required for a small portion of the satellite s orbit, it may be possible to include communication relay components on a science spacecraft. Furthermore, an integrated satellite has the potential to reduce lunar surface mission costs. A SCience Hybrid Orbiter and Lunar Relay (SCHOLR) is proposed to accomplish scientific goals while also supporting the communications needs of landers on the far side of the Moon. User needs and design drivers for the system were derived from the anticipated needs of future robotic and lander missions. Based on these drivers and user requirements, accommodations for communications payload aboard a science spacecraft were developed. A team of interns identified and compared possible SCHOLR architectures. The final SCHOLR architecture was analyzed in terms of orbiter lifetime, lunar surface coverage, size, mass, power, and communications data rates. This paper presents the driving requirements, operational concept, and architecture views for SCHOLR

  4. The tracking and data relay satellite system - An historical perspective

    NASA Technical Reports Server (NTRS)

    Elwell, Daniel W.; Levine, Allen J.; Harris, David W.

    1992-01-01

    The Tracking and Data Relay Satellite System (TDRSS), NASA's primary communications link between near-earth orbiting spacecraft and the ground, is addressed. The TDRSS supporting elements and their roles are described along with the different phases of the TDRSS life cycle. Users of TDRSS and the extent of support given to them are shown. TDRSS performance is evaluated in terms of availability and service proficiency.

  5. Bibliography of relay literature, 1993: IEEE committee report

    SciTech Connect

    Sachdev, M.S.; Folkman, A.G.; Finley, D.

    1995-04-01

    The latest of a series of classified lists of power system relaying references, begun in 1927, is presented. This bibliography is in continuation to the bibliographies of relay literature which were published previously and are contained in the volumes of the IEEE Transaction. The papers listed include references to the subjects of service restoration, testing and methods of calculation, as well as to the field of relaying. Only the more readily available foreign publications are included. Each reference includes the title, author, publication information, and a very brief summary of the subject matter. The listing of the titles is subdivided into ten sections, depending upon the general substance of each article. The entries in each section are listed in alphabetical order by the name of the first author. Each title is listed in only one section even if it covers material that belongs to several sections. A list of the periodicals which have been cited and the addresses of their publishers follows the bibliography.

  6. Bibliography of relay literature, 1995. IEEE committee report

    SciTech Connect

    1997-04-01

    The latest of a series of classified lists of power system relaying references, begun in 1927, is presented. This bibliography is in continuation to the bibliographies of relay literature which were published previously and are contained in the volumes of the IEEE Transactions. The papers listed include references to the subjects of service restoration, testing and methods of calculation, as well as to the field of relaying. Only the more readily available foreign publications are included. Each reference includes the title, author, publication information, and a very brief summary of the subject matter. The listing of titles is subdivided into ten sections, depending upon the general substance of each article. The entries in each section are listed in only one section even if it covers material that belongs to several sections. A list of the periodicals which have been cited and the addresses of their publishers follows the bibliography. The abstracts of many articles reported in this paper are available in the Science Abstracts-Section B, the Engineering Index, and other digesting and/or indexing periodicals.

  7. Spacecraft Data and Relay Management using Delay Tolerant Networking

    NASA Technical Reports Server (NTRS)

    Torgerson, J. Leigh; Schoolcraft, Joshua B.; Pang, Jackson N; Segui, John S; Jennings, Esther H.; Krupiarz, Christopher J.

    2006-01-01

    NASA's demonstration of the successful transmission of relay data through the orbiting Mars Odyssey, Mars Global Surveyor, and Mars Express by the Mars Exploration Rovers has shown not only the benefit of using a relay satellite for multiple landed assets in a deep space environment but also the benefit of international standards for such architecture. As NASA begins the quest defined in the Vision for Exploration with robotic and manned missions to the Moon, continues its study of Mars, and is joined in these endeavors by countries world-wide, landed assets transmitting data through relay satellites will be crucial for completing mission objectives. However, this method of delivery of data will result in increased complexity in routing and prioritization of data transmission as the number of missions increases. Also, there is currently no standard method among organizations conducting such missions to return these data sets to Earth given a complex environment. One possibility for establishing such a standard is for mission designers to deploy protocols which fall under the umbrella of Delay Tolerant Networking (DTN). These developing standards include the Bundle Protocol (BP) which provides a standard, secure, store and forward mechanism designed for high latency and asymmetric communication links and the Licklider Transmission Protocol (LTP) which is used to provide a reliable deep space link transmission service.

  8. Intermittent hypoendorphinaemia in migraine attack.

    PubMed

    Baldi, E; Salmon, S; Anselmi, B; Spillantini, M G; Cappelli, G; Brocchi, A; Sicuteri, F

    1982-06-01

    Beta-endorphin (RIA method, previous chromatographic extraction) was evaluated in plasma of migraine sufferers in free periods and during attacks. Decreased levels of the endogenous opioid peptide were found in plasma sampled during the attacks but not in free periods. Even chronic headache sufferers exhibited significantly lowered levels of beta-endorphin, when compared with control subjects with a negative personal and family history of head pains. The mechanism of the hypoendorphinaemia is unknown: lowered levels of the neuropeptide, which controls nociception, vegetative functions and hedonia, could be important in a syndrome such as migraine, characterized by pain, dysautonomia and anhedonia. The impairment of monoaminergic synapses ("empty neuron" condition) constantly present in sufferers from serious headaches, could be due to the fact that opioid neuropeptides, because of a receptoral or metabolic impairment, poorly modulate the respective monoaminergic neurons, resulting in imbalance of synaptic neurotransmission. PMID:6290072

  9. Diabetes - preventing heart attack and stroke

    MedlinePlus

    ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ... and cholesterol levels are very important for preventing heart attacks and strokes. See your doctor who treats your ...

  10. After Heart Attack, New Threat: Heart Failure

    MedlinePlus

    ... of heart attack known as STEMI (ST elevation myocardial infarction). "Patients with ischemic heart disease are at the ... failure]. This includes those who have had a myocardial infarction, also called heart attack," Gho said. "Research studying ...

  11. Half of Heart Attacks Might Be 'Silent'

    MedlinePlus

    ... gov/medlineplus/news/fullstory_158855.html Half of Heart Attacks Might Be 'Silent' Without typical symptoms, many miss ... HealthDay News) -- As many as half of all heart attacks may be "silent" -- without the typical crushing chest ...

  12. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... 159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated care, ... people with diabetes have a higher risk of death after a heart attack. "We knew that following ...

  13. Heart Attacks Striking Younger, Fatter Americans

    MedlinePlus

    ... nlm.nih.gov/medlineplus/news/fullstory_157946.html Heart Attacks Striking Younger, Fatter Americans: Study Doctors, patients need ... 24, 2016 THURSDAY, March 24, 2016 (HealthDay News) -- Heart attack victims in the United States are becoming younger ...

  14. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... news/fullstory_159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated ... are much more likely to die after a heart attack than people without the blood sugar condition, a ...

  15. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  16. Fat May Not Hike Heart Attack Risk

    MedlinePlus

    ... news/fullstory_160179.html Fat May Not Hike Heart Attack Risk: Study But it does raise diabetes risk, ... that obesity may not increase the risk of heart attack or premature death. Their study of identical twins ...

  17. Diabetes - preventing heart attack and stroke

    MedlinePlus

    ... medlineplus.gov/ency/patientinstructions/000080.htm Diabetes - preventing heart attack and stroke To use the sharing features on ... with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure ...

  18. Half of Heart Attacks Might Be 'Silent'

    MedlinePlus

    ... medlineplus.gov/news/fullstory_158855.html Half of Heart Attacks Might Be 'Silent' Without typical symptoms, many miss ... HealthDay News) -- As many as half of all heart attacks may be "silent" -- without the typical crushing chest ...

  19. Commercial grade item (CGI) dedication of MDR relays for nuclear safety related applications

    NASA Astrophysics Data System (ADS)

    Das, Ranjit K.; Julka, Anil; Modi, Govind

    1994-08-01

    MDR relays manufactured by Potter & Brumfield (P&B) have been used in various safety related applications in commercial nuclear power plants. These include emergency safety features (ESF) actuation systems, emergency core cooling systems (ECCS) actuation, and reactor protection systems. The MDR relays manufactured prior to May 1990 showed signs of generic failure due to corrosion and outgassing of coil varnish. P&B has made design changes to correct these problems in relays manufactured after May 1990. However, P&B does not manufacture the relays under any 10CFR50 Appendix B quality assurance (QA) program. They manufacture the relays under their commercial QA program and supply these as commercial grade items. This necessitates CGI Dedication of these relays for use in nuclear-safety-related applications. This paper presents a CGI dedication program that has been used to dedicate the MDR relays manufactured after been used to dedicate the MDR relays manufactured after May 1990. The program is in compliance with current Nuclear Regulatory Commission (NRC) and Electric Power Research Institute (EPRI) guidelines and applicable industry standards; it specifies the critical characteristics of the relays, provides the tests and analysis required to verify the critical characteristics, the acceptance criteria for the test results, performs source verification to quality P&B for its control of the critical characteristics, and provides documentation. The program provides reasonable assurance that the new MDR relays will perform their intended safety functions.

  20. Mars Express Forward Link Capabilities for the Mars Relay Operations Service (MaROS)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul

    2012-01-01

    This software provides a new capability for landed Mars assets to perform forward link relay through the Mars Express (MEX) European Union orbital spacecraft. It solves the problem of standardizing the relay interface between lander missions and MEX. The Mars Operations Relay Service (MaROS) is intended as a central point for relay planning and post-pass analysis for all Mars landed and orbital assets. Through the first two phases of implementation, MaROS supports relay coordination through the Odyssey orbiter and the Mars Reconnaissance Orbiter (MRO). With this new software, MaROS now fully integrates the Mars Express spacecraft into the relay picture. This new software generates and manages a new set of file formats that allows for relay request to MEX for forward and return link relay, including the parameters specific to MEX. Existing MEX relay planning interactions were performed via email exchanges and point-to-point file transfers. By integrating MEX into MaROS, all transactions are managed by a centralized service for tracking and analysis. Additionally, all lander missions have a single, shared interface with MEX and do not have to integrate on a mission-by mission basis. Relay is a critical element of Mars lander data management. Landed assets depend largely upon orbital relay for data delivery, which can be impacted by the availability and health of each orbiter in the network. At any time, an issue may occur to prevent relay. For this reason, it is imperative that all possible orbital assets be integrated into the overall relay picture.

  1. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.

    PubMed

    Chen, Yan; Lin, W Sabrina; Liu, K J Ray

    2010-07-01

    Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent's strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector's strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker's strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data. PMID:20227981

  2. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  3. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  4. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  5. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  6. Analysis of Polygonal Distance Protection Relay of Transmission Line Affected by SMES Device

    NASA Astrophysics Data System (ADS)

    Yang, Jun; Zhang, Wenjia

    Because of unique advantages in rapid response and independent control of act ve and reactive power, Superconducting Magnetic Energy Storage (SMES) device will be widely used in the power system. The SMES exchanges power with power grid in the charging and discharging process, so it may affect the performance of protection relay of transmission line, which will lead to mal-operation. Based on SMES model, the tripping characteristic of polygonal distance relay for single-machine-infinite-bus performance of polygonal distance relay with SMES. The simulation results show the measured impedance of polygonal distance relay is changed by SMES, and polygonal distance relay will make mal-operation when faults occur in the boundary of protection zone. Also an improving distance relay is proposed to solve the problem.

  7. Seismically induced relay chatter risk analysis for the Advanced Test Reactor

    SciTech Connect

    Khericha, S.T.; Calley, M.B.; Farmer, F.G.; Eide, S.A.; Ravindra, M.K.; Campbell, R.D.

    1992-12-31

    A seismic probabilistic risk assessment (PRA) was performed as part of the Level I PRA for the Department of Energy (DOE) Advanced Test Reactor (ATR) located at the Idaho National Engineering Laboratory (INEL). This seismic PRA included a comprehensive and efficient seismically-induced relay chatter risk analysis. The key elements to this comprehensive and efficient seismically-induced relay chatter analysis included (1) screening procedures to identify the critical relays to be evaluated, (2) streamlined seismic fragility evaluation, and (3) comprehensive seismic risk evaluation using detailed event trees and fault trees. These key elements were performed to provide a core fuel damage frequency evaluation due to seismically induced relay chatter. A sensitivity analysis was performed to evaluate the impact of including seismically-induced relay chatter events in the seismic PRA. The systems analysis was performed by EG&G Idaho, Inc. and the fragilities for the relays were developed by EQE Engineering Consultants.

  8. Seismically induced relay chatter risk analysis for the Advanced Test Reactor

    SciTech Connect

    Khericha, S.T.; Calley, M.B.; Farmer, F.G. ); Eide, S.A. ); Ravindra, M.K.; Campbell, R.D. )

    1992-01-01

    A seismic probabilistic risk assessment (PRA) was performed as part of the Level I PRA for the Department of Energy (DOE) Advanced Test Reactor (ATR) located at the Idaho National Engineering Laboratory (INEL). This seismic PRA included a comprehensive and efficient seismically-induced relay chatter risk analysis. The key elements to this comprehensive and efficient seismically-induced relay chatter analysis included (1) screening procedures to identify the critical relays to be evaluated, (2) streamlined seismic fragility evaluation, and (3) comprehensive seismic risk evaluation using detailed event trees and fault trees. These key elements were performed to provide a core fuel damage frequency evaluation due to seismically induced relay chatter. A sensitivity analysis was performed to evaluate the impact of including seismically-induced relay chatter events in the seismic PRA. The systems analysis was performed by EG G Idaho, Inc. and the fragilities for the relays were developed by EQE Engineering Consultants.

  9. Single-molecule spectroscopy exposes hidden states in an enzymatic electron relay

    NASA Astrophysics Data System (ADS)

    Grossman, Iris; Yuval Aviram, Haim; Armony, Gad; Horovitz, Amnon; Hofmann, Hagen; Haran, Gilad; Fass, Deborah

    2015-10-01

    The ability to query enzyme molecules individually is transforming our view of catalytic mechanisms. Quiescin sulfhydryl oxidase (QSOX) is a multidomain catalyst of disulfide-bond formation that relays electrons from substrate cysteines through two redox-active sites to molecular oxygen. The chemical steps in electron transfer have been delineated, but the conformational changes accompanying these steps are poorly characterized. Here we use single-molecule Förster resonance energy transfer (smFRET) to probe QSOX conformation in resting and cycling enzyme populations. We report the discovery of unanticipated roles for conformational changes in QSOX beyond mediating electron transfer between redox-active sites. In particular, a state of the enzyme not previously postulated or experimentally detected is shown to gate, via a conformational transition, the entrance into a sub-cycle within an expanded QSOX kinetic scheme. By tightly constraining mechanistic models, smFRET data can reveal the coupling between conformational and chemical transitions in complex enzymatic cycles.

  10. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  11. Using an ethernet based relay to remotely control lights at CFHT

    NASA Astrophysics Data System (ADS)

    Barrick, Gregory

    2011-03-01

    Prior to observatory automation, all the lights at the summit were controlled using local light switches. Lights that were inadvertently left on during the day that impact observing can previously could be turned off by the night staff. Likewise, the night staff could turn on lights as needed for troubleshooting. Remote observing will make this impossible. The use of WebRelays provided a means for remotely turning on or off critical lights as needed. WebRelays are an Ethernet based relay that can be controlled either using network commands or by supplying voltage to an optically isolated input on the WebRelay.

  12. The broadcast classical-quantum capacity region of a two-phase bidirectional relaying channel

    NASA Astrophysics Data System (ADS)

    Boche, Holger; Cai, Minglai; Deppe, Christian

    2015-10-01

    We studied a three-node quantum network that enables bidirectional communication between two nodes with a half-duplex relay node for transmitting classical messages. A decode-and-forward protocol is used to perform the communication in two phases. In the first phase, the messages of two nodes are transmitted to the relay node. The capacity of the first phase is well known by previous works. In the second phase, the relay node broadcasts a re-encoded composition to the two nodes. We determine the capacity region of the broadcast phase. To the best of our knowledge, this is the first paper analyzing quantum bidirectional relay networks.

  13. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  14. The 3 Rs of Stroke Biology: Radial, Relayed, and Regenerative.

    PubMed

    Carmichael, S Thomas

    2016-04-01

    Stroke not only causes initial cell death, but also a limited process of repair and recovery. As an overall biological process, stroke has been most often considered from the perspective of early phases of ischemia, how these inter-relate and lead to expansion of the infarct. However, just as the biology of later stages of stroke becomes better understood, the clinical realities of stroke indicate that it is now more a chronic disease than an acute killer. As an overall biological process, it is now more important to understand how early cell death leads to the later, limited recovery so as develop an integrative view of acute to chronic stroke. This progression from death to repair involves sequential stages of primary cell death, secondary injury events, reactive tissue progenitor responses, and formation of new neuronal circuits. This progression is radial: from the tissue that suffers the infarct secondary injury signals, including free radicals and inflammatory cytokines, radiate out from the stroke core to trigger later regenerative events. Injury and repair processes occur not just in the local stroke site, but are also triggered in the connected networks of neurons that had existed in the stroke center: damage signals are relayed throughout a brain network. From these relayed, distributed damage signals, reactive astrocytosis, inflammatory processes, and the formation of new connections occur in distant brain areas. In short, emerging data in stroke cell death studies and the development of the field of stroke neural repair now indicate a continuum in time and in space of progressive events that can be considered as the 3 Rs of stroke biology: radial, relayed, and regenerative. PMID:26602550

  15. Real-Time Multimission Event Notification System for Mars Relay

    NASA Technical Reports Server (NTRS)

    Wallick, Michael N.; Allard, Daniel A.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    As the Mars Relay Network is in constant flux (missions and teams going through their daily workflow), it is imperative that users are aware of such state changes. For example, a change by an orbiter team can affect operations on a lander team. This software provides an ambient view of the real-time status of the Mars network. The Mars Relay Operations Service (MaROS) comprises a number of tools to coordinate, plan, and visualize various aspects of the Mars Relay Network. As part of MaROS, a feature set was developed that operates on several levels of the software architecture. These levels include a Web-based user interface, a back-end "ReSTlet" built in Java, and databases that store the data as it is received from the network. The result is a real-time event notification and management system, so mission teams can track and act upon events on a moment-by-moment basis. This software retrieves events from MaROS and displays them to the end user. Updates happen in real time, i.e., messages are pushed to the user while logged into the system, and queued when the user is not online for later viewing. The software does not do away with the email notifications, but augments them with in-line notifications. Further, this software expands the events that can generate a notification, and allows user-generated notifications. Existing software sends a smaller subset of mission-generated notifications via email. A common complaint of users was that the system-generated e-mails often "get lost" with other e-mail that comes in. This software allows for an expanded set (including user-generated) of notifications displayed in-line of the program. By separating notifications, this can improve a user's workflow.

  16. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  17. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  18. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  19. Coordination procedure for radio relay and communication satellite services

    NASA Technical Reports Server (NTRS)

    Eckerman, J.

    1973-01-01

    A global rain rate statistic model is used to link microwave propagation statistics to measurable rain statistics in order to develop international telecommunication site criteria for radio relay and communication satellite services that minimize interference between receivers and transmitters. This rain coordination procedure utilizes a rain storm cell size, a statistical description of the rainfall rate within the cell valid for most of the earth's surface, approximations between Raleigh scatter and constancy of precipitation with altitude, and an analytic relation between radar reflectivity and rain rate.

  20. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  1. MGS and Odyssey - relay satellites for the MER mission

    NASA Technical Reports Server (NTRS)

    Esposito, Pasquale B.; Bhat, R.; Demeak, S.; Ardalan, S.; Breeden, J.; Helfrich, C.; Jefferson, D.; Stauch, J.

    2004-01-01

    Both Mars Global Surveyor (MGS) and Odyssey are currently in low altitude, nearly circular and highly inclined orbits about Mars. Thus, they are available adn compartible to serve as relay satellites for the Mars Exploration Rovers (MER) mission. Consequently, the MER project developed requirements for MGS to be overhead for MER-A (Spirit) at Gusev crater, at maximum elevation, mudway between lander separation and initial touchdown; in time, this was specified as 01/04/04. 04:24:55 UTC/SCET with a 30 sec tolerance.

  2. Nanostructure of Materials Determined by Relayed Paramagnetic Relaxation Enhancement

    PubMed Central

    2015-01-01

    Particle and domain sizes strongly influence the properties of materials. Here we present an NMR approach based on paramagnetic relaxation enhancement (PRE) relayed by spin diffusion (SD), which allows us to determine lengths in the nm−μm range. We demonstrate the method on multicomponent organic polymer mixtures by selectively doping one component with a paramagnetic center in order to measure the domain size in a second component. Using this approach we determine domain sizes in ethyl cellulose/hydroxypropyl cellulose film coatings in pharmaceutical controlled release formulations. Here we measure particle sizes ranging from around 50 to 200 nm. PMID:26397956

  3. Design analysis tracking and data relay satellite simulation system

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.

  4. Fabricating and using a micromachined magnetostatic relay or switch

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor)

    2001-01-01

    A micromachined magnetostatic relay or switch includes a springing beam on which a magnetic actuation plate is formed. The springing beam also includes an electrically conductive contact. In the presence of a magnetic field, the magnetic material causes the springing beam to bend, moving the electrically conductive contact either toward or away from another contact, and thus creating either an electrical short-circuit or an electrical open-circuit. The switch is fabricated from silicon substrates and is particularly useful in forming a MEMs commutation and control circuit for a miniaturized DC motor.

  5. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  6. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  7. Proposed statistical performance measures for microprocessor-based transmission-line protective relays. Part 1: Explanation of the statistics

    SciTech Connect

    1997-01-01

    The paper presents practical calculations and novel techniques for collecting performance data from protective relays. The methods are focused on, but not limited to, microprocessor-based transmission line relaying systems. Standard definitions are presented for Availability, Dependability, Security, Hardware MTBF, Relaying MTBF, Repair Time, and other measures of interest for specific relay types. The paper explains the novel concept of Exposures, the key to a standardized security measure. A companion paper, Part 2--Collection and Uses of Data, gives practical guidelines for gathering and calculation of results. With these standard measures, relay users will be able to compile the first consistent industry-wide data base for relay performance assessment.

  8. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  9. UHF Relay Antenna Measurements on Phoenix Mars Lander Mockup

    NASA Technical Reports Server (NTRS)

    Ilott, Peter; Harrel, Jefferson; Arnold, Bradford; Bliznyuk, Natalia; Nielsen, Rick; Dawson, David; McGee, Jodi

    2006-01-01

    The Phoenix Lander, a NASA Discovery mission which lands on Mars in the spring of 2008, will rely entirely on UHF relay links between it and Mars orbiting assets, (Odyssey and Mars Reconnaissance Orbiter (MRO)), to communicate with the Earth. As with the Mars Exploration Rover (MER) relay system, non directional antennas will be used to provide roughly emispherical coverage of the Martian sky. Phoenix lander deck object pattern interference and obscuration are significant, and needed to be quantified to answer system level design and operations questions. This paper describes the measurement campaign carried out at the SPAWAR (Space and Naval Warfare Research) Systems Center San Diego (SSC-SD) hemispherical antenna range, using a Phoenix deck mockup and engineering model antennas. One goal of the measurements was to evaluate two analysis tools, the time domain CST, and the moment method WIPL-D software packages. These would subsequently be used to provide pattern analysis for configurations that would be difficult and expensive to model and test on Earth.

  10. Three Generations of Tracking and Data Relay Satellite (TDRS) Spacecraft

    NASA Technical Reports Server (NTRS)

    Zaleski, Ron

    2016-01-01

    The current Tracking and Data Relay Satellite configuration consists of nine in-orbit satellites (four first generation, three second generation and two third generation satellites) globally distributed in geosynchronous orbit to provide near continuous data relay service to missions like Hubble Space Telescope and the International Space Station. The 1st generation spacecraft were designed by TRW/Northrop Grumman with their launches of the five spacecraft ranging from 1983 through 1995. The 2nd and 3rd generation spacecraft were designed by Boeing with their launches ranging 2000 - 2002 and 2013 - 2017 respectively. TDRS-3 is now 27 years on orbit, continues to be a capable asset for the TDRS constellation. Lack of need for inclination control combined with large fuel reserves and redundancy on critical elements provides spacecraft that operate well past design life, all of which contributes to expanded TDRS constellation support capabilities. All spacecraft generations have issues. Significant issues will be summarized with the focus on the Boeing related problems. Degradations and failures are continually assessed and provide the foundation for yearly updates to spacecraft reliability models, constellation service projections and deorbit plans (in order to meet NASAs mandate of limiting orbital debris). Even when accounting for degradations and failures, the life expectancy for the Boeing delivered 2nd generation TDRS-8, 9 10 TDRS are anticipated to be 25+ years.

  11. Polar On-Line Acquisition Relay and Transmission System (POLARATS)

    SciTech Connect

    Yuracko, K.

    2004-07-15

    POLARATS (Polar On-Line Acquisition Relay And Transmission System) is being developed by YAHSGS LLC (YAHSGS) and Oak Ridge National Laboratory (ORNL) to provide remote, unattended monitoring of environmental parameters under harsh environmental conditions. In particular, instrumental design and engineering is oriented towards protection of human health in the Arctic, and with the additional goal of advancing Arctic education and research. POLARATS will obtain and transmit environmental data from hardened monitoring devices deployed in locations important to understanding atmospheric and aquatic pollutant migration as it is biomagnified in Arctic food chains. An Internet- and personal computer (PC)-based educational module will provide real time sensor data, on-line educational content, and will be integrated with workbooks and textbooks for use in middle and high school science programs. The educational elements of POLARATS include an Internet-based educational module that will instruct students in the use of the data and how those data fit into changing Arctic environments and food chains. POLARATS will: (1) Enable students, members of the community, and scientific researchers to monitor local environmental conditions in real time over the Internet; and (2) Provide additional educational benefits through integration with middle- and high-school science curricula. Information will be relayed from POLARATS devices to classrooms and libraries along with custom-designed POLARATS teaching materials that will be integrated into existing curricula to enhance the educational benefits realized from the information obtained.

  12. Phoenix Mars Scout UHF Relay-Only Operations

    NASA Technical Reports Server (NTRS)

    Lewicki, Christopher A.; Krajewski, Joel; Ilott, Peter; Dates, Jason

    2006-01-01

    The Phoenix Mars Scout Lander will launch in August 2007 and land on the northern plains of Mars in May of 2008. In a departure from traditional planetary surface mission operations, it will have no direct-to-Earth communications capability and will rely entirely on Mars-orbiting relays in order to facilitate command and control as well as the return of science and engineering data. The Mars Exploration Rover missions have demonstrated the robust data-return capability using this architecture, and also have demonstrated the capability of using this method for command and control. The Phoenix mission will take the next step and incorporate this as the sole communications link. Operations for 90 Sols will need to work within the constraints of Odyssey and Mars Reconnaissance Orbiter communications availability, anomalies must be diagnosed and responded to through an intermediary and on-board fault responses must be tolerant to loss of a relay. These and other issues pose interesting challenges and changes in paradigm for traditional space operations and spacecraft architecture, and the approach proposed for the Phoenix mission is detailed herein.

  13. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    PubMed

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels. PMID:26131675

  14. Mars Relay Spacecraft: A Low-Cost Approach

    NASA Technical Reports Server (NTRS)

    SvitekT, .; King, J.; Fulton, R.; McOmber, R.; Hastrup, R.; Miller, A.

    1995-01-01

    The next phase of Mars exploration will utilize numerous globally distributed small low-cost devices including landers penetrators microrovers and balloons. Direct-to-Earth communications links if required for these landers will drive the lander design for two reasons: a) mass and complexity needed for a steerable high-gain antenna and b) power requirements for a high-power amplifier (i.e. solar panel and battery mass). Total mass of the direct link hardware for several recent small-lander designs exceeded the mass of the scientific payload. Alternatively if communications are via a Mars-orbiting relay spacecraft resource requirements for the local UHF communication link are comparatively trivial: a simple whip antenna and less than 1 watt power. Clearly using a Mars relay spacecraft (MRS) is the preferred option if the MRS mission can be accomplished in an affordable and robust way. Our paper describes a point design for such a mission launched in the s001 or 2003 opportunity.

  15. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks †

    PubMed Central

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels. PMID:26131675

  16. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  17. Impact of imperfect information on network attack

    NASA Astrophysics Data System (ADS)

    Melchionna, Andrew; Caloca, Jesus; Squires, Shane; Antonsen, Thomas M.; Ott, Edward; Girvan, Michelle

    2015-03-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erdős-Rényi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erdős-Rényi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links.

  18. Impact of imperfect information on network attack.

    PubMed

    Melchionna, Andrew; Caloca, Jesus; Squires, Shane; Antonsen, Thomas M; Ott, Edward; Girvan, Michelle

    2015-03-01

    This paper explores the effectiveness of network attack when the attacker has imperfect information about the network. For Erdős-Rényi networks, we observe that dynamical importance and betweenness centrality-based attacks are surprisingly robust to the presence of a moderate amount of imperfect information and are more effective compared with simpler degree-based attacks even at moderate levels of network information error. In contrast, for scale-free networks the effectiveness of attack is much less degraded by a moderate level of information error. Furthermore, in the Erdős-Rényi case the effectiveness of network attack is much more degraded by missing links as compared with the same number of false links. PMID:25871157

  19. The Baton Problem: Physics and the 4 x 100 M Relay

    ERIC Educational Resources Information Center

    Harris, Frank

    2012-01-01

    Success in any relay race depends on the speeds achieved by the individual runners and the successful handover of the baton from each runner to the next. Choosing top sprinters is the easy part but there are many ways for the passing of the baton to go wrong. In this article, the knowledge and judgement required by the coach for a relay team are…

  20. Performance Evaluation of Wireless Sensor Network Based on MIMO Relaying Channel Capacity

    NASA Astrophysics Data System (ADS)

    Leng, Ky; Sakaguchi, Kei; Araki, Kiyomichi

    In this paper, the performance of the Wireless Sensor Network (WSN) using fixed relay nodes and Multiple-Input Multiple-Output (MIMO) technology was evaluated based on the correlated channel capacity of MIMO system and the number of sensor node served by the system. Moreover, the performance evaluation of the proposed algorithm, which is used to find the optimum distance to place the relay nodes from sink node, is done not only with AF relaying and spatial correlation effect, but also with Decode-and-Forward (DF) relaying scheme. The results show that the relay gain (a ratio between the maximum number of sensors satisfying the required channel capacity in 7-cell topology to the number of sensor nodes in sink cell) is affected strongly by the spatial correlation at high required channel capacity but little at low required channel capacity. The results also show that the relay gain can be improved remarkably by using the DF relaying scheme, and that the validity of the proposed algorithm holds for any relaying scheme, spatial correlation effect and different antenna size.

  1. 77 FR 60630 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... 2, 2011, 76 FR 24393. The final regulations address fraud, waste, and abuse in the Video Relay... 47 CFR 64.604 in the Federal Register of May 2, 2011, (76 FR 24393). The amended rules are necessary... Relay Service (TRS) Fund administrator and the Commission on the need to inquire further about, and...

  2. 75 FR 25255 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... Affairs Bureau (Bureau), addresses the compensability from the Interstate TRS Fund (Fund) of certain types of calls made through Video Relay Service (VRS), a form of Telecommunications Relay Service (TRS... a provider's subcontractor, are not eligible for compensation from the TRS Fund on a...

  3. Tracking and data relay satellite system configuration and tradeoff study, part 1. Volume 3: Telecommunications service system

    NASA Technical Reports Server (NTRS)

    1972-01-01

    The results of the telecommunications subsystem analysis are presented. The relay system requirements and constraints, interference analysis, frequency selection, modulation and coding analysis, and the performance analysis of the relay system are included.

  4. Deployment Control of Wireless Multi-Hop-Relay Mobile Robots Based on Voronoi Partition

    NASA Astrophysics Data System (ADS)

    Imaizumi, Takaaki; Murakami, Hiroyuki; Uchimura, Yutaka

    This paper describes a new method for the deployment of wireless relay nodes. When using rescue robots in a building or underground city, the wireless radio signal is attenuated significantly, and therefore, multi-hop extension involving wireless communication relays is required. The goal of this research is to deploy wireless relay nodes to maintain connectivity between the base station and the leader robot that explores around the front line. To move the relay robot autonomously, a distributed algorithm is required. The proposed method is suitable when it is applied for wireless relay purposes. In the method, a virtual force drives a node to the centroid of Voronoi neighbors, and it maintains the connectivity of wireless communication. The proposed method is evaluated by conducting numerical simulations and experiments. In the simulation, one or two leader robots are assumed. In the experiment, a mobile robot equipped with omni-wheels is used.

  5. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  6. Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing

    NASA Astrophysics Data System (ADS)

    Zhang, Linyuan; Wu, Qihui; Ding, Guoru; Feng, Shuo; Wang, Jinlong

    2014-12-01

    In cognitive radio networks, spectrum sensing data falsification (SSDF) attack is a crucial factor deteriorating the detection performance of cooperative spectrum sensing. In this paper, we propose and analyze a novel probabilistic soft SSDF attack model, which goes beyond the existing models for its generalization. Under this generalized SSDF attack model, we firstly obtain closed form expressions of global sensing performance at the fusion center. Then, we theoretically evaluate the performance of the proposed attack model, in terms of destructiveness and stealthiness, sequentially. Numerical simulations match the analytical results well. Last but not least, an interesting trade-off between destructiveness and stealthiness is discovered, which is a fundamental issue involved in SSDF attack, however, ignored by most of the previous studies.

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Novel Material Integration for Reliable and Energy-Efficient NEM Relay Technology

    NASA Astrophysics Data System (ADS)

    Chen, I.-Ru

    Energy-efficient switching devices have become ever more important with the emergence of ubiquitous computing. NEM relays are promising to complement CMOS transistors as circuit building blocks for future ultra-low-power information processing, and as such have recently attracted significant attention from the semiconductor industry and researchers. Relay technology potentially can overcome the energy efficiency limit for conventional CMOS technology due to several key characteristics, including zero OFF-state leakage, abrupt switching behavior, and potentially very low active energy consumption. However, two key issues must be addressed for relay technology to reach its full potential: surface oxide formation at the contacting surfaces leading to increased ON-state resistance after switching, and high switching voltages due to strain gradient present within the relay structure. This dissertation advances NEM relay technology by investigating solutions to both of these pressing issues. Ruthenium, whose native oxide is conductive, is proposed as the contacting material to improve relay ON-state resistance stability. Ruthenium-contact relays are fabricated after overcoming several process integration challenges, and show superior ON-state resistance stability in electrical measurements and extended device lifetime. The relay structural film is optimized via stress matching among all layers within the structure, to provide lower strain gradient (below 10E-3/microm -1) and hence lower switching voltage. These advancements in relay technology, along with the integration of a metallic interconnect layer, enable complex relay-based circuit demonstration. In addition to the experimental efforts, this dissertation theoretically analyzes the energy efficiency limit of a NEM switch, which is generally believed to be limited by the surface adhesion energy. New compact (<1 microm2 footprint), low-voltage (<0.1 V) switch designs are proposed to overcome this limit. The results

  9. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  10. [Relation between serum eosinophil cationic protein (ECP) level and asthma attack in children].

    PubMed

    Ishigaki, N; Masuhara, C; Sakamaki, K; Ishikawa, Y; Ohta, K; Koike, R; Mikuni, K; Haruna, H; Awa, S

    2000-11-01

    Serum eosinophil cationic protein (sECP) levels were measured in 339 patients with childhood asthma, and the clinical courses of these patients were followed for 57 weeks. While considering the history and characteristics of each patient, we examined the correlation between asthma attack frequency and sECP, blood eosinophil count, and serum total IgE (tIgE) to determine their usefulness in predicting asthma attacks. Among patients with no other allergic diseases, sECP levels in patients who had no asthma attacks two weeks before or after the measurement were significantly lower than those of patients who had attacks during the same four-week period. Among patients who had attacks, those patients with no attack for a year after the measurement were also found to have low sECP levels. Similarly, even among patients with asthma attacks and high sECP levels, there were cases where attacks were well controlled using nebulizer treatments with DSCG or BDP. The incident rate of attacks for patients with other allergic diseases and a low sECP was low. Yet, there was no common trend in patients with high sECP levels. Moreover, this study detected a significant correlation between sECP level and blood eosinophil count as well as between sECP level and serum tIgE. The most significant correlation with asthma attack frequency was sECP level. Thus, sECP level seems to reflect the allergy activity level, especially two weeks prior to and after the measurement. For patients without other allergic diseases, asthma attack prediction during the two weeks period after the measurement of sECP also seems possible. Therefore, periodic measurement of sECP level is useful in objectively monitoring the improvement of symptoms and establishing the treatment plan, including treatment with DSCG or BDP. PMID:11193461

  11. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  12. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  13. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  14. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  15. Exomars orbiter science and data-relay mission / looking for trace gases on Mars

    NASA Astrophysics Data System (ADS)

    Fratacci, Olivier

    EXOMARS Orbiter Module: looking for trace gas on Mars and providing data relay support for future Mars Surface assets O.Fratacci, M.Mesrine, H.Renault, Thales Alenia Space France B.Musetti, M.Montagna, Thales Alenia Space Italy M.Kesselmann, M.Barczewski OHB P.Mitschdoerfer, D.Dellantonio Euro-pean Space Agency / ESTEC The European Space Agency (ESA) in a joint cooperation with NASA, will launch in 2016 the EXOMARS spacecraft composite to develop European landing technologies and provide a science orbiter with data-relay capability around Mars until end 2022. The spacecraft composite is composed of the Orbitr Module (OM), provided by TAS-France, an entry descent and landing demonstrator module (EDM) provided by TAS-Italy, and a set of six scientific payloads to be selected by the JPL during 2010. Recent observations of the planet Mars have indicated detection of methane as well as temporal, perhaps spatial variability in the detected signal while current photochemical models cannot explain the presence of methane in the atmosphere of Mars nor its reported rapid variations in space and time. The triple scientific objectives that drive the selection of these six instruments for the Exomars 2016 mission is to detect trace gases in Mars atmosphere, to characterise their spatial and temporal variation and to explore the source of the key trace gases (e.g. methane) on the surface. The launch is scheduled in January 2016 from Kennedy Space Center (KSC) using an ATLAS V 421 launcher with a total launch mass of 4.4 tons. After release of the EDM on Mars, the OM will perform the Mars Orbit Insertion manoeuvre and then reduce its elliptic orbit by implementing the first European Aerobraking around Mars for about 6 to 9 months, to finally end on a circular 400x400km orbit with an altitude in the range of 350km to 420km. From this orbit, a science phase will follow lasting 2 years in which the Mars atmosphere and surface is continuously observed. Science instruments composed of

  16. Fast detection of network intrusion

    NASA Astrophysics Data System (ADS)

    Chen, Xinjia; Walker, Ernest

    2011-06-01

    In this paper, we propose new network intrusion detection techniques which promptly detect malicious attacks and thus lower the resulting damage. Moreover, our approach rigorously control the probability of falsely implicating benign remote hosts as malicious. Such technique is especially suitable for detecting DoS attackers and port-scan attackers routinely perform random "portscans" of IP addresses to find vulnerable servers to compromise. Our method performs significantly faster and also more accurate than other current solutions.

  17. An airborne meteorological data collection system using satellite relay (ASDAR)

    NASA Technical Reports Server (NTRS)

    Bagwell, J. W.; Lindow, B. G.

    1978-01-01

    The National Aeronautics and Space Administration (NASA) has developed an airborne data acquisition and communication system for the National Oceanic and Atmospheric Administration (NOAA). This system known as ASDAR, the Aircraft to Satellite Data Relay, consists of a microprocessor based controller, time clock, transmitter and antenna. Together they acquire meteorological and position information from existing aircraft systems on B-747 aircraft, convert and format these, and transmit them to the ground via the GOES meteorological satellite series. The development and application of the ASDAR system is described with emphasis on unique features. Performance to date is exceptional, providing horizon-to-horizon coverage of aircraft flights. The data collected is of high quality and is considered a valuable addition to the data base from which NOAA generates its weather forecasts.

  18. Tensile-stressed microelectromechanical apparatus and microelectromechanical relay formed therefrom

    DOEpatents

    Fleming, James G.

    2008-03-04

    A microelectromechanical (MEM) apparatus is disclosed which includes a shuttle suspended above a substrate by two or more sets of tensile-stressed beams which are operatively connected to the shuttle and which can comprise tungsten or a silicon nitride/polysilicon composite structure. Initially, the tensile stress in each set of beams is balanced. However, the tensile stress can be unbalanced by heating one or more of the sets of beams; and this can be used to move the shuttle over a distance of up to several tens of microns. The MEM apparatus can be used to form a MEM relay having relatively high contact and opening forces, and with or without a latching capability.

  19. A Calcium-Relay Mechanism in Vertebrate Phototransduction

    PubMed Central

    2013-01-01

    Calcium-signaling in cells requires a fine-tuned system of calcium-transport proteins involving ion channels, exchangers, and ion-pumps but also calcium-sensor proteins and their targets. Thus, control of physiological responses very often depends on incremental changes of the cytoplasmic calcium concentration, which are sensed by calcium-binding proteins and are further transmitted to specific target proteins. This Review will focus on calcium-signaling in vertebrate photoreceptor cells, where recent physiological and biochemical data indicate that a subset of neuronal calcium sensor proteins named guanylate cyclase-activating proteins (GCAPs) operate in a calcium-relay system, namely, to make gradual responses to small changes in calcium. We will further integrate this mechanism in an existing computational model of phototransduction showing that it is consistent and compatible with the dynamics that are characteristic for the precise operation of the phototransduction pathways. PMID:23472635

  20. Orbiting Deep Space Relay Station (ODSRS). Volume 1: Requirement determination

    NASA Technical Reports Server (NTRS)

    Hunter, J. A.

    1979-01-01

    The deep space communications requirements of the post-1985 time frame are described and the orbiting deep space relay station (ODSRS) is presented as an option for meeting these requirements. Under current conditions, the ODSRS is not yet cost competitive with Earth based stations to increase DSN telemetry performance, but has significant advantages over a ground station, and these are sufficient to maintain it as a future option. These advantages include: the ability to track a spacecraft 24 hours per day with ground stations located only in the USA; the ability to operate at higher frequencies that would be attenuated by Earth's atmosphere; and the potential for building very large structures without the constraints of Earth's gravity.

  1. Temporal patterns of solar eclipses on areostationary relay satellites

    NASA Astrophysics Data System (ADS)

    Romero, P.; Antolín, R.

    2014-09-01

    Mars Areostationary Relay Satellites are considered robust candidates to meet the telecommunications needs of the coming set of Mars science missions. Orbital station-keeping manoeuvres are required to compensate natural perturbations on the areostationary orbit. This paper deals on the pattern description of solar eclipses in the areostationary orbit to allow to test the constrain imposed by the impossibility to perform manoeuvres at the eclipse times. We present here the models used to characterize the two eclipse epochs around the spring and autumn equinoxes over a Martian year. In average, each eclipse season lasts 90 sols in eclipse with a daily maxima duration of about 1 h 18 min plus 2 min 54 s of penumbra. Temporal duration of solar eclipses with different values near to zero inclination and different satellite orbit nodes has been also analyzed.

  2. Experimental service of 3DTV broadcasting relay in Korea

    NASA Astrophysics Data System (ADS)

    Hur, Namho; Ahn, Chung-Hyun; Ahn, Chieteuk

    2002-11-01

    This paper introduces 3D HDTV relay broadcasting experiments of 2002 FIFA World Cup Korea/Japan using a terrestrial and satellite network. We have developed 3D HDTV cameras, 3D HDTV video multiplexer/demultiplexer, a 3D HDTV receiver, and a 3D HDTV OB van for field productions. By using a terrestrial and satellite network, we distributed a compressed 3D HDTV signal to predetermined demonstration venues which are approved by host broadcast services (HBS), KirchMedia, and FIFA. In this case, we transmitted a 40Mbps MPEG-2 transport stream (DVB-ASI) over a DS-3 network specified in ITU-T Rec. G.703. The video/audio compression formats are MPEG-2 main-profile, high-level and Dolby Digital AC-3 respectively. Then at venues, the recovered left and right images by the 3D HDTV receiver are displayed on a screen with polarized beam projectors.

  3. Quinones as Reversible Electron Relays in Artificial Photosynthesis.

    PubMed

    Rodenberg, Alexander; Orazietti, Margherita; Mosberger, Mathias; Bachmann, Cyril; Probst, Benjamin; Alberto, Roger; Hamm, Peter

    2016-05-01

    We explore the potential of various hydroquinone/quinone redox couples as electron relays in a homogenous water reduction system between a Re-based photosensitizer and a sacrificial electron donor [tris-(2-carboxyethyl)-phosphine, TCEP]. By using transient IR spectroscopy, flash photolysis as well as stopped-flow techniques covering timescales from picoseconds to 100 ms, we determine quenching rates and cage escape yields, the kinetics of the follow-up chemistry of the semiquinone, the recombination rates, as well as the re-reduction rates by TCEP. The overall quantum yield of hydrogen production is low, and we show that the limiting factors are the small cage escape yields and, more importantly, the slow regeneration rate by TCEP in comparison to the undesired charge recombination with the reduced water reduction catalyst. PMID:26752324

  4. GSFC network operations with Tracking and Data Relay Satellites

    NASA Technical Reports Server (NTRS)

    Spearing, R.; Perreten, D. E.

    1984-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  5. The mammillary bodies and memory: more than a hippocampal relay

    PubMed Central

    Vann, Seralynne D.; Nelson, Andrew J.D.

    2015-01-01

    Although the mammillary bodies were one of the first neural structures to be implicated in memory, it has long been assumed that their main function was to act primarily as a hippocampal relay, passing information on to the anterior thalamic nuclei and from there to the cingulate cortex. This view not only afforded the mammillary bodies no independent role in memory, it also neglected the potential significance of other, nonhippocampal, inputs to the mammillary bodies. Recent advances have transformed the picture, revealing that projections from the tegmental nuclei of Gudden, and not the hippocampal formation, are critical for sustaining mammillary body function. By uncovering a role for the mammillary bodies that is independent of its subicular inputs, this work signals the need to consider a wider network of structures that form the neural bases of episodic memory. PMID:26072239

  6. Relay telescope for high power laser alignment system

    DOEpatents

    Dane, C. Brent; Hackel, Lloyd; Harris, Fritz B.

    2006-09-19

    A laser system includes an optical path having an intracavity relay telescope with a telescope focal point for imaging an output of the gain medium between an image location at or near the gain medium and an image location at or near an output coupler for the laser system. A kinematic mount is provided within a vacuum chamber, and adapted to secure beam baffles near the telescope focal point. An access port on the vacuum chamber is adapted for allowing insertion and removal of the beam baffles. A first baffle formed using an alignment pinhole aperture is used during alignment of the laser system. A second tapered baffle replaces the alignment aperture during operation and acts as a far-field baffle in which off angle beams strike the baffle a grazing angle of incidence, reducing fluence levels at the impact areas.

  7. The design and evaluation of grazing incidence relay optics

    NASA Technical Reports Server (NTRS)

    Davis, John M.; Chase, R. C.; Silk, J. K.; Krieger, A. S.

    1989-01-01

    X-ray astronomy, both solar and celestial, has many needs for high spatial resolution observations which have to be performed with electronic detectors. If the resolution is not to be detector limited, plate scales in excess of 25 microns arc/sec, corresponding to focal lengths greater than 5 m, are required. In situations where the physical size is restricted, the problem can be solved by the use of grazing incidence relay optics. A system was developed which employs externally polished hyperboloid-hyperboloid surfaces to be used in conjunction with a Wolter-Schwarzschild primary. The secondary is located in front of the primary focus and provides a magnification of 4, while the system has a plate scale of 28 microns arc/sec and a length of 1.9 m. The design, tolerance specification, fabrication and performance at visible and X-ray wavelengths of this optical system are described.

  8. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  9. Symptoms of transient ischemic attack.

    PubMed

    Kim, Jong S

    2014-01-01

    Transient ischemic attack (TIA) is a cerebrovascular disease with temporary (<24 h) neurological symptoms. The symptoms of TIA patients are largely similar to those of ischemic stroke patients and include unilateral limb weakness, speech disturbances, sensory symptoms, visual disturbances, and gait difficulties. As these symptoms are transient, they are frequently evaluated based on patients' subjective reports, which are less precise than those of patients with stroke whose longer-lasting symptoms and signs can be reliably assessed by physicians. Some symptoms, such as monocular blindness, are much more common in TIA than in stroke, and limb shaking occurs almost exclusively in TIA patients. On the other hand, symptoms like hemivisual field defects or limb ataxia are underappreciated in TIA patients. These transient neurological symptoms are not necessarily caused by cerebrovascular diseases, but can be produced by a variety of non-vascular diseases. Careful history taking, examination, and appropriate imaging tests are needed to differentiate these TIA mimics from TIA. Each TIA symptom has a different specificity and sensitivity, and there has been an effort to assess the outcome of the patients through the use of specific clinical features. On top of this, recent developments in imaging techniques have greatly enhanced our ability to predict the outcomes of TIA patients. Perception or recognition of TIA symptoms may differ according to the race, sex, education, and specialty of physicians. Appropriate education of both the general population and physicians with regard to TIA symptoms is important as TIAs need emergent evaluation and treatment. PMID:24157558

  10. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility †

    PubMed Central

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-01

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination’s home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination’s home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609

  11. Cell speed, persistence and information transmission during signal relay and collective migration.

    PubMed

    McCann, Colin P; Kriebel, Paul W; Parent, Carole A; Losert, Wolfgang

    2010-05-15

    Collective migration is a key feature of the social amoebae Dictyostelium discoideum, where the binding of chemoattractants leads to the production and secretion of additional chemoattractant and the relay of the signal to neighboring cells. This then guides cells to migrate collectively in a head-to-tail fashion. We used mutants that were defective in signal relay to elucidate which quantitative metrics of cell migration are most strongly affected by signal relay and collective motion. We show that neither signal relay nor collective motion markedly impact the speed of cell migration. Cells maintained a preferred overall direction of motion for several minutes with similar persistence, regardless of whether or not they were attracted to moving neighbors, moving collectively in contact with their neighbors, or simply following a fixed exogenous signal. We quantitatively establish that signal relay not only increases the number of cells that respond to a chemotactic signal, but most remarkably, also transmits information about the location of the source accurately over large distances, independently of the strength of the exogenous signal. We envision that signal relay has a similar key role in the migration of a variety of chemotaxing mammalian cells that can relay chemoattractant signals. PMID:20427323

  12. The Relay/Converter Interface Influences Hydrolysis of ATP by Skeletal Muscle Myosin II.

    PubMed

    Bloemink, Marieke J; Melkani, Girish C; Bernstein, Sanford I; Geeves, Michael A

    2016-01-22

    The interface between relay and converter domain of muscle myosin is critical for optimal myosin performance. Using Drosophila melanogaster indirect flight muscle S1, we performed a kinetic analysis of the effect of mutations in the converter and relay domain. Introduction of a mutation (R759E) in the converter domain inhibits the steady-state ATPase of myosin S1, whereas an additional mutation in the relay domain (N509K) is able to restore the ATPase toward wild-type values. The R759E S1 construct showed little effect on most steps of the actomyosin ATPase cycle. The exception was a 25-30% reduction in the rate constant of the hydrolysis step, the step coupled to the cross-bridge recovery stroke that involves a change in conformation at the relay/converter domain interface. Significantly, the double mutant restored the hydrolysis step to values similar to the wild-type myosin. Modeling the relay/converter interface suggests a possible interaction between converter residue 759 and relay residue 509 in the actin-detached conformation, which is lost in R759E but is restored in N509K/R759E. This detailed kinetic analysis of Drosophila myosin carrying the R759E mutation shows that the interface between the relay loop and converter domain is important for fine-tuning myosin kinetics, in particular ATP binding and hydrolysis. PMID:26586917

  13. The Relay/Converter Interface Influences Hydrolysis of ATP by Skeletal Muscle Myosin II*

    PubMed Central

    Bloemink, Marieke J.; Melkani, Girish C.; Bernstein, Sanford I.; Geeves, Michael A.

    2016-01-01

    The interface between relay and converter domain of muscle myosin is critical for optimal myosin performance. Using Drosophila melanogaster indirect flight muscle S1, we performed a kinetic analysis of the effect of mutations in the converter and relay domain. Introduction of a mutation (R759E) in the converter domain inhibits the steady-state ATPase of myosin S1, whereas an additional mutation in the relay domain (N509K) is able to restore the ATPase toward wild-type values. The R759E S1 construct showed little effect on most steps of the actomyosin ATPase cycle. The exception was a 25–30% reduction in the rate constant of the hydrolysis step, the step coupled to the cross-bridge recovery stroke that involves a change in conformation at the relay/converter domain interface. Significantly, the double mutant restored the hydrolysis step to values similar to the wild-type myosin. Modeling the relay/converter interface suggests a possible interaction between converter residue 759 and relay residue 509 in the actin-detached conformation, which is lost in R759E but is restored in N509K/R759E. This detailed kinetic analysis of Drosophila myosin carrying the R759E mutation shows that the interface between the relay loop and converter domain is important for fine-tuning myosin kinetics, in particular ATP binding and hydrolysis. PMID:26586917

  14. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.

    PubMed

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-01

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination's home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination's home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609

  15. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  16. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  17. Summary of Static power converters of 500 kW or less serving as the relay interface package for non-conventional generators''

    SciTech Connect

    Ball, G.J.; Blackburn, D.C. Jr.; Gish, W.

    1994-07-01

    The special publication was prepared by the Power System Relaying Committee of the IEEE to assist people involved in the installation, application, and operation of utility-interconnected dispersed storage and generation (DSG) systems of 500 kW or less. The energy sources considered are batteries, fuel cells, windmills and photovoltaic arrays. In most cases, the electrical energy produced is direct current, dc, which must be converted to alternating current, ac, for connection to the electric utility network. The interface between the dc source and the utility ac is often a static power converter (SPC). The purpose of the publication is to illustrate those SPC characteristics that can obviate the need for the interface relay protection package normally required by a utility. A qualifying SPC can detect utility system disturbances or other conditions that would require generator separation in addition to its normal function of protection and control of the DSG.

  18. A relay strategy for the mercury (II) chemodosimeter with ultra-sensitivity as test strips

    PubMed Central

    Ruan, Zhijun; Li, Conggang; Li, Jian-Rong; Qin, Jingui; Li, Zhen

    2015-01-01

    A relay strategy has been proposed to design a new Hg2+ chemodosimeter (TPE-S), by coupling Hg2+-promoted deprotection reaction with ketone-enol isomerization, realizing the multistage amplifying effect. Changes in both of color and fluorescence could occur immediately, and TPE-S displayed high selectivity for Hg2+, other metal ions (Ag+, Fe3+, Cu2+, Pb2+, Co2+, Cr3+, Al3+, Cd2+, Mg2+, Mn2+, Ba2+, Fe2+, Ca2+, Ni2+, Zn2+, Li+, K+ and Na+) gave nearly no disturbance to the sensing process. When fabricated as test strips similar to pH-indicator papers, immediate color change from colorless to purple could be visually observed by naked-eyes without the aid of any additional equipment, with the detection limit as low as 1 × 10−7 M (Hg2+ in aqueous solution). Due to its easy synthesis, high selectivity and sensitivity, combined with the portable test strips, TPE-S could be developed as a convenient and cost-effective tool for the detection of Hg2+ in on-site inspections. PMID:26541941

  19. A relay strategy for the mercury (II) chemodosimeter with ultra-sensitivity as test strips

    NASA Astrophysics Data System (ADS)

    Ruan, Zhijun; Li, Conggang; Li, Jian-Rong; Qin, Jingui; Li, Zhen

    2015-11-01

    A relay strategy has been proposed to design a new Hg2+ chemodosimeter (TPE-S), by coupling Hg2+-promoted deprotection reaction with ketone-enol isomerization, realizing the multistage amplifying effect. Changes in both of color and fluorescence could occur immediately, and TPE-S displayed high selectivity for Hg2+, other metal ions (Ag+, Fe3+, Cu2+, Pb2+, Co2+, Cr3+, Al3+, Cd2+, Mg2+, Mn2+, Ba2+, Fe2+, Ca2+, Ni2+, Zn2+, Li+, K+ and Na+) gave nearly no disturbance to the sensing process. When fabricated as test strips similar to pH-indicator papers, immediate color change from colorless to purple could be visually observed by naked-eyes without the aid of any additional equipment, with the detection limit as low as 1 × 10-7 M (Hg2+ in aqueous solution). Due to its easy synthesis, high selectivity and sensitivity, combined with the portable test strips, TPE-S could be developed as a convenient and cost-effective tool for the detection of Hg2+ in on-site inspections.

  20. Development of Support System for Setting and Coordination between Protection Relays

    NASA Astrophysics Data System (ADS)

    Kameda, Hideyuki; Uemura, Satoshi; Uchikawa, Yuuki; Nakajima, Takayuki

    The opportunity for distributed generators to be connected to the power system has been increasing since the introduction of electricity deregulation. Moreover, a power system which has a new concept such as a micro-grid or a smart-grid is going to appear. The increase in the uncertainty of power flow and the power system operation under an irregular system configuration is supposed in such new power systems. And the sensitivity of a protection relay may decrease or a protection relay may miscoordinate with other protection relays. Under the above conditions, to prevent the fault expansion is required of the electric power utilities. From the background, the development of a program that can check the relay setting and the coordination between protection relay systems is desired. The development of “Support System for Setting and Coordination between protection relays” called SSSC was initiated in 2006, and it will be completed in 2011. SSSC has the following features ·It enables us to check whether the protection relay is set as operate correctly against all of assumed system faults. ·It enables us to check automatically whether the coordination between the protection relays is proper as prevent the fault extension even if an unexpected condition occurs. ·It enables us to analyze the response of the protection relays in the power system where some apparatus with nonlinear characteristic is installed. This paper describes the prototype of the SSSC based on the dynamic analysis like Y-method. Furthermore, in this paper, the checking method of coordination between protection relays for short circuit fault, and the verification results of the prototype in the 6.6kV model distribution system are described.

  1. Mars Interoperability 2008-2015: Options for Relay Orbiter Support to Mars Bound Assets

    NASA Technical Reports Server (NTRS)

    Kazz, Greg J.; Greenberg, Edward

    2008-01-01

    The current relay orbiter infrastructure at Mars, in support of the user assets presently at Mars and those scheduled for the 2008 to 2015 time frame, only have a need to store-and-forward the returned data collected by an asset to Earth as a single non-prioritized data file. In the forward direction, the relay orbiters are only required to relay the forward link data, i.e., command sequences, software and configuration information assembled on the ground, to the Asset. There are currently no requirements for status/control messages or files to be sent in the return direction from an Asset to an application located on the Relay, nor are there requirements in the forward direction to send status/control messages or files originating on a Relay to an Asset. In addition there are currently no networking requirements at Mars where data originally sent by an Asset is to be delivered to another user asset. However, we foresee the day when standard services for 1) on-board file prioritization of user asset data by a Relay, 2) control/status message transfer between assets and a Relay, and 3) networking between assets i.e., Asset to Asset message/file transfer via a Relay will be required. Each of these services will require the Relay to be capable of understanding the data type and routing needs of the user asset data and be capable of processing it for these purposes. This paper will focus on the innovative enhancements required to the existing communications infrastructure at Mars to enable these future services.

  2. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  3. Innovation Relay: Empowering School Nurses to Find New Solutions for Old Problems.

    PubMed

    Maughan, Erin D; Galemore, Cynthia; Mattey, Beth

    2016-09-01

    NASN's 48th Annual School Nurse Conference-Learning, Linking, Leading-included the first ever innovation relay contest. The relay was based on a design developed by the Institute of Healthcare Improvement's Innovation Relay. Participation included 43 contestants from 16 states and one foreign country. Teams were given 24 hours to develop a solution. This article describes the process utilized, the problem introduced, and a brief synopsis of each team's solution. The ongoing purpose of the exercise is to encourage innovation by school nurses as they experience student health-related barriers in the academic setting. PMID:27520983

  4. Effect of migraine attacks on paracetamol absorption.

    PubMed Central

    Tokola, R A; Neuvonen, P J

    1984-01-01

    The absorption of effervescent paracetamol (1000 mg) was investigated in nine female patients during a migraine attack and in the same patients when headache free. Migraine attack decreased (P less than 0.05) the areas under the serum paracetamol concentration-time curves (AUC) of 0-2 h, 0-4 h and 0-6 h and the peak serum concentration. The severity of nausea correlated significantly with the decrease in the AUC values. Our results support findings of delayed gastric emptying in migraine attacks. Both a delay and an impairment of drug absorption may follow. PMID:6529526

  5. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  6. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  7. Women's Heart Disease: Heart Attack Symptoms

    MedlinePlus

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  8. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  9. Heart attack - what to ask your doctor

    MedlinePlus

    A heart attack occurs when blood flow to a part of your heart is blocked for a period of time ... muscle is damaged. It is also called a myocardial infarction (MI). Angina is pain or pressure in the ...

  10. Dengue Virus May Bolster Zika's Attack

    MedlinePlus

    ... news/fullstory_159534.html Dengue Virus May Bolster Zika's Attack Prior exposure to this other mosquito-borne ... dengue fever virus may increase the severity of Zika virus, a new study says. Early stage laboratory ...

  11. Heart attack - what to ask your doctor

    MedlinePlus

    ... muscle is damaged. It is also called a myocardial infarction (MI). Watch this video about: Coronary artery disease ... help you take care of yourself after a heart attack. Questions What are the signs and symptoms that ...

  12. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  13. Recovery of infrastructure networks after localised attacks

    NASA Astrophysics Data System (ADS)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  14. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... THE INSTALLATION, INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  15. Double- and relay-cropping oilseed and biomass crops for sustainable energy production

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Economically and environmentally sustainable bioenergy production requires strategic integration of biofuel crops into modern cropping systems. Double- and relay-cropping can offer a means of increasing production efficiency to boost profits and provide environmental benefits through crop diversific...

  16. Achievable Region in Slotted ALOHA Throughput for One-Relay Two-Hop Wireless Network Coding

    NASA Astrophysics Data System (ADS)

    Umehara, Daisuke; Denno, Satoshi; Morikura, Masahiro; Sugiyama, Takatoshi

    This paper presents achievable regions in slotted ALOHA throughput both without and with network coding for one-relay two-hop wireless networks between two end node groups. In this paper, there are no restrictions on the total traffic and the number of end nodes per group. It follows that the relay node will be generally involved with asymmetric bidirectional traffic. This paper derives closed-form expressions of the throughput and packet delay per group both without and with network coding from a theoretical perspective regardless of whether the buffer on the relay node is saturated or not. Furthermore, we show that the maximum throughput per group with network coding can be achieved at the boundary of the relay buffer saturation and unsaturation which is expressed as the solution of a polynomial equation in two group node traffics. As a result, we clarify the enhancement of the achievable region in slotted ALOHA throughput by applying network coding.

  17. G.E. SLATE SWITCHBOARD WITH RELAYS IN GLINES POWERHOUSE. ALSO NOTE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    G.E. SLATE SWITCHBOARD WITH RELAYS IN GLINES POWERHOUSE. ALSO NOTE 1926 PHONE BOOTH (STILL IN OPERATION). PHOTO BY JET LOWE, HAER, 1995. - Elwha River Hydroelectric System, Glines Hydroelectric Dam & Plant, Port Angeles, Clallam County, WA

  18. Scheduler software for tracking and data relay satellite system loading analysis: User manual and programmer guide

    NASA Technical Reports Server (NTRS)

    Craft, R.; Dunn, C.; Mccord, J.; Simeone, L.

    1980-01-01

    A user guide and programmer documentation is provided for a system of PRIME 400 minicomputer programs. The system was designed to support loading analyses on the Tracking Data Relay Satellite System (TDRSS). The system is a scheduler for various types of data relays (including tape recorder dumps and real time relays) from orbiting payloads to the TDRSS. Several model options are available to statistically generate data relay requirements. TDRSS time lines (representing resources available for scheduling) and payload/TDRSS acquisition and loss of sight time lines are input to the scheduler from disk. Tabulated output from the interactive system includes a summary of the scheduler activities over time intervals specified by the user and overall summary of scheduler input and output information. A history file, which records every event generated by the scheduler, is written to disk to allow further scheduling on remaining resources and to provide data for graphic displays or additional statistical analysis.

  19. The Role of Remotely Sensed and Relayed Data in the Delaware River Basin

    NASA Technical Reports Server (NTRS)

    Paulson, R. W.

    1971-01-01

    The planned integration of the existing water quality monitoring and data processing systems in the Delaware River Basin with a data relay experiment proposed for the ERTS-1 is discussed. The experiment is designed to use ERTS-1 as a data relay link for a maximum of 20 hydrologic stations in the basin, including stream gaging, reservoir level, ground water level, and water quality monitoring stations. This experiment has the potential for reducing the time lag between data collection and dissemination to less than 12 hours. The experiment will also provide impetus to develop an operational system of real time data processing and dissemination to handle the large quantity of data that will be obtained from the stations in the basin. The results of this experiment will demonstrate the relative merits of satellite relay of data versus conventional means of data telemetry and will provide a basis for the development of operational satellite relay of hydrologic data.

  20. Multi-Path Relay Selection Algorithm Based on the Broadcast TV

    NASA Astrophysics Data System (ADS)

    Zhang, Chaoyi; Luan, Linlin; Wu, Muqing

    This paper presents a relay selection method for Broadcast TV services. This method get through the node's time-delay and power information, obtain the value of the system interrupt as to be a decision threshold, then chose the relay node. At the same time this paper proposes an optimal relay selection strategy which can minimize the system interrupt probability combination with power distribution--Multi-Path Relay Routing Protocol. This protocol can dynamically change the appropriate route according to the shifty network. Simulation results show that the protocol can extend the coverage area, reducing time-delay and increase system throughput, improve system spectral efficiency, and enhance the Qos of the Broadcast TV service.

  1. On-line Adaptive and Intelligent Distance Relaying Scheme for Power Network

    NASA Astrophysics Data System (ADS)

    Dubey, Rahul; Samantaray, S. R.; Panigrahi, B. K.; Venkoparao, G. V.

    2015-10-01

    The paper presents an on-line sequential extreme learning machine (OS-ELM) based fast and accurate adaptive distance relaying scheme (ADRS) for transmission line protection. The proposed method develops an adaptive relay characteristics suitable to the changes in the physical conditions of the power systems. This can efficiently update the trained model on-line by partial training on the new data to reduce the model updating time whenever a new special case occurs. The effectiveness of the proposed method is validated on simulation platform for test system with two terminal parallel transmission lines with complex mutual coupling. The test results, considering wide variations in operating conditions of the faulted power network, indicate that the proposed adaptive relay setting provides significant improvement in the relay performance.

  2. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  3. Spread spectrum watermarking: malicious attacks and counterattacks

    NASA Astrophysics Data System (ADS)

    Hartung, Frank H.; Su, Jonathan K.; Girod, Bernd

    1999-04-01

    Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some skepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we review proposed attacks on spread spectrum watermarks are systematically. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

  4. Tracking and Delay Relay Satellite System (TDRSS)-LIGHT: a space communications architecture

    NASA Astrophysics Data System (ADS)

    Seery, Bernard D.; Fitzmaurice, Michael W.; Hayden, William L.; Burt, Joseph; Minott, Peter O.; Krainak, Michael A.

    1994-08-01

    There is a growing interest in applying the resources of the Tracking and Data Relay Satellite System (TDRSS) as the primary support capability for future small satellite users. This interest is based on a variety of benefits offered by the TDRSS, and not available with globally-distributed space-ground links. An architecture based on an optical augmentation to the current TDRSS space network is discussed, including a candidate design for the user and relay terminals.

  5. The effect of relay ramps on sediment routes and deposition: A review

    NASA Astrophysics Data System (ADS)

    Athmer, Wiebke; Luthi, Stefan M.

    2011-12-01

    A better understanding of the interplay between rift basin evolution and sediment transport paths can improve the success rate of locating hydrocarbon reservoirs at passive rift margins. This paper reviews the current knowledge and suggests future research directions. Relay ramps at extensional basin margins can form drainage entry points if tectonic activity exceeds sedimentation and incision rates, leading to a diversion of sedimentary flow paths towards the ramp. During base level lowstands, channels and canyons may incise into the relay ramp and provide flow paths from the basin margin into the basin. Their orientation and geometry mainly develops as a response to faulting and fracturing, and their activity is influenced by base level fluctuations. Flow constraints such as channels parallel to the ramp axis direct flows to the foot of the relay ramp where sediment accumulates in response to the basin topography. In subaqueous settings, however, turbidity currents are likely to spill at least partly over channel levees and flow down the fault slope into the basin, depositing its load adjacent to the en-echelon boundary faults. Channels and canyons with oblique and perpendicular orientations to the boundary faults can funnel flows down the hanging wall fault onto the basin floor, by-passing the relay ramp. The prevalent basinward tilt of relay ramps can direct unconstrained subaqueous gravity flows also directly into the basin. In subaerial settings, the duration of channel activity in relation to relay ramp evolution strongly depends on the ratio between flow incision rates and tectonic uplift. Drainage direction on the footwall may revert if footwall uplift exceeds incision rates, and the feeding of former depocentres terminates. In the course of rift margin development relay ramp bounding faults may link, causing the breaching of relay ramps and eventually their burial. The effect of continued rifting on ramp remnants and associated syn-rift deposits, however

  6. Tracking and orbit determination of near earth orbiting satellites using earth synchronous relay satellites

    NASA Technical Reports Server (NTRS)

    Bryant, W. C., Jr.; Goad, C. C.

    1973-01-01

    A Tracking Data Relay Satellite System (TDRSS) made up of two earth synchronous data relay satellites is proposed for the late 1970s to aid in the tracking, or take the place of ground tracking, or near-earth orbiters. Theoretical error analysis studies were conducted to evaluate the TDRSS concept of tracking user satellites. All major factors affecting orbit determination accuracy were considered in the analysis, including tracking system and dynamic modeling errors.

  7. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  8. Pitcherpot: Avoiding Honeypot Detection

    NASA Astrophysics Data System (ADS)

    Panchal, Vinod K.; Bhatnagar, Pramod K.; Bhatnagar, Mitul

    This paper explores the various ways honeypots could be detected by the malicious attacker. This includes the different prevalent criteria and characteristics for honeypots generation & their weaknesses. Further this paper proposes a new way of implementation of a honeypot (Pitcher pots Systems) that effectively facilitate its identity avoidance and yet offers better ways to study the attacker.

  9. Enzyme structure captures four cysteines aligned for disulfide relay

    PubMed Central

    Gat, Yair; Vardi-Kilshtain, Alexandra; Grossman, Iris; Major, Dan Thomas; Fass, Deborah

    2014-01-01

    Thioredoxin superfamily proteins introduce disulfide bonds into substrates, catalyze the removal of disulfides, and operate in electron relays. These functions rely on one or more dithiol/disulfide exchange reactions. The flavoenzyme quiescin sulfhydryl oxidase (QSOX), a catalyst of disulfide bond formation with an interdomain electron transfer step in its catalytic cycle, provides a unique opportunity for exploring the structural environment of enzymatic dithiol/disulfide exchange. Wild-type Rattus norvegicus QSOX1 (RnQSOX1) was crystallized in a conformation that juxtaposes the two redox-active di-cysteine motifs in the enzyme, presenting the entire electron-transfer pathway and proton-transfer participants in their native configurations. As such a state cannot generally be enriched and stabilized for analysis, RnQSOX1 gives unprecedented insight into the functional group environments of the four cysteines involved in dithiol/disulfide exchange and provides the framework for analysis of the energetics of electron transfer in the presence of the bound flavin adenine dinucleotide cofactor. Hybrid quantum mechanics/molecular mechanics (QM/MM) free energy simulations based on the X-ray crystal structure suggest that formation of the interdomain disulfide intermediate is highly favorable and secures the flexible enzyme in a state from which further electron transfer via the flavin can occur. PMID:24888638

  10. Tracking and Data Relay Satellite launch recovery mission

    NASA Astrophysics Data System (ADS)

    Sackheim, R. L.; Dressler, G. A.

    1984-02-01

    On April 5, 1983, the Tracking and Data Relay Satellite (TDRS), Flight 1, was incorrectly inserted into an elliptical orbit as a result of a malfunction of the Inertial Upper Stage (IUS) injection vehicle. The onboard Reaction Control System (RCS) hyrazine thrusters stabilized the spacecraft following separation from the IUS. Severe damage occurred to both the primary and redundant negative roll thrusters, located near the spacecraft to IUS mating interface, during the separation (at the 180 deg/s tumbling rate) and initialization sequence. In spite of this damage, the onboard RCS provided the necessary impulse to raise the perigee to geosynchronous altitude. Modifications to the attitude control modes were necessary to successfully accomplish the orbit raising without use of negative roll control thrusters and to avoid overheating of other RCS thrusters due to protracted operation (up to 3 hr) at off nominal, worst case duty cycles. The way that the hydrazine fueled RCS provided the impulse to raise TDRS perigee approximately 13,900 km (860 statute miles) to the necessary geosynchronous altitude is investigated. A description of the spacecraft in general and the operation of the two delta V thrusters, in particular, generating an average thrust of 2.7 Nt (0.6 1bf) and consuming a combined total of 363 kg (700 pounds) of hydrazine over 44 hours in 38 separate burns, is also presented.

  11. An unusual case of relay pentobarbital toxicosis in a dog.

    PubMed

    Bischoff, Karyn; Jaeger, Robin; Ebel, Joseph G

    2011-09-01

    Sodium pentobarbital and phenytoin are common constituents of veterinary euthanasia solutions in the United States. Relay, or secondary, barbiturate toxicosis has been reported in carnivorous animals that have fed from the carcasses of euthanized livestock. This case report presents barbiturate toxicosis in a dog. A 2-year-old female spayed Australian shepherd presented comatose 2 h after ingesting an unknown substance on the beach. The material was retrieved from the stomach by gastric lavage and visually identified as fish or other animal tissue. The dog recovered with symptomatic and supportive therapy and was released on the third day of hospitalization. Tissue found on the beach near where the dog walked and a urine sample from the dog were analyzed by gas chromatography/mass spectrometry. Both samples were positive for pentobarbital and phenytoin. The tissue was consistent with mammalian blubber based on gross and histological examination. Three weeks previously, a juvenile humpback whale had stranded on the beach where the dog had ingested the unknown substance. The whale had been euthanized with a barbiturate solution, necropsied, and removed from the beach. It was not definitively determined that the pentobarbital-containing blubber ingested by the dog was from the euthanized whale, but that was the most likely source. Although attempts were made to remove the whale's remains from the beach, practical considerations made complete removal challenging, if not impossible. PMID:21660622

  12. Mars Relay Operations Service (MaROS): A Present Service Preparing for the Future

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.

    2014-01-01

    The Mars Relay Operations Service (MaROS) has been deployed by NASA's Mars Program Office and the Multimission Ground Systems and Services (MGSS) Project into mission operations to aid in the coordination of relay activities at Mars. This live system presents standardized interfaces and a centralized infrastructure to current and future participants in the Mars Relay Network for the purpose of reliably and securely exchanging and storing all relay-related planning and operations data. The initial development of this system leveraged over eight years of experience performing relay operations between the various spacecraft at Mars. Now, four years after its initial deployment, MaROS continues to undergo further refinement to better meet the needs of the Mars Relay Network. The most substantial, recent update was focused on providing capabilities needed by the Mars Science Laboratory project, which landed on Mars in August of 2012. This paper will describe the nature of that update and describe additional features being added to the system to better serve the needs of current and future Mars missions.

  13. Performance Analysis of Amplify-and-Forward Systems with Single Relay Selection in Correlated Environments.

    PubMed

    Van Nguyen, Binh; Kim, Kiseon

    2016-01-01

    In this paper, we consider amplify-and-forward (AnF) cooperative systems under correlated fading environments. We first present a brief overview of existing works on the effect of channel correlations on the system performance. We then focus on our main contribution which is analyzing the outage probability of a multi-AnF-relay system with the best relay selection (BRS) scheme under a condition that two channels of each relay, source-relay and relay-destination channels, are correlated. Using lower and upper bounds on the end-to-end received signal-to-noise ratio (SNR) at the destination, we derive corresponding upper and lower bounds on the system outage probability. We prove that the system can achieve a diversity order (DO) equal to the number of relays. In addition, and importantly, we show that the considered correlation form has a constructive effect on the system performance. In other words, the larger the correlation coefficient, the better system performance. Our analytic results are corroborated by extensive Monte-Carlo simulations. PMID:27626426

  14. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks.

    PubMed

    Nasir, Hina; Javaid, Nadeem; Sher, Muhammad; Qasim, Umar; Khan, Zahoor Ali; Alrajeh, Nabil; Niaz, Iftikhar Azim

    2016-01-01

    This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs); performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE) efficient depth based routing and Enhanced-ACE (E-ACE) are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ). E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment. PMID:27420061

  15. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    PubMed Central

    Nasir, Hina; Javaid, Nadeem; Sher, Muhammad; Qasim, Umar; Khan, Zahoor Ali; Alrajeh, Nabil; Niaz, Iftikhar Azim

    2016-01-01

    This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs); performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE) efficient depth based routing and Enhanced-ACE (E-ACE) are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ). E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment. PMID:27420061

  16. Single-molecule spectroscopy exposes hidden states in an enzymatic electron relay

    PubMed Central

    Grossman, Iris; Yuval Aviram, Haim; Armony, Gad; Horovitz, Amnon; Hofmann, Hagen; Haran, Gilad; Fass, Deborah

    2015-01-01

    The ability to query enzyme molecules individually is transforming our view of catalytic mechanisms. Quiescin sulfhydryl oxidase (QSOX) is a multidomain catalyst of disulfide-bond formation that relays electrons from substrate cysteines through two redox-active sites to molecular oxygen. The chemical steps in electron transfer have been delineated, but the conformational changes accompanying these steps are poorly characterized. Here we use single-molecule Förster resonance energy transfer (smFRET) to probe QSOX conformation in resting and cycling enzyme populations. We report the discovery of unanticipated roles for conformational changes in QSOX beyond mediating electron transfer between redox-active sites. In particular, a state of the enzyme not previously postulated or experimentally detected is shown to gate, via a conformational transition, the entrance into a sub-cycle within an expanded QSOX kinetic scheme. By tightly constraining mechanistic models, smFRET data can reveal the coupling between conformational and chemical transitions in complex enzymatic cycles. PMID:26468675

  17. Fragments of ATP synthase mediate plant perception of insect attack

    PubMed Central

    Schmelz, Eric A.; Carroll, Mark J.; LeClere, Sherry; Phipps, Stephen M.; Meredith, Julia; Chourey, Prem S.; Alborn, Hans T.; Teal, Peter E. A.

    2006-01-01

    Plants can perceive a wide range of biotic attackers and respond with targeted induced defenses. Specificity in plant non-self-recognition occurs either directly by perception of pest-derived elicitors or indirectly through resistance protein recognition of host targets that are inappropriately proteolyzed. Indirect plant perception can occur during interactions with pathogens, yet evidence for analogous events mediating the detection of insect herbivores remains elusive. Here we report indirect perception of herbivory in cowpea (Vigna unguiculata) plants attacked by fall armyworm (Spodoptera frugiperda) larvae. We isolated and identified a disulfide-bridged peptide (+ICDINGVCVDA−), termed inceptin, from S. frugiperda larval oral secretions that promotes cowpea ethylene production at 1 fmol leaf−1 and triggers increases in the defense-related phytohormones salicylic acid and jasmonic acid. Inceptins are proteolytic fragments of chloroplastic ATP synthase γ-subunit regulatory regions that mediate plant perception of herbivory through the induction of volatile, phenylpropanoid, and protease inhibitor defenses. Only S. frugiperda larvae that previously ingested chloroplastic ATP synthase γ-subunit proteins and produced inceptins significantly induced cowpea defenses after herbivory. Digestive fragments of an ancient and essential plant enzyme, inceptin functions as a potent indirect signal initiating specific plant responses to insect attack. PMID:16720701

  18. Moth tails divert bat attack: Evolution of acoustic deflection

    PubMed Central

    Barber, Jesse R.; Leavell, Brian C.; Keener, Adam L.; Breinholt, Jesse W.; Chadwell, Brad A.; McClure, Christopher J. W.; Hill, Geena M.; Kawahara, Akito Y.

    2015-01-01

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator–prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey. PMID:25730869

  19. Analysis of misoperation of the differential current relay applied in a Y-Y-Y-{Delta} transformer

    SciTech Connect

    Wang, F.; Tang, J.

    1995-09-01

    Transformers play an important role in power transmission and distribution systems. For the operation of transformers, the differential current relay is the most important kind of relay in transformer protective relays in present power system.s In principle, a differential current relay may safely and quickly remove the internal fault occurring inside a transformer and in the feeder between the transformer and the busbar within the range of protection. When an external fault happens outside of the transformer, the relay should be reliably locked to ensure that the protected transformer can normally operate. However, because transformers have many different structures and winding connections forms, especially some specially winding-connected transformers, misconnection of the differential current relay may happen in some circumstances. When an external fault occurs, the relay connected in the incorrect way may cause misoperation of the relay, enlarging the range of the system fault. This paper illustrates a misoperation of a set of differential relays applied in a special multi-winding transformer, with triple-Y-connected windings and an additional delta-connected winding, due to the misconnection of the relays in field. An analysis of the difference of the equivalent circuits between the triple-Y-connected winding transformer and the triple-Y-connected winding with an additional delta-connected winding transformer is presented. Some measures to prevent those mistakes are discussed in this paper.

  20. Transient ischemic attack as a medical emergency.

    PubMed

    Okada, Yasushi

    2014-01-01

    Since transient ischemic attack (TIA) is regarded as a medical emergency with high risk for early stroke recurrence, the underlying mechanisms should be immediately clarified to conclude a definitive diagnosis and provide early treatment. Early risk stratification using ABCD(2) scores can predict the risk of ischemic stroke occurring after TIA. Carotid ultrasonography (US) can evaluate the degree of stenosis, plaque properties and flow velocity of ICA lesions. High-risk mobile plaques can be classified by carotid US, and aortogenic sources of emboli can be detected by transesophageal echocardiography. Cardiac monitoring and blood findings are thought to play a key role in a diagnosis of cardioembolic TIA. Diffusion-weighted imaging (DWI)-MRI and MR angiography are also indispensable to understand the mechanism of TIA and cerebral circulation. To prevent subsequent stroke arising from TIA, antiplatelet and anticoagulant therapies should be started immediately along with comprehensive management of life-style, hypertension, diabetes mellitus, dyslipidemia and other atherosclerotic diseases. Carotid endarterectomy and endovascular intervention are critical for treating symptomatic patients with significant stenosis of ICA. A novel concept of acute cerebrovascular syndrome (ACVS) has recently been advocated to increase awareness of TIA among citizens, patients and medical professionals. TIA should be recognized as the last opportunity to avoid irreversible ischemic stroke and its sequelae. The clinical relevance of the new concept of ACVS is advocated by early recurrence after TIA, analysis of high-risk TIA, treatment strategies and the optimal management of TIA. Raising TIA awareness should also proceed across many population sectors. PMID:24157554

  1. Anti-spoofing for display and print attacks on palmprint verification systems

    NASA Astrophysics Data System (ADS)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  2. Consensus-Based Cooperative Spectrum Sensing with Improved Robustness Against SSDF Attacks

    NASA Astrophysics Data System (ADS)

    Liu, Quan; Gao, Jun; Guo, Yunwei; Liu, Siyang

    2011-05-01

    Based on the consensus algorithm, an attack-proof cooperative spectrum sensing (CSS) scheme is presented for decentralized cognitive radio networks (CRNs), where a common fusion center is not available and some malicious users may launch attacks with spectrum sensing data falsification (SSDF). Local energy detection is firstly performed by each secondary user (SU), and then, utilizing the consensus notions, each SU can make its own decision individually only by local information exchange with its neighbors rather than any centralized fusion used in most existing schemes. With the help of some anti-attack tricks, each authentic SU can generally identify and exclude those malicious reports during the interactions within the neighborhood. Compared with the existing solutions, the proposed scheme is proved to have much better robustness against three categories of SSDF attack, without requiring any a priori knowledge of the whole network.

  3. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    PubMed Central

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  4. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    PubMed

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. PMID:22319316

  5. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  6. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  7. Individual triptan selection in migraine attack therapy.

    PubMed

    Belvís, Robert; Pagonabarraga, Javier; Kulisevsky, Jaime

    2009-01-01

    About 6% of men and 18% of women suffer migraine attacks. Migraine can induce a great impact in the quality of life of the patient and the costs of medical care and lost productivity can be also high. There are two therapeutic approaches in the treatment of migraine: preventive therapy and acute treatment of migraine attack. Immediate treatment with selective serotonin [5-HT1B/1T] receptor agonists (so-called triptans) is the first-line option in the acute treatment of moderate-severe migraine attacks. The introduction in early nineties of triptans was a revolution in migraine therapy and evidences about their efficacy are at present irrefutable. At the moment, there are seven marketed molecules: sumatriptan, rizatriptan, zolmitriptan, eletriptan, naratriptan, almotriptan and frovatriptan. Obviously, every molecule has different pharmacokinetic and pharmacodinamic properties and, moreover, some triptans have several formulations: tablets, dissolvable tablets, nasal and injections. The prescription of one of these seven triptans for a specified patient is based in the drug profile: efficacy, safety, pharmacokinetics and pharmacodynamics. Despite there are a lot of published studies using triptans, no clinical trial has analyzed all the molecules at the same time. Other data to take account in the final prescription are clinical characteristics of the migraine attack and patient characteristics: labour aspects, style of life and the patient medical history. We present a state-of-the-art of the triptan selection in treatment of moderate-severe migraine attacks. PMID:19149716

  8. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  9. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  10. Relay cropping for improved air and water quality.

    PubMed

    Schepers, James S; Francis, Dennis D; Shanahan, John F

    2005-01-01

    Using plants to extract excess nitrate from soil is important in protecting against eutrophication of standing water, hypoxic conditions in lakes and oceans, or elevated nitrate concentrations in domestic water supplies Global climate change issues have raised new concerns about nitrogen (N) management as it relates to crop production even though there may not be an immediate threat to water quality. Carbon dioxide (CO2) emissions are frequently considered the primary cause of global climate change, but under anaerobic conditions, animals can contribute by expelling methane (CH4) as do soil microbes. In terms of the potential for global climate change, CH4 is approximately 25 times more harmful than CO2. This differential effect is minuscule compared to when nitrous oxide (N2O) is released into the atmosphere because it is approximately 300 times more harmful than CO2. N2O losses from soil have been positively correlated with residual N (nitrate, NO3-) concentrations in soil. It stands to reason that phytoremediation via nitrate scavenger crops is one approach to help protect air quality, as well as soil and water quality. Winter wheat was inserted into a seed corn/soybean rotation to utilize soil nitrate and thereby reduce the potential for nitrate leaching and N2O emissions. The net effect of the 2001-2003 relay cropping sequence was to produce three crops in two years, scavenge 130 kg N/ha from the root zone, produce an extra 2 Mg residue/ha, and increase producer profitability by approximately 250 dollars/ha. PMID:15948582

  11. IEEE 802.16J-Relay Fortified Aeromacs Networks; Benefits and Challenges

    NASA Technical Reports Server (NTRS)

    Kamali, Behnam; Apaza, Rafael D.

    2014-01-01

    Aeronautical Mobile Airport Communications System (AeroMACS) is an IEEE 802.16 standard-based (WiMAX) broadband aviation transmission technology, developed to provide safety critical communications coverage for airport surface in support of fixed and mobile ground to ground applications and services. We have previously demonstrated that IEEE 802.16j-amendment-based WiMAX is most feasible for AeroMACS applications. The principal argument in favor of application of IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified WiMAX networks, with virtually no increase in the power requirements. In this article, following introductory remarks on airport surface communications, WiMAX and AeroMACS; the IEEE 802.16j-based WiMAX technology and multihop relay systems are briefly described. The two modes of relay operation supported by IEEE 802.16j amendment; i.e., transparent (TRS) and non-transparent (NTRS) modes, are discussed in some detail. Advantages and disadvantages of using TRS and NTRS in AeroMACS networks are summarized in a table. Practical issues vis--vis the inclusion of relays in AeroMACS networks are addressed. It is argued that the selection of relay type may affect a number of network parameters. A discussion on specific benefits and challenges of inclusion of relays in AeroMACS networks is provided. The article concludes that in case it is desired or necessary to exclusively employ one type of relay mode for all applications throughout an AeroMACS network, the proper selection would be the non-transparent mode.

  12. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  13. Responding to chemical attack. Final report

    SciTech Connect

    Bagley, R.W.

    1991-02-11

    In view of Iraq's stated intention of using chemical weapons in the Persian Gulf War, the Coalition forces must be prepared to respond. Iraq is capable of conducting such an attack. While the use of chemical weapons may not be militarily significant, the political effect of the use and the response to it may be very significant. Responses including the use of chemical and nuclear weapons are assessed in terms of their legality, political cost, and military effectiveness and found unacceptable. Reliance on diplomatic protests and on post-war criminal sanctions are judged ineffective. A response in the form of increased conventional attack on the Iraqi chemical infrastructure is recommended because that response will preserve the present Coalition, effectively counter the chemical attack, contribute to regional stability, and enhance the reputation of the United States for lawfulness and dependability.

  14. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey V.; Havlin, Shlomo; Stanley, H. Eugene

    2011-06-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  15. Robustness of interdependent networks under targeted attack

    NASA Astrophysics Data System (ADS)

    Huang, Xuqing; Gao, Jianxi; Buldyrev, Sergey; Havlin, Shlomo; Stanley, H. Eugene

    2012-02-01

    When an initial failure of nodes occurs in interdependent networks, a cascade of failure between the networks occurs. Earlier studies focused on random initial failures. Here we study the robustness of interdependent networks under targeted attack on high or low degree nodes. We introduce a general technique which maps the targeted-attack problem in interdependent networks to the random-attack problem in a transformed pair of interdependent networks. We find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc=0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. The result implies that interdependent networks are difficult to defend by strategies such as protecting the high degree nodes that have been found useful to significantly improve robustness of single networks.

  16. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  17. Counteracting Power Analysis Attacks by Masking

    NASA Astrophysics Data System (ADS)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  18. Attack optimization for unequal moderate forces

    SciTech Connect

    Canavan, G.H.

    1997-06-01

    Attack allocation optimizations produce stability indices for unsymmetrical forces that indicate significant regions of both stability and instability and that have their minimum values roughly when the two sides have equal forces. This note derives combined stability indices for unsymmetrical offensive force configurations. The indices are based on optimal allocations of offensive missiles between vulnerable missiles and value based on the minimization of first strike cost, which is done analytically. Exchanges are modeled probabalistically and their results are converted into first and second strike costs through approximations to the damage to the value target sets held at risk. The stability index is the product of the ratio of first to second strike costs seen by the two sides. Optimal allocations scale directly on the opponent`s vulnerable missiles, inversely on one`s own total weapons, and only logarithmically on the attacker`s damage preference, kill probability, and relative target set. The defender`s allocation scales in a similar manner on the attacker`s parameters. First and second strike magnitudes increase roughly linearly for the side with greater forces and decrease linearly for the side with fewer. Conversely, the first and second strike magnitudes decrease for the side with greater forces and increase for the side with fewer. These trends are derived and discussed analytically. The resulting stability indices exhibit a minimum where the two sides have roughly equal forces. If one side has much larger forces than the other, his costs drop to levels low enough that he is relatively insensitive to whether he strikes first or second. These calculations are performed with the analytic attack allocation appropriate for moderate forces, so some differences could be expected for the largest of the forces considered.

  19. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  20. Airfoil Lift with Changing Angle of Attack

    NASA Technical Reports Server (NTRS)

    Reid, Elliott G

    1927-01-01

    Tests have been made in the atmospheric wind tunnel of the National Advisory Committee for Aeronautics to determine the effects of pitching oscillations upon the lift of an airfoil. It has been found that the lift of an airfoil, while pitching, is usually less than that which would exist at the same angle of attack in the stationary condition, although exceptions may occur when the lift is small or if the angle of attack is being rapidly reduced. It is also shown that the behavior of a pitching airfoil may be qualitatively explained on the basis of accepted aerodynamic theory.