Science.gov

Sample records for efficiency measures securing

  1. No Blanket Security Measures.

    ERIC Educational Resources Information Center

    Leisner, Hava

    2001-01-01

    Presents a discussion with Jefferson County, Colorado, Architect Jack Swanzy, who explains how security is implemented in his 148-school district in the aftermath of the Columbine tragedy. Discusses the use of key management, videotapes, on-site police, and staff emergency communications. (GR)

  2. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-03-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  3. Efficient Controlled Quantum Secure Direct Communication Protocols

    NASA Astrophysics Data System (ADS)

    Patwardhan, Siddharth; Moulick, Subhayan Roy; Panigrahi, Prasanta K.

    2016-07-01

    We study controlled quantum secure direct communication (CQSDC), a cryptographic scheme where a sender can send a secret bit-string to an intended recipient, without any secure classical channel, who can obtain the complete bit-string only with the permission of a controller. We report an efficient protocol to realize CQSDC using Cluster state and then go on to construct a (2-3)-CQSDC using Brown state, where a coalition of any two of the three controllers is required to retrieve the complete message. We argue both protocols to be unconditionally secure and analyze the efficiency of the protocols to show it to outperform the existing schemes while maintaining the same security specifications.

  4. Photoreceiver efficiency measurements

    NASA Technical Reports Server (NTRS)

    Lehr, C. G.

    1975-01-01

    The efficiency and other related parameters of Smithsonian Astrophysical Observatory's four laser receivers were measured at the observing stations by oscilloscope photography. If the efficiency is defined as the number of photoelectrons generated by the photomultiplier tube divided by the number of photons entering the aperture of the receiver, its measured value is about 1% for the laser wavelength of 694 nm. This value is consistent with the efficiency computed from the specified characteristics of the photoreceiver's optical components.

  5. Towards Efficient Collaboration in Cyber Security

    SciTech Connect

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  6. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  7. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  8. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  9. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  10. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  11. A New Method for Creating Efficient Security Policies in Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  12. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  13. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  14. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  15. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security...) Protect sensitive security areas within the facility; (6) Protect security and surveillance equipment...

  16. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  17. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  18. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  19. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  20. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for restricted... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  1. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. PMID:25487829

  2. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. PMID:25407084

  3. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for restricted areas. 105.260 Section 105.260 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.260 Security measures for restricted areas. (a)...

  4. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures for monitoring. (a) General. (1) The vessel owner or operator must ensure the implementation of security...

  5. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures for monitoring. (a) General. (1) The vessel owner or operator must ensure the implementation of security...

  6. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures for monitoring. (a) General. (1) The vessel owner or operator must ensure the implementation of security...

  7. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures for monitoring. (a) General. (1) The vessel owner or operator must ensure the implementation of security...

  8. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.285 Security measures for monitoring. (a) General. (1) The vessel owner or operator must ensure the implementation of security...

  9. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  10. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of...

  11. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of...

  12. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of...

  13. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of...

  14. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of...

  15. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  16. National Residential Efficiency Measures Database

    DOE Data Explorer

    The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

  17. Energy efficient lighting and security; Are they compatible

    SciTech Connect

    Tucker, R.A. )

    1992-01-01

    This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.

  18. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  19. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  20. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  1. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  2. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  3. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute...

  4. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  5. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  6. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  7. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a) General... 49 CFR 1572.19(f); (ii) The individual can present another identification credential that meets...

  8. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  9. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  10. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  11. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  12. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  13. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  14. GENERAL: Efficient quantum secure communication with a publicly known key

    NASA Astrophysics Data System (ADS)

    Li, Chun-Yan; Li, Xi-Han; Deng, Fu-Guo; Zhou, Hong-Yu

    2008-07-01

    This paper presents a simple way for an eavesdropper to eavesdrop freely the secret message in the experimental realization of quantum communication protocol proposed by Beige et al (2002 Acta Phys. Pol. A 101 357). Moreover, it introduces an efficient quantum secure communication protocol based on a publicly known key with decoy photons and two biased bases by modifying the original protocol. The total efficiency of this new protocol is double that of the original one. With a low noise quantum channel, this protocol can be used for transmitting a secret message. At present, this protocol is good for generating a private key efficiently.

  15. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  16. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  17. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  18. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  19. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  20. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  1. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  2. Efficient and provable secure pairing-free security-mediated identity-based identification schemes.

    PubMed

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C-W

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  3. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  4. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  5. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side. PMID:26729130

  6. Detecting measurement outliers: remeasure efficiently

    NASA Astrophysics Data System (ADS)

    Ullrich, Albrecht

    2010-09-01

    Shrinking structures, advanced optical proximity correction (OPC) and complex measurement strategies continually challenge critical dimension (CD) metrology tools and recipe creation processes. One important quality ensuring task is the control of measurement outlier behavior. Outliers could trigger false positive alarm for specification violations impacting cycle time or potentially yield. Constant high level of outliers not only deteriorates cycle time but also puts unnecessary stress on tool operators leading eventually to human errors. At tool level the sources of outliers are natural variations (e.g. beam current etc.), drifts, contrast conditions, focus determination or pattern recognition issues, etc. Some of these can result from suboptimal or even wrong recipe settings, like focus position or measurement box size. Such outliers, created by an automatic recipe creation process faced with more complicated structures, would manifest itself rather as systematic variation of measurements than the one caused by 'pure' tool variation. I analyzed several statistical methods to detect outliers. These range from classical outlier tests for extrema, robust metrics like interquartile range (IQR) to methods evaluating the distribution of different populations of measurement sites, like the Cochran test. The latter suits especially the detection of systematic effects. The next level of outlier detection entwines additional information about the mask and the manufacturing process with the measurement results. The methods were reviewed for measured variations assumed to be normally distributed with zero mean but also for the presence of a statistically significant spatial process signature. I arrive at the conclusion that intelligent outlier detection can influence the efficiency and cycle time of CD metrology greatly. In combination with process information like target, typical platform variation and signature, one can tailor the detection to the needs of the photomask

  7. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  8. Planned Efficiency Measurements of STIRAP

    NASA Astrophysics Data System (ADS)

    Zakharov, Vladislav; McKenna, Casey; Yuan, Deqian; Gasparik, Jessica; Metcalf, Harold

    2015-05-01

    Our measurements of the absolute efficiency of using STIRAP to populate Rydberg states of He have been limited by the Doppler detuning associated with the divergence of the atomic beam that crosses perpendicular to our laser beams. The limitation is exacerbated when both laser beams co-propagate, compounding these Doppler shifts. We plan to have them counter-propagate and thereby ameliorate this effect. He 23S atoms in a LN2 temperature thermal beam are coupled to the 33P state by λ = 389 nm light (blue), and that state is coupled to Rydberg states by ~ 800 nm (red) light. The anti-parallel laser beams are arranged so that the atoms encounter the red light first (counter-intuitive order for STIRAP) partially overlapping with the blue. We have observed interference among the atomic transitions by varying the light polarization, and are planning further studies concerning these internal atomic interferometry phenomena. Supported by ONR and Dept. of Education GAANN.

  9. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  10. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  11. Efficient arbitrated quantum signature and its proof of security

    NASA Astrophysics Data System (ADS)

    Li, Qin; Li, Chengqing; Long, Dongyang; Chan, Wai Hong; Wang, Changji

    2013-07-01

    In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.

  12. Energy security and end use: efficiency and fuel switching

    SciTech Connect

    Fulkerson, W.; Carlsmith, R.S.

    1984-01-01

    In terms of vulnerability to an oil supply disruption or the probability of another sudden large increase in the price of oil, the United States is much more secure today than it has been in a decade. Two causes are the large improvement in the apparent efficiency of energy use (less energy use per unit of activity) and the switching from oil to other fuels. Most of the oil savings due to efficiency improvements were in the industrial and transportation sectors, whereas most of the oil savings due to fuel switching occurred in the electric utility and building sectors. Despite these remarkable changes much more is possible. Presently, we are far from the economically justifiable limits of fuel use efficiency. Similarly, additional oil savings can occur if the trend away from oil by electric utilities and in buildings continues. There appears to be a significant short-term fuel switching capability especially in the industrial and building sectors, but the amount is uncertain. Much of what has been accomplished to date has been the result of changes which did not require large capital investments. Future progress will be increasingly more expensive as these investments are made. Research to find additional technological options for efficiency improvements has a very large potential economic benefit to the US economy. Given the considerable potential for continued improvements in economically attractive efficiency improvements and fuel switching, the United States and other developed countries should be able to manage the demand side of the international oil market to minimize the chance of future oil shortages or large price fluctuations. The strategy for doing this is to complement market forces with appropriate government policies so that the margin between effective world oil production capacity and oil demand is kept at a stable, safe level.

  13. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  14. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  15. Measuring Academic Efficiency at the School Level.

    ERIC Educational Resources Information Center

    Marzano, Robert J.; Hutchins, C. L.

    In this paper, academic efficiency is operationally defined and a methodology for measuring it at the school level is described. Academic efficiency is defined as the extent to which a school utilizes its time for the academic development of all its students. The measure of academic efficiency must include three elements: time, students, and…

  16. Spectral measurements of photosynthetic efficiency

    Technology Transfer Automated Retrieval System (TEKTRAN)

    The photosynthetic efficiency of plants was examined for plants in two very different canopies, a USDA cornfield having an instrumented flux tower in Beltsville, MD, USA and a coniferous forest in British Columbia, Canada, included in the tower network of the Canadian Carbon Program. Basic field st...

  17. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  18. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... display area of an airport covered by an airport security program under 49 CFR part 1542 in the United... repair station who has successfully undergone a check as described in paragraph (b)(3) of this section... history. The repair station obtains the employee's employment history for the most recent five year...

  19. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  20. Efficient and Secure Fingerprint Verification for Embedded Devices

    NASA Astrophysics Data System (ADS)

    Yang, Shenglin; Sakiyama, Kazuo; Verbauwhede, Ingrid

    2006-12-01

    This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  1. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  2. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

    NASA Astrophysics Data System (ADS)

    Lindell, Yehuda; Pinkas, Benny

    We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secure in the presence of semi-honest adversaries. Security against malicious adversaries can be obtained by applying the compiler of Goldreich, Micali and Wigderson (the "GMW compiler"). However, this approach does not seem to be very practical as it requires using generic zero-knowledge proofs.

  3. 61 FR 25729 - Security Measures; Hellenikon International Airport, Athens, Greece

    Federal Register 2010, 2011, 2012, 2013, 2014

    1996-05-22

    ... Security Measures; Hellenikon International Airport, Athens, Greece Summary The Secretary of Transportation has now determined that Hellenikon International Airport, Athens, Greece, maintains and carries out... that Hellenikon International Airport, Athens, Greece, did not maintain and carry out...

  4. Measuring Transmission Efficiencies Of Mass Spectrometers

    NASA Technical Reports Server (NTRS)

    Srivastava, Santosh K.

    1989-01-01

    Coincidence counts yield absolute efficiencies. System measures mass-dependent transmission efficiencies of mass spectrometers, using coincidence-counting techniques reminiscent of those used for many years in calibration of detectors for subatomic particles. Coincidences between detected ions and electrons producing them counted during operation of mass spectrometer. Under certain assumptions regarding inelastic scattering of electrons, electron/ion-coincidence count is direct measure of transmission efficiency of spectrometer. When fully developed, system compact, portable, and used routinely to calibrate mass spectrometers.

  5. Radiated microwave power transmission system efficiency measurements

    NASA Technical Reports Server (NTRS)

    Dickinson, R. M.; Brown, W. C.

    1975-01-01

    The measured and calculated results from determining the operating efficiencies of a laboratory version of a system for transporting electric power from one point to another via a wireless free space radiated microwave beam are reported. The system's overall end-to-end efficiency as well as intermediated conversion efficiencies were measured. The maximum achieved end-to-end dc-to-ac system efficiency was 54.18% with a probable error of + or - 0.94%. The dc-to-RF conversion efficiency was measured to be 68.87% + or - 1.0% and the RF-to-dc conversion efficiency was 78.67 + or - 1.1%. Under these conditions a dc power of 495.62 + or - 3.57 W was received with a free space transmitter antenna receiver antenna separation of 170.2 cm (67 in).

  6. Collection efficiency measurements for solar cell research

    NASA Technical Reports Server (NTRS)

    Hampton, H. L.; Olsen, L. C.

    1976-01-01

    A system was established for measuring absolute, spectral collection efficiency that is well suited to solar cell research and development. Determination of spectral collection efficiency involves measurements of the incident photon intensity, the device reflection coefficient, and the cell short circuit current. A monochromatic photon flux is obtained with a high intensity Bausch and Lomb monochromator, and an Epply thermopile detector is used to measure incident intensity. Normal incidence reflectivity measurements are achieved with a prism type beam splitter. The experimental approach is discussed, measurements of the reflectivity of evaporated silver films are considered. Collection efficiency measurements of silicon solar cells are presented, and collection efficiency studies of Cu20 solar cells are discussed.

  7. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for delivery of vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.270 Security measures for...

  8. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  10. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  11. A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security

    NASA Astrophysics Data System (ADS)

    Maurer, Ueli; Sjödin, Johan

    Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes based on any weak pseudorandom function (PRF) which can be much more efficiently implemented than PRFs. Damgård and Nielsen (CRYPTO '02) have shown how to construct an efficient symmetric encryption scheme based on any weak PRF that is provably secure against chosen-plaintext attacks. The main ingredient is a range-extension construction for weak PRFs. By using well-known techniques, they also showed how their scheme can be made secure against the stronger chosen-ciphertext attacks.

  12. Chapter 20: Data Center IT Efficiency Measures

    SciTech Connect

    Huang, R.; Masanet, E.

    2015-01-01

    Data centers use about 2% of the electricity in the United States; a typical data center has 100 to 200 times the energy use intensity of a commercial building. Data centers present tremendous opportunities--energy use can be reduced as much as 80% between inefficient and efficient data centers. Data center efficiency measures generally fall into the following categories: power infrastructure (e.g., more efficient uninterruptible power supplies, power distribution units); cooling (e.g., free cooling, variable-speed drives, temperature and humidity set points); airflow management (e.g., hot aisle/cold aisle, containment, grommets); and information technology efficiency (e.g., server virtualization, efficient servers, efficient data storage).

  13. Secure quantum weak oblivious transfer against individual measurements

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-06-01

    In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by , where is the probability with which Alice can guess Bob's choice, and is the probability with which Bob can guess both of Alice's bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both and can be made arbitrarily close to , so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.

  14. Efficient Cryptography for the Next Generation Secure Cloud

    ERIC Educational Resources Information Center

    Kupcu, Alptekin

    2010-01-01

    Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…

  15. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  16. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  17. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  18. Measure Guideline. High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This measure guideline covers installation of high-efficiency gas furnaces, including: when to install a high-efficiency gas furnace as a retrofit measure; how to identify and address risks; and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  19. Measure Guideline: High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This Measure Guideline covers installation of high-efficiency gas furnaces. Topics covered include when to install a high-efficiency gas furnace as a retrofit measure, how to identify and address risks, and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  20. Punishment in School: The Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  1. Securing Biometric Templates Where Similarity Is Measured with Set Intersection

    NASA Astrophysics Data System (ADS)

    Socek, Daniel; Božović, Vladimir; Ćulibrk, Dubravko

    A novel scheme for securing biometric templates of variable size and order is proposed. The proposed scheme is based on a new similarity measure approach, namely the set intersection, which strongly resembles the methodology used in most of the current state-of-the-art biometrics matching systems. The applicability of the new scheme is compared with that of the existing principal schemes, and it is shown that the new scheme has definite advantages over the existing approaches. The proposed scheme is analyzed both in terms of security and performance.

  2. Power Measurement Methods for Energy Efficient Applications

    PubMed Central

    Calandrini, Guilherme; Gardel, Alfredo; Bravo, Ignacio; Revenga, Pedro; Lázaro, José L.; Toledo-Moreo, F. Javier

    2013-01-01

    Energy consumption constraints on computing systems are more important than ever. Maintenance costs for high performance systems are limiting the applicability of processing devices with large dissipation power. New solutions are needed to increase both the computation capability and the power efficiency. Moreover, energy efficient applications should balance performance vs. consumption. Therefore power data of components are important. This work presents the most remarkable alternatives to measure the power consumption of different types of computing systems, describing the advantages and limitations of available power measurement systems. Finally, a methodology is proposed to select the right power consumption measurement system taking into account precision of the measure, scalability and controllability of the acquisition system. PMID:23778191

  3. Accurate Measurement of Organic Solar Cell Efficiency

    SciTech Connect

    Emery, K.; Moriarty, T.

    2008-01-01

    We discuss the measurement and analysis of current vs. voltage (I-V) characteristics of organic and dye-sensitized photovoltaic cells and modules. A brief discussion of the history of photovoltaic efficiency measurements and procedures will be presented. We discuss both the error sources in the measurements and the strategies to minimize their influence. These error sources include the sample area, spectral errors, temperature fluctuations, current and voltage response time, contacting, and degradation during testing. Information that can be extracted from light and dark I-V measurement includes peak power, open-circuit voltage, short-circuit current, series and shunt resistance, diode quality factor, dark current, and photo-current. The quantum efficiency provides information on photo-current nonlinearities, current generation, and recombination mechanisms.

  4. Statistics of Measurements of Automobile Fuel Efficiency

    NASA Astrophysics Data System (ADS)

    Bartlett, Albert A.

    2003-11-01

    In these days, with the growing need to worry about petroleum and the efficiency of our automobiles, there should be an increased interest, especially among physics students, in the miles per gallon (MPG) of cars. There should also be interest in the accuracy of single and multiple measurements of the MPG of a car. These topics are covered here in this report of a series of measurements that span 16 years.

  5. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature. PMID:25634700

  6. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    SciTech Connect

    Greene, David L; Leiby, Paul Newsome

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described in this report has been specifically developed to

  7. A secure and efficiently searchable health information architecture.

    PubMed

    Yasnoff, William A

    2016-06-01

    Patient-centric repositories of health records are an important component of health information infrastructure. However, patient information in a single repository is potentially vulnerable to loss of the entire dataset from a single unauthorized intrusion. A new health record storage architecture, the personal grid, eliminates this risk by separately storing and encrypting each person's record. The tradeoff for this improved security is that a personal grid repository must be sequentially searched since each record must be individually accessed and decrypted. To allow reasonable search times for large numbers of records, parallel processing with hundreds (or even thousands) of on-demand virtual servers (now available in cloud computing environments) is used. Estimated search times for a 10 million record personal grid using 500 servers vary from 7 to 33min depending on the complexity of the query. Since extremely rapid searching is not a critical requirement of health information infrastructure, the personal grid may provide a practical and useful alternative architecture that eliminates the large-scale security vulnerabilities of traditional databases by sacrificing unnecessary searching speed. PMID:27109933

  8. Automated passage control for security, cost efficiency, and convenience

    SciTech Connect

    Smart, D.C.

    1990-01-01

    The purpose of this paper is to describe new methods of passage control through automatic computer processes and electromechanical identity and surveillance devices. It is now possible for a person to be identified with objective certainty by computer without interaction of a guard or duty officer. In addition, the presence of just one person is also confirmed automatically BEFORE passage is allowed into a secured area. There can be no tailgating of intruders during a valid, authorized entry process. The advantage to the facility using this new equipment is improved security through elimination of the subjective decision process of guards who may be right on or who may be off that day. The objective decisions of the automated passage control computers determine a positive identity and passage authority, or else interdicts the passage attempt. There can be no indecision, argument, or waffling about authorization to enter. Each person's Logical Presence is known at all times, and a permanent audit trail is maintained. There is an almost immediate return on investment through the furloughing of expensive guards and inspectors at entry points.

  9. PRODUCTIVITY BENEFITS OF INDUSTRIAL ENERGY EFFICIENCY MEASURES

    EPA Science Inventory

    A journal article by: Ernst Worrell1, John A. Laitner, Michael Ruth, and Hodayah Finman Abstract: We review the relationship between energy efficiency improvement measures and productivity in industry. We review over 70 industrial case studies from widely available published dat...

  10. Managing Complex IT Security Processes with Value Based Measures

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2009-01-01

    Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.

  11. Unconditionally secure bit commitment by transmitting measurement outcomes.

    PubMed

    Kent, Adrian

    2012-09-28

    We propose a new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information. The receiving party sends a number of randomly chosen Bennett-Brassard 1984 (BB84) qubits to the committer at a given point in space-time. The committer carries out measurements in one of the two BB84 bases, depending on the committed bit value, and transmits the outcomes securely at (or near) light speed in opposite directions to remote agents. These agents unveil the bit by returning the outcomes to adjacent agents of the receiver. The protocol's security relies only on simple properties of quantum information and the impossibility of superluminal signalling. PMID:23030073

  12. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  13. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  14. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is...

  15. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is...

  16. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is...

  17. Productivity benefits of industrial energy efficiency measures

    SciTech Connect

    Worrell, Ernst; Laitner, John A.; Michael, Ruth; Finman, Hodayah

    2004-08-30

    We review the relationship between energy efficiency improvement measures and productivity in industry. We review over 70 industrial case studies from widely available published databases, followed by an analysis of the representation of productivity benefits in energy modeling. We propose a method to include productivity benefits in the economic assessment of the potential for energy efficiency improvement. The case-study review suggests that energy efficiency investments can provide a significant boost to overall productivity within industry. If this relationship holds, the description of energy-efficient technologies as opportunities for larger productivity improvements has significant implications for conventional economic assessments. The paper explores the implications this change in perspective on the evaluation of energy-efficient technologies for a study of the iron and steel industry in the US. This examination shows that including productivity benefits explicitly in the modeling parameters would double the cost-effective potential for energy efficiency improvement, compared to an analysis excluding those benefits. We provide suggestions for future research in this important area.

  18. Productivity benefits of industrial energy efficiency measures.

    SciTech Connect

    Worrell, Ernst; Laitner, John A.; Michael, Ruth; Finman, Hodayah

    2004-08-30

    We review the relationship between energy efficiency improvement measures and productivity in industry. We review over 70 industrial case studies from widely available published databases, followed by an analysis of the representation of productivity benefits in energy modeling. We propose a method to include productivity benefits in the economic assessment of the potential for energy efficiency improvement. The case-study review suggests that energy efficiency investments can provide a significant boost to overall productivity within industry. If this relationship holds, the description of energy-efficient technologies as opportunities for larger productivity improvements has significant implications for conventional economic assessments. The paper explores the implications this change in perspective on the evaluation of energy-efficient technologies for a study of the iron and steel industry in the US. This examination shows that including productivity benefits explicitly in the mode ling parameters would double the cost-effective potential for energy efficiency improvement, compared to an analysis excluding those benefits. We provide suggestions for future research in this important area.

  19. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process.

    PubMed

    Yu, Yao-Chang; Hou, Ting-Wei

    2014-05-01

    The frequently used digital signature algorithms, such as RSA and the Digital Signature Algorithm (DSA), lack forward-secure function. The result is that, when private keys are renewed, trustworthiness is lost. In other words, electronic medical records (EMRs) signed by revoked private keys are no longer trusted. This significant security threat stands in the way of EMR adoption. This paper proposes an efficient forward-secure group certificate digital signature scheme that is based on Shamir's (t,n) threshold scheme and Schnorr's digital signature scheme to ensure trustworthiness is maintained when private keys are renewed and to increase the efficiency of EMRs' authentication processes in terms of number of certificates, number of keys, forward-secure ability and searching time. PMID:24652661

  20. [Planning a Health Residence for Prison Security Measures, Tuscany (Italy)].

    PubMed

    Porfido, Eugenio; Colombai, Renato; Scarpa, Franco; Totaro, Michele; Tani, Luca; Baldini, Claudio; Baggiani, Angelo

    2016-01-01

    Health Residences for Prison Security Measures are facilities hosting psychotic persons who have committed crimes and providing them with personalized rehabilitation and treatment plans to promote their reinstatement in society. The aim of this study was to describe the criteria for planning and designing a prison health residence in the Tuscany region (Italy), to be managed by the regional healthcare service, in line with current regulations, with dedicated staff for providing specific treatment plans and programmes. PMID:27510291

  1. Efficient 41Ca measurements for biomedical applications

    NASA Astrophysics Data System (ADS)

    Vockenhuber, C.; Schulze-König, T.; Synal, H.-A.; Aeberli, I.; Zimmermann, M. B.

    2015-10-01

    We present the performance of 41Ca measurements using low-energy Accelerator Mass Spectrometry (AMS) at the 500 kV facility TANDY at ETH Zurich. We optimized the measurement procedure for biomedical applications where reliability and high sample throughput is required. The main challenge for AMS measurements of 41Ca is the interfering stable isobar 41K. We use a simplified sample preparation procedure to produce calcium fluoride (CaF2) and extract calcium tri-fluoride ions (CaF3-) ions to suppress the stable isobar 41K. Although 41K is not completely suppressed we reach 41Ca/40Ca background level in the 10-12 range which is adequate for biomedical studies. With helium as a stripper gas we can use charge state 2+ at high transmission (∼50%). The new measurement procedure with the approximately 10 × improved efficiency and the higher accuracy due to 41K correction allowed us to measure more than 600 samples for a large biomedical study within only a few weeks of measurement time.

  2. Secure transmission of shipper/receiver confirmatory measurements. [Gillaroo Encrypted Secure Communication

    SciTech Connect

    Tisinger, R.M.; Brumfield, T.

    1988-01-01

    Shipper/receiver confirmatory measurements will be performed at Y-12 using equipment designed by Y-12 and the Safeguards Assay Group at Los Alamos. Equipment consists of three stationary NaI(Tl) gamma-ray counter arrays and a Digital Equipment Corporation Micro-11 processor for processing data. In the case of outgoing shipments, the counter data will be incorporated in a shipping file with other necessary documentation and transmitted to the intended recipient. In the case of incoming shipments, this station will receive a similar file from the sending organization. Protection of all data at the S/RD level is required. Transmission of the data files can be made point-to-point over telephone lines with proper encryption. Two commercial devices used in conjunction with a personal computer are being evaluated to provide secure communication endorsed by the National Security Agency (NSA). One device is the Gillaroo from P. E. Systems, Inc., and the other is the STU-III, which is available as a PC board or a standalone unit, whereas the STU-III is a Secure Telephone Unit with an RS-232 port for connection to a computer. In both cases, file encryption is performed in hardware using keys supplied by NSA. The prime advantage of this approach is a simplicity. Aside from key management, the whole operation can be automatically controlled by command files on the computer without involving additional interfaces with secure networks or mail systems. Additional benefits are rapid response, immediate confirmation of receipt of message, a communication channel independent of the shipment itself, and low cost.

  3. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  4. An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme

    PubMed Central

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters’ identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters. PMID:25238418

  5. Implementation and evaluation of an efficient secure computation system using ‘R’ for healthcare statistics

    PubMed Central

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-01-01

    Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677

  6. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    PubMed

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  7. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    PubMed Central

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  8. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is not... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer...

  9. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... accordance with 49 CFR part 1572 by completing the full enrollment process, paying the user fee, and is not... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer...

  10. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  11. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency. PMID:27330910

  12. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    PubMed Central

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  13. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.

    PubMed

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  14. Efficient Video Similarity Measurement and Search

    SciTech Connect

    Cheung, S-C S

    2002-12-19

    The amount of information on the world wide web has grown enormously since its creation in 1990. Duplication of content is inevitable because there is no central management on the web. Studies have shown that many similar versions of the same text documents can be found throughout the web. This redundancy problem is more severe for multimedia content such as web video sequences, as they are often stored in multiple locations and different formats to facilitate downloading and streaming. Similar versions of the same video can also be found, unknown to content creators, when web users modify and republish original content using video editing tools. Identifying similar content can benefit many web applications and content owners. For example, it will reduce the number of similar answers to a web search and identify inappropriate use of copyright content. In this dissertation, they present a system architecture and corresponding algorithms to efficiently measure, search, and organize similar video sequences found on any large database such as the web.

  15. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    NASA Astrophysics Data System (ADS)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  16. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application

    PubMed Central

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747

  17. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application.

    PubMed

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747

  18. Energy-Efficient and Secure S-Box circuit using Symmetric Pass Gate Adiabatic Logic

    SciTech Connect

    Kumar, Dinesh; Mohammad, Azhar; Singh, Vijay; Perumalla, Kalyan S

    2016-01-01

    Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs. Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.

  19. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  20. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting

    2015-01-01

    Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666

  1. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting

    2015-01-01

    Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666

  2. Novel efficient and secure medical data transmission on WiMAX.

    PubMed

    Kumar, Basant; Singh, Harsh Vikram; Singh, S P; Mohan, Anand

    2008-12-01

    This paper discusses an improved technique for bandwidth-efficient and secure transmission of medical records over simulated orthogonal frequency division multiplexing (OFDM)-based Worldwide Interoperability for Microwave Access (WiMAX)/IEEE 802.16 physical layer. Medical data compaction along with security has been achieved by embedding electrocardiogram (ECG) data into Haar wavelet coefficients of an x-ray image that is transmitted over the channel. The compaction ratio and peak signal-to-noise ratio (PSNR) between the transmitted and received x-ray images for visual clinical performance have been evaluated. It is shown that 12.5% data compaction along with true reception of ECG signal can be achieved for channel signal-to-noise ratio (SNR) >or= 9.6 dB while the achieved PSNR was 55.97 dB. The PSNR value is well above the minimum acceptable 35 dB level, making it potentially useful for secure and bandwidth-efficient transmission of clinical records. PMID:19119828

  3. High power and efficiency quantum cascade laser systems for defense and security applications

    NASA Astrophysics Data System (ADS)

    Tsekoun, A.; Lyakh, A.; Maulini, R.; Lane, M.; Macdonald, T.; Go, R.; Patel, C. Kumar N.

    2009-05-01

    Leveraging Pranalytica's fundamental research into high power and high wallplug efficiency QCL devices and high performance/reliability QCL packaging technologies, we developed several models of turn-key QCL systems for security-related applications. Our tabletop high power system produces, at room temperature, more than 2W of nominally collimated continuous wave radiation at 4.6 μm. Our flashlight-size portable illuminator at 4.6 μm produces over 100 mW average power portable illuminator at 9.6 μm produces more than 20 mW, both with runtime of ~10 hrs. These systems are opening the window of QCL acceptance into real-world security and defense applications. At chip level, we have demonstrated 3W of CW power at room temperature from a single, high reflectivity coated chip.

  4. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  5. An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  6. Measuring Charter School Efficiency: An Early Appraisal

    ERIC Educational Resources Information Center

    Carpenter, Dick M., II; Noller, Scott L.

    2010-01-01

    In an era of increased accountability and challenging times for public finance, charter schools built on decentralization, grassroots accountability, and market forces may provide, in the spirit of "educational laboratories," lessons for increasing student achievement more efficiently through diverse and innovative management, organization,…

  7. Measuring efficiency in wholesale electricity markets

    SciTech Connect

    Bowden, Nicholas S.

    2009-06-15

    The mechanisms of the bid-based economic dispatch and market power mitigation algorithms which result in the market clearing price epitomize the complexity of the new regulatory regime. The augmented Lerner Index presented here offers a method to objectively assess the efficiency of the new structure. (author)

  8. Efficient Chlorophyll Fluorescence Measurements of Sugarcane

    Technology Transfer Automated Retrieval System (TEKTRAN)

    As with many crops, chlorophyll fluorescence emission is a promising tool for measuring responses of sugarcane (Saccharum spp.) to biotic and abiotic stresses. Chlorophyll fluorescence can be easily measured using portable fluorometers. However, several factors should be considered in order to op...

  9. Efficient Quantum Secure Direct Communication Using the Orbital Angular Momentum of Single Photons

    NASA Astrophysics Data System (ADS)

    Jian, Zhuo-Ru; Jin, Guang-Sheng; Wang, Tie-Jun

    2016-03-01

    Quantum secure direct communication (QSDC) is to transmit information directly through quantum channels without generating secret keys. The efficiencies of QSDC rely on the capacity of qubits. Exploiting orbital angular momentum of single photons, we proposed a high-capacity one-time pad QSDC protocol. The information is encoded on the Hermite-Gauss mode and transmitted directly on the Laguerre-Gauss mode of the photon pluses. The proposed system provides a high coding space, and the proposed protocol is robust against collective-dephasing channel noise.

  10. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference. PMID:22231147

  11. High accuracy radiation efficiency measurement techniques

    NASA Technical Reports Server (NTRS)

    Kozakoff, D. J.; Schuchardt, J. M.

    1981-01-01

    The relatively large antenna subarrays (tens of meters) to be used in the Solar Power Satellite, and the desire to accurately quantify antenna performance, dictate the requirement for specialized measurement techniques. The error contributors associated with both far-field and near-field antenna measurement concepts were quantified. As a result, instrumentation configurations with measurement accuracy potential were identified. In every case, advances in the state of the art of associated electronics were found to be required. Relative cost trade-offs between a candidate far-field elevated antenna range and near-field facility were also performed.

  12. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  13. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  14. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes. PMID:25750176

  15. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  16. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  17. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  18. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  19. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  20. Security Problems of Scan Design and Accompanying Measures

    NASA Astrophysics Data System (ADS)

    Biasizzo, Anton; Novak, Franc

    2016-05-01

    The paper deals with the security problems of scan design and investigates currently proposed solutions. A solution based on data encryption to protect the data in scan chains is discussed and problems related to the block-based encoding are outlined. Next, security extension for IEEE Std. 1149.1 providing a locking mechanism is analysed. The mechanism prevents unauthorised users to interfere via test bus with the system normal operation. Possible attack scenario is considered and the probabilities of successful attack within a given time interval are calculated for different lengths of the Lock register. The paper concludes with the description of current work focused on improvements the security of the locking mechanism, in particular by using simplified public key infrastructure.

  1. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY... satisfaction of aviation security in an effort to more efficiently manage its security screening performance at.... Information Collection Requirement Title: Aviation Security Customer Satisfaction Performance...

  2. Building America Top Innovations 2012: National Residential Efficiency Measures Database

    SciTech Connect

    none,

    2013-01-01

    This Building America Top Innovations profile describes the DOE-sponsored National Residential Efficiency Measures Database, which contains performance characteristics and cost estimates for nearly 3,000 energy retrofit measures. To date, it is used in four prominent DOE software packages to help optimize energy-efficiency recommendations.

  3. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  4. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  5. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... persons seeking unescorted access to secure areas must present their TWIC for inspection before being allowed unescorted access, in accordance with § 101.514 of this subchapter. Inspection must include: (i)...

  6. Measuring capital market efficiency: Global and local correlations structure

    NASA Astrophysics Data System (ADS)

    Kristoufek, Ladislav; Vosvrda, Miloslav

    2013-01-01

    We introduce a new measure for capital market efficiency. The measure takes into consideration the correlation structure of the returns (long-term and short-term memory) and local herding behavior (fractal dimension). The efficiency measure is taken as a distance from an ideal efficient market situation. The proposed methodology is applied to a portfolio of 41 stock indices. We find that the Japanese NIKKEI is the most efficient market. From a geographical point of view, the more efficient markets are dominated by the European stock indices and the less efficient markets cover mainly Latin America, Asia and Oceania. The inefficiency is mainly driven by a local herding, i.e. a low fractal dimension.

  7. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  8. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  9. Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Wang, L. L.; Ma, W. P.; Shen, D. S.; Wang, M. L.

    2015-10-01

    With single photos in both polarization and spatial-mode degrees of freedom,we present an efficient bidirectional quantum secure direct communication (QSDC) protocol is proposed. The participants' secret messages can be transmitted directly in a quantum channel through performing different local unitary operations, which are chosen by the two participants separately from the Pauli operations and Hadamard operations, on the polarization states and the spatial-mode states of single photons. Each single photon in two degrees of freedom can carry two bits of information. Thus the capacity of quantum communication of our protocol is improved. Moreover, we discuss the security of our QSDC network protocol comprehensively. It is showed that the proposed scheme not only can defend several outsider eavesdropper's attacks but also can remove the drawback of information leakage, which prevents the secret messages being leaked out to other people through the public information. In addition, our protocol is practical since the preparation and the measurement of single photon quantum states in both the polarization and the spatial-mode degrees of freedom are available with current quantum techniques.

  10. Measuring energy efficiency in economics: Shadow value approach

    NASA Astrophysics Data System (ADS)

    Khademvatani, Asgar

    For decades, academic scholars and policy makers have commonly applied a simple average measure, energy intensity, for studying energy efficiency. In contrast, we introduce a distinctive marginal measure called energy shadow value (SV) for modeling energy efficiency drawn on economic theory. This thesis demonstrates energy SV advantages, conceptually and empirically, over the average measure recognizing marginal technical energy efficiency and unveiling allocative energy efficiency (energy SV to energy price). Using a dual profit function, the study illustrates how treating energy as quasi-fixed factor called quasi-fixed approach offers modeling advantages and is appropriate in developing an explicit model for energy efficiency. We address fallacies and misleading results using average measure and demonstrate energy SV advantage in inter- and intra-country energy efficiency comparison. Energy efficiency dynamics and determination of efficient allocation of energy use are shown through factors impacting energy SV: capital, technology, and environmental obligations. To validate the energy SV, we applied a dual restricted cost model using KLEM dataset for the 35 US sectors stretching from 1958 to 2000 and selected a sample of the four sectors. Following the empirical results, predicted wedges between energy price and the SV growth indicate a misallocation of energy use in stone, clay and glass (SCG) and communications (Com) sectors with more evidence in the SCG compared to the Com sector, showing overshoot in energy use relative to optimal paths and cost increases from sub-optimal energy use. The results show that energy productivity is a measure of technical efficiency and is void of information on the economic efficiency of energy use. Decomposing energy SV reveals that energy, capital and technology played key roles in energy SV increases helping to consider and analyze policy implications of energy efficiency improvement. Applying the marginal measure, we also

  11. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  12. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

    PubMed Central

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  13. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks. PMID:23553734

  14. Measuring energy efficiency in the United States` economy: A beginning

    SciTech Connect

    1995-10-01

    Energy efficiency is a vital component of the Nation`s energy strategy. One of the Department of Energy`s missions are to promote energy efficiency to help the Nation manage its energy resources. The ability to define and measure energy efficiency is essential to this objective. In the absence of consistent defensible measures, energy efficiency is a vague, subjective concept that engenders directionless speculation and confusion rather than insightful analysis. The task of defining and measuring energy efficiency and creating statistical measures as descriptors is a daunting one. This publication is not a final product, but is EIA`s first attempt to define and measure energy efficiency in a systematic and robust manner for each of the sectors and the United States economy as a whole. In this process, EIA has relied on discussions, customer reviews, in-house reviews, and seminars that have focused on energy efficiency in each of the sectors. EIA solicits the continued participation of its customers in further refining this work.

  15. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication. PMID

  16. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  17. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students. PMID:25722253

  18. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-26

    ... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY... satisfaction of aviation security in an effort to more efficiently manage airport performance. DATES: Send your...; Aviation Security Customer Satisfaction Performance Measurement Passenger Survey. TSA, with OMB's...

  19. Thermoelectric properties and efficiency measurements under large temperature differences.

    PubMed

    Muto, A; Kraemer, D; Hao, Q; Ren, Z F; Chen, G

    2009-09-01

    The maximum efficiency of a thermoelectric generator is determined by the material's dimensionless figure of merit ZT. Real thermoelectric material properties are highly temperature dependent and are often measured individually using multiple measurement tools on different samples. As a result, reported ZT values have large uncertainties. In this work we present an experimental technique that eliminates some of these uncertainties. We measure the Seebeck coefficient, electrical conductivity, and thermal conductivity of a single element or leg, as well as the conversion efficiency, under a large temperature difference of 2-160 degrees C. The advantages of this technique include (1) the thermoelectric leg is mounted only once and all measurements are in the same direction and (2) the measured properties are corroborated by efficiency measurements. The directly measured power and efficiency are compared to the values calculated from the measured properties and agree within 0.4% and 2%, respectively. The realistic testing conditions of this technique make it ideal for material characterization prior to implementation in a real thermoelectric generator. PMID:19791947

  20. Atomic teleportation via cavity QED and position measurements: Efficiency analysis

    NASA Astrophysics Data System (ADS)

    Tumminello, M.; Ciccarello, F.

    2008-07-01

    We have recently presented a novel protocol to teleport an unknown atomic state via cavity QED and position measurements. Here, after a brief review of our scheme, we provide a quantitative study of its efficiency. This is accomplished by an explicit description of the measurement process that allows us to derive the fidelity with respect to the atomic internal state to be teleported.

  1. A Framework for Comparative Assessments of Energy Efficiency Policy Measures

    SciTech Connect

    Blum, Helcio; Atkinson, Barbara; Lekov, Alex

    2011-05-24

    When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

  2. A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

    NASA Astrophysics Data System (ADS)

    Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu

    2014-07-01

    Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.

  3. Alternate measures of replacement rates for social security benefits and retirement income.

    PubMed

    Biggs, Andrew G; Springstead, Glenn R

    2008-01-01

    Discussions of retirement planning and Social Security policy often focus on replacement rates, which represent retirement income or Social Security benefits relative to preretirement earnings. Replacement rates are a rule of thumb designed to simplify the process of smoothing consumption over individuals' lifetimes. Despite their widespread use, however, there is no common means of measuring replacement rates. Various measures of preretirement earnings mean that the denominators used in replacement rate calculations are often inconsistent and can lead to confusion. Whether a given replacement rate represents an adequate retirement income depends on whether the denominator in the replacement rate calculation is an appropriate measure of preretirement earnings. This article illustrates replacement rates using four measures of preretirement earnings: final earnings; the constant income payable from the present value (PV) of lifetime earnings (PV payment); the wage-indexed average of all earnings prior to claiming Social Security benefits; and the inflation-adjusted average of all earnings prior to claiming Social Security benefits (consumer price index (CPI) average). The article then measures replacement rates against a sample of the Social Security beneficiary population using the Social Security Administration's Modeling Income in the Near Term (MINT) microsimulation model. Replacement rates are shown based on Social Security benefits alone, to indicate the adequacy of the current benefit structure, as well as on total retirement income including defined benefit pensions and financial assets, to indicate total preparedness for retirement. The results show that replacement rates can vary considerably based on the definition of preretirement earnings used and whether replacement rates are measured on an individual or a shared basis. For current new retirees, replacement rates based on all sources of retirement income seem strong by most measures and are projected to

  4. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-06-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  5. Secure and efficient health data management through multiple watermarking on medical images.

    PubMed

    Giakoumaki, A; Pavlopoulos, S; Koutsouris, D

    2006-08-01

    The landscape of healthcare delivery and medical data management has significantly changed over the last years, as a result of the significant advancements in information and communication technologies. Complementary and/or alternative solutions are needed to meet the new challenges, especially regarding security of the widely distributed sensitive medical information. Digital watermarking is a recently established research area with many applications; nevertheless, the potential of this technology to contribute value-added services to medical information management systems has only recently started to be realized by the research community. The paper presents a review of research efforts in the area of medical-oriented watermarking and proposes a wavelet-based multiple watermarking scheme; this scheme aims to address critical health information management issues, including origin and data authentication, protection of sensitive data, and image archiving and retrieval. In accordance with the strict limitations applying to medical images, the scheme allows the definition of a region of interest (ROI) whose diagnostic value is protected, since the only additional information embedded therein aims at integrity control. The robustness of the method is enhanced through a form of hybrid coding, which includes repetitive embedding of BCH encoded watermarks. The experimental results on different medical imaging modalities demonstrate the efficiency and transparency of the watermarking scheme. PMID:16937204

  6. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    NASA Astrophysics Data System (ADS)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2015-07-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  7. Implementation and Rejection of Industrial Steam System Energy Efficiency Measures

    SciTech Connect

    Therkelesen, Peter; McKane, Aimee

    2013-05-01

    Steam systems consume approximately one third of energy applied at U.S. industrial facilities. To reduce energy consumption, steam system energy assessments have been conducted on a wide range of industry types over the course of five years through the Energy Savings Assessment (ESA) program administered by the U.S. Department of Energy (U.S. DOE). ESA energy assessments result in energy efficiency measure recommendations that are given potential energy and energy cost savings and potential implementation cost values. Saving and cost metrics that measure the impact recommended measures will have at facilities, described as percentages of facility baseline energy and energy cost, are developed from ESA data and used in analyses. Developed savings and cost metrics are examined along with implementation and rejection rates of recommended steam system energy efficiency measures. Based on analyses, implementation of steam system energy efficiency measures is driven primarily by cost metrics: payback period and measure implementation cost as a percentage of facility baseline energy cost (implementation cost percentage). Stated reasons for rejecting recommended measures are primarily based upon economic concerns. Additionally, implementation rates of measures are not only functions of savings and cost metrics, but time as well.

  8. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  9. Infrared measurements of a scramjet exhaust. [to determine combustion efficiency

    NASA Technical Reports Server (NTRS)

    Reed, R. A.; Slack, M. W.

    1980-01-01

    Diagnostic 2 - 5 mm infrared spectra of a hydrogen burning scramjet exhaust were measured with an interferometer spectrometer. Exhaust gas temperatures and water vapor partial pressures were determined from the observed intensity and spectral profile of the H2O 2.7 mm infrared emission band. Overall engine combustion efficiencies were derived by combining these measurements with the known engine operating conditions. Efficiencies fall (70 - 50 percent) as fuel equivalence ratios rise (0.4 - 1.0). Data analysis techniques and sensitivity studies are also presented.

  10. Improved Methods for Identifying, Applying, and Verifying Industrial Energy Efficiency Measures

    NASA Astrophysics Data System (ADS)

    Harding, Andrew Chase

    Energy efficiency is the least expensive source of additional energy capacity for today's global energy expansion. Energy efficiency offers additional benefits of cost savings for consumers, reduced environmental impacts, and enhanced energy security. The challenges of energy efficiency include identifying potential efficiency measures, quantifying savings, determining cost effectiveness, and verifying savings of installed measures. This thesis presents three separate chapters which address these challenges. The first is a paper presented at the 2014 industrial energy technology conference (IETC) that details a compressed air system project using the systems approach to identify cost effective measures, energy intensity to project savings, and proper measurement and verification (M&V) practices to prove that the savings were achieved. The second is a discussion of proper M&V techniques, how these apply to international M&V protocols, and how M&V professionals can improve the accuracy and efficacy of their M&V activities. The third is an energy intensity analysis of a poultry processing facility at a unit operations level, which details the M&V practices used to determine the intensities at each unit operation and compares these to previous works.

  11. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  12. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... individual has reported the TWIC as lost, damaged, or stolen to TSA as required in 49 CFR 1572.19(f); (ii... control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND... measures for access control. (a) General. The facility owner or operator must ensure the implementation...

  13. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  14. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-21

    ... January 8, 1999 (see 64 FR 2935). Dated: May 17, 2010. C.S. Eliot Kang, Acting Assistant Secretary of... of International Security and Nonproliferation; Lifting of Nonproliferation Measures Against Two... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION...

  15. Efficient Measurement of Multiparticle Entanglement with Embedding Quantum Simulator.

    PubMed

    Chen, Ming-Cheng; Wu, Dian; Su, Zu-En; Cai, Xin-Dong; Wang, Xi-Lin; Yang, Tao; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2016-02-19

    The quantum measurement of entanglement is a demanding task in the field of quantum information. Here, we report the direct and scalable measurement of multiparticle entanglement with embedding photonic quantum simulators. In this embedding framework [R. Di Candia et al. Phys. Rev. Lett. 111, 240502 (2013)], the N-qubit entanglement, which does not associate with a physical observable directly, can be efficiently measured with only two (for even N) and six (for odd N) local measurement settings. Our experiment uses multiphoton quantum simulators to mimic dynamical concurrence and three-tangle entangled systems and to track their entanglement evolutions. PMID:26943520

  16. Measurements of light absorption efficiency in InSb nanowires

    PubMed Central

    Jurgilaitis, A.; Enquist, H.; Harb, M.; Dick, K. A.; Borg, B. M.; Nüske, R.; Wernersson, L.-E.; Larsson, J.

    2013-01-01

    We report on measurements of the light absorption efficiency of InSb nanowires. The absorbed 70 fs light pulse generates carriers, which equilibrate with the lattice via electron-phonon coupling. The increase in lattice temperature is manifested as a strain that can be measured with X-ray diffraction. The diffracted X-ray signal from the excited sample was measured using a streak camera. The amount of absorbed light was deduced by comparing X-ray diffraction measurements with simulations. It was found that 3.0(6)% of the radiation incident on the sample was absorbed by the nanowires, which cover 2.5% of the sample. PMID:26913673

  17. Measuring industrial energy efficiency: Physical volume versus economic value

    SciTech Connect

    Freeman, S.L.; Niefer, M.J.; Roop, J.M.

    1996-12-01

    This report examines several different measures of industrial output for use in constructing estimates of industrial energy efficiency and discusses some reasons for differences between the measures. Estimates of volume-based measures of output, as well as 3 value-based measures of output (value of production, value of shipments, and value added), are evaluated for 15 separate 4-digit industries. Volatility, simple growth rate, and trend growth rate estimates are made for each industry and each measure of output. Correlations are made between the volume- and value-based measures of output. Historical energy use data are collected for 5 of the industries for making energy- intensity estimates. Growth rates in energy use, energy intensity, and correlations between volume- and value-based measures of energy intensity are computed. There is large variability in growth trend estimates both long term and from year to year. While there is a high correlation between volume- and value-based measures of output for a few industries, typically the correlation is low, and this is exacerbated for estimates of energy intensity. Analysis revealed reasons for these low correlations. It appears that substantial work must be done before reliable measures of trends in the energy efficiency of industry can be accurately characterized.

  18. Using reflectance measurements to determine light use efficiency in corn

    Technology Transfer Automated Retrieval System (TEKTRAN)

    This study examines the ability of narrow band vegetation indexes to detect spectral changes associated with stress and relate them to light use efficiency (LUE) over the course of a day as well as through the growing season. In a corn field in Beltsville, MD, carbon flux measurements were made at a...

  19. Efficiency Measurement Using a Motor-Dynamo Module

    ERIC Educational Resources Information Center

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-01-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction. (Contains 1 table and 8 figures.)

  20. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    ERIC Educational Resources Information Center

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  1. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  2. Improving crop productivity and resource use efficiency to ensure food security and environmental quality in China.

    PubMed

    Fan, Mingsheng; Shen, Jianbo; Yuan, Lixing; Jiang, Rongfeng; Chen, Xinping; Davies, William J; Zhang, Fusuo

    2012-01-01

    In recent years, agricultural growth in China has accelerated remarkably, but most of this growth has been driven by increased yield per unit area rather than by expansion of the cultivated area. Looking towards 2030, to meet the demand for grain and to feed a growing population on the available arable land, it is suggested that annual crop production should be increased to around 580 Mt and that yield should increase by at least 2% annually. Crop production will become more difficult with climate change, resource scarcity (e.g. land, water, energy, and nutrients) and environmental degradation (e.g. declining soil quality, increased greenhouse gas emissions, and surface water eutrophication). To pursue the fastest and most practical route to improved yield, the near-term strategy is application and extension of existing agricultural technologies. This would lead to substantial improvement in crop and soil management practices, which are currently suboptimal. Two pivotal components are required if we are to follow new trajectories. First, the disciplines of soil management and agronomy need to be given increased emphasis in research and teaching, as part of a grand food security challenge. Second, continued genetic improvement in crop varieties will be vital. However, our view is that the biggest gains from improved technology will come most immediately from combinations of improved crops and improved agronomical practices. The objectives of this paper are to summarize the historical trend of crop production in China and to examine the main constraints to the further increase of crop productivity. The paper provides a perspective on the challenge faced by science and technology in agriculture which must be met both in terms of increased crop productivity but also in increased resource use efficiency and the protection of environmental quality. PMID:21963614

  3. Measuring efficiency of rice growing farmers using data envelopment analysis

    NASA Astrophysics Data System (ADS)

    Zaibidi, Nerda Zura; Kasim, Maznah Mat; Ramli, Razamin; Baten, Md. Azizul; Khan, Sahubar Ali Nadhar

    2015-12-01

    Self-sufficiency in rice production has been the main issue in Malaysia agriculture. It is significantly low and does not comply with the current average rice yield of 3.7 tons per ha per season. One of the best options and the most effective way to improve rice productivity is through more efficient utilization of paddy farmers. Getting farmers to grow rice is indeed a challenge when they could very well be making better money doing something else. This paper attempts to study the efficiency of rice growing farmers in Kubang Pasu using Data Envelopment Analysis model. For comparative analysis, three scenarios are considered in this study in measuring efficiency of rice growing farmers. The first scenario considers only fertilizer factor as an input while for the second, the land size is added as another factor. The third scenario considers more details about the inputs such as the type of fertilizer, NPK and mixed and also land tenureship and size. In all scenarios, the outputs are rice yield (tons) and the profit (RM). As expected, the findings show that the third scenario establishes the highest number of efficient rice growing farmers. It reveals that the combination of outputs and inputs chosen has significant contribution in measuring efficiency of rice growing farmers.

  4. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  5. Cryptographically secure hardware random number generator dedicated for distributed measurement and control systems

    NASA Astrophysics Data System (ADS)

    Czernik, Pawel

    The chaotic signal generator based on the theory of nonlinear dynamical systems for applications in cryptographically secure distributed measurement and control systems with asymmetric resources is presented. This system was implemented on the basis of the physical chaotic electronic vibration generator in which the resonant circuit is composed of two capacitors, two resistors, coil and transistor, called the Colpitts oscillator. The presented system was designed, programmed and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. True cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results will be here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  6. Efficient visible through SWIR focal plane MTF measurement

    NASA Astrophysics Data System (ADS)

    Malone, Neil; Fierro, Josh; Troup, Richard; Willberger, Gary; Wyles, Jessica; Boe, Raymond; Dixon, Andrew

    2015-09-01

    Raytheon Vision Systems (RVS) has developed an efficient method to measure MTF on Visible through MWIR small pixel FPAs. The measured data was obtained using an advanced but low cost test set with sub μm target projection on the FPA and real time display of the LSF as the slit is walked through focus. The test set is commercially procured, maintained and calibrated, provides target and filter holders and a light source. The analysis summary includes references from simplified MTF published analysis tools and a list of artifacts to be aware of when measuring MTF. The SWIR and MWIR detectors have a Mesa structure geometry for improved MTF performance and the Visible has state of the art crosstalk control to provide excellent MTF performance. The modeled data is compared to measured tilted slit MTF measured data and shows close agreement.

  7. Efficient measurement-device-independent detection of multipartite entanglement structure

    NASA Astrophysics Data System (ADS)

    Zhao, Qi; Yuan, Xiao; Ma, Xiongfeng

    2016-07-01

    Witnessing entanglement is crucial in quantum information processing. With properly preparing ancillary states, it has been shown previously that genuine entanglement can be witnessed without trusting measurement devices. In this work we generalize the scenario and show that generic multipartite entanglement structures, including entanglement of subsystems and entanglement depth, can be witnessed via measurement-device-independent means. As the original measurement-device-independent entanglement witness scheme exploits only one out of four Bell measurement outcomes for each party, a direct generalization to multipartite quantum states will inevitably cause inefficiency in entanglement detection after taking account of statistical fluctuations. To resolve this problem, we also present a way to utilize all the measurement outcomes. The scheme is efficient for multipartite entanglement detection and can be realized with state-of-the-art technologies.

  8. Measurement and simulation of thermoelectric efficiency for single leg.

    PubMed

    Hu, Xiaokai; Yamamoto, Atsushi; Ohta, Michihiro; Nishiate, Hirotaka

    2015-04-01

    Thermoelectric efficiency measurements were carried out on n-type bismuth telluride legs with the hot-side temperature at 100 and 150°C. The electric power and heat flow were measured individually. Water coolant was utilized to maintain the cold-side temperature and to measure heat flow out of the cold side. Leg length and vacuum pressure were studied in terms of temperature difference across the leg, open-circuit voltage, internal resistance, and heat flow. Finite-element simulation on thermoelectric generation was performed in COMSOL Multiphysics, by inputting two-side temperatures and thermoelectric material properties. The open-circuit voltage and resistance were in good agreement between the measurement and simulation. Much larger heat flows were found in measurements, since they were comprised of conductive, convective, and radiative contributions. Parasitic heat flow was measured in the absence of bismuth telluride leg, and the conductive heat flow was then available. Finally, the maximum thermoelectric efficiency was derived in accordance with the electric power and the conductive heat flow. PMID:25933893

  9. Measurement and simulation of thermoelectric efficiency for single leg

    SciTech Connect

    Hu, Xiaokai; Yamamoto, Atsushi Ohta, Michihiro; Nishiate, Hirotaka

    2015-04-15

    Thermoelectric efficiency measurements were carried out on n-type bismuth telluride legs with the hot-side temperature at 100 and 150°C. The electric power and heat flow were measured individually. Water coolant was utilized to maintain the cold-side temperature and to measure heat flow out of the cold side. Leg length and vacuum pressure were studied in terms of temperature difference across the leg, open-circuit voltage, internal resistance, and heat flow. Finite-element simulation on thermoelectric generation was performed in COMSOL Multiphysics, by inputting two-side temperatures and thermoelectric material properties. The open-circuit voltage and resistance were in good agreement between the measurement and simulation. Much larger heat flows were found in measurements, since they were comprised of conductive, convective, and radiative contributions. Parasitic heat flow was measured in the absence of bismuth telluride leg, and the conductive heat flow was then available. Finally, the maximum thermoelectric efficiency was derived in accordance with the electric power and the conductive heat flow.

  10. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  11. Measurements of charge state breeding efficiency at BNL test EBIS

    SciTech Connect

    Kondrashev, S.; Alessi, J.; Beebe, E.N.; Dickerson, C.; Ostroumov, P.N.; Pikin, A.; Savard, G.

    2011-04-02

    Charge breeding of singly charged ions is required to efficiently accelerate rare isotope ion beams for nuclear and astrophysics experiments, and to enhance the accuracy of low-energy Penning trap-assisted spectroscopy. An efficient charge breeder for the Californium Rare Isotope Breeder Upgrade (CARIBU) to the ANL Tandem Linear Accelerator System (ATLAS) facility is being developed using the BNL Test Electron Beam Ion Source (Test EBIS) as a prototype. Parameters of the CARIBU EBIS charge breeder are similar to those of the BNL Test EBIS except the electron beam current will be adjustable in the range from 1 to 2 {angstrom}. The electron beam current density in the CARIBU EBIS trap will be significantly higher than in existing operational charge state breeders based on the EBIS concept. The charge state breeding efficiency is expected to be about 25% for the isotope ions extracted from the CARIBU. For the success of our EBIS project, it is essential to demonstrate high breeding efficiency at the BNL Test EBIS tuned to the regime close to the parameters of the CARIBU EBIS at ANL. The breeding efficiency optimization and measurements have been successfully carried out using a Cs{sup +} surface ionization ion source for externally pulsed injection into the BNL Test EBIS. A Cs{sup +} ion beam with a total number of ions of 5 x 10{sup 8} and optimized pulse length of 70 {mu}s has been injected into the Test EBIS and charge-bred for 5.3 ms for two different electron beam currents 1 and 1.5 {angstrom}. In these experiments we have achieved 70% injection/extraction efficiency and breeding efficiency into the most abundant charge state 17%.

  12. Measuring technical efficiency of output quality in intensive care units.

    PubMed

    Junoy, J P

    1997-01-01

    Presents some examples of the implications derived from imposing the objective of maximizing social welfare, subject to limited resources, on ethical care patients management in respect of quality performance of health services. Conventional knowledge of health economics points out that critically ill patients are responsible for increased use of technological resources and that they receive a high proportion of health care resources. Attempts to answer, from the point of view of microeconomics, the question: how do we measure comparative efficiency in the management of intensive care units? Analyses this question through data from an international empirical study using micro-economic measures of productive efficiency in public services (data envelopment analysis). Results show a 28.8 per cent level of technical inefficiency processing data from 25 intensive care units in the USA. PMID:10169231

  13. 78 FR 9769 - Bureau of International Security and Nonproliferation Imposition of Nonproliferation Measures on...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Nonproliferation Measures on Chinese and.... ACTION: Notice. SUMMARY: The U.S. Government has determined that a number of Chinese and Iranian foreign... amended, the U.S. Government determined on December 21, 2012 that the following Chinese and...

  14. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  15. Intelligence and Neural Efficiency: Measures of Brain Activation versus Measures of Functional Connectivity in the Brain

    ERIC Educational Resources Information Center

    Neubauer, Aljoscha C.; Fink, Andreas

    2009-01-01

    The neural efficiency hypothesis of intelligence suggests a more efficient use of the cortex (or even the brain) in brighter as compared to less intelligent individuals. This has been shown in a series of studies employing different neurophysiological measurement methods and a broad range of different cognitive task demands. However, most of the…

  16. Toward the Effective and Efficient Measurement of Implementation Fidelity

    PubMed Central

    Schoenwald, Sonja K.; Garland, Ann F.; Chapman, Jason E.; Frazier, Stacy L.; Sheidow, Ashli J.; Southam-Gerow, Michael A.

    2011-01-01

    Implementation science in mental health is informed by other academic disciplines and industries. Conceptual and methodological territory charted in psychotherapy research is pertinent to two elements of the conceptual model of implementation posited by Aarons and colleagues (2010)—implementation fidelity and innovation feedback systems. Key characteristics of scientifically validated fidelity instruments, and of the feasibility of their use in routine care, are presented. The challenges of ensuring fidelity measurement methods are both effective (scientifically validated) and efficient (feasible and useful in routine care) are identified as are examples of implementation research attempting to balance these attributes of fidelity measurement. PMID:20957425

  17. Extrapolated HPGe efficiency estimates based on a single calibration measurement

    SciTech Connect

    Winn, W.G.

    1994-07-01

    Gamma spectroscopists often must analyze samples with geometries for which their detectors are not calibrated. The effort to experimentally recalibrate a detector for a new geometry can be quite time consuming, causing delay in reporting useful results. Such concerns have motivated development of a method for extrapolating HPGe efficiency estimates from an existing single measured efficiency. Overall, the method provides useful preliminary results for analyses that do not require exceptional accuracy, while reliably bracketing the credible range. The estimated efficiency {element_of} for a uniform sample in a geometry with volume V is extrapolated from the measured {element_of}{sub 0} of the base sample of volume V{sub 0}. Assuming all samples are centered atop the detector for maximum efficiency, {element_of} decreases monotonically as V increases about V{sub 0}, and vice versa. Extrapolation of high and low efficiency estimates {element_of}{sub h} and {element_of}{sub L} provides an average estimate of {element_of} = 1/2 [{element_of}{sub h} + {element_of}{sub L}] {plus_minus} 1/2 [{element_of}{sub h} {minus} {element_of}{sub L}] (general) where an uncertainty D{element_of} = 1/2 ({element_of}{sub h} {minus} {element_of}{sub L}] brackets limits for a maximum possible error. The {element_of}{sub h} and {element_of}{sub L} both diverge from {element_of}{sub 0} as V deviates from V{sub 0}, causing D{element_of} to increase accordingly. The above concepts guided development of both conservative and refined estimates for {element_of}.

  18. Assessing methods to measure motor efficiency in situ

    SciTech Connect

    Douglass, J.; Wohlgemuth, C.; Wainwright, G.

    1997-07-01

    Managing electric motor systems is one of the most important aspects of improving reliability and increasing energy efficiency in the industrial environment. Unfortunately, unknown performance data for existing motors often frustrates good motor systems management intentions. Determining motor efficiency is not easy. Nonetheless, several existing methods and dedicated instruments estimated in-situ efficiency well enough to support economic decisions. The off-voltage conditions did not subvert results as much as the authors have expected. However, performance of the different methods varied by the motor under test, revealing that developers need to tune their designs for better accuracy with older, rewound, and/or damaged motors. For most methods, the best correlation with lab-determined efficiency was for the new energy efficient 300 HP motor. With the diverse veteran motors the methods diverged more, not only from lab efficiency, but also from each other. The most accurate methods were more invasive, requiring shutdown and uncoupling. However, with a structured motor systems management program, these procedures could be accomplished conveniently at different times with the results combined later to compute efficiency. For example, winding resistance could be measured and recorded at the receiving inspection of new and repaired motors. No-load power consumption could be accomplished either at the repair shop or during initial or post-repair installation. Performance under load could be recorded any time the motor is installed and operating at normal load. The authors believe that all methods can benefit from more validation studies with a diversity of typical veteran motors (i.e. other than new, efficient, and healthy motors). Where divergence occurs, case studies should pursue the causes of divergence. Several methods perform well enough that their adoption should be encouraged. However, the need to keep the techniques simple and user friendly for use in the

  19. Two essays on efficiency in the electric power industry: Measurement of technical and allocative efficiency

    NASA Astrophysics Data System (ADS)

    Gardiner, John Corby

    The electric power industry market structure has changed over the last twenty years since the passage of the Public Utility Regulatory Policies Act (PURPA). These changes include the entry by unregulated generator plants and, more recently, the deregulation of entry and price in the retail generation market. Such changes have introduced and expanded competitive forces on the incumbent electric power plants. Proponents of this deregulation argued that the enhanced competition would lead to a more efficient allocation of resources. Previous studies of power plant technical and allocative efficiency have failed to measure technical and allocative efficiency at the plant level. In contrast, this study uses panel data on 35 power plants over 59 years to estimate technical and allocative efficiency of each plant. By using a flexible functional form, which is not constrained by the assumption that regulation is constant over the 59 years sampled, the estimation procedure accounts for changes in both state and national regulatory/energy policies that may have occurred over the sample period. The empirical evidence presented shows that most of the power plants examined have operated more efficiently since the passage of PURPA and the resultant increase of competitive forces. Chapter 2 extends the model used in Chapter 1 and clarifies some issues in the efficiency literature by addressing the case where homogeneity does not hold. A more general model is developed for estimating both input and output inefficiency simultaneously. This approach reveals more information about firm inefficiency than the single estimation approach that has previously been used in the literature. Using the more general model, estimates are provided on the type of inefficiency that occurs as well as the cost of inefficiency by type of inefficiency. In previous studies, the ranking of firms by inefficiency has been difficult because of the cardinal and ordinal differences between different types of

  20. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  1. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  2. Comparison of measured efficiencies of nine turbine designs with efficiencies predicted by two empirical methods

    NASA Technical Reports Server (NTRS)

    English, Robert E; Cavicchi, Richard H

    1951-01-01

    Empirical methods of Ainley and Kochendorfer and Nettles were used to predict performances of nine turbine designs. Measured and predicted performances were compared. Appropriate values of blade-loss parameter were determined for the method of Kochendorfer and Nettles. The measured design-point efficiencies were lower than predicted by as much as 0.09 (Ainley and 0.07 (Kochendorfer and Nettles). For the method of Kochendorfer and Nettles, appropriate values of blade-loss parameter ranged from 0.63 to 0.87 and the off-design performance was accurately predicted.

  3. Compact Efficient Lidar Receiver for Measuring Atmospheric Aerosols

    NASA Technical Reports Server (NTRS)

    Gili, Christopher; De Young, Russell

    2006-01-01

    A small, light weight, and efficient aerosol lidar receiver was constructed and tested. Weight and space savings were realized by using rigid optic tubes and mounting cubes to package the steering optics and detectors in a compact assembly. The receiver had a 1064nm channel using an APD detector. The 532nm channel was split (90/10) into an analog channel (90%) and a photon counting channel (10%). The efficiency of the 1064nm channel with optical filter was 44.0%. The efficiency of the analog 532nm channel was 61.4% with the optical filter, and the efficiency of the 532nm photon counting channel was 7.6% with the optical filter. The results of the atmospheric tests show that the detectors were able to consistently return accurate results. The lidar receiver was able to detect distinct cloud layers, and the lidar returns also agreed across the different detectors. The use of a light weight fiber-coupled telescope reduced weight and allowed great latitude in detector assembly positioning due to the flexibility enabled by the use of fiber optics. The receiver is now ready to be deployed for aircraft or ground based aerosol lidar measurements.

  4. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of U.S. households compared to piecemeal remodeling efforts. In this report, the U.S Department of Energy Building America Retrofit Alliance research team examines the improvement of a home’s energy performance in an opportunistic way by examining what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for energy efficiency upgrades to occur at the same time as remodeling proejcts. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home’s energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  5. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of the households in our nation compared to more piecemeal remodeling efforts. Even when programs like the Weatherization Assistance Program and Home Performance with ENERGY STAR are considered, homes that have had a comprehensive energy makeover still represent a small fraction of the 111.1 million households. In this report, the U.S Department of Energy Building America Retrofit Alliance research team looks at the improvement of a home's energy performance in an opportunistic way: it examines what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for the possibility for people who would not normally pursue energy efficiency but will remodel their kitchen or re-side their home to improve their home's performance at the same time. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home's energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  6. Resource-Efficient Measurement-Device-Independent Entanglement Witness.

    PubMed

    Verbanis, E; Martin, A; Rosset, D; Lim, C C W; Thew, R T; Zbinden, H

    2016-05-13

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections-measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. Here we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW that significantly reduces the experimental complexity. By applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4. PMID:27232009

  7. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    DOE PAGESBeta

    Verbanis, E.; Martin, A.; Rosset, D.; Lim, C. C. W.; Thew, R. T.; Zbinden, H.

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW thatmore » significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.« less

  8. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    NASA Astrophysics Data System (ADS)

    Verbanis, E.; Martin, A.; Rosset, D.; Lim, C. C. W.; Thew, R. T.; Zbinden, H.

    2016-05-01

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. Here we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW that significantly reduces the experimental complexity. By applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.

  9. 40 CFR Appendix A to Subpart Mmmm... - Alternative Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... volatile portion of the coating and the efficiency of the capture system. The organic carbon content of the... 40 Protection of Environment 13 2014-07-01 2014-07-01 false Alternative Capture Efficiency and... Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures for Magnet...

  10. 40 CFR Appendix A to Subpart Mmmm... - Alternative Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... volatile portion of the coating and the efficiency of the capture system. The organic carbon content of the... 40 Protection of Environment 13 2013-07-01 2012-07-01 true Alternative Capture Efficiency and... Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures for Magnet...

  11. 40 CFR Appendix A to Subpart Mmmm... - Alternative Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... volatile portion of the coating and the efficiency of the capture system. The organic carbon content of the... 40 Protection of Environment 13 2012-07-01 2012-07-01 false Alternative Capture Efficiency and... Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures for Magnet...

  12. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  13. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  14. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  15. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  16. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  17. TPV efficiency predictions and measurements for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry affects. The overall efficiency of the TPV device is controlled by the TPV cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4x4 configuration) in a cavity geometry. The first code subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell performance predictions (assuming infinite parallel plates). The second utilizes a Monte Carlo Ray-Tracing code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays are fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  18. TPV efficiency measurements and predictions for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry effects. The overall efficiency of the TPV device is controlled by the TP cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4 x 4 configuration) in a cavity geometry. The first code, subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell electrical output performance predictions (assuming infinite parallel plates). The second code, utilizes a Monte Carlo Photon Transport code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays were fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  19. Measuring efficiency of international crude oil markets: A multifractality approach

    NASA Astrophysics Data System (ADS)

    Niere, H. M.

    2015-01-01

    The three major international crude oil markets are treated as complex systems and their multifractal properties are explored. The study covers daily prices of Brent crude, OPEC reference basket and West Texas Intermediate (WTI) crude from January 2, 2003 to January 2, 2014. A multifractal detrended fluctuation analysis (MFDFA) is employed to extract the generalized Hurst exponents in each of the time series. The generalized Hurst exponent is used to measure the degree of multifractality which in turn is used to quantify the efficiency of the three international crude oil markets. To identify whether the source of multifractality is long-range correlations or broad fat-tail distributions, shuffled data and surrogated data corresponding to each of the time series are generated. Shuffled data are obtained by randomizing the order of the price returns data. This will destroy any long-range correlation of the time series. Surrogated data is produced using the Fourier-Detrended Fluctuation Analysis (F-DFA). This is done by randomizing the phases of the price returns data in Fourier space. This will normalize the distribution of the time series. The study found that for the three crude oil markets, there is a strong dependence of the generalized Hurst exponents with respect to the order of fluctuations. This shows that the daily price time series of the markets under study have signs of multifractality. Using the degree of multifractality as a measure of efficiency, the results show that WTI is the most efficient while OPEC is the least efficient market. This implies that OPEC has the highest likelihood to be manipulated among the three markets. This reflects the fact that Brent and WTI is a very competitive market hence, it has a higher level of complexity compared against OPEC, which has a large monopoly power. Comparing with shuffled data and surrogated data, the findings suggest that for all the three crude oil markets, the multifractality is mainly due to long

  20. Leveraging performance measurement and management: the quality and efficiency edge.

    PubMed

    Cerese, J

    2001-11-01

    The University HealthSystem Consortium (UHC) is a mission-based, member driven alliance of academic health centers. UHC's objectives are to pool resources, create economies of scale, improve clinical and operating efficiencies, and influence the direction and delivery of health care. To assist our members in developing these strategies, UHC conducted concurrent clinical and operational cardiology benchmarking projects. The goals of the cardiology-benchmarking project were to: Identify successful organizational structures and operational processes used by members to provide cardiology service. Identify methods to maximize productivity, and manage supply and equipment costs. Share methods of measuring and reporting outcomes (report cards, databases). PMID:11761795

  1. Cross-Sector Impact Analysis of Industrial Efficiency Measures

    SciTech Connect

    Morrow, William; CreskoEngineering, Joe; Carpenter, Alberta; Masanet, Eric; Nimbalkar, Sachin U; Shehabi, Arman

    2013-01-01

    The industrial or manufacturing sector is a foundational component to all economic activity. In addition to being a large direct consumer of energy, the manufacturing sector also produces materials, products, and technologies that influence the energy use of other economic sectors. For example, the manufacturing of a lighter-weight vehicle component affects the energy required to ship that component as well as the fuel efficiency of the assembled vehicle. Many energy efficiency opportunities exist to improve manufacturing energy consumption, however comparisons of manufacturing sector energy efficiency investment opportunities tend to exclude any impacts that occur once the product leaves the factory. Expanding the scope of analysis to include energy impacts across different stages of product life-cycle can highlight less obvious opportunities and inform actions that create the greatest economy-wide benefits. We present a methodology and associated analysis tool (LIGHTEnUP Lifecycle Industry GHgas, Technology and Energy through the Use Phase) that aims to capture both the manufacturing sector energy consumption and product life-cycle energy consumption implications of manufacturing innovation measures. The tool architecture incorporates U.S. national energy use data associated with manufacturing, building operations, and transportation. Inputs for technology assessment, both direct energy saving to the manufacturing sector, and indirect energy impacts to additional sectors are estimated through extensive literature review and engineering methods. The result is a transparent and uniform system of comparing manufacturing and use-phase impacts of technologies.

  2. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system. PMID:22673892

  3. Measuring Infant Attachment Security in Rhesus Macaques (Macaca mulatta): Adaptation of the Attachment Q-set

    PubMed Central

    Warfield, James J.; Kondo-Ikemura, Kiyomi; Waters, Everett

    2010-01-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult’s availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant’s typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This paper reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. PMID:20853398

  4. Measuring infant attachment security in rhesus macaques (Macaca mulatta): adaptation of the attachment Q-set.

    PubMed

    Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett

    2011-02-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. PMID:20853398

  5. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  6. An efficient wireless power transfer system with security considerations for electric vehicle applications

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  7. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  8. A sodium laser guide star coupling efficiency measurement method

    NASA Astrophysics Data System (ADS)

    Feng, Lu; Shen, Zhi-Xia; Xue, Suijian; Li, Yang-Peng; Jin, Kai; Otarola, Angel; Bo, Yong; Zuo, Jun-Wei; Bian, Qi; Wei, Kai; Hu, Jing-Yao

    2016-09-01

    A large telescope's adaptive optics (AO) system requires one or more bright artificial laser guide stars to improve its sky coverage. The recent advent of a high power sodium laser is perfect for such application. However, besides the output power, other parameters of the laser also have a significant impact on the brightness of the generated sodium laser guide star, mostly in non-linear relationships. When tuning and optimizing these parameters it is necessary to tune based on a laser guide star generation performance metric. Although return photon fluxis widely used, variability of the atmosphere and sodium layer makes it difficult to compare results from different sites or even within a short time period for the same site. A new metric, coupling efficiency, is adopted in our field tests. In this paper, we will introduce our method for measuring the coupling efficiency of a 20W class pulse sodium laser for AO application during field tests that were conducted during 2013–2015.

  9. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    PubMed

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN. PMID:20703727

  10. Improving Campus Security with Increased Lighting Efficiency while Simultaneously Reducing Light Pollution

    NASA Astrophysics Data System (ADS)

    Schenk, Andrew; Miller, Dan; Martell, Eric

    2008-04-01

    Many outdoor lighting fixtures fail to enhance the security of the assets they were designed to protect; moreover, they simultaneously increase the levels of light pollution for astronomers. The problem is simple: most lighting fixtures do not properly aim the light they produce downward. In fact, up to fifty percent of the light rays escape upward, thus wasting a significant amount of energy and severely degrading the environment in which to do astronomy. To resolve these problems, I first created a scale model of Millikin University's campus and took time exposures and photometer readings from the replicas of the existing light fixtures. I then fastened improved fixtures to the scaled lamps and retook the camera exposures and photometer readings for comparison. With this information I was able to take my work full scale and physically change one of the light fixtures on campus. Finally to wrap up my project I took my findings to safety and security to show the improvement that these new fixtures represented to Millikin's safety and to its astronomy equipment.