These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Online Payments Using Handwritten Signature Verification  

Microsoft Academic Search

Making payments online is inherently insecure, especially those involving credit cards where a handwritten signature is normally required to be authenticated. This paper describes a system for enhancing the security of online payments using automated handwritten signature verification. Our system combines complementary statistical models to analyse both the static features of a signature (e.g., shape, slant, size), and its dynamic

Jarrod Trevathan; Alan McCabe; Wayne Read

2009-01-01

2

Online Signature Verification Based on Global Feature of Writing Forces  

Microsoft Academic Search

\\u000a Writing forces are important dynamics of online signatures and it is harder to be imitated by forgers than signature shapes.\\u000a An improved DTW (Dynamic Time Warping) algorithm is put forward to verify online signatures based on writing forces. Compared\\u000a to the general DTW algorithm, this one deals with the varying consistency of signature point, signing duration and the different\\u000a weights

Zhongcheng Wu; Ping Fang; Fei Shen

2006-01-01

3

Fusion of HMM's Likelihood and Viterbi Path for On-line Signature Verification  

Microsoft Academic Search

\\u000a We describe a method fusing two complementary scores descended from a Hidden Markov Model (HMM) for on-line signature verification.\\u000a The signatures are acquired using a digitizer that captures pen-position, pen-pressure, and pen-inclination. A writer is considered\\u000a as being authentic when the arithmetic mean of two similarity scores obtained on an input signature is higher than a threshold.\\u000a The first score

Van-bao Ly; Sonia Garcia-salicetti; Bernadette Dorizzi

2004-01-01

4

Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis  

PubMed Central

One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%. PMID:25133227

Iranmanesh, Vahab; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Arigbabu, Olasimbo Ayodeji; Malallah, Fahad Layth

2014-01-01

5

Pattern recognition techniques in on-line hand written signature verification - A survey  

Microsoft Academic Search

Over the last two decades, in the field of secure communication and financial on-line applications, we have witnessed an explosive growth in biometric personal authentication systems which are covenant with a measurable physical characteristic or behavioral trait. On-line refers to making use of the time functions of the signing process. Verification of on-line signature as a biometric modality still is

K. R. Radhika; G. N. Sekhar; M. K. Venkatesha

2009-01-01

6

Online Signature Verification System for Kaisyo Script Based on Structured Learning and Segmentation of HMM  

NASA Astrophysics Data System (ADS)

This paper presents a new Hidden Markov Model (HMM) for the online signature verification of oriental characters such as Japanese and Chinese. These oriental characters usually consist of many individual strokes such as dots and straight lines. Taking into account of this characteristic, a new HMM is proposed, which is composed of many sub-models each of which corresponds to an individual stroke. In addition, the ‘pen-up’ state which represents the movement between strokes is explicitly introduced. Then, a parameter re-estimation scheme for this special class of HMM is derived exploiting the structure of the proposed HMM. Thanks to the structured learning mechanism, the proposed HMM not only can drastically reduce the computational time necessary for the learning process but also shows higher recognition performance for the rejection of the skilled forgery. Finally, the usefulness of the proposed scheme is demonstrated by comparing it with conventional models.

Zhang, Dapeng; Inagaki, Shinkichi; Suzuki, Tatsuya; Kanada, Naoki

7

Improved DTW Algorithm for Online Signature Verification Based on Writing Forces  

Microsoft Academic Search

\\u000a Writing forces are important dynamics of online signatures and they are harder to be imitated by forgers than signature shape.\\u000a An improved DTW (Dynamic Time Warping) algorithm is put forward to verify online signatures based on writing forces. Compared\\u000a to the general DTW algorithm, this one deals with the varying consistency of signature point, signing duration and the different\\u000a weights

Ping Fang; Zhongcheng Wu; Fei Shen; Yunjian Ge; Bing Fang

2005-01-01

8

Signature Generation method, Agent Signature Verification method.  

E-print Network

Abstract—This paper presents a novel method that allows an agent host to delegate its signing power to an anonymous mobile agent in such away that the mobile agent does not reveal any information about its host’s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The solution introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates

Omaima Bamasak

9

Robustness of Signature Verification Systems to Imitators with Increasing Skills  

Microsoft Academic Search

In this paper, we study the impact of an incremental level of skill in the forgeries against signature verification sys- tems. Experiments are carried out using both off-line sys- tems, involving the discrimination of signatures written on a piece of paper, and on-line systems, in which dynamic in- formation of the signing process (such as velocity and ac- celeration) is

Fernando Alonso-fernandez; Julian Fiérrez; Almudena Gilperez; Javier Galbally; Javier Ortega-garcia

2009-01-01

10

Signature Verification Based on Handwritten Text Recognition  

NASA Astrophysics Data System (ADS)

Signatures continue to be an important biometric trait because it remains widely used primarily for authenticating the identity of human beings. This paper presents an efficient text-based directional signature recognition algorithm which verifies signatures, even when they are composed of special unconstrained cursive characters which are superimposed and embellished. This algorithm extends the character-based signature verification technique. The experiments carried out on the GPDS signature database and an additional database created from signatures captured using the ePadInk tablet, show that the approach is effective and efficient, with a positive verification rate of 94.95%.

Viriri, Serestina; Tapamo, Jules-R.

11

Generic Verification Protocol for Verification of Online Turbidimeters  

EPA Science Inventory

This protocol provides generic procedures for implementing a verification test for the performance of online turbidimeters. The verification tests described in this document will be conducted under the Environmental Technology Verification (ETV) Program. Verification tests will...

12

Machine Learning for Signature Verification Harish Srinivasan  

E-print Network

Machine Learning for Signature Verification Harish Srinivasan , Sargur N. Srihari and Matthew J it can be viewed as one that involves machine learning from a population of signatures. There are two and performance phases is de- scribed. Keywords: machine learning, forensic signature examination, biometrics

13

New online signature acquisition system  

NASA Astrophysics Data System (ADS)

We present a nonconstraining and low-cost online signature acquisition system that has been developed to enhance the performances of an existing multimodal biometric authentication system (based initially on both voice and image modalities). A laboratory prototype has been developed and validated for an online signature acquisition.

Oulefki, Adel; Mostefai, Messaoud; Abbadi, Belkacem; Djebrani, Samira; Bouziane, Abderraouf; Chahir, Youssef

2013-01-01

14

Online fingerprint verification.  

PubMed

As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications. PMID:17365425

Upendra, K; Singh, S; Kumar, V; Verma, H K

2007-01-01

15

FIR signature verification system characterizing dynamics of handwriting features  

NASA Astrophysics Data System (ADS)

This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

2013-12-01

16

Signature verification with writing posture analysis  

NASA Astrophysics Data System (ADS)

A video-based handwritten signature verification framework is proposed in this paper. Using a camera as the sensor has the advantage that the entire writing processes can be captured along with the signatures. The main contribution of this work is that writing postures are analyzed to achieve the verification purpose because the writing postures cannot be easily imitated or forged. The proposed system is able to achieve low false rejection rates while maintaining low false acceptance rates for database containing both unskilled and skilled imitation signatures.

Cheng, Hsu-Yung; Yu, Chih-Chang

2013-07-01

17

Discriminative Features Mining for Offline Handwritten Signature Verification  

NASA Astrophysics Data System (ADS)

Signature verification is an active research area in the field of pattern recognition. It is employed to identify the particular person with the help of his/her signature's characteristics such as pen pressure, loops shape, speed of writing and up down motion of pen, writing speed, pen pressure, shape of loops, etc. in order to identify that person. However, in the entire process, features extraction and selection stage is of prime importance. Since several signatures have similar strokes, characteristics and sizes. Accordingly, this paper presents combination of orientation of the skeleton and gravity centre point to extract accurate pattern features of signature data in offline signature verification system. Promising results have proved the success of the integration of the two methods.

Neamah, Karrar; Mohamad, Dzulkifli; Saba, Tanzila; Rehman, Amjad

2014-03-01

18

On-Line Fingerprint Verification  

Microsoft Academic Search

Abstract: We describe the design and implementation of an onlinefingerprint verification system which operates in twostages: (i) minutia extraction and (ii) minutia matching. Animproved minutia extraction algorithm that is much fasterand more accurate than our earlier algorithm [8] has beenimplemented. For minutia matching, an alignment-basedelastic matching algorithm has been developed. This algorithmis capable of finding the correspondences between inputminutiae and

Anil K. Jain; Lin Hong; Ruud M. Bolle

1997-01-01

19

Using Adapted Levenshtein Distance for On-Line Signature Authentication  

Microsoft Academic Search

In this paper a new method for on-line signature authen- tication will be presented, which is based on a event-string modelling of features derived from pen-position and pres- sure signals of digitizer tablets. A distance measure well known from textual pattern recognition, the Levenshtein Distance, is used for comparison of signatures and classifi- cation is carried out applying a nearest

Sascha Schimke; Claus Vielhauer; Jana Dittmann

2004-01-01

20

Analyzing Personalized Policies for Online Biometric Verification  

PubMed Central

Motivated by India’s nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident’s biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India’s program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India’s biometric program. The mean delay is sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32–41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident. PMID:24787752

Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M.

2014-01-01

21

Low-Latency ECDSA Signature Verification A Road Towards Safer Traffic  

E-print Network

the precursors for ITS, the traffic control systems for air and rail traffic were already deployed in the lateLow-Latency ECDSA Signature Verification ­ A Road Towards Safer Traffic ­ Miroslav Knezevi caused by the rising traffic densities on our roads and in our cities. Traffic congestion is increasingly

22

Biometric classifier update using online learning: A case study in near infrared face verification  

E-print Network

Biometric classifier update using online learning: A case study in near infrared face verification 2010 Accepted 26 January 2010 Keywords: Biometrics Online learning Support vector machine Near infrared establishes a decision hyper- plane for improved classification. The proposed algorithm incorporates soft

Ross, Arun Abraham

23

Online Writer Verification Using Feature Parameters Basedonthe Document Examiners' Knowledge  

NASA Astrophysics Data System (ADS)

This paper investigates writer verification using feature parameters based on the knowledge of document examiners, which are automatically extracted from handwritten kanji characters on a digitizing tablet. Criteria of feature selection using the evaluation measure that is obtained by modifying the measure of decidability, d-prime, is established and the criteria are applied to the evaluation measures that are calculated from learning samples. Then two classifiers based on the frequency distribution of deviations of the selected features are proposed and its design method using learning samples is showed. The effectiveness of the proposed method is evaluated by verification experiments with the database including skilled forgeries. The experimental results show that the proposed methods are effective in writer verification.

Nakamura, Yoshikazu; Kidode, Masatsugu

24

A method for online verification of adapted fields using an independent dose monitor  

SciTech Connect

Purpose: Clinical implementation of online adaptive radiotherapy requires generation of modified fields and a method of dosimetric verification in a short time. We present a method of treatment field modification to account for patient setup error, and an online method of verification using an independent monitoring system.Methods: The fields are modified by translating each multileaf collimator (MLC) defined aperture in the direction of the patient setup error, and magnifying to account for distance variation to the marked isocentre. A modified version of a previously reported online beam monitoring system, the integral quality monitoring (IQM) system, was investigated for validation of adapted fields. The system consists of a large area ion-chamber with a spatial gradient in electrode separation to provide a spatially sensitive signal for each beam segment, mounted below the MLC, and a calculation algorithm to predict the signal. IMRT plans of ten prostate patients have been modified in response to six randomly chosen setup errors in three orthogonal directions.Results: A total of approximately 49 beams for the modified fields were verified by the IQM system, of which 97% of measured IQM signal agree with the predicted value to within 2%.Conclusions: The modified IQM system was found to be suitable for online verification of adapted treatment fields.

Chang Jina; Norrlinger, Bernhard D. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Heaton, Robert K.; Jaffray, David A.; Cho, Young-Bin; Islam, Mohammad K. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, Toronto, Ontario M5G 2M9 (Canada); Mahon, Robert [Department of Radiation Therapy, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada)

2013-07-15

25

Is Your Avatar Ethical? On-Line Course Tools that Are Methods for Student Identity and Verification  

ERIC Educational Resources Information Center

On-line college courses present a mandate for student identity verification for accreditation and funding sources. Student authentication requires course modification to detect fraud and misrepresentation of authorship in assignment submissions. The reality is that some college students cheat in face-to-face classrooms; however, the potential for…

Semple, Mid; Hatala, Jeffrey; Franks, Patricia; Rossi, Margherita A.

2011-01-01

26

Efficient cost-sensitive human-machine collaboration for offline signature verification  

NASA Astrophysics Data System (ADS)

We propose a novel strategy for the optimal combination of human and machine decisions in a cost-sensitive environment. The proposed algorithm should be especially beneficial to financial institutions where off-line signatures, each associated with a specific transaction value, require authentication. When presented with a collection of genuine and fraudulent training signatures, produced by so-called guinea pig writers, the proficiency of a workforce of human employees and a score-generating machine can be estimated and represented in receiver operating characteristic (ROC) space. Using a set of Boolean fusion functions, the majority vote decision of the human workforce is combined with each threshold-specific machine-generated decision. The performance of the candidate ensembles is estimated and represented in ROC space, after which only the optimal ensembles and associated decision trees are retained. When presented with a questioned signature linked to an arbitrary writer, the system first uses the ROC-based cost gradient associated with the transaction value to select the ensemble that minimises the expected cost, and then uses the corresponding decision tree to authenticate the signature in question. We show that, when utilising the entire human workforce, the incorporation of a machine streamlines the authentication process and decreases the expected cost for all operating conditions.

Coetzer, Johannes; Swanepoel, Jacques; Sabourin, Robert

2012-01-01

27

Signature Verification via "Hand-Pen" Motion Investigation* Mladen Savov, Georgi Gluhchev  

E-print Network

position and dynamics of the system "hand-pen". A set of features for separate hand and pen description authentication. It is due to the comparative stability of the graph and of the movement dynamics which results from the stereotype built in the years. Along with the steadiness of the main signature elements

Borissova, Daniela

28

Aging in Biometrics: An Experimental Analysis on On-Line Signature  

PubMed Central

The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system’s performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given. PMID:23894557

Galbally, Javier; Martinez-Diaz, Marcos; Fierrez, Julian

2013-01-01

29

Aging in biometrics: an experimental analysis on on-line signature.  

PubMed

The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system's performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given. PMID:23894557

Galbally, Javier; Martinez-Diaz, Marcos; Fierrez, Julian

2013-01-01

30

Authentication Based on Pole-zero Models of Signature Velocity  

PubMed Central

With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

2013-01-01

31

Patient-Specific 3D Pretreatment and Potential 3D Online Dose Verification of Monte Carlo-Calculated IMRT Prostate Treatment Plans  

SciTech Connect

Purpose: Fast and reliable comprehensive quality assurance tools are required to validate the safety and accuracy of complex intensity-modulated radiotherapy (IMRT) plans for prostate treatment. In this study, we evaluated the performance of the COMPASS system for both off-line and potential online procedures for the verification of IMRT treatment plans. Methods and Materials: COMPASS has a dedicated beam model and dose engine, it can reconstruct three-dimensional dose distributions on the patient anatomy based on measured fluences using either the MatriXX two-dimensional (2D) array (offline) or a 2D transmission detector (T2D) (online). For benchmarking the COMPASS dose calculation, various dose-volume indices were compared against Monte Carlo-calculated dose distributions for five prostate patient treatment plans. Gamma index evaluation and absolute point dose measurements were also performed in an inhomogeneous pelvis phantom using extended dose range films and ion chamber for five additional treatment plans. Results: MatriXX-based dose reconstruction showed excellent agreement with the ion chamber (<0.5%, except for one treatment plan, which showed 1.5%), film ({approx}100% pixels passing gamma criteria 3%/3 mm) and mean dose-volume indices (<2%). The T2D based dose reconstruction showed good agreement as well with ion chamber (<2%), film ({approx}99% pixels passing gamma criteria 3%/3 mm), and mean dose-volume indices (<5.5%). Conclusion: The COMPASS system qualifies for routine prostate IMRT pretreatment verification with the MatriXX detector and has the potential for on-line verification of treatment delivery using T2D.

Boggula, Ramesh, E-mail: ramesh.boggula@umm.de [Department of Radiation Oncology, University Medical Centre Mannheim, University of Heidelberg, Mannheim (Germany); Jahnke, Lennart; Wertz, Hansjoerg; Lohr, Frank; Wenz, Frederik [Department of Radiation Oncology, University Medical Centre Mannheim, University of Heidelberg, Mannheim (Germany)

2011-11-15

32

Online Kidney Position Verification Using Non-Contrast Radiographs on a Linear Accelerator with on Board KV X-Ray Imaging Capability  

SciTech Connect

The kidneys are dose-limiting organs in abdominal radiotherapy. Kilovoltage (kV) radiographs can be acquired using on-board imager (OBI)-equipped linear accelerators with better soft tissue contrast and lower radiation doses than conventional portal imaging. A feasibility study was conducted to test the suitability of anterior-posterior (AP) non-contrast kV radiographs acquired at treatment time for online kidney position verification. Anthropomorphic phantoms were used to evaluate image quality and radiation dose. Institutional Review Board approval was given for a pilot study that enrolled 5 adults and 5 children. Customized digitally reconstructed radiographs (DRRs) were generated to provide a priori information on kidney shape and position. Radiotherapy treatment staff performed online evaluation of kidney visibility on OBI radiographs. Kidney dose measured in a pediatric anthropomorphic phantom was 0.1 cGy for kV imaging and 1.7 cGy for MV imaging. Kidneys were rated as well visualized in 60% of patients (90% confidence interval, 34-81%). The likelihood of visualization appears to be influenced by the relative AP separation of the abdomen and kidneys, the axial profile of the kidneys, and their relative contrast with surrounding structures. Online verification of kidney position using AP non-contrast kV radiographs on an OBI-equipped linear accelerator appears feasible for patients with suitable abdominal anatomy. Kidney position information provided is limited to 2-dimensional 'snapshots,' but this is adequate in some clinical situations and potentially advantageous in respiratory-correlated treatments. Successful clinical implementation requires customized partial DRRs, appropriate imaging parameters, and credentialing of treatment staff.

Willis, David J. [Division of Radiation Oncology, Peter MacCallum Cancer Centre, Melbourne, Victoria (Australia)], E-mail: David.Willis@petermac.org; Kron, Tomas; Hubbard, Patricia; Haworth, Annette; Wheeler, Greg; Duchesne, Gillian M. [Division of Radiation Oncology, Peter MacCallum Cancer Centre, Melbourne, Victoria (Australia)

2009-01-01

33

DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION  

SciTech Connect

International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

2009-10-06

34

Signature Crossroads  

E-print Network

Signature Crossroads, an urban form that grows out of an street intersection, combines both the sense of "transit" and the sense of "destination." Such dual character gives Signature Crossroads a superiority over traditional ...

Chong, Puifai Cyril

1997-01-01

35

78 FR 43145 - Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard  

Federal Register 2010, 2011, 2012, 2013, 2014

This notice announces the Secretary of Commerce's approval of Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS). FIPS 186-4 specifies three techniques for the generation and verification of digital signatures that can be used for the protection of data: The Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA) and the......

2013-07-19

36

Group Signatures  

Microsoft Academic Search

Abstract. In this paper we present a new type of signature for a group of persons, called a group signature, which has the following propertjes: (i) only members,of the group can sign messages; (ii) the receiver can verify that it is a valid group signaa~e, but cannot discover which gr~up member made (i) if necessary, the signature can be \\

David Chaum; Eugène Van Heyst

1991-01-01

37

SEPARATED/DIVORCED INCOME VERIFICATION Student Name: _______________________________________MSU ID: _________________________  

E-print Network

STUDENT SEPARATED/DIVORCED INCOME VERIFICATION Student Name for federal financial aid indicates that you are divorced or separated and filed a joint ________ tax return: _____________________________________________________________________________ Signature of Applicant Date Please attach a copy of your divorce, separation, or interlocutory agreement

Dyer, Bill

38

SEPARATED/DIVORCED INCOME VERIFICATION Student's Name: ______________________________________________MSU ID: _________________________  

E-print Network

PARENT SEPARATED/DIVORCED INCOME VERIFICATION Student's Name application for federal financial aid indicates that your parents are divorced or separated as of the date: ____________________________________________________________________________________ Signature of Parent Date Please attach a copy of parental divorce, separation, or interlocutory agreement

Dyer, Bill

39

2014-15 Child Support Paid Verification Worksheet  

E-print Network

2014-15 Child Support Paid Verification Worksheet Office of Student Financial Assistance P.O. Box.aid@uaa.alaska.edu G:\\Financial Aid\\Forms\\2014-15\\1415_Child_Support_Paid_Verification_Worksheet.docx RRAAREQ Code of Child Support Paid in 2013 III. SIGNATURES I/We certify that all information reported on this worksheet

Pantaleone, Jim

40

2013-14 Child Support Paid Verification Worksheet  

E-print Network

2013-14 Child Support Paid Verification Worksheet Office of Student Financial Assistance P.O. Box.aid@uaa.alaska.edu G:\\Financial Aid\\Forms\\2013-14\\1314_Child_Support_Paid_Verification_Worksheet.docx RRAAREQ Code of Child Support Paid in 2012 III. SIGNATURES I/We certify that all information reported on this worksheet

Pantaleone, Jim

41

This form is to be submitted by the student to the major department prior to the end of the first quarter of enrollment in the program. Please type or print the application (the pdf can be filled in online and printed for signatures), and retain a copy fo  

E-print Network

This form is to be submitted by the student to the major department prior to the end of the first quarter of enrollment in the program. Please type or print the application (the pdf can be filled in online and printed for signatures), and retain a copy for your records. If your plans for meeting degree

Prinz, Friedrich B.

42

Energy verification in Ion Beam Therapy  

Microsoft Academic Search

The adoption of synchrotrons for medical applications necessitates a comprehensive on-line verification of all beam parameters, autonomous of common beam monitors. In particular for energy verification, the required precision of down to 0.1MeV in absolute terms, poses a special challenge regarding the betatron-core driven 3rd order extraction mechanism which is intended to be used at MedAustron [1]. Two different energy

F Moser; M Benedikt; U Dorda

2011-01-01

43

JAVASCRIPT: VERIFICATION  

E-print Network

page window.location = "citibank.com.evil.com" #12;5 #12;#12;Facebook JavaScript (FBJS) Google CajaJAVASCRIPT: SECURITY & VERIFICATION Arjun Guha Joe Gibbs Politz Benjamin S. Lerner Shriram Yahoo! ADsafe 7 Microsoft Web Sandbox #12;eval ... 8 o[f] lookup(o, f)lookup Rewriting Wrappers #12

Rajamani, Sriram K.

44

A complexity measure of handwritten curves: modeling of dynamic signature forgery  

Microsoft Academic Search

It is generally accepted that highly unstable and easily imitated signatures are among the main causes of deterioration in handwritten signature verification system performance. The authors attempt to estimate, quantitatively and a priori from the coordinates sampled during its execution, the difficulty that could be experienced by a typical imitator in reproducing both visually and dynamically a signature. A functional

Jean-Jules Brault; R. Plamondon

1993-01-01

45

Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow  

E-print Network

Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature of improved variants of the UOV and Rainbow signature schemes. In this paper we show how we can do even better by a slight variation of their algorithms. Keywords: Multivariate Cryptography, UOV Signature Scheme, Rainbow

46

Signature quantization  

PubMed Central

We associate to the action of a compact Lie group G on a line bundle over a compact oriented even-dimensional manifold a virtual representation of G using a twisted version of the signature operator. We obtain analogues of various theorems in the more standard theory of geometric quantization. PMID:14569022

Guillemin, Victor; Sternberg, Shlomo; Weitsman, Jonathan

2003-01-01

47

ETV - VERIFICATION TESTING (ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM)  

EPA Science Inventory

Verification testing is a major component of the Environmental Technology Verification (ETV) program. The ETV Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantia...

48

A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents  

PubMed Central

This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

Kabir, Muhammad N.; Alginahi, Yasser M.

2014-01-01

49

Subliminal-free Authentication and Signature  

Microsoft Academic Search

Simmons [17] introduced the notion of subliminal channel in 1983, by demonstrating how to “hide” secret information inside an authenticated\\u000a message. In this paper we propose a practical subliminal-free authentication system and extend our results to subliminal-free\\u000a signatures. The subliminal-freeness of our systems can be proven. We discuss applications in the context of verification of\\u000a treaty and international bank communications.

Yvo Desmedt

50

Towards a Better Understanding of the Oxygen Isotope Signature of Atmospheric CO2: Determining the 18O-Exchange Between CO2 and H2O in Leaves and Soil On-line with Laser-Based Spectroscopy  

NASA Astrophysics Data System (ADS)

The oxygen isotope signature of carbon dioxide (?18O-CO2) is a powerful tool to disentangle CO2 fluxes in terrestrial ecosystems, as CO2 attains a contrasting 18O signature by the interaction with isotopically different soil and leaf water pools during soil respiration and photosynthesis, respectively. However, using the ?18O-CO2 signal to quantify plant-soil-atmosphere CO2 fluxes is still challenging due to a lack of knowledge concerning the magnitude and effect of individual fractionation processes during CO2 and H2O diffusion and during CO2-H2O isotopic exchange in soils and leaves, especially related to short-term changes in environmental conditions (non-steady state). This study addresses this research gap by combined on-line monitoring of the oxygen isotopic signature of CO2 and water vapor during gas exchange in soil and plant leaves with laser-based spectroscopy, using soil columns and plant chambers. In both experimental setups, the measured ?18O of water vapor was used to infer the ?18O of liquid water, and, together with the ?18O-CO2, the degree of oxygen isotopic equilibrium between the two species (?). Gas exchange experiments with different functional plant types (C3 coniferous, C3 monocotyledonous, C3 dicotyledonous, C4) revealed that ? and the influence of the plant on the ambient ?18O-CO2 (CO18O-isoforcing) not only varied on a diurnal timescale but also when plants were exposed to limited water availability, elevated air temperature, and abrupt changes in light intensity (sunflecks). Maximum ? before treatments ranged between 0.7 and 0.8 for the C3 dicotyledonous (poplar) and C3 monocotyledonous (wheat) plants, and between 0.5 and 0.6 for the conifer (spruce) and C4 plant (maize) while maximum CO18O-isoforcing was highest in wheat (0.03 m s-1 ‰), similar in poplar and maize (0.02 m s-1 ‰), and lowest in spruce (0.01 m s-1 ‰). Multiple regression analysis showed that up to 97 % of temporal dynamics in CO18O-isoforcing could be explained by variations in stomatal conductance, ?, and ?18O of H2O at the evaporation site. The determined maximum in vivo activity of carbonic anhydrase, the enzyme which catalyzes the CO2-H2O oxygen isotope exchange inside leaves, varied between the different plant species and was, as observed for ?, higher in poplar and wheat, and lower in maize and spruce. Preliminary experiments with soil columns filled with sand demonstrated that gas-permeable microporous polypropylene tubing, which was installed at different depths in the soil columns, was appropriate for determining ?18O-H2O and ?18O-CO2 simultaneously without fractionation. Hence, this new methodology is promising for further studies on the oxygen isotopic exchange between CO2 and H2O in soils. Altogether, this study highlights that the ?18O-CO2 exchange in the soil-plant-atmosphere continuum is highly dynamic in response to short-term variations in environmental conditions, and emphasizes the need for an improved parameterization of models simulating ?18O-CO2.

Gangi, L.; Rothfuss, Y.; Vereecken, H.; Brueggemann, N.

2013-12-01

51

Time Capsule Signature  

Microsoft Academic Search

We introduce a new cryptographic problem called time cap- sule signature. Time capsule signature is a 'future signature' that be- comes valid from a specific future time t, when a trusted third party (called Time Server) publishes some trapdoor information associated with the time t. In addition, time capsule signature should satisfy the following properties: (1) If the signer wants,

Yevgeniy Dodis; Dae Hyun Yum

2005-01-01

52

Columbus pressurized module verification  

NASA Technical Reports Server (NTRS)

The baseline verification approach of the COLUMBUS Pressurized Module was defined during the A and B1 project phases. Peculiarities of the verification program are the testing requirements derived from the permanent manned presence in space. The model philosophy and the test program have been developed in line with the overall verification concept. Such critical areas as meteoroid protections, heat pipe radiators and module seals are identified and tested. Verification problem areas are identified and recommendations for the next development are proposed.

Messidoro, Piero; Comandatore, Emanuele

1986-01-01

53

Developing composite signatures  

NASA Astrophysics Data System (ADS)

A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper explores the merits of using composite signatures, in lieu of waiting for opportunities for the more elusive diagnostic signatures, to satisfy key essential elements of information Keywords: signature, composite signature, civil disaster (EEI) associated with civil disaster-related problems. It discusses efforts to refine composite signature development methodology and quantify the relative value of composite vs. diagnostic signatures. The objectives are to: 1) investigate and develop innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral; 2) explore the feasibility of collecting representative composite signatures using current and emerging intelligence, surveillance, and reconnaissance (ISR) collection architectures leveraging civilian and commercial architectures; and 3) collaborate extensively with scientists and engineers from U.S. government organizations and laboratories, the defense industry, and academic institutions.

Hawley, Chadwick T.; Carpenter, Tom; Cappelaere, Patrice G.; Frye, Stu; Lemoigne-Stewart, Jacqueline J.; Mandle, Dan; Montgomery, Sarah; Williams-Bess, Autumn

2011-06-01

54

Energy verification in Ion Beam Therapy  

E-print Network

The adoption of synchrotrons for medical applications necessitates a comprehensive on-line verification of all beam parameters, autonomous of common beam monitors. In particular for energy verification, the required precision of down to 0.1MeV in absolute terms, poses a special challenge regarding the betatron-core driven 3rd order extraction mechanism which is intended to be used at MedAustron [1]. Two different energy verification options have been studied and their limiting factors were investigated: 1) A time-of-flight measurement in the synchrotron, limited by the orbit circumference information and measurement duration as well as extraction uncertainties. 2) A calorimeter-style system in the extraction line, limited by radiation hardness and statistical fluctuations. The paper discusses in detail the benefits and specific aspects of each method.

Moser, F; Dorda, U

2011-01-01

55

Request for Online Payment Site ETSU Bursar Office  

E-print Network

Request for Online Payment Site ETSU Bursar Office PO Box 70732 Date*: _____________ (*allow), dates, costs and any other information to develop the online payment site, logos. Signature, Site: ________________________________________________________ (The Online Site Manager is a department designee with responsibility for the Online Marketplace Ustore

Karsai, Istvan

56

SEPARATED/DIVORCED INCOME VERIFICATION Student Name: _______________________________________MSU ID: _________________________  

E-print Network

STUDENT SEPARATED/DIVORCED INCOME VERIFICATION Student Name application for federal financial aid indicates that you are divorced or separated as of the date your FAFSA: ____________________________________________________________________________ Signature of Applicant Date Please attach a copy of your divorce, separation, or interlocutory agreement

Dyer, Bill

57

Verification Tools Secure Online Shopping, Banking  

NASA Technical Reports Server (NTRS)

Just like rover or rocket technology sent into space, the software that controls these technologies must be extensively tested to ensure reliability and effectiveness. Ames Research Center invented the open-source Java Pathfinder (JPF) toolset for the deep testing of Java-based programs. Fujitsu Labs of America Inc., based in Sunnyvale, California, improved the capabilities of the JPF Symbolic Pathfinder tool, establishing the tool as a means of thoroughly testing the functionality and security of Web-based Java applications such as those used for Internet shopping and banking.

2010-01-01

58

Application for admission to exam Please register online! Use this form only if registering online is not possible.  

E-print Network

Application for admission to exam Please register online! Use this form only if registering online is not possible. Matrikelnummer: Name, first name: Study programme: Final degree: Phone: E-mail: Date, Signature: Exam no./exam name: Exam date: Time: Examiner: Signature of examiner: (with oral exams only) yes no

Pfeifer, Holger

59

Signatures support program  

NASA Astrophysics Data System (ADS)

The Signatures Support Program (SSP) leverages the full spectrum of signature-related activities (collections, processing, development, storage, maintenance, and dissemination) within the Department of Defense (DOD), the intelligence community (IC), other Federal agencies, and civil institutions. The Enterprise encompasses acoustic, seismic, radio frequency, infrared, radar, nuclear radiation, and electro-optical signatures. The SSP serves the war fighter, the IC, and civil institutions by supporting military operations, intelligence operations, homeland defense, disaster relief, acquisitions, and research and development. Data centers host and maintain signature holdings, collectively forming the national signatures pool. The geographically distributed organizations are the authoritative sources and repositories for signature data; the centers are responsible for data content and quality. The SSP proactively engages DOD, IC, other Federal entities, academia, and industry to locate signatures for inclusion in the distributed national signatures pool and provides world-wide 24/7 access via the SSP application.

Hawley, Chadwick T.

2009-05-01

60

Three-Dimensional Target Signature Modeling  

NASA Astrophysics Data System (ADS)

The capability of accurately modeling a wide, range of military targets, in both the RF and IR portion of the spectrum, has become essential for the numerous defense programs associated with tactical weapon sensors and satellite surveillance systems. Advances in computer technology permit the use of precise analytical models early in the development cycle of new sensors. This capability leads to a new class of methods for synthetic sensor performance verification. Having recognized this opportunity Aerojet ElectroSystems Company (AESC) has developed techniques for passive target signature modeling in the 1 to 25 ?m region. This paper summarizes the company's approach to passive three dimensional target modeling.

Davison, G. A.; Dummer, R. S.; Reitz, K. M.

1984-01-01

61

Quantum homomorphic signature  

NASA Astrophysics Data System (ADS)

Quantum signature is an effective approach to identity authentication for single stream in quantum networks, but it is constrained in the crossing case of multiple streams. To solve this problem, we present a quantum homomorphic signature scheme to enhance the security of quantum networks. By entanglement swapping, this scheme can combine two quantum signatures and generate a new homomorphic signature. Analysis results show that the proposed signature scheme can effectively guarantee the security of secret key and verify the identity of different data sources in a quantum network.

Shang, Tao; Zhao, Xiao-jie; Wang, Chao; Liu, Jian-wei

2015-01-01

62

Safety Assessment of Autonomous Cars using Verification Techniques  

Microsoft Academic Search

A common requirement for autonomous cars is a safe locomotion which is evaluated by the method of hybrid verification applied online. The approach checks avoidance of static obstacles and dynamic traffic participants, which are described by imprecise data on their positions and velocities. The nonlinear dynamics of the autonomous car and other traffic participants is conservatively abstracted to Markov chains,

Matthias Althoff; Olaf Stursberg; Martin Buss

2007-01-01

63

Verification Testing Test Driven Development Testing with JUnit Verification  

E-print Network

Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

Peters, Dennis

64

Online MBA Programs Online Colleges  

E-print Network

Online MBA Programs Online Colleges Culinary Art Schools Fashion Design Schools Online Colleges Graphic Design Schools Interior Design Schools Online College Degrees MBA Degrees Online Medical Career by Goooooogle High Quality Low Cost PCB PCB, assembly and turnkey solutions - Online instant Quote ! http

Ham, Donhee

65

Cooperatively Formed Group Signatures  

Microsoft Academic Search

Group signatures and their applications have received considerable attention in the literature in recent times. Substantial\\u000a gains have been made with respect to designing provably secure and efficient schemes. In practice, as with all signature schemes,\\u000a deploying group signature schemes requires the group member’s signing keys to be both physically and electronically secure\\u000a from theft. Smartcards or similar devices are

Greg Maitland; Colin Boyd

2002-01-01

66

Modular data structure verification  

E-print Network

This dissertation describes an approach for automatically verifying data structures, focusing on techniques for automatically proving formulas that arise in such verification. I have implemented this approach with my ...

Kuncak, Viktor (Viktor Jaroslav), 1977-

2007-01-01

67

Mechanical verification of refactorings  

Microsoft Academic Search

In this paper we describe the formal verification of refactorings for untyped and typed lambda-calculi. This verification is performed in the proof assistant Isabelle\\/HOL. Refactorings are program transformations applied to improve the design of source code. Well-structured source code is easier and cheaper to maintain, and this motivates the use of refactoring. These transformations have been implemented as programmer tools

Nik Sultana; Simon J. Thompson

2008-01-01

68

Online Fingerprint Template Improvement  

Microsoft Academic Search

Abstract—This work proposes,a technique,that improves,fingerprint templates,by merging,and averaging,minutiae,of multiple fingerprints. The weighted,averaging scheme,enables,the template to change,gradually with time in line with changes,of the skin and imaging,conditions. The recursive nature of the algorithm greatly reduces the storage and computation requirements of this technique. As a result, the proposed template improvement procedure can be performed,online during the fingerprint verification process. Extensive experimental,studies

Xudong Jiang; Wee Ser

2002-01-01

69

HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO).  

E-print Network

HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO). want to view your statement online. statements online at At Your Service Online (AYSO). EMPLOYEE SIGNATURE DATE Davis, CA 95616 Option may take up to two pay periods before in effect. Physical location

Leistikow, Bruce N.

70

A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State  

NASA Astrophysics Data System (ADS)

In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

Cao, Hai-Jing; Huang, Jun; Yu, Yao-Feng; Jiang, Xiu-Li

2014-09-01

71

Traceable Ring Signature  

NASA Astrophysics Data System (ADS)

The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No group manager, no special setup, and the dynamics of group choice. The ring signature is, however, vulnerable to malicious or irresponsible signers in some applications, because of its anonymity. In this paper, we propose a traceable ring signature scheme. A traceable ring scheme is a ring signature except that it can restrict “excessive” anonymity. The traceable ring signature has a tag that consists of a list of ring members and an issue that refers to, for instance, a social affair or an election. A ring member can make any signed but anonymous opinion regarding the issue, but only once (per tag). If the member submits another signed opinion, possibly pretending to be another person who supports the first opinion, the identity of the member is immediately revealed. If the member submits the same opinion, for instance, voting “yes” regarding the same issue twice, everyone can see that these two are linked. The traceable ring signature can suit to many applications, such as an anonymous voting on a BBS. We formalize the security definitions for this primitive and show an efficient and simple construction in the random oracle model.

Fujisaki, Eiichiro; Suzuki, Koutarou

72

An archaeal genomic signature  

NASA Technical Reports Server (NTRS)

Comparisons of complete genome sequences allow the most objective and comprehensive descriptions possible of a lineage's evolution. This communication uses the completed genomes from four major euryarchaeal taxa to define a genomic signature for the Euryarchaeota and, by extension, the Archaea as a whole. The signature is defined in terms of the set of protein-encoding genes found in at least two diverse members of the euryarchaeal taxa that function uniquely within the Archaea; most signature proteins have no recognizable bacterial or eukaryal homologs. By this definition, 351 clusters of signature proteins have been identified. Functions of most proteins in this signature set are currently unknown. At least 70% of the clusters that contain proteins from all the euryarchaeal genomes also have crenarchaeal homologs. This conservative set, which appears refractory to horizontal gene transfer to the Bacteria or the Eukarya, would seem to reflect the significant innovations that were unique and fundamental to the archaeal "design fabric." Genomic protein signature analysis methods may be extended to characterize the evolution of any phylogenetically defined lineage. The complete set of protein clusters for the archaeal genomic signature is presented as supplementary material (see the PNAS web site, www.pnas.org).

Graham, D. E.; Overbeek, R.; Olsen, G. J.; Woese, C. R.

2000-01-01

73

Verification in Referral-Based Crowdsourcing  

PubMed Central

Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

2012-01-01

74

Verification in referral-based crowdsourcing.  

PubMed

Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through "referral-based crowdsourcing": the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R

2012-01-01

75

Spectroscopic signatures of isomnerization  

E-print Network

This thesis explores spectroscopic signatures of isomerization, especially new patterns that emerge and report on chemically relevant portions of the potential energy surface, such as the transition state. The most important ...

Baraban, Joshua Herschel Goldblum

2013-01-01

76

Meteor signature interpretation  

SciTech Connect

Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

Canavan, G.H.

1997-01-01

77

Requirement Assurance: A Verification Process  

NASA Technical Reports Server (NTRS)

Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

Alexander, Michael G.

2011-01-01

78

Techniques in Hydrologic Forecast Verification  

NSDL National Science Digital Library

This module demonstrates techniques for developing a hydrologic forecast verification effort. Although it can be taken as stand-alone training, the module on Introduction to Verification of Hydrologic Forecasts is intended a useful prerequisite. Through the use of rich illustrations, case study examples, and review questions, this module provides an example of developing a verification effort using NWS verification tools. Two case studies will be highlighted that both look at the primary question of whether QPF input to hydrologic models improves the hydrologic forecasts. Related questions of QPF's impact on hydrologic forecasts are explored that include considerations of basin characteristics, forecast lead time, and event magnitude. One case will look at verification of deterministic stage height forecasts using the Interactive Verification Program (IVP) at the Ohio River Forecast Center (OHRFC). The other case will look at the verification of ensemble flow forecasts using the Ensemble Verification System (EVS) at the Middle Atlantic River Forecast Center (MARFC).

Comet

2010-12-14

79

Quantum Money with Classical Verification  

E-print Network

We construct a quantum money scheme that allows verification through classical communication with bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification.

Gavinsky, Dmitry

2011-01-01

80

Gravitational Wave Verification Sources  

NASA Astrophysics Data System (ADS)

Ultra-compact binary systems containing white dwarfs dominate the gravitational wave foreground in the mHz frequency range. Many of these binaries are weak gravitational wave sources. However, there are nine systems where the gravitational wave strain is strong enough to make them verification sources for gravitational wave missions, e.g. the evolved Laser Interferometer Space Antenna (eLISA). Here we present a summary of the physical characteristics of these nine systems, including the observed rate of orbital decay. In addition, we present the recent discoveries from the ELM Survey, which identified two verification sources in the last 3 years. We also discuss the future prospects for increasing the sample of verification binaries.

Kilic, Mukremin; Brown, Warren R.; Hermes, J. J.; Gianninas, A.

81

Explaining Verification Conditions  

NASA Technical Reports Server (NTRS)

The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs themselves. We describe a systematic extension of the Hoare rules by labels so that the calculus itself can be used to build up explanations of the VCs. The labels are maintained through the different processing steps and rendered as natural language explanations. The explanations can easily be customized and can capture different aspects of the VCs; here, we focus on their structure and purpose. The approach is fully declarative and the generated explanations are based only on an analysis of the labels rather than directly on the logical meaning of the underlying VCs or their proofs. Keywords: program verification, Hoare calculus, traceability.

Deney, Ewen; Fischer, Bernd

2006-01-01

82

Nuclear disarmament verification  

SciTech Connect

Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

DeVolpi, A.

1993-12-31

83

Lessons Online  

NSDL National Science Digital Library

The instructors of an Earth science course used WebCT, a multipurpose software package, to create an online supplement to their course. It included class e-mail, science hyperlinks, an online calendar, an online discussion board, and online handouts. The

Krockover, Gerald H.; Ridgway, Kenneth D.; Witham, Shelly A.; Zinsmeister, William J.

2002-12-01

84

Verification and validation benchmarks.  

SciTech Connect

Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

Oberkampf, William Louis; Trucano, Timothy Guy

2007-02-01

85

The Exact Security of Digital Signatures -- How to Sign with RSA and Rabin  

Microsoft Academic Search

We describe an RSA-based signing scheme called PSS which combines essentially optimal efficiency with attractive security properties. Signing takes one RSA decryption plus some hashing, verification takes one RSA encryption plus some hashing, and the size of the signature is the size of the modulus. Assuming the underlying hash functions are ideal, our schemes are not only provably secure, but

Mihir Bellare; Phillip Rogaway

1996-01-01

86

Online Shopping  

Microsoft Academic Search

This chapter provides an overview of recent research related to online shopping and the conceptual frameworks that have guided\\u000a that research. Specifically, the chapter addresses research related to who shops online and who does not, what attracts consumers\\u000a to shop online, how and what consumers do when shopping online, and factors that might slow the growth in consumer online\\u000a activities.

Yi Cai; Brenda J. Cude

87

Online, Inc.  

NSDL National Science Digital Library

The Online, Inc. site contains selections from four magazines including Online, Database, CD-ROM Professional, and MultiMedia Schools. Tables of contents, selected articles, columns, and indexes are available for these Online, Inc. magazines. General information about subscribing to and writing for these magazines is also included. Registration and program information for the Online CD-ROM Conference and Exposition, and other events sponsored by Online, Inc., is also available.

88

Better Verification Through Symmetry  

Microsoft Academic Search

We address the state explosion problem in automatic verification of finite-state systemsby exploiting symmetries in the system description.We make symmetries easy to detect by introducing a new data type scalarset, a finiteand unordered set, to our description language. The set of operations on scalarsets arerestricted so that states are guaranteed to have the same future behavior, up to permutationof the

C. Norris Ip; David L. Dill

1996-01-01

89

Better Verification Through Symmetry  

Microsoft Academic Search

We address the state explosion problem in automatic verification of finite-state systemsby exploiting symmetries in the system description.We make symmetries easy to detect by introducing a new data type scalarset, a finiteand unordered set, to our description language. The set of operations on scalarsets arerestricted so that states are guaranteed to have the same future behavior, up to permutationof the

C. Norris Ip

1993-01-01

90

Software Modeling and Verification  

E-print Network

Software Modeling and Verification 2Staff · Professors: Prof. Dr. Ir. Joost­Pieter Katoen Prof. em. Benedikt Bollig (until Okt. 1st) Dr. Michael Weber (until Nov. 1st) Tingting Han, B.Sc. (since Nov. 1st is led by Joost-Pieter Katoen. As Joost-Pieter already joined the group in December 2004, this change

Ábrahám, Erika

91

Firmware versus software verification  

Microsoft Academic Search

The paper presents an uniform framework in which the firmware verification problem can be reduced to the software one. It is shown how to transform the control memory (ROM) content into a microprogram written in the specially designed language MIDDLE and what kind of information has to be included in the hardware documentation in order to make the transformation possible.

S. Budkowski; P. Dembinski

1978-01-01

92

ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

This presentation will be given at the EPA Science Forum 2005 in Washington, DC. The Environmental Technology Verification Program (ETV) was initiated in 1995 to speed implementation of new and innovative commercial-ready environemntal technologies by providing objective, 3rd pa...

93

Computer Verification in Cryptography  

Microsoft Academic Search

In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryp tographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we

Markus Kaiser; Johannes Buchmann

2009-01-01

94

Environmental Technology Verification Program  

E-print Network

Activities.................4 Table 2.0 Records Management Responsibilities for the MMR CenterEnvironmental Technology Verification Program Quality Management Plan (QMP) for the ETV Materials Management and Remediation Center Version 1.0 #12;QUALITY MANAGEMENT PLAN (QMP) for the ETV MATERIALS

95

Improved Verification for Aerospace Systems  

NASA Technical Reports Server (NTRS)

Aerospace systems are subject to many stringent performance requirements to be verified with low risk. This report investigates verification planning using conditional approaches vice the standard classical statistical methods, and usage of historical surrogate data for requirement validation and in verification planning. The example used in this report to illustrate the results of these investigations is a proposed mission assurance requirement with the concomitant maximum acceptable verification risk for the NASA Constellation Program Orion Launch Abort System (LAS). This report demonstrates the following improvements: 1) verification planning using conditional approaches vice classical statistical methods results in plans that are more achievable and feasible; 2) historical surrogate data can be used to bound validation of performance requirements; and, 3) incorporation of historical surrogate data in verification planning using conditional approaches produces even less costly and more reasonable verification plans. The procedures presented in this report may produce similar improvements and cost savings in verification for any stringent performance requirement for an aerospace system.

Powell, Mark A.

2008-01-01

96

QPF Verification: Challenges and Tools  

NSDL National Science Digital Library

This module looks at the common challenges and tools with respect to verification of quantitative precipitation forecasts (QPF). Through the use of rich illustrations, animations, and interactions, this module provides an introduction to a variety of methods and approaches for assessing the quality of QPFs. The module examines the need for, and the challenges of verifying precipitation forecasts. An overview is then presented of three verification programs available to most NWS forecast offices: the Hydrometeorological Prediction Center (HPC) verification, the National Precipitation Verification Unit (NPVU), and the Boise Verify Program (BOI Verify). For each of these programs, an introduction is provided covering the strengths and weaknesses as well as specific products available. Case examples are provided where appropriate to illustrate the application of the products in the field. Additional NWS verification tools under development are introduced: the Interactive Verification Program (IVP) and the Ensemble Verification System (EVS).

Comet

2010-05-25

97

Manhattan Project Signature Facilities  

NSDL National Science Digital Library

This collection is a list of the Department of Energy's Manhattan Project "Signature Facilities" approved by the Departmental Corporate Board on Historic Preservation in December 1999. Taken together, the eight Signature Facilities provide the core for DOE's ability to successfully interpret, whether in situ or through museum or other interpretive setting, the Manhattan Project mission of developing atomic bombs during World War II. This list does not preclude protection and preservation of other historic facilities in the nuclear-weapons complex. Just as these facilities constitute the core for DOE-wide preservation, access, and interpretation, sites may have site-specific signature facilities that best interpret that site's Manhattan Project mission from a local, state, regional, national or international perspective.

Griffith, Christopher

98

Current Signature Sensor  

NASA Technical Reports Server (NTRS)

A solenoid health monitoring system uses a signal conditioner and controller assembly in one embodiment that includes analog circuitry and a DSP controller. The analog circuitry provides signal conditioning to the low-level raw signal coming from a signal acquisition assembly. Software running in a DSP analyzes the incoming data (recorded current signature) and determines the state of the solenoid whether it is energized, de-energized, or in a transitioning state. In one embodiment, the software identifies key features in the current signature during the transition phase and is able to determine the health of the solenoid.

Perotti, Jose M. (Inventor); Lucena, Angel (Inventor); Ihlefeld, Curtis (Inventor); Burns, Bradley (Inventor); Bassignani, Mario (Inventor); Bassignani, Karin E. (Inventor)

2005-01-01

99

The verification challenge: Problems and promise of Strategic Nuclear Arms Control Verification  

Microsoft Academic Search

A broad, authoritative examination of Strategic Nuclear Arms Control Verification that addresses principles and tasks of verification, technology and monitoring, compliance issues, future verification needs, and review on what constitutes adequate verification.

T. J. Ralston; W. D. Metz

1985-01-01

100

Collider signatures of hylogenesis  

NASA Astrophysics Data System (ADS)

We consider collider signatures of the hylogenesis—a variant of the antibaryonic dark matter model. We obtain bounds on the model parameters from results of the first LHC run. Also we suggest several new channels relevant for probing the antibaryonic dark matter at LHC.

Demidov, S. V.; Gorbunov, D. S.; Kirpichnikov, D. V.

2015-02-01

101

Online Games  

NSDL National Science Digital Library

This is the home of resource collections that support the use of online games and environments for teaching geoscience. There is now a collection of relevant references, examples of online games, and ideas for teaching with online games suggested by participants in the Spring 2008 workshop.

102

Restructuring proteomics through verification  

PubMed Central

Proteomics technologies have revolutionized cell biology and biochemistry by providing powerful new tools to characterize complex proteomes, multiprotein complexes and post-translational modifications. Although proteomics technologies could address important problems in clinical and translational cancer research, attempts to use proteomics approaches to discover cancer biomarkers in biofluids and tissues have been largely unsuccessful and have given rise to considerable skepticism. The National Cancer Institute has taken a leading role in facilitating the translation of proteomics from research to clinical application, through its Clinical Proteomic Technologies for Cancer. This article highlights the building of a more reliable and efficient protein biomarker development pipeline that incorporates three steps: discovery, verification and qualification. In addition, we discuss the merits of multiple reaction monitoring mass spectrometry, a multiplex targeted proteomics platform, which has emerged as a potentially promising, high-throughput protein biomarker measurements technology for preclinical ‘verification’. PMID:21133699

Boja, Emily; Rivers, Robert; Kinsinger, Christopher; Mesri, Mehdi; Hiltke, Tara; Rahbar, Amir; Rodriguez, Henry

2011-01-01

103

Microprocessor Design Verification  

Microsoft Academic Search

Abstract Abstract. The verification of a microprocessor,design has been accomplished using a mechanical theorem prover. This microprocessor, the FM8502, is a 32-bit generalpurpose, von Neumann processor whose design-level (gate-level) specification has been verified with respect to,its instruction-level specification. Both,specifications were written in the Boyer-Moore logic, and the proof of correctness was carried out with the Boyer-Moore theorem prover. 2 Chapter

Warren A. Hunt Jr.

1989-01-01

104

Continuous verification using multimodal biometrics.  

PubMed

Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system. PMID:17299225

Sim, Terence; Zhang, Sheng; Janakiraman, Rajkumar; Kumar, Sandeep

2007-04-01

105

Biological Convergence of Cancer Signatures  

Microsoft Academic Search

Gene expression profiling has identified cancer prognostic and predictive signatures with superior performance to conventional histopathological or clinical parameters. Consequently, signatures are being incorporated into clinical practice and will soon influence everyday decisions in oncology. However, the slight overlap in the gene identity between signatures for the same cancer type or condition raises questions about their biological and clinical implications.

Xavier Solé; Núria Bonifaci; Núria López-Bigas; Antoni Berenguer; Pilar Hernández; Oscar Reina; Christopher A. Maxwell; Helena Aguilar; Ander Urruticoechea; Silvia de Sanjosé; Francesc Comellas; Gabriel Capellá; Víctor Moreno; Miguel Angel Pujana; Gustavo Stolovitzky

2009-01-01

106

Quantum Money with Classical Verification  

E-print Network

We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

Dmitry Gavinsky

2012-03-15

107

Quantum money with classical verification  

NASA Astrophysics Data System (ADS)

We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

Gavinsky, Dmitry

2014-12-01

108

Low Maintenance Verification Valeria Bertacco  

E-print Network

Low Maintenance Verification Valeria Bertacco Advanced Computer Architecture Lab The University of Michigan ­ Ann Arbor, MI Email: valeria@umich.edu Abstract-- Guaranteeing the functional correctness

Bertacco, Valeria

109

Measured Performance Signature Method  

E-print Network

MEASURED PERFORMANCE SIGNATURE METHOD Manager Power Schenectady, David J. Ahner Generation Technology Technologies, Inc. New York ABSTRACT The performance correction of systems that have many thermally integrated components is complex... and subject to error if individual component misperformance and/or deterioration is present. The performance correction involves a set of equations or curves which relate the expected changes in dependent performance parameters (i.e. output, fuel...

Ahner, D. J.

110

Knowledge Signatures for Information Integration  

SciTech Connect

This paper introduces the notion of a knowledge signature: a concise, ontologically-driven representation of the semantic characteristics of data. Knowledge signatures provide programmatic access to data semantics while allowing comparisons to be made across different types of data such as text, images or video, enabling efficient, automated information integration. Through observation, which determines the degree of association between data and ontological concepts, and refinement, which uses the axioms and structure of the domain ontology to place the signature more accurately within the context of the domain, knowledge signatures can be created. A comparison of such signatures for two different pieces of data results in a measure of their semantic separation. This paper discusses the definition of knowledge signatures along with the design and prototype implementation of a knowledge signature generator.

Thomson, Judi; Cowell, Andrew J.; Paulson, Patrick R.; Butner, R. Scott; Whiting, Mark A.

2003-10-25

111

Signature-based authentication system using watermarking in the ridgelet and Radon-DCT domain  

NASA Astrophysics Data System (ADS)

In this paper we propose a signature-based biometric system, where watermarking is applied to signature images in order to hide and keep secret some signature features in a static representation of the signature itself. Being a behavioral biometric, signatures are intrinsically different from other commonly used biometric data, possessing dynamic properties which can not be extracted from a single signature image. The marked images can be used for user authentication, letting their static characteristics being analyzed by automatic algorithms or security attendants. When a higher security is needed, the embedded features can be extracted and used, thus realizing a multi-level decision procedure. The proposed watermarking techniques are tailored to images with sharpened edges, just like a signature picture. In order to obtain a robust method, able to hide relevant data while keeping intact the original structure of the host, the mark is embedded as close as possible to the lines that constitute the signature, using the properties of the Radon transform. An extensive set of experimental results, obtained varying the system's parameters and concerning both the mark extraction and the verification performances, show the effectiveness of our approach.

Maiorana, Emanuele; Campisi, Patrizio; Neri, Alessandro

2007-10-01

112

Software Testing and Verification  

NSDL National Science Digital Library

The current issue of the IBM Systems Journal examines many aspects of software testing and verification. This new material contains ten articles written by workers in the IBM Research Division. Some of the papers, such as Testing z/OS, might be specific to IBM operations; however, most can be useful to individuals or companies implementing similar testing strategies. One article in particular discusses three case studies of Orthogonal Defect Classification and how it can be used "to improve software testing." Although the issue cannot be downloaded as a whole, individual papers can be viewed or downloaded in various formats.

2002-01-01

113

Software Verification and Validation Procedure  

SciTech Connect

This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

Olund, Thomas S.

2008-09-15

114

HDL to verification logic translator  

NASA Technical Reports Server (NTRS)

The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

Gambles, J. W.; Windley, P. J.

1992-01-01

115

Use Pre-disinfection Verification  

E-print Network

Use Pre-disinfection Rinsing & Washing Verification PackingSterilization Transfer Storage 1 2 3 4 5 and pass the following steps: pre-disinfection, rinsing, washing, verification, packing, sterilization in a chemical substance, which enables pre-disinfection, and are transferred to the sterilization service. There

Paris-Sud XI, Université de

116

Electromagnetic Signature Technique as a Promising Tool to Verify Nuclear Weapons Storage and Dismantlement under a Nuclear Arms Control Regime  

SciTech Connect

The 2010 ratification of the New START Treaty has been widely regarded as a noteworthy national security achievement for both the Obama administration and the Medvedev-Putin regime, but deeper cuts are envisioned under future arms control regimes. Future verification needs will include monitoring the storage of warhead components and fissile materials and verifying dismantlement of warheads, pits, secondaries, and other materials. From both the diplomatic and technical perspectives, verification under future arms control regimes will pose new challenges. Since acceptable verification technology must protect sensitive design information and attributes, non-nuclear non-sensitive signatures may provide a significant verification tool without the use of additional information barriers. The use of electromagnetic signatures to monitor nuclear material storage containers is a promising technology with the potential to fulfill these challenging requirements. Research performed at Pacific Northwest National Laboratory (PNNL) has demonstrated that low frequency electromagnetic signatures of sealed metallic containers can be used to confirm the presence of specific components on a “yes/no” basis without revealing classified information. Arms control inspectors might use this technique to verify the presence or absence of monitored items, including both nuclear and non-nuclear materials. Although additional research is needed to study signature aspects such as uniqueness and investigate container-specific scenarios, the technique potentially offers a rapid and cost-effective tool to verify reduction and dismantlement of U.S. and Russian nuclear weapons.

Bunch, Kyle J.; Williams, Laura S.; Jones, Anthony M.; Ramuhalli, Pradeep

2012-08-01

117

Online Investing  

NSDL National Science Digital Library

Sponsored by the Wall Street Journal, this site provides a collection of articles offering information and advice on several aspects of online investing. Stemming from a newly published book, Online Investing, by the editors and reporters of the online version of the Wall Street Journal, the site is divided into five "chapters" covering types of online investing, including stocks, bonds, mutual funds, futures and options, and tools of the trade. The articles are well written and offer very basic information for novices looking for sound information and advice on this kind of investing.

118

Signature CERN-URSS  

ScienceCinema

Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

None

2011-04-25

119

Multimodal signature modeling of humans  

NASA Astrophysics Data System (ADS)

Georgia Tech been investigating method for the detection of covert personnel in traditionally difficult environments (e.g., urban, caves). This program focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification and characterization of potential observables. Both aspects are needed to support the development of personnel detection and tracking algorithms. The difficult nature of these personnel-related problems dictates a multimodal sensing approach. Human signature data of sufficient and accurate quality and quantity do not exist, thus the development of an accurate signature model for a human is needed. This model should also simulate various human activities to allow motion-based observables to be exploited. This paper will describe a multimodal signature modeling approach that incorporates human physiological aspects, thermoregulation, and dynamics into the signature calculation. This approach permits both passive and active signatures to be modeled. The focus of the current effort involved the computation of signatures in urban environments. This paper will discuss the development of a human motion model for use in simulating both electro-optical signatures and radar-based signatures. Video sequences of humans in a simulated urban environment will also be presented; results using these sequences for personnel tracking will be presented.

Cathcart, J. Michael; Kocher, Brian; Prussing, Keith; Lane, Sarah; Thomas, Alan

2010-04-01

120

LOOK FOR THE SIGNATURE 1 Look for the Signature: How the Infusion of Personal Signatures Affects Product Evaluations and  

E-print Network

LOOK FOR THE SIGNATURE 1 Look for the Signature: How the Infusion of Personal Signatures Affects Product Evaluations and Purchase Behavior Abstract Brand managers often infuse personal signatures. The infusion of a personal signature into marketing stimuli thus influences consumption behavior by (1

Shyu, Mei-Ling

121

Online Training for Searching Online.  

ERIC Educational Resources Information Center

This paper focuses on the casual user's needs and problems in learning to search online retrieval systems. Such users are inclined to infrequent use, and are unlikely to have much interest or knowledge about the complexities of the system. The TRAINER program is designed to teach these users to search online, so that they may access information…

Caruso, Elaine

122

Spatial Forecast Verification Eric Gilleland  

E-print Network

Laboratory, National Center for Atmospheric Research Co-authors: D. Ahijevych, B.G. Brown, B. Casati, and E.E. Ebert 2010 ASP Colloquium #12;Spatial Forecast Verification Methods Inter-Comparison Project (ICP) #12

Gilleland, Eric

123

High stakes in INF verification  

SciTech Connect

The stakes involved in negotiating INF verification arrangements are high. While these proposals deal only with intermediate-range ground-launched cruise and mobile missiles, if properly devised they could help pave the way for comprehensive limits on other cruise missiles and strategic mobile missiles. In contrast, poorly drafted monitoring provisions could compromise national industrial security and generate numerous compliance controversies. Any verification regime will require new openness on both sides, but that means significant risks as well as opportunities. US and Soviet negotiators could spend weeks, months, and even years working out in painstaking detail verification provisions for medium-range missiles. Alternatively, if the two sides wished to conclude an INF agreement quickly, they could defer most of the difficult verification issues to the strategic arms negotiations.

Krepon, M.

1987-06-01

124

Generic interpreters and microprocessor verification  

NASA Technical Reports Server (NTRS)

The following topics are covered in viewgraph form: (1) generic interpreters; (2) Viper microprocessors; (3) microprocessor verification; (4) determining correctness; (5) hierarchical decomposition; (6) interpreter theory; (7) AVM-1; (8) phase-level specification; and future work.

Windley, Phillip J.

1990-01-01

125

Software Modeling and Verification Professors  

E-print Network

Software Modeling and Verification Staff · Professors Prof. Dr. Ir. Joost-Pieter Katoen PD Prof. em. Brockschmidt B. Bruetsch F. Dulat C. Dehnert D. Guck F. Gretz C. Kuhl F. Korzilius M. Maass M. Sarej M

Ábrahám, Erika

126

Verification for large space structures  

NASA Technical Reports Server (NTRS)

The primary concern for verification is the dynamic characteristics of the space structure related to the control and sensor/actuator location. Properties such as modal density, range of natural frequencies, and modal displacements at the sensor/actuator location are considered and are simulated for the verification of the structure/control closed loop system. A space beam is studied in zero gravity environment and in a 1 G gravity environment, along with their governing equations.

Chen, J.; Garba, J.

1985-01-01

127

Learning Online  

NSDL National Science Digital Library

To improve large lecture courses, the authors designed a hybrid instructional format that couples online homework with in-class, active learning exercises. They assessed student perceptions of a pilot version this hybrid class, and most students felt that

Sibley, Duncan H.; Riffell, Samuel K.

2003-03-01

128

Histology Online  

NSDL National Science Digital Library

Histology-online is a web-based, interactive histology textbook and atlas. It includes a computerized microscope to examine tissues and organs and provides a new way to teach histology that is preferred by students.

2011-08-01

129

Halloween Online  

NSDL National Science Digital Library

The scariest night of the year is almost upon us, and this site will help users get into the proper "spirit." Halloween Online is simply put a massive Halloween resource, with decorating and costume tips; a guide to carving and displaying your pumpkins; a selection of featured articles and interviews; Halloween recipes; downloadable graphics ("Scream Savers") and music files; e-cards; online games; and a large collection of links, among other offerings.

130

Protocol Online  

NSDL National Science Digital Library

Protocol Online is a database of research protocols in a variety of life science fields. It contains protocols contributed by worldwide researchers as well as links to web protocols hosted by worldwide research labs, biotech companies, personal web sites. The data is stored in a MySql relational database. Protocol Online also hosts discipline specific discussion forums (BioForum), and provides a free PubMed search and alerting service (PubAlert).

Long-Cheng Li (Protocol Online)

2012-01-06

131

Analytic Redundancy, Possible Conflicts, and TCG-based Fault Signature Diagnosis  

E-print Network

Analytic Redundancy, Possible Conflicts, and TCG-based Fault Signature Diagnosis applied evaluation steps in fault detection and isolation in dynamic systems. This paper compares three different-based approaches for online fault detection, isolation, and identi- fication (FDII) in complex nonlinear systems

Koutsoukos, Xenofon D.

132

Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest Wisconsin (USA)  

E-print Network

Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest online 20 November 2010 Keywords: Fire history Charcoal analysis Fire regime Wisconsin Sand plain CHAR Charster We show how sedimentary charcoal records from multiple sites within a single landscape can be used

Wisconsin at Madison, University of

133

An Off-line Payment System Based on a Group Blind Signature Constantin Popescu  

E-print Network

not provide the anonymity of the customers. Kugler and Vogt [13] proposed an online payment system withoutAn Off-line Payment System Based on a Group Blind Signature Scheme Constantin Popescu Department or trace the blackmailer. To solve anonymity of customers, electronic payment systems with revokable

Nørvåg, Kjetil

134

UHECR: Signatures and Models  

E-print Network

The signatures of Ultra High Energy (E >1 EeV) proton propagation through CMB radiation are pair-production dip and GZK cutoff. The visible characteristics of these two spectral features are ankle, which is intrinsic part of the dip, beginning of GZK cutoff in the differential spectrum and E_{1/2} in integral spectrum. Measured by HiRes and Telescope Array (TA) these characteristics agree with theoretical predictions. However, directly measured mass composition remains a puzzle. While HiRes and TA detectors observe the proton dominated mass composition, the data of Auger detector strongly evidence for nuclei mass composition becoming progressively heavier at energy higher than 4 EeV and reaching Iron at energy about 35 EeV. The models based on the Auger and HiRes/TA data are considered independently and classified using the transition from galactic to extragalactic cosmic rays. The ankle cannot provide this transition. since data of all three detector at energy (1 - 3) EeV agree with pure proton composition (...

Berezinsky, V

2013-01-01

135

UHECR: Signatures and models  

NASA Astrophysics Data System (ADS)

The signatures of Ultra High Energy (E ? 1 EeV) proton propagation through CMB radiation are pair-production dip and GZK cutoff. The visible characteristics of these two spectral features are ankle, which is intrinsic part of the dip, beginning of GZK cutoff in the differential spectrum and E1/2 in integral spectrum. Measured by HiRes and Telescope Array (TA) these characteristics agree with theoretical predictions. However, directly measured mass composition remains a puzzle. While HiRes and TA detectors observe the proton-dominated mass composition, the data of Auger detector strongly evidence for nuclei mass composition becoming progressively heavier at energy higher than 4 EeV and reaching Iron at energy about 35 EeV. The models based on the Auger and HiRes/TA data are considered independently and classified using the transition from galactic to extragalactic cosmic rays. The ankle cannot provide this transition. since data of all three detector at energy (1-3) EeV agree with pure proton composition (or at least not heavier than Helium). If produced in Galaxy these particles result in too high anisotropy. This argument excludes or strongly disfavours all ankle models with ankle energy Ea > 3 EeV. The calculation of elongation curves, Xmax(E), for different ankle models strengthens further this conclusion. Status of other models, the dip, mixed composition and Auger based models are discussed.

Berezinsky, V.

2013-06-01

136

Development of Asset Fault Signatures for Prognostic and Health Management in the Nuclear Industry  

SciTech Connect

Proactive online monitoring in the nuclear industry is being explored using the Electric Power Research Institute’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. The FW-PHM Suite is a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. The FW-PHM Suite has four main modules: Diagnostic Advisor, Asset Fault Signature (AFS) Database, Remaining Useful Life Advisor, and Remaining Useful Life Database. This paper focuses on development of asset fault signatures to assess the health status of generator step-up generators and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. At the most basic level, fault signatures are comprised of an asset type, a fault type, and a set of one or more fault features (symptoms) that are indicative of the specified fault. The AFS Database is populated with asset fault signatures via a content development exercise that is based on the results of intensive technical research and on the knowledge and experience of technical experts. The developed fault signatures capture this knowledge and implement it in a standardized approach, thereby streamlining the diagnostic and prognostic process. This will support the automation of proactive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

Vivek Agarwal; Nancy J. Lybeck; Randall Bickford; Richard Rusaw

2014-06-01

137

Intrusion detection using secure signatures  

DOEpatents

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30

138

On Incremental Quantitative Verification for Probabilistic Systems  

E-print Network

On Incremental Quantitative Verification for Probabilistic Systems Marta Kwiatkowska, David Parker, Hongyang Qu and Mateusz Ujma Department of Computer Science, University of Oxford Abstract Quantitative for adaptive systems. We argue the need for incremental quantitative verification techniques which are able

Oxford, University of

139

On Quantitative Software Verification Marta Kwiatkowska  

E-print Network

software. The lecture will give an overview of current research directions in quantitative softwareOn Quantitative Software Verification Marta Kwiatkowska Oxford University Computing Laboratory guided by counterexample traces [1]. The vast majority of software verification research to date has

Oxford, University of

140

Quantitative Verification Techniques for Biological Processes  

E-print Network

of a rich selection of quantitative properties. 1 Introduction Recent research has had considerable successDRAFT Quantitative Verification Techniques for Biological Processes Marta Kwiatkowska, Gethin approach but, by employing formal verification techniques, compute exact quantitative mea- sures as opposed

Oxford, University of

141

Ballastic signature identification systems study  

NASA Technical Reports Server (NTRS)

The results are described of an attempt to establish a uniform procedure for documenting (recording) expended bullet signatures as effortlessly as possible and to build a comprehensive library of these signatures in a form that will permit the automated comparison of a new suspect bullet with the prestored library. The ultimate objective is to achieve a standardized format that will permit nationwide interaction between police departments, crime laboratories, and other interested law enforcement agencies.

Reich, A.; Hine, T. L.

1976-01-01

142

Hoover's Online  

NSDL National Science Digital Library

Hoover's Online features an accurate and comprehensive database of company information free on the Web. Called Hoover's MasterList Plus, the database of more than 8,500 of the largest public and private U.S. companies provides company name, key personnel, address, sales, number of employees, ticker symbol and other information for companies meeting the user's designated search criteria. Hoover's Online also includes the week's top business news stories, a directory of more than 1,000 corporate Web sites, a synopsis of the 25 top-selling business books and links to other business information resources on the Web, including stock quotes and SEC filings. The new List of Lists has dozens of rankings indicating which companies are the largest, which CEOs made the most money, which companies are the best employers, and more. Almost all of Hoover's Online is free, including the content mentioned here.

1998-01-01

143

A verification system of RMAP protocol controller  

NASA Astrophysics Data System (ADS)

The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

2015-01-01

144

Structural verification for GAS experiments  

NASA Technical Reports Server (NTRS)

The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

Peden, Mark Daniel

1992-01-01

145

SD Online  

NSDL National Science Digital Library

The European Foundation presents SD Online, a special feature of the Sustainable Development pages. SD Online is a full-text database of the Foundation's resources which "explore specific facets of the sustainability debate and take advantage of the Foundation's research in a variety of areas." Beginning in 1998, the databases have grown to include a Networks database, tools database, as well as databases on SME support initiatives and education and training. Each searchable and browseable database must be accessed separately using the sidebar menu on the right, and each offers a brief explanation of the information within the database, as well as fully cataloged records.

146

NISTIR 7284 Personal Identity Verification Card  

E-print Network

NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

147

Logic verification algorithms and their parallel implementation  

Microsoft Academic Search

LOVER incorporates a novel approach to combinational logic verification and obtains good results when compared to existing techniques. In this paper we describe a new verification algorithm, LOVER-PODEM, whose enumeration phase is based on PODEM. A variant of LOVER-PODEM, called PLOVER, is presented. We have developed, for the first time, parallel logic verification schemes. Issues in efficiently parallelizing both general

Hi-Keung Tony Ma; Srinivas Devadas; Alberto L. Sangiovanni-Vincentelli; R. Wei

1987-01-01

148

Working Memory Mechanism in Proportional Quantifier Verification  

ERIC Educational Resources Information Center

The paper explores the cognitive mechanisms involved in the verification of sentences with proportional quantifiers (e.g. "More than half of the dots are blue"). The first study shows that the verification of proportional sentences is more demanding than the verification of sentences such as: "There are seven blue and eight yellow…

Zajenkowski, Marcin; Szymanik, Jakub; Garraffa, Maria

2014-01-01

149

Formal verification of mathematical software  

NASA Technical Reports Server (NTRS)

Methods are investigated for formally specifying and verifying the correctness of mathematical software (software which uses floating point numbers and arithmetic). Previous work in the field was reviewed. A new model of floating point arithmetic called the asymptotic paradigm was developed and formalized. Two different conceptual approaches to program verification, the classical Verification Condition approach and the more recently developed Programming Logic approach, were adapted to use the asymptotic paradigm. These approaches were then used to verify several programs; the programs chosen were simplified versions of actual mathematical software.

Sutherland, D.

1984-01-01

150

Domestic Wire Transfer Instructions To insure legibility and accuracy, fill in this form online before printing.  

E-print Network

Domestic Wire Transfer Instructions To insure legibility and accuracy, fill in this form online to the Office of Treasury Operations for processing. The online Request for Wire Transfer form supersedes any to be included in the request. Signature Authority All Request for Wire Transfer forms must be signed

Moore, Paul A.

151

(VP, AVP, Dean, Manager): Have you completed the Online Travel Certification?  

E-print Network

(VP, AVP, Dean, Manager): Have you completed the Online Travel Certification? If "No", please log in to Skillport via Online Services to complete it. No No Will your lodging arrangements exceed $175 per night. Yes Traveler's Signature (Required): Date (Must be prior to travel) Appropriate Administrator

Ravikumar, B.

152

CHEMICAL INDUCTION MIXER VERIFICATION - ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

The Wet-Weather Flow Technologies Pilot of the Environmental Technology Verification (ETV) Program, which is supported by the U.S. Environmental Protection Agency and facilitated by NSF International, has recently evaluated the performance of chemical induction mixers used for di...

153

Quantum messages with signatures forgeable in arbitrated quantum signature schemes  

NASA Astrophysics Data System (ADS)

Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

2015-02-01

154

SIGNATURE: A workbench for gene expression signature analysis  

PubMed Central

Background The biological phenotype of a cell, such as a characteristic visual image or behavior, reflects activities derived from the expression of collections of genes. As such, an ability to measure the expression of these genes provides an opportunity to develop more precise and varied sets of phenotypes. However, to use this approach requires computational methods that are difficult to implement and apply, and thus there is a critical need for intelligent software tools that can reduce the technical burden of the analysis. Tools for gene expression analyses are unusually difficult to implement in a user-friendly way because their application requires a combination of biological data curation, statistical computational methods, and database expertise. Results We have developed SIGNATURE, a web-based resource that simplifies gene expression signature analysis by providing software, data, and protocols to perform the analysis successfully. This resource uses Bayesian methods for processing gene expression data coupled with a curated database of gene expression signatures, all carried out within a GenePattern web interface for easy use and access. Conclusions SIGNATURE is available for public use at http://genepattern.genome.duke.edu/signature/. PMID:22078435

2011-01-01

155

Hybrid Enrichment Assay Methods for a UF6 Cylinder Verification Station: FY10 Progress Report  

SciTech Connect

Pacific Northwest National Laboratory (PNNL) is developing the concept of an automated UF6 cylinder verification station that would be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until the arrival of International Atomic Energy Agency (IAEA) inspectors. At the center of this unattended system is a hybrid enrichment assay technique that combines the traditional enrichment-meter method (based on the 186 keV peak from 235U) with non-traditional neutron-induced high-energy gamma-ray signatures (spawned primarily by 234U alpha emissions and 19F(alpha, neutron) reactions). Previous work by PNNL provided proof-of-principle for the non-traditional signatures to support accurate, full-volume interrogation of the cylinder enrichment, thereby reducing the systematic uncertainties in enrichment assay due to UF6 heterogeneity and providing greater sensitivity to material substitution scenarios. The work described here builds on that preliminary evaluation of the non-traditional signatures, but focuses on a prototype field system utilizing NaI(Tl) and LaBr3(Ce) spectrometers, and enrichment analysis algorithms that integrate the traditional and non-traditional signatures. Results for the assay of Type-30B cylinders ranging from 0.2 to 4.95 wt% 235U, at an AREVA fuel fabrication plant in Richland, WA, are described for the following enrichment analysis methods: 1) traditional enrichment meter signature (186 keV peak) as calculated using a square-wave convolute (SWC) algorithm; 2) non-traditional high-energy gamma-ray signature that provides neutron detection without neutron detectors and 3) hybrid algorithm that merges the traditional and non-traditional signatures. Uncertainties for each method, relative to the declared enrichment for each cylinder, are calculated and compared to the uncertainties from an attended HPGe verification station at AREVA, and the IAEA’s uncertainty target values for feed, tail and product cylinders. A summary of the major findings from the field measurements and subsequent analysis follows: • Traditional enrichment-meter assay using specially collimated NaI spectrometers and a Square-Wave-Convolute algorithm can achieve uncertainties comparable to HPGe and LaBr for product, natural and depleted cylinders. • Non-traditional signatures measured using NaI spectrometers enable interrogation of the entire cylinder volume and accurate measurement of absolute 235U mass in product, natural and depleted cylinders. • A hybrid enrichment assay method can achieve lower uncertainties than either the traditional or non-traditional methods acting independently because there is a low degree of correlation in the systematic errors of the two individual methods (wall thickness variation and 234U/235U variation, respectively). This work has indicated that the hybrid NDA method has the potential to serve as the foundation for an unattended cylinder verification station. When compared to today’s handheld cylinder-verification approach, such a station would have the following advantages: 1) improved enrichment assay accuracy for product, tail and feed cylinders; 2) full-volume assay of absolute 235U mass; 3) assay of minor isotopes (234U and 232U) important to verification of feedstock origin; single instrumentation design for both Type 30B and Type 48 cylinders; and 4) substantial reduction in the inspector manpower associated with cylinder verification.

Smith, Leon E.; Jordan, David V.; Orton, Christopher R.; Misner, Alex C.; Mace, Emily K.

2010-08-01

156

Significance Analysis of Prognostic Signatures  

PubMed Central

A major goal in translational cancer research is to identify biological signatures driving cancer progression and metastasis. A common technique applied in genomics research is to cluster patients using gene expression data from a candidate prognostic gene set, and if the resulting clusters show statistically significant outcome stratification, to associate the gene set with prognosis, suggesting its biological and clinical importance. Recent work has questioned the validity of this approach by showing in several breast cancer data sets that “random” gene sets tend to cluster patients into prognostically variable subgroups. This work suggests that new rigorous statistical methods are needed to identify biologically informative prognostic gene sets. To address this problem, we developed Significance Analysis of Prognostic Signatures (SAPS) which integrates standard prognostic tests with a new prognostic significance test based on stratifying patients into prognostic subtypes with random gene sets. SAPS ensures that a significant gene set is not only able to stratify patients into prognostically variable groups, but is also enriched for genes showing strong univariate associations with patient prognosis, and performs significantly better than random gene sets. We use SAPS to perform a large meta-analysis (the largest completed to date) of prognostic pathways in breast and ovarian cancer and their molecular subtypes. Our analyses show that only a small subset of the gene sets found statistically significant using standard measures achieve significance by SAPS. We identify new prognostic signatures in breast and ovarian cancer and their corresponding molecular subtypes, and we show that prognostic signatures in ER negative breast cancer are more similar to prognostic signatures in ovarian cancer than to prognostic signatures in ER positive breast cancer. SAPS is a powerful new method for deriving robust prognostic biological signatures from clinically annotated genomic datasets. PMID:23365551

Beck, Andrew H.; Knoblauch, Nicholas W.; Hefti, Marco M.; Kaplan, Jennifer; Schnitt, Stuart J.; Culhane, Aedin C.; Schroeder, Markus S.; Risch, Thomas; Quackenbush, John; Haibe-Kains, Benjamin

2013-01-01

157

EDGAR Online  

NSDL National Science Digital Library

IPO Express is a new database of over 2,500 initial public offer filings from EDGAR Online. Users can search by industry, company, underwriter, or geographic location and retrieve details on the offer, principle shareholders, and competitors in addition to other relevant company information.

158

Science Online.  

ERIC Educational Resources Information Center

Describes how anyone with a personal computer and a telephone can easily go "online" with hundreds of different bulletin board services (BBS), many of which are ideal data sources and information exchanges for amateur scientists. Lists contact information for selected commercial and governmental BBS systems. (Author/JJK)

McCormick, John

1991-01-01

159

SFT monitoring and design verification  

Microsoft Academic Search

The Submerged Floating Tunnel (SFT) is still a prototype structure. To change this, SFTs have to be built and we have to learn from this process. This involves comparing the structure’s real behaviour with its design and transferring this knowledge to the engineering community. Monitoring and design verification is a step in this direction. The paper discusses various aspects that

Ian Markey

2010-01-01

160

Ozone Monitoring Instrument geolocation verification  

Microsoft Academic Search

Verification of the geolocation assigned to individual ground pixels as measured by the Ozone Monitoring Instrument (OMI) aboard the NASA EOS-Aura satellite was performed by comparing geophysical Earth surface details as observed in OMI false color images with the high-resolution continental outline vector map as provided by the Interactive Data Language (IDL) software tool from ITT Visual Information Solutions. The

M. Kroon; M. R. Dobber; R. Dirksen; J. P. Veefkind; P. F. Levelt

2008-01-01

161

NEXT Thruster Component Verification Testing  

Microsoft Academic Search

Component testing is a critical part of thruster life validation activities under NASA's Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life

Luis R. Piñero; James S. Sovey

2007-01-01

162

Visual Attention During Sentence Verification.  

ERIC Educational Resources Information Center

Eye movement data were collected for 28 college students reading 32 sentences with sentence verification questions. The factors observed were target sentence voice (active/passive), probe voice, and correct response (true/false). Pairs of subjects received the same set of stimuli, but with agents and objects in the sentences reversed. As expected,…

Lucas, Peter A.

163

Automated verification system user's guide  

NASA Technical Reports Server (NTRS)

Descriptions of the operational requirements for all of the programs of the Automated Verification System (AVS) are provided. The AVS programs are: (1) FORTRAN code analysis and instrumentation program (QAMOD); (2) Test Effectiveness Evaluation Program (QAPROC); (3) Transfer Control Variable Tracking Program (QATRAK); (4) Program Anatomy Table Generator (TABGEN); and (5) Network Path Analysis Program (RAMBLE).

Hoffman, R. H.

1972-01-01

164

Hidden verification for computational mathematics  

Microsoft Academic Search

We present hidden verification as a means to make the power of computational logic available to users of computer algebra systems while shieldin gt hemfrom its complexity. We have implemented in PV Sa library of facts about elementary and transcendental functions, and automatic procedures to attempt proofs of continuity, convergence and differentiability for functions in this class. These are called

Hanne Gottliebsena

165

Continuous Verification Using Multimodal Biometrics  

E-print Network

the system. This may be appropriate for low-security environments but can lead to session "hijacking" (akin the cost of unauthorized use of a computer is high, continuous verification, if it can be realized is desirable include the usage of computers for airline cockpit con- trols, in defense establishments

Sim, Terence

166

Retrieval processes in arithmetic production and verification.  

PubMed

To investigate whether arithmetic production and verification involve the same retrieval processes, we alternated multiplication production trials (e.g., 9 x 6 = ?) with verification trials (4 x 9 = 36, true or false?) and analyzed positive error priming. Positive error priming is the phenomenon in which errors frequently match correct answers from preceding problems. Production errors were strongly primed by previous production trials (the error-answer matching rate was about 90% greater than expected by chance), but production errors were not strongly primed by previous verification trials (approximately 13% above chance). Conversely, false-verification errors were primed by previous verification trials (approximately 25% above chance), but not by production trials. The results indicated that arithmetic production and verification were mediated by different memory processes and suggest a familiarity-based over a retrieval-based model of arithmetic verification. PMID:8881320

Campbell, J I; Tarling, D P

1996-03-01

167

Regression Verification Using Impact Summaries  

NASA Technical Reports Server (NTRS)

Regression verification techniques are used to prove equivalence of syntactically similar programs. Checking equivalence of large programs, however, can be computationally expensive. Existing regression verification techniques rely on abstraction and decomposition techniques to reduce the computational effort of checking equivalence of the entire program. These techniques are sound but not complete. In this work, we propose a novel approach to improve scalability of regression verification by classifying the program behaviors generated during symbolic execution as either impacted or unimpacted. Our technique uses a combination of static analysis and symbolic execution to generate summaries of impacted program behaviors. The impact summaries are then checked for equivalence using an o-the-shelf decision procedure. We prove that our approach is both sound and complete for sequential programs, with respect to the depth bound of symbolic execution. Our evaluation on a set of sequential C artifacts shows that reducing the size of the summaries can help reduce the cost of software equivalence checking. Various reduction, abstraction, and compositional techniques have been developed to help scale software verification techniques to industrial-sized systems. Although such techniques have greatly increased the size and complexity of systems that can be checked, analysis of large software systems remains costly. Regression analysis techniques, e.g., regression testing [16], regression model checking [22], and regression verification [19], restrict the scope of the analysis by leveraging the differences between program versions. These techniques are based on the idea that if code is checked early in development, then subsequent versions can be checked against a prior (checked) version, leveraging the results of the previous analysis to reduce analysis cost of the current version. Regression verification addresses the problem of proving equivalence of closely related program versions [19]. These techniques compare two programs with a large degree of syntactic similarity to prove that portions of one program version are equivalent to the other. Regression verification can be used for guaranteeing backward compatibility, and for showing behavioral equivalence in programs with syntactic differences, e.g., when a program is refactored to improve its performance, maintainability, or readability. Existing regression verification techniques leverage similarities between program versions by using abstraction and decomposition techniques to improve scalability of the analysis [10, 12, 19]. The abstractions and decomposition in the these techniques, e.g., summaries of unchanged code [12] or semantically equivalent methods [19], compute an over-approximation of the program behaviors. The equivalence checking results of these techniques are sound but not complete-they may characterize programs as not functionally equivalent when, in fact, they are equivalent. In this work we describe a novel approach that leverages the impact of the differences between two programs for scaling regression verification. We partition program behaviors of each version into (a) behaviors impacted by the changes and (b) behaviors not impacted (unimpacted) by the changes. Only the impacted program behaviors are used during equivalence checking. We then prove that checking equivalence of the impacted program behaviors is equivalent to checking equivalence of all program behaviors for a given depth bound. In this work we use symbolic execution to generate the program behaviors and leverage control- and data-dependence information to facilitate the partitioning of program behaviors. The impacted program behaviors are termed as impact summaries. The dependence analyses that facilitate the generation of the impact summaries, we believe, could be used in conjunction with other abstraction and decomposition based approaches, [10, 12], as a complementary reduction technique. An evaluation of our regression verification technique shows that our approach is capable of leveragin

Backes, John; Person, Suzette J.; Rungta, Neha; Thachuk, Oksana

2013-01-01

168

Design and implementation of WPKI-based Gas station online payment system  

Microsoft Academic Search

Through analyzing the security problems which exist in general on-line payment systems, this paper proposes a scheme based on WPKI (Wireless Public Key Infrastructure) and further designs and implements a gas station on-line payment system. By using WPKI technology which includes SSL (Secure Sockets Layer) protocol, digital signature and digital certificate, the designed on-line payment system can achieve data privacy,

Wang Jian; Liu Yanheng; Dong Tianzhe

2010-01-01

169

Signature Visualization of Software Binaries  

SciTech Connect

In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

Panas, T

2008-07-01

170

Democrats Online  

NSDL National Science Digital Library

Now that the political convention season is over, you may be looking for sites that offer a little more interactivity and are a little less concerned with the party line. Debuting this week is Democrats Online: A Community of American Voices. The emphasis on this site is user involvement; users are offered the opportunity to participate in real-time chat using Ewgie, a Java applet, and to post a personal web page indicating which accomplishments of the Clinton/Gore administration are most important to them. A highlight of the site is the Shockwave-driven "Help Dole Name his Cabinet," which allows users to spin the slot machine and imagine Dole's possible picks for Chief of Staff, Secretary of State, and Secretary of Defense. The results are discomforting or inspiring, depending on your perspective. A "question of the week" poll will come online on Labor Day.

171

ISSN Online  

NSDL National Science Digital Library

The ISSN (International Standard Serial Number) is the internationally recognized unique numeric identifier for serial publications in any format. To date, the ISSN network, coordinated by the ISSN International Centre in Paris, has registered and assigned ISSNs for more than 900,000 serials, with approximately 4,000 new ISSNs added to the ISSN Register each month. Recently, this register has been made accessible through the Web at ISSN Online. ISSN Online is a subscription service, but it is available for free on a 30-day trial basis. Trial users must register an email address to obtain a temporary password. Then they may conduct 40 queries, view 400 records, and download 10 records during the test period.

172

of the UF Signature: UF Signature with Themeline  

E-print Network

with the guidelines in the UF Graphic Identity manual found at identity.ufl.edu. · Secondary signatures elements work together to create a graphic identity representation of the University of Florida as a prominent graphic element in all publications -- print and electronic -- affiliated with the university

Jawitz, James W.

173

Avion Online  

NSDL National Science Digital Library

The first Aviation/Aerospace Newspaper to be available on the Internet via the World Wide Web is The Avion Online. Produced at Embry-Riddle Aeronautical University, this weekly college newspaper specializes in coverage of aerospace activity, such as the space shuttle, and aviation topics like the Lockheed/Martin merger. Get weekly reports from students who are studying the very stories they are reporting.

174

Physiology Online  

NSDL National Science Digital Library

Physiology Online, the electronic information service of the Physiological Society, provides information about its three journals: Journal of Physiology, Proceedings of the Physiological Society, and Experimental Physiology. Also included are selected abstracts, as well as information about recent monographs, job listings (mostly in the U.K.), information about Society grants, a physiology file and software archive for both PC and Mac platforms, pointers to other physiology resources on the Internet, and a listing of upcoming meetings and conferences within the field.

1994-01-01

175

Outside Online  

NSDL National Science Digital Library

Outside Online is one of the premier outdoors oriented sites on the Web, covering fitness, biking, hiking, water sports, snow sports, travel, and mountaineering, among others. The site contains news and views, a travel section, reviews of outdoor products, coverage of outdoor activities such as the Tour DuPont, the World Cup Whitewater Slalom and skiing in South America, and selected full text, as well as special buyer's and family vacation guides from "Outside Magazine."

176

Online OCR  

NSDL National Science Digital Library

For those with scanned documents that would be more useful in editable form, Online OCR offers a free, high-quality solution. Users can simply upload an image (JPG, JPEG, BMP, TIFF, GIF, and non-editable PDF are all accepted), then choose the language and preferred output format. At the free level, the service will convert 14 images per hour, but those who are satisfied with the service and require more frequent conversion may purchase a membership.

2013-01-01

177

Einstein Online  

NSDL National Science Digital Library

Einstein Online provides the user with a simple, but meticulous, approach to Einstein's Theory of Relativity. In the section 'Elementary Einstein', the theories of Special and General Relativity are explained in detail, going through concepts like Relativity, Spacetime and Space Geometry. The following section, 'Spotlights on Relativity', contains applications of both theories, from the Relativity of Simultaneity, to Gravity and Gravitational Waves, to Black Holes and Cosmology, to the Quantum realm.

2007-06-18

178

Registration online.  

PubMed

The Nursing and Midwifery Council has launched a secure service that allows nurses to register and manage their registration online. Users can view their registration status, update contact details, view and print a statement of entry, submit notification of practice, pay the annual retention or renewal fees, set up a direct debit for annual fee payments, provide equality and diversity information, and give the geographical location of employment. Go to tinyurl.com/mj2ahxk to set up an account. PMID:25428323

2014-11-27

179

Software Verification and Testing Lecture Notes: Testing I  

E-print Network

Software Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence mathematical skills 1 #12;Motivation verification vs testing: · verification used often in early stages

Struth, Georg

180

Irma 5.2 multi-sensor signature prediction model  

NASA Astrophysics Data System (ADS)

The Irma synthetic signature prediction code is being developed by the Munitions Directorate of the Air Force Research Laboratory (AFRL/MN) to facilitate the research and development of multi-sensor systems. There are over 130 users within the Department of Defense, NASA, Department of Transportation, academia, and industry. Irma began as a high-resolution, physics-based Infrared (IR) target and background signature model for tactical weapon applications and has grown to include: a laser (or active) channel (1990), improved scene generator to support correlated frame-to-frame imagery (1992), and passive IR/millimeter wave (MMW) channel for a co-registered active/passive IR/MMW model (1994). Irma version 5.0 was released in 2000 and encompassed several upgrades to both the physical models and software; host support was expanded to Windows, Linux, Solaris, and SGI Irix platforms. In 2005, version 5.1 was released after an extensive verification and validation of an upgraded and reengineered active channel. Since 2005, the reengineering effort has focused on the Irma passive channel. Field measurements for the validation effort include the unpolarized data collection. Irma 5.2 is scheduled for release in the summer of 2007. This paper will report the validation test results of the Irma passive models and discuss the new features in Irma 5.2.

Savage, James; Coker, Charles; Thai, Bea; Aboutalib, Omar; Chow, Anthony; Yamaoka, Neil; Kim, Charles

2007-04-01

181

Irma 5.2 multi-sensor signature prediction model  

NASA Astrophysics Data System (ADS)

The Irma synthetic signature prediction code is being developed by the Munitions Directorate of the Air Force Research Laboratory (AFRL/RW) to facilitate the research and development of multi-sensor systems. There are over 130 users within the Department of Defense, NASA, Department of Transportation, academia, and industry. Irma began as a high-resolution, physics-based Infrared (IR) target and background signature model for tactical weapon applications and has grown to include: a laser (or active) channel (1990), improved scene generator to support correlated frame-to-frame imagery (1992), and passive IR/millimeter wave (MMW) channel for a co-registered active/passive IR/MMW model (1994). Irma version 5.0 was released in 2000 and encompassed several upgrades to both the physical models and software; host support was expanded to Windows, Linux, Solaris, and SGI Irix platforms. In 2005, version 5.1 was released after extensive verification and validation of an upgraded and reengineered ladar channel. The reengineering effort then shifted focus to the Irma passive channel. Field measurements for the validation effort include both polarized and unpolarized data collection. Irma 5.2 was released in 2007 with a reengineered passive channel. This paper summarizes the capabilities of Irma and the progress toward Irma 5.3, which includes a reengineered radar channel.

Savage, James; Coker, Charles; Thai, Bea; Aboutalib, Omar; Pau, John

2008-04-01

182

Molecular Signatures of Natural Selection  

E-print Network

Molecular Signatures of Natural Selection Rasmus Nielsen Center for Bioinformatics and Department There is an increasing interest in detecting genes, or genomic re- gions, that have been targeted by natural selection contribution of natural selection in shaping the genetic variation observed among living organisms. In one

Nielsen, Rasmus

183

Disaster relief through composite signatures  

NASA Astrophysics Data System (ADS)

A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

2012-06-01

184

Content Extraction Signatures Ron Steinfeld  

E-print Network

Content Extraction Signatures Ron Steinfeld Department of Computing, Macquarie University, North. Software and Info. Systems, University of North Carolina at Charlotte, Charlotte, NC 28223, USA yzheng of an earlier paper presented at ICISC 2001, Dec. 6-7 2001, Seoul, South Korea. This work was done while

Zheng, Yuliang

185

Shape Signature for Retinal Biometrics  

Microsoft Academic Search

The technique used in the only commercially available system for retinal biometrics is based on encoding the vessel structure surrounding the optic disc. However, it has been reported that this technique has low inter-personal variability, making it unsuitable for identifying an individual from a large database. In this paper we propose a new technique based on the shape signature to

M. Z. Che Azemin; Dinesh K. Kumar; Hong Ren Wu

2009-01-01

186

NEXT Thruster Component Verification Testing  

NASA Technical Reports Server (NTRS)

Component testing is a critical part of thruster life validation activities under NASA s Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life test of two NEXT isolators was therefore initiated and has accumulated more than 10,000 hr of operation. Measurements to date indicate only a negligibly small increase in leakage current. The cathode heaters were also selected for verification testing. The technology to fabricate these heaters, developed for the International Space Station plasma contactor hollow cathode assembly, was transferred to Aerojet for the fabrication of the NEXT prototype model ion thrusters. Testing the contractor-fabricated heaters is necessary to validate fabrication processes for high reliability heaters. This paper documents the status of the propellant isolator and cathode heater tests.

Pinero, Luis R.; Sovey, James S.

2007-01-01

187

Formal verification of AI software  

NASA Technical Reports Server (NTRS)

The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

Rushby, John; Whitehurst, R. Alan

1989-01-01

188

Verification of Security Protocols References  

E-print Network

}KB {NA, NB}KA {NB}KB Charlie #12;Corrected Protocol · Needham-Schroeder-Lowe A B : {A, NA}KB B A : {B, NA, NB}KA Charlie {C, NA, NB}KA #12;Model Checking · Protocols are typical concurrent systems;Alice Bob Attacker (Charlie) {NA, A}KC {NA, A}KB {NA, NB}KA {NB}KC {NB}KB #12;Verification in Strand

Hagiya, Masami

189

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2010 CFR

...letters or characters comprising a name, executed, adopted or authorized as a signature. Signatures are not required in unofficial PDF copies submitted in accordance with § 232.104. (b) Each signatory to an electronic filing (including,...

2010-04-01

190

PERFORMANCE VERIFICATION OF ANIMAL WATER TREATMENT TECHNOLOGIES THROUGH EPA'S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

The U.S. Environmental Protection Agency created the Environmental Technology Verification Program (ETV) to further environmental protection by accelerating the commercialization of new and innovative technology through independent performance verification and dissemination of in...

191

ENVIRONMENTAL TECHNOLOGY VERIFICATION: GENERIC VERIFICATION PROTOCOL FOR BIOLOGICAL AND AEROSOL TESTING OF GENERAL VENTILATION AIR CLEANERS  

EPA Science Inventory

The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

192

PERFORMANCE VERIFICATION OF STORMWATER TREATMENT DEVICES UNDER EPA¿S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

The Environmental Technology Verification (ETV) Program was created to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The program¿s goal is to further environmental protection by a...

193

Verification Challenges at Low Numbers  

SciTech Connect

Many papers have dealt with the political difficulties and ramifications of deep nuclear arms reductions, and the issues of “Going to Zero”. Political issues include extended deterrence, conventional weapons, ballistic missile defense, and regional and geo-political security issues. At each step on the road to low numbers, the verification required to ensure compliance of all parties will increase significantly. Looking post New START, the next step will likely include warhead limits in the neighborhood of 1000 . Further reductions will include stepping stones at1000 warheads, 100’s of warheads, and then 10’s of warheads before final elimination could be considered of the last few remaining warheads and weapons. This paper will focus on these three threshold reduction levels, 1000, 100’s, 10’s. For each, the issues and challenges will be discussed, potential solutions will be identified, and the verification technologies and chain of custody measures that address these solutions will be surveyed. It is important to note that many of the issues that need to be addressed have no current solution. In these cases, the paper will explore new or novel technologies that could be applied. These technologies will draw from the research and development that is ongoing throughout the national laboratory complex, and will look at technologies utilized in other areas of industry for their application to arms control verification.

Benz, Jacob M.; Booker, Paul M.; McDonald, Benjamin S.

2013-06-01

194

Speaker Verification Using Adapted Gaussian Mixture Models  

Microsoft Academic Search

Reynolds, Douglas A., Quatieri, Thomas F., and Dunn, Robert B., Speaker Verification Using Adapted Gaussian Mixture Models, Digital Signal Processing10(2000), 19–41.In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using

Douglas A. Reynolds; Thomas F. Quatieri; Robert B. Dunn

2000-01-01

195

Introduction to Verification of Hydrologic Forecasts  

NSDL National Science Digital Library

This module offers a comprehensive description of a set of common verification measures for hydrologic forecasts, both deterministic and probabilistic. Through use of rich illustrations, animations, and interactions, this module explains how these verification measures can provide valuable information to users with varying needs. In addition to providing a measure of how well a forecast matches observations, verification measures can be used to help forecasters and users learn about the strengths and weaknesses of a forecast.

Comet

2008-06-30

196

Kiplinger Online  

NSDL National Science Digital Library

The Kiplinger organization developed Kiplinger Online to provide personal finance guidance on the Internet. Users can find selected articles from the current and past three months' issues of Kiplinger's Personal Finance Magazine on topics ranging from investing to retirement planning. The news section highlights consumer, business and financial news. Visitors to the site can compare the rankings of mutual funds (stocks and bonds) by size and return, consult a glossary of 101 financial terms and examine financial planning calculators . Parents might want to refer to sections on educating children, budgeting, and money management. Note that certain parts of the site require subscription.

1998-01-01

197

Bloomberg Online  

NSDL National Science Digital Library

Bloomberg Online provides the latest financial news and data. The site features three sections: Bloomberg News, World Markets and Bloomberg Energy. In the Bloomberg News section, visitors can read the latest financial news from the United States and around the world. They can also read articles written by Bloomberg columnists on various business and financial issues. The World Markets section provides stock market indices and currency rates from all over the world. The section also contains a yield curve on US and foreign bonds. Bloomberg Energy provides the latest information and news on energy prices. Some information at this site is available only to Boomberg Personal Finance Magazine subscribers.

1998-01-01

198

Online Conversion  

NSDL National Science Digital Library

Need to convert joules to kilocalories? A rood to a square mile? 100 weight to stones? How about your age in dog years? You can do all of these conversions and over 8,000 more at Online Conversion. Conversions are organized by type (temperature, length, cooking, etc.), and each conversion page includes numerous options. Quick links to other conversions are also provided on each page so users don't have to return to the main page. Simply put, a very handy and easy-to-use site that belongs in the reference section of any user's bookmarks.

199

Biology Online  

NSDL National Science Digital Library

Biology Online is a community-run web site that provides access to resources on many aspects of biological and life sciences. The site includes a discussion board with forums on cell biology, molecular biology, evolution, bioinformatics, and many other topics. The Wiki dictionary features user-editable content and links to articles on a wide variety of topics in biology. There is also a book catalog with information on biology-related books, including author and content descriptions, product details, and customer reviews; and a directory of links to other websites with related content in the life and Earth sciences.

200

Online Writery  

NSDL National Science Digital Library

The Online Writery at the University of Missouri, Columbia, is a student-oriented writing and learning environment that includes both communication and information resources: e-mail, access to two MOOs , writing resources, teaching resources, and paperless papers. It is a place to write and read and talk, a place to learn stuff. It is a resource you can use whether you are writing for a class or not. These pages are made of the stuff writers (of any kind) need: information about writing, and opportunities to talk with other writers.

201

Kidsource Online  

NSDL National Science Digital Library

Kidsource Online is an extensive collection of information about raising children from newborns to adolescents. A sampling of the publications they've pulled together at the site includes "Children and Bilingualism" from the American Speech-Language-Hearing Association; "Testing Your Child's Hearing" by Carol Knightly, Pediatric Audiologist; and the Asthma and Allergy Foundation of America (AAFA) Provides Tips to Help Parents and Kids Cope with Allergy Season. Resources are organized under top-level categories of Newborns, Toddlers, Preschoolers, K-12, Education, Health, Recreation, Forums, Organizations, and Guide to Best Software, among others.

1997-01-01

202

ADA Online  

NSDL National Science Digital Library

ADA Online, from the American Dental Association (ADA), includes resources for professionals, patients, and students. The site contains membership information, ADA publications and position papers, research and recommendations on clinical issues, a catalog of handouts and posters for patient education, information for new dentists, factsheets on dental careers, licensing information, directories of accredited education programs, listings of continuing education courses, and more. The section for patients and consumers includes answers to frequently asked questions; information on oral health, disease prevention, and how to deal with dental emergencies; and special sections for parents, children, and teens. A small portion of the site is for ADA members only.

1998-01-01

203

Signature Tree Generation for Polymorphic Worms  

E-print Network

Signature Tree Generation for Polymorphic Worms Yong Tang, Bin Xiao, Member, IEEE, and Xicheng Lu generate accurate signatures for worms, especially polymorphic worms. In this paper, we propose a new NSG system--PolyTree, to defend against polymorphic worms. We observe that signatures from worms

Xiao, Bin

204

Collider Signatures of Dark Matter Michael Schmitt  

E-print Network

Collider Signatures of Dark Matter Michael Schmitt Northwestern University SLAC Summer Institute, August 2, 2007 Lecture 1 Dark Matter Paradigm Missing Energy Signatures Tevatron LHC #12;2SSI 1: Collider Signatures for DM Dark Matter at CollidersDark Matter at Colliders There is a remarkable optimism about

Schmitt, Michael

205

Gender verification in competitive sports.  

PubMed

The possibility that men might masquerade as women and be unfair competitors in women's sports is accepted as outrageous by athletes and the public alike. Since the 1930s, media reports have fuelled claims that individuals who once competed as female athletes subsequently appeared to be men. In most of these cases there was probably ambiguity of the external genitalia, possibly as a result of male pseudohermaphroditism. Nonetheless, beginning at the Rome Olympic Games in 1960, the International Amateur Athletics Federation (IAAF) began establishing rules of eligibility for women athletes. Initially, physical examination was used as a method for gender verification, but this plan was widely resented. Thus, sex chromatin testing (buccal smear) was introduced at the Mexico City Olympic Games in 1968. The principle was that genetic females (46,XX) show a single X-chromatic mass, whereas males (46,XY) do not. Unfortunately, sex chromatin analysis fell out of common diagnostic use by geneticists shortly after the International Olympic Committee (IOC) began its implementation for gender verification. The lack of laboratories routinely performing the test aggravated the problem of errors in interpretation by inexperienced workers, yielding false-positive and false-negative results. However, an even greater problem is that there exist phenotypic females with male sex chromatin patterns (e.g. androgen insensitivity, XY gonadal dysgenesis). These individuals have no athletic advantage as a result of their congenital abnormality and reasonably should not be excluded from competition. That is, only the chromosomal (genetic) sex is analysed by sex chromatin testing, not the anatomical or psychosocial status. For all the above reasons sex chromatin testing unfairly excludes many athletes. Although the IOC offered follow-up physical examinations that could have restored eligibility for those 'failing' sex chromatin tests, most affected athletes seemed to prefer to 'retire'. All these problems remain with the current laboratory based gender verification test, polymerase chain reaction based testing of the SRY gene, the main candidate for male sex determination. Thus, this 'advance' in fact still fails to address the fundamental inequities of laboratory based gender verification tests. The IAAF considered the issue in 1991 and 1992, and concluded that gender verification testing was not needed. This was thought to be especially true because of the current use of urine testing to exclude doping: voiding is observed by an official in order to verify that a sample from a given athlete has actually come from his or her urethra. That males could masquerade as females in these circumstances seems extraordinarily unlikely. Screening for gender is no longer undertaken at IAAF competitions. PMID:8272686

Simpson, J L; Ljungqvist, A; de la Chapelle, A; Ferguson-Smith, M A; Genel, M; Carlson, A S; Ehrhardt, A A; Ferris, E

1993-11-01

206

The AIAA Code Verification Project -Test cases for CFD Code Verification  

E-print Network

1 The AIAA Code Verification Project - Test cases for CFD Code Verification Urmila Ghia University of solutions obtained by CFD codes. This document is a product of the AIAA Committee On Standards (COS, and as a complement to the Verification and Validation Guide prepared by the AIAA. While the solutions presented

207

Verification challenge: problems and promise of strategic nuclear arms control verification  

Microsoft Academic Search

The reviewer of Potter's book, Verification and Arms Control, cites the need for public information on verification aspects. He notes that US-Soviet disagreements on methods to assure compliance began in the late 1950s. Despite advances in technical sophistication of surveillance satellites, the two countries remain politically distrustful. The lack of technically perfect verification systems enables those who are hostile to

R. Scribner; W. Metz; T. Ralston

1985-01-01

208

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2010 CFR

... 2010-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2010-07-01

209

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2014 CFR

... 2014-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2014-07-01

210

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2012 CFR

... 2012-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2012-07-01

211

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2011 CFR

... 2011-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2011-07-01

212

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2013 CFR

... 2013-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2013-07-01

213

Gene-expression signatures of Atlantic salmon's plastic life cycle Nadia Aubin-Horth a,*, Benjamin H. Letcher b  

E-print Network

Gene-expression signatures of Atlantic salmon's plastic life cycle Nadia Aubin-Horth a,*, Benjamin expression differs as a function of life history variation is largely unknown. Atlantic salmon exhibits April 2009 Available online 3 May 2009 Keywords: Life history Alternative reproductive tactics Migration

Hofmann, Hans A.

214

Climate signatures on decadal to interdecadal time scales as obtained from mollusk shells (Arctica islandica) from Iceland  

E-print Network

. On multidecadal time scales, the record shows a pronounced variability linked to North Atlantic tem- perature and Lohmann, 2004). Part of its signature resembles the North Atlantic Oscillation (NAO) (Hurrell and van Loon 2012 Accepted 12 August 2012 Available online 13 September 2012 Keywords: Climate proxy North Atlantic

Schöne, Bernd R.

215

Infrared signature studies of aerospace vehicles  

NASA Astrophysics Data System (ADS)

Infrared (IR) emissions from aircraft are used to detect, track, and lock-on to the target. MAN Portable Air Defence Systems (MANPADS) have emerged as a major cause of aircraft and helicopter loss. Therefore, IR signature studies are important to counter this threat for survivability enhancement, and are an important aspect of stealth technology. This paper reviews contemporary developments in this discipline, with particular emphasis on IR signature prediction from aerospace vehicles. The role of atmosphere in IR signature analysis, and relation between IR signature level and target susceptibility are illustrated. Also, IR signature suppression systems and countermeasure techniques are discussed, to highlight their effectiveness and implications in terms of penalties.

Mahulikar, Shripad P.; Sonawane, Hemant R.; Arvind Rao, G.

2007-10-01

216

Polarization signatures of airborne particulates  

NASA Astrophysics Data System (ADS)

Exploratory research has been conducted with the aim of completely determining the polarization signatures of selected particulates as a function of wavelength. This may lead to a better understanding of the interaction between electromagnetic radiation and such materials, perhaps leading to the point detection of bio-aerosols present in the atmosphere. To this end, a polarimeter capable of measuring the complete Mueller matrix of highly scattering samples in transmission and reflection (with good spectral resolution from 300 to 1100 nm) has been developed. The polarization properties of Bacillus subtilis (surrogate for anthrax spore) are compared to ambient particulate matter species such as pollen, dust, and soot. Differentiating features in the polarization signatures of these samples have been identified, thus demonstrating the potential applicability of this technique for the detection of bio-aerosol in the ambient atmosphere.

Raman, Prashant; Fuller, Kirk A.; Gregory, Don A.

2013-07-01

217

32 CFR 270.7 - Verification of eligibility.  

Code of Federal Regulations, 2010 CFR

...DEFENSE (CONTINUED) MISCELLANEOUS COMPENSATION OF CERTAIN FORMER OPERATIVES INCARCERATED BY THE DEMOCRATIC REPUBLIC OF VIETNAM Standards and Verification of Eligibility § 270.7 Verification of eligibility. (a) All...

2010-07-01

218

Cascade signature and syndrome compression  

Microsoft Academic Search

A linear feedback shift register (LFSR) is commonly used in built-in self-test (BIST) and board-level testing schemes to compress the output response from the circuit under-test. The problem of aliasing, where errors go undetected, may occur with the LFSR-based compression. This paper describes a new method that reduces the probability of aliasing significantly. The method utilizes both LFSR-based signature analyser

Rana Ejaz Ahmed

1995-01-01

219

Estimating Attributes of Nuclear Weapon and Other Fissile Material Configuration Using Features Of Nuclear Materials Identification Signatures  

SciTech Connect

This brief describes a strategy that, when implemented, will allow the attributes, i.e., the physical properties, of nuclear weapon and other configurations of fissile material to be estimated from Nuclear Material Identification System (NMIS) signatures for arms control, treaty verification, and transparency purposes. Attributes are estimated by condensing measured NMIS signatures into ''features'' that approximately represent physical characteristics of the measurement such as gamma-ray transmission, induced fission, etc. The features are obtained from NMIS signatures to estimate quantities related to gamma and neutron transmission through the inspected item and gamma and neutron scattering and production via induced fission within the inspected item. Multivariate, i.e., multiple-feature, linear models have been successfully employed to estimate attributes, and multivariate nonlinear models are currently under investigation. Attributes estimated employing this strategy can then be examined to test the supposition that the inspected item is in fact a nuclear weapon.

mattingly, j.k.; mihalczo, j.t.; mullens, j.a.; perez, r.b.; valentine, t.e.

1999-08-24

220

Functional Role of Ribosomal Signatures  

PubMed Central

Although structure and sequence signatures in ribosomal RNA and proteins are defining characteristics of the three domains of life and instrumental in constructing the modern phylogeny, little is known about their functional roles in the ribosome. In this work, the largest coevolving RNA/protein signatures in the bacterial 30S ribosome are investigated both experimentally and computationally through all-atom molecular-dynamics simulations. The complex includes the N-terminal fragment of the ribosomal protein S4, which is a primary binding protein that initiates 30S small subunit assembly from the 5? domain, and helix 16 (h16), which is part of the five-way junction in 16S rRNA. Our results show that the S4 N-terminus signature is intrinsically disordered in solution, whereas h16 is relatively stable by itself. The dynamic disordered property of the protein is exploited to couple the folding and binding process to the five-way junction, and the results provide insight into the mechanism for the early and fast binding of S4 in the assembly of the ribosomal small subunit. PMID:21156135

Chen, Ke; Eargle, John; Sarkar, Krishnarjun; Gruebele, Martin; Luthey-Schulten, Zaida

2010-01-01

221

Formal Definition and Construction of Nominative Signature  

NASA Astrophysics Data System (ADS)

Since the introduction of nominative signature in 1996, there are three problems that have still not been solved. First, there is no convincing application proposed; second, there is no formal security model available; and third, there is no proven secure scheme constructed, given that all the previous schemes have already been found flawed. In this paper, we give positive answers to these problems. First, we illustrate that nominative signature is a better tool for building user certification systems which were originally implemented using universal designated-verifier signature. Second, we propose a formal definition and adversarial model for nominative signature. Third, we show that Chaum's undeniable signature can be transformed to an efficient nominative signature by simply using a standard signature. The security of our transformation can be proven under the standard number-theoretic assumption.

Liu, Dennis Y. W.; Wong, Duncan S.; Huang, Xinyi; Wang, Guilin; Huang, Qiong; Mu, Yi; Susilo, Willy

222

Turbulence Modeling Verification and Validation  

NASA Technical Reports Server (NTRS)

Computational fluid dynamics (CFD) software that solves the Reynolds-averaged Navier-Stokes (RANS) equations has been in routine use for more than a quarter of a century. It is currently employed not only for basic research in fluid dynamics, but also for the analysis and design processes in many industries worldwide, including aerospace, automotive, power generation, chemical manufacturing, polymer processing, and petroleum exploration. A key feature of RANS CFD is the turbulence model. Because the RANS equations are unclosed, a model is necessary to describe the effects of the turbulence on the mean flow, through the Reynolds stress terms. The turbulence model is one of the largest sources of uncertainty in RANS CFD, and most models are known to be flawed in one way or another. Alternative methods such as direct numerical simulations (DNS) and large eddy simulations (LES) rely less on modeling and hence include more physics than RANS. In DNS all turbulent scales are resolved, and in LES the large scales are resolved and the effects of the smallest turbulence scales are modeled. However, both DNS and LES are too expensive for most routine industrial usage on today's computers. Hybrid RANS-LES, which blends RANS near walls with LES away from walls, helps to moderate the cost while still retaining some of the scale-resolving capability of LES, but for some applications it can still be too expensive. Even considering its associated uncertainties, RANS turbulence modeling has proved to be very useful for a wide variety of applications. For example, in the aerospace field, many RANS models are considered to be reliable for computing attached flows. However, existing turbulence models are known to be inaccurate for many flows involving separation. Research has been ongoing for decades in an attempt to improve turbulence models for separated and other nonequilibrium flows. When developing or improving turbulence models, both verification and validation are important steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

Rumsey, Christopher L.

2014-01-01

223

Conformance Verification of Privacy Policies  

NASA Astrophysics Data System (ADS)

Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

Fu, Xiang

224

SHIELD verification and validation report  

SciTech Connect

This document outlines the verification and validation effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system code. Along with its predecessors, SHIELD has been in use at the Savannah River Site (SRS) for more than ten years. During this time the code has been extensively tested and a variety of validation documents have been issued. The primary function of this report is to specify the features and capabilities for which SHIELD is to be considered validated, and to reference the documents that establish the validation.

Boman, C.

1992-02-01

225

Structural dynamics verification facility study  

NASA Technical Reports Server (NTRS)

The need for a structural dynamics verification facility to support structures programs was studied. Most of the industry operated facilities are used for highly focused research, component development, and problem solving, and are not used for the generic understanding of the coupled dynamic response of major engine subsystems. Capabilities for the proposed facility include: the ability to both excite and measure coupled structural dynamic response of elastic blades on elastic shafting, the mechanical simulation of various dynamical loadings representative of those seen in operating engines, and the measurement of engine dynamic deflections and interface forces caused by alternative engine mounting configurations and compliances.

Kiraly, L. J.; Hirchbein, M. S.; Mcaleese, J. M.; Fleming, D. P.

1981-01-01

226

Online Search Optimization.  

ERIC Educational Resources Information Center

This course syllabus describes methods for optimizing online searching, using as an example searching on the National Library of Medicine (NLM) online system. Four major activities considered are the online interview, query analysis and search planning, online interaction, and post-search analysis. Within the context of these activities, concepts…

Homan, Michael; Worley, Penny

227

University Student Online Plagiarism  

ERIC Educational Resources Information Center

This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

Wang, Yu-mei

2008-01-01

228

Agronomy Journal Online  

NSDL National Science Digital Library

The American Society of Agronomy has announced online availability of this journal, in conjunction with Stanford University's HighWire Press. Online full-text content for the Agronomy Journal begins with the July-August 1999 issue, with online abstracts from January-February 1998. Note that the free trial period for the online journal ends May 1, 2001.

229

Online Voucher Quick Reference  

E-print Network

Online Voucher Quick Reference NUFinancials Payments OnlineVoucherQuickReference 12/10/2013 - rb > Online Voucher Entry Page · or NUFinancials Accounts Payable Vouchers Add/Update Online Voucher/letters or barcode# on form). 2. Enter the Invoice Date (from invoice, date of service, or today's date). 3. Look up

Shull, Kenneth R.

230

EMERGING RENEWABLES PROGRAM SYSTEMS VERIFICATION REPORT  

E-print Network

on-site verifications of small scale renewable energy systems in 2004-2005. These were done The keywords for purposes of a search on the California Energy Commission Web site (www.energy, renewable energy, shading, solar, system performance, system verification, utility interconnection, wind #12

231

Graph Based Reduction of Program Verification Conditions  

Microsoft Academic Search

Increasing the automaticity of proofs in deductive verifica- tion of C programs is a challenging task. When applied to industrial C programs known heuristics to generate sim- pler verification conditions are not efficient enough. This is mainly due to their size and a high number of irrelevant hypotheses. This work presents a strategy to reduce program verification conditions by selecting

Jean-François Couchot; Alain Giorgetti; Nicolas Stouls

2009-01-01

232

Concepts for inventory verification in critical facilities  

Microsoft Academic Search

Materials measurement and inventory verification concepts for safeguarding large critical facilities are presented. Inspection strategies and methods for applying international safeguards to such facilities are proposed. The conceptual approach to routine inventory verification includes frequent visits to the facility by one inspector, and the use of seals and nondestructive assay (NDA) measurements to verify the portion of the inventory maintained

D. D. Cobb; J. L. Sapir; E. A. Kern; R. J. Dietz

1978-01-01

233

The monitoring and verification of nuclear weapons  

NASA Astrophysics Data System (ADS)

This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

Garwin, Richard L.

2014-05-01

234

Verification techniques for cache coherence protocols  

Microsoft Academic Search

In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic model checking, and symbolic state models. Since these techniques search the state space of the protocol exhaustively, the amount of memory required to manipulate that state information and the verification time grow very fast with the number

Fong Pong; Michel Dubois

1997-01-01

235

Quantum Money with Classical Verification Dmitry Gavinsky  

E-print Network

Quantum Money with Classical Verification Dmitry Gavinsky NEC Laboratories America, Inc. Princeton, NJ, U.S.A. Abstract We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme

Gavinsky, Dmitry

236

Modular verification of software components in C  

Microsoft Academic Search

We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software system into subproblems of manageable complexity. The decomposition reflects the modularity in the software design. We use weak simulation as the notion of conformance between the program and its specification.

Sagar Chaki; Edmund M. Clarke; Alex Groce; Somesh Jha; Helmut Veith

2003-01-01

237

Quantitative Aspects of Behaviour Network Verification  

E-print Network

Quantitative Aspects of Behaviour Network Verification Christopher Armbrust, Thorsten Ropertz, Lisa Kiekbusch, and Karsten Berns Robotics Research Lab, Department of Computer Science, University://rrlab.cs.uni-kl.de/ Abstract. This paper presents quantitative aspects of an approach for the modelling and verification

Berns, Karsten

238

Formal Specification and Verification of Concurrent  

E-print Network

Formal Specification and Verification of Concurrent ProgramsCurriculum Module SEI-CM-27-1.0 #12;Formal Specification and Verification of Concurrent Programs SEI Curriculum Module SEI-CM-27-1.0 February as reducingThis module introduces formal specification of con- the number of eventual errors

Berry, Daniel M.

239

IMPROVING AIR QUALITY THROUGH ENVIRONMENTAL TECHNOLOGY VERIFICATIONS  

EPA Science Inventory

The U.S. Environmental Protection Agency (EPA) began the Environmental Technology Verification (ETV) Program in 1995 as a means of working with the private sector to establish a market-based verification process available to all environmental technologies. Under EPA's Office of R...

240

High School Completion Status Verification Worksheet  

E-print Network

High School Completion Status Verification Worksheet Office of Student Financial Assistance P for a review process called "Verification" or you answered "none of the above" to the high school completion question on the FAFSA. As a result, we must verify your high school completion status and compare

Pantaleone, Jim

241

201314 High School Completion Status Verification Worksheet  

E-print Network

201314 High School Completion Status Verification Worksheet Office of Student Financial selected for a review process called "Verification" or you answered "none of the above" to the high school completion question on the FAFSA. As a result, we must verify your high school completion status and compare

Pantaleone, Jim

242

Guidelines for qualifying cleaning and verification materials  

NASA Technical Reports Server (NTRS)

This document is intended to provide guidance in identifying technical issues which must be addressed in a comprehensive qualification plan for materials used in cleaning and cleanliness verification processes. Information presented herein is intended to facilitate development of a definitive checklist that should address all pertinent materials issues when down selecting a cleaning/verification media.

Webb, D.

1995-01-01

243

Working memory mechanism in proportional quantifier verification.  

PubMed

The paper explores the cognitive mechanisms involved in the verification of sentences with proportional quantifiers (e.g., "More than half of the dots are blue"). The first study shows that the verification of proportional sentences is more demanding than the verification of sentences such as: "There are seven blue and eight yellow dots". The second study reveals that both types of sentences are correlated with memory storage, however, only proportional sentences are associated with the cognitive control. This result suggests that the cognitive mechanism underlying the verification of proportional quantifiers is crucially related to the integration process, in which an individual has to compare in memory the cardinalities of two sets. In the third study we find that the numerical distance between two cardinalities that must be compared significantly influences the verification time and accuracy. The results of our studies are discussed in the broader context of processing complex sentences. PMID:24374596

Zajenkowski, Marcin; Szymanik, Jakub; Garraffa, Maria

2014-12-01

244

Hierarchical Design and Verification for VLSI  

NASA Technical Reports Server (NTRS)

The specification and verification work is described in detail, and some of the problems and issues to be resolved in their application to Very Large Scale Integration VLSI systems are examined. The hierarchical design methodologies enable a system architect or design team to decompose a complex design into a formal hierarchy of levels of abstraction. The first step inprogram verification is tree formation. The next step after tree formation is the generation from the trees of the verification conditions themselves. The approach taken here is similar in spirit to the corresponding step in program verification but requires modeling of the semantics of circuit elements rather than program statements. The last step is that of proving the verification conditions using a mechanical theorem-prover.

Shostak, R. E.; Elliott, W. D.; Levitt, K. N.

1983-01-01

245

Attitudes toward buying online.  

PubMed

A survey of 11 positive features and 10 discouraging features of online shopping was carried out on 180 students and identified certain behavioral patterns for online shoppers versus non-shoppers. It was found that online shoppers have consistently stronger positive feelings about online shopping than do non-shoppers. On the other hand, non-shoppers have more negative feelings about online shopping than do shoppers, but not consistently so. Online shoppers are aware of some of the discouraging features of online shopping, but these features do not deter them from shopping online. The implication for marketers is that they should focus on making the experience of online shopping more accommodating and more user-friendly since the positive features of online shopping ("convenience" and "efficiency") appear to be more important than the negative features ("effort/impersonality"). PMID:15006173

Yang, Bijou; Lester, David

2004-02-01

246

Video-based fingerprint verification.  

PubMed

Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

Qin, Wei; Yin, Yilong; Liu, Lili

2013-01-01

247

Cognitive Bias in Systems Verification  

NASA Technical Reports Server (NTRS)

Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

Larson, Steve

2012-01-01

248

OFFICE VERIFICATION/DENTIST'S SIGNATURE FOR DENTIST'S USE ONLY --FOR ADDITIONAL INFORMATION, DIAGNOSIS, PROCEDURES, OR SPECIAL  

E-print Network

NO A FULL TIME STUDENT? YES NO EMPLOYED? YES NO 3. ARE ANY DENTAL BENEFITS OR SERVICES PROVIDED UNDER ANY OTHER PLAN OF INSURANCE OR DENTAL SERVICES: YES NO IF "YES," PROVIDE: POLICY NUMBER: NAME OF INSURER THE PLACEMENT OF A BRIDGE, DENTURE OR CROWN: A) IS THIS THE INITIAL PLACEMENT? UPPER YES NO LOWER YES NO B

Northern British Columbia, University of

249

75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification  

Federal Register 2010, 2011, 2012, 2013, 2014

...regulatory requirements for documentation of employment eligibility...3) Copying of documentation. * * * If such a copy or...appropriate hardware and software, personnel and documentation) necessary to locate,...

2010-07-22

250

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes  

E-print Network

by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under contract FA8750 not necessarily represent the official views of the HHS. Supported in part by the Defense Advanced Research

251

Observational Signatures of Magnetic Reconnection  

NASA Technical Reports Server (NTRS)

Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

Savage, Sabrina

2014-01-01

252

Signature of anisotropic bubble collisions  

SciTech Connect

Our universe may have formed via bubble nucleation in an eternally inflating background. Furthermore, the background may have a compact dimension--the modulus of which tunnels out of a metastable minimum during bubble nucleation--which subsequently grows to become one of our three large spatial dimensions. When in this scenario our bubble universe collides with other ones like it, the collision geometry is constrained by the reduced symmetry of the tunneling instanton. While the regions affected by such bubble collisions still appear (to leading order) as disks in an observer's sky, the centers of these disks all lie on a single great circle, providing a distinct signature of anisotropic bubble nucleation.

Salem, Michael P. [Institute of Cosmology, Department of Physics and Astronomy, Tufts University, Medford, Massachusetts 02155 (United States)

2010-09-15

253

Magnetic signatures for satellite anomalies  

NASA Astrophysics Data System (ADS)

A study of the electrostatic discharge event records of a geosynchronous communications satellite from April 1983 to December 1987 has uncovered similarities with the yearly trends of magnetic activity in the declining portion of the 11-year solar cycle, with maxima around the equinoxes and minima during solstitial months. Detailed comparisons with magnetograms obtained near the satellite's footprint, at Yellowknife, Canada, indicate that magnetic storms, substorms, and bays offer magnetic signatures for the discharge events; substorms are noted to play a dominant role. The occurrences of electrostatic discharge relative to the magnetic perturbations implies a variable time delay in the occurrence after initiation of the magnetic disturbance.

Lam, Hing-Lan; Hruska, Jaroslava

1991-02-01

254

Detecting intrusions through attack signature analysis  

SciTech Connect

Intrusion detection has generally been based on defining normal user behavior through profiles and rule-based systems and on identifying significant deviations from such behavior as anomalous. An alternative, or a supplementary, strategy for detecting intrusions is based on attack signature analysis, whose objective is to define and recognize events or sequences of events as attack-type behavior. Such event sequences, which may constitute part of a larger attack, may be employed to exploit certain system flaws or known vulnerabilities. This paper concentrates on attack signature analysis in general, and on a preliminary version of the signature analysis module of the distributed intrusion detection system (DIDS) in particular. A signature representation is developed, a number of attack scenarios and their corresponding signatures are outlined, and mechanisms to detect the signatures are discussed.

Snapp, S.R. [Haystack Labs., Inc., Austin, TX (United States); Mukherjee, B.; Levitt, K.N. [Lawrence Livermore National Lab., CA (United States)

1991-10-11

255

Poynter Online  

NSDL National Science Digital Library

Founded in 1975, the Poynter Institute was created by Nelson Poynter, who served as chairman of the St. Petersburg Times and the Congressional Quarterly. Over the past three decades, the organization has worked to train new cadres of journalists through a variety of intensive seminars and educational formats. Poynter Online provides interested parties access to a wide range of articles and columns created by well-regarded members of their organization and other working journalists from around the United States. Visitors can view job postings in the field, look over career columns, and even submit questions to columnists. Along with this vocationally oriented material, there are sections such as âÂÂdiversityâÂÂ, âÂÂphotojournalismâÂÂ, and âÂÂethicsâÂÂ, which contain insightful pieces on these subjects. As might be expected given the general trends in media, there are a number of helpful blogs here that address writing for general audiences, ethical considerations for journalists, and so on. For aspiring journalists and those currently working in the profession, this site is tremendously useful.

256

LD Online  

NSDL National Science Digital Library

LD Online is a website focused on providing information on learning disabilities (LD) and attention-deficit hyperactivity disorder (ADHD) which is geared towards parents, teachers, and professionals. The site is an educational service of public television station WETA, and also works with the National Joint Committee on Learning Disabilities. Visitors will find that the site addresses both children and adults with LD and ADHD, and those who are unfamiliar with LD and ADHD will appreciate the site's "Getting Started" link, which has "LD Basics", "ADHD Basics", "Questions + Answers" and a "Glossary". The "Multimedia" link of videos, audio, and transcripts will give visitors the opportunity to listen to or watch experts in the field. They can also listen to the personal stories of families, teachers, and kids with LD or ADHD. Practical tips for parents are also offered in the Multimedia link. Users will be pleasantly surprised by the optimism and determination of some of these kids, when reading their personal stories in the "Your Stories" section.

257

Competition on Software Verification University of Passau, Germany  

E-print Network

Competition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract Competition on Software Verification. The verification community has performed competitions in various areas in the past, and SV-COMP'12 is the first competition of verification tools that take software programs

Beyer, Dirk

258

Term-Level Verification of a Pipelined CISC Microprocessor  

E-print Network

Term-Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12;Abstract By abstracting the details of the data representations and operations in a microprocessor, term-level verification can formally prove that a pipelined

259

TermLevel Verification of a Pipelined CISC Microprocessor  

E-print Network

Term­Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12; Abstract By abstracting the details of the data representations and operations in a microprocessor, term­level verification can formally prove that a pipelined

260

Verification: What works and what does not? Stephen A. Edwards  

E-print Network

Verification: What works and what does not? Stephen A. Edwards Columbia University Verification: What works and what does not? ­ p. 1/5 #12;Verification at Columbia · Luca Carloni et al. model detection. I want to verify my implementation obeys the semantics. Verification: What works and what does

261

Narrow terahertz attenuation signatures in Bacillus thuringiensis.  

PubMed

Terahertz absorption signatures from culture-cultivated Bacillus thuringiensis were measured with a THz photomixing spectrometer operating from 400 to 1200 GHz. We observe two distinct signatures centered at ?955 and 1015 GHz, and attribute them to the optically coupled particle vibrational resonance (surface phonon-polariton) of Bacillus spores. This demonstrates the potential of the THz attenuation signatures as "fingerprints" for label-free biomolecular detection. PMID:23821459

Zhang, Weidong; Brown, Elliott R; Viveros, Leamon; Burris, Kellie P; Stewart, C Neal

2014-10-01

262

Metric Signature Transitions in Optical Metamaterials  

E-print Network

We demonstrate that the extraordinary waves in indefinite metamaterials experience (- - + +) effective metric signature. During a metric signature change transition in such a metamaterial, a Minkowski space-time is "created" together with large number of particles populating this space-time. Such metamaterial models provide a table top realization of metric signature change events suggested to occur in Bose-Einstein condensates and quantum gravity theories.

Igor I. Smolyaninov; Evgenii E. Narimanov

2010-07-07

263

Formal verification of algorithms for critical systems  

NASA Technical Reports Server (NTRS)

We describe our experience with formal, machine-checked verification of algorithms for critical applications, concentrating on a Byzantine fault-tolerant algorithm for synchronizing the clocks in the replicated computers of a digital flight control system. First, we explain the problems encountered in unsynchronized systems and the necessity, and criticality, of fault-tolerant synchronization. We give an overview of one such algorithm, and of the arguments for its correctness. Next, we describe a verification of the algorithm that we performed using our EHDM system for formal specification and verification. We indicate the errors we found in the published analysis of the algorithm, and other benefits that we derived from the verification. Based on our experience, we derive some key requirements for a formal specification and verification system adequate to the task of verifying algorithms of the type considered. Finally, we summarize our conclusions regarding the benefits of formal verification in this domain, and the capabilities required of verification systems in order to realize those benefits.

Rushby, John M.; Von Henke, Friedrich

1993-01-01

264

Novel Quantum Proxy Signature without Entanglement  

NASA Astrophysics Data System (ADS)

Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

Xu, Guang-bao

2015-01-01

265

Formal specification and verification of Ada software  

NASA Technical Reports Server (NTRS)

The use of formal methods in software development achieves levels of quality assurance unobtainable by other means. The Larch approach to specification is described, and the specification of avionics software designed to implement the logic of a flight control system is given as an example. Penelope is described which is an Ada-verification environment. The Penelope user inputs mathematical definitions, Larch-style specifications and Ada code and performs machine-assisted proofs that the code obeys its specifications. As an example, the verification of a binary search function is considered. Emphasis is given to techniques assisting the reuse of a verification effort on modified code.

Hird, Geoffrey R.

1991-01-01

266

KAT-7 Science Verification Highlights  

NASA Astrophysics Data System (ADS)

KAT-7 is a pathfinder of the Square Kilometer Array precursor MeerKAT, which is under construction. Its short baselines and low system temperature make it sensitive to large scale, low surface brightness emission. This makes it an ideal instrument to use in searches for faint extended radio emission and low surface density extraplanar gas. We present an update on the progress of several such ongoing KAT-7 science verification projects. These include a large scale radio continuum and polarization survey of the Galactic Center, deep HI observations (100+ hours) of nearby disk galaxies (e.g. NGC253 and NGC3109), and targeted searches for HI tidal tails in galaxy groups (e.g. IC1459). A brief status update for MeerKAT will also be presented if time permits.

Lucero, Danielle M.; Carignan, Claude; KAT-7 Science Data; Processing Team, KAT-7 Science Commissioning Team

2015-01-01

267

Verification of NASA Emergent Systems  

NASA Technical Reports Server (NTRS)

NASA is studying advanced technologies for a future robotic exploration mission to the asteroid belt. This mission, the prospective ANTS (Autonomous Nano Technology Swarm) mission, will comprise of 1,000 autonomous robotic agents designed to cooperate in asteroid exploration. The emergent properties of swarm type missions make them powerful, but at the same time are more difficult to design and assure that the proper behaviors will emerge. We are currently investigating formal methods and techniques for verification and validation of future swarm-based missions. The advantage of using formal methods is their ability to mathematically assure the behavior of a swarm, emergent or otherwise. The ANT mission is being used as an example and case study for swarm-based missions for which to experiment and test current formal methods with intelligent swam. Using the ANTS mission, we have evaluated multiple formal methods to determine their effectiveness in modeling and assuring swarm behavior.

Rouff, Christopher; Vanderbilt, Amy K. C. S.; Truszkowski, Walt; Rash, James; Hinchey, Mike

2004-01-01

268

News from VLT Science Verification  

NASA Astrophysics Data System (ADS)

The data from the UT1 Science Verifications (SV) have been released to the ESO community on October 2, 1998, with the data relative to the Hubble Deep Field South being available worldwide. The SV data can be retrieved either from the ESO Web server at http://www.eso.org/paranal/sv or ask the library of your institution for the CD-ROM set containing the combined and the raw data. These CD-ROM sets where mailed in October to all astronomical institutes within ESO member states (addressed to the institute's library). Since some sets are still available, interested people may get one by contacting ESO through the above Web page.

1998-12-01

269

Rhythmic TMS Causes Local Entrainment of Natural Oscillatory Signatures  

PubMed Central

Summary Background Neuronal elements underlying perception, cognition, and action exhibit distinct oscillatory phenomena, measured in humans by electro- or magnetoencephalography (EEG/MEG). So far, the correlative or causal nature of the link between brain oscillations and functions has remained elusive. A compelling demonstration of causality would primarily generate oscillatory signatures that are known to correlate with particular cognitive functions and then assess the behavioral consequences. Here, we provide the first direct evidence for causal entrainment of brain oscillations by transcranial magnetic stimulation (TMS) using concurrent EEG. Results We used rhythmic TMS bursts to directly interact with an MEG-identified parietal ?-oscillator, activated by attention and linked to perception. With TMS bursts tuned to its preferred ?-frequency (?-TMS), we confirmed the three main predictions of entrainment of a natural oscillator: (1) that ?-oscillations are induced during ?-TMS (reproducing an oscillatory signature of the stimulated parietal cortex), (2) that there is progressive enhancement of this ?-activity (synchronizing the targeted, ?-generator to the ?-TMS train), and (3) that this depends on the pre-TMS phase of the background ?-rhythm (entrainment of natural, ongoing ?-oscillations). Control conditions testing different TMS burst profiles and TMS-EEG in a phantom head confirmed specificity of ?-boosting to the case of synchronization between TMS train and neural oscillator. Conclusions The periodic electromagnetic force that is generated during rhythmic TMS can cause local entrainment of natural brain oscillations, emulating oscillatory signatures activated by cognitive tasks. This reveals a new mechanism of online TMS action on brain activity and can account for frequency-specific behavioral TMS effects at the level of biologically relevant rhythms. PMID:21723129

Thut, Gregor; Veniero, Domenica; Romei, Vincenzo; Miniussi, Carlo; Schyns, Philippe; Gross, Joachim

2011-01-01

270

75 FR 60169 - Proposed Information Collection (Vetbiz Vendor Information Pages Verification Program) Activity...  

Federal Register 2010, 2011, 2012, 2013, 2014

...Proposed Information Collection (Vetbiz Vendor Information Pages Verification Program...information technology. Title: Vetbiz Vendor Information Pages Verification Program...approved collection. Abstract: Vetbiz Vendor Information Pages Verification...

2010-09-29

271

Mobile Qualified Electronic Signatures for Secure Mobile Brokerage  

Microsoft Academic Search

Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promising opportunity for the deployment of an infrastructure for qualified electronic signatures. We that SIM-based signatures are the most secure and convenient solution. However, using the SIM-card as a secure signature creation device (SSCD)

Heiko Rossnagel

272

The Internet and clinical trials: background, online resources, examples and issues. | accrualnet.cancer.gov  

Cancer.gov

The Internet is increasingly being used to improve clinical trial knowledge and awareness and facilitate participant recruitment. Online clinical trial registries connect potential clinical trial participants with research teams. Individual clinical trial Web sites provide easy-to-understand information to the public. Potential participants can be screened using online questionnaires, and enrollment and consent forms can be made available for download or digital signature.

273

Status Report on REC Verification, Tracking  

E-print Network

for banking functionality 7. Verify deliverability requirements 8. Level of verification with regards to DG · Acceptance and support of REC market by the regulatory community, OR · Policy driver (GHG regulation

274

HDM/PASCAL Verification System User's Manual  

NASA Technical Reports Server (NTRS)

The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

Hare, D.

1983-01-01

275

The PASCAL-HDM Verification System  

NASA Technical Reports Server (NTRS)

The PASCAL-HDM verification system is described. This system supports the mechanical generation of verification conditions from PASCAL programs and HDM-SPECIAL specifications using the Floyd-Hoare axiomatic method. Tools are provided to parse programs and specifications, check their static semantics, generate verification conditions from Hoare rules, and translate the verification conditions appropriately for proof using the Shostak Theorem Prover, are explained. The differences between standard PASCAL and the language handled by this system are explained. This consists mostly of restrictions to the standard language definition, the only extensions or modifications being the addition of specifications to the code and the change requiring the references to a function of no arguments to have empty parentheses.

1983-01-01

276

40 CFR 1066.135 - Linearity verification.  

Code of Federal Regulations, 2014 CFR

...verification for chiller temperature. We recommend that...simulated reference temperature signal below the alarm...CVS flow meter inlet temperature. (d) Perform linearity...use either osmotic-membrane dryers or...

2014-07-01

277

PERFORMANCE VERIFICATION OF WATER SECURITY - RELATED TECHNOLOGIES  

EPA Science Inventory

The Environmental Technology Verification (ETV) Program's Advanced Monitoring Systems (AMS) Center has been charged by EPA to verify the performance of commercially available monitoring technologies for air, water, soil. Four categories of water security technologies (most of whi...

278

FUELS DATA. Model Verification Fuel Rod Data  

SciTech Connect

FUELS DATA is a collection of machine-readable fuel behavior data from domestic and foreign water reactor test facilities developed for use in model verification of the Nuclear Regulatory Commission FRAP codes.

Laats, E.T.; Hampton, N.L. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States); Scofield, N.R. [Water and Power Resource Center, Denver, CO (United States); Coleman, D.R. [Nuclear Associates International Corp., Rockville, MD (United States)

1984-08-01

279

Environmental Technology Verification Program (ETV) Policy Compendium  

EPA Science Inventory

The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

280

ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS  

EPA Science Inventory

The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

281

Commissioning and Science Verification of ALMA  

Microsoft Academic Search

We explain the current construction state of ALMA and give the timeline toward Early Science. The procedures to test the antennas and to commission the system are described. Results from the Science Verification are presented.

R. Mauersberger; E. Villard; A. B. Peck; S. Asayama; D. Barkats; P. Calisse; S. Corder; J. Cortes; P. Cortes; I. de Gregorio; W. R. F. Dent; E. Fomalont; D. Fulla; D. Garcia-Appadoo; D. Gunawan; A. Hales; R. E. Hills; T. Kamazaki; L. Knee; R. Kneissl; S. Komugi; S. Leon; R. Lucas; A. Lundgren; G. Marconi; S. Matsushita; P. Planesas; M. Rawlings; A. Richards; T. Sawada; R. Simon; K. Tachihara; T. van Kempen; T. Wiklind

2011-01-01

282

ETV - ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) - RISK MANAGEMENT  

EPA Science Inventory

In October 1995, the Environmental Technology Verification (ETV) Program was established by EPA. The goal of ETV is to provide credible performance data for commercial-ready environmental technologies to speed their implementation for the benefit of vendors, purchasers, permitter...

283

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2014 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2014-01-01

284

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2011 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2011-01-01

285

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2012 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2012-01-01

286

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2013 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2013-01-01

287

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2010 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2010-01-01

288

VERIFICATION OF GLOBAL CLIMATE CHANGE MITIGATION TECHNOLOGIES  

EPA Science Inventory

This is a continuation of independent performance evaluations of environmental technologies under EPA's Environmental Technology Verification Program. Emissions of some greenhouse gases, most notably methane. can be controlled profitably now, even in the absence of regulations. ...

289

ETV PILOTS (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM)  

EPA Science Inventory

The Environmental Technology Verification (ETV) Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantially accelerate the entrance of new environmental technologies ...

290

THE EPA'S ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM  

EPA Science Inventory

The Environmental Protection Agency (EPA) instituted the Environmental Technology Verification Program--or ETV--to verify the performance of innovative technical solutions to problems that threaten human health or the environment. ETV was created to substantially accelerate the e...

291

78 FR 58492 - Generator Verification Reliability Standards  

Federal Register 2010, 2011, 2012, 2013, 2014

...of Generator Real and Reactive Power Capability and Synchronous Condenser Reactive Power Capability), MOD- 026-1 (Verification of Models...Coordination of Generating Unit or Plant Capabilities, Voltage Regulating Controls, and...

2013-09-24

292

Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model  

NASA Astrophysics Data System (ADS)

How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

293

TOXLINE (TOXICOLOGY INFORMATION ONLINE)  

EPA Science Inventory

TOXLINE? (TOXicology information onLINE) are the National Library of Medicines extensive collection of online bibliographic information covering the pharmacological, biochemical, physiological, and toxicological effects of drugs and other chemicals. TOXLINE and TOXLINE65 together...

294

Online optimization problems  

E-print Network

In this thesis, we study online optimization problems in routing and allocation applications. Online problems are problems where information is revealed incrementally, and decisions must be made before all information is ...

Lu, Xin, Ph. D. Massachusetts Institute of Technology. Operations Research Center

2013-01-01

295

The Online Underworld.  

ERIC Educational Resources Information Center

Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

Scrogan, Len

1988-01-01

296

Teaching Geoscience Online  

NSDL National Science Digital Library

More and more schools are offering online courses in the sciences, and the geophysical sciences are no exception. Carleton College is deservedly well known for their "Cutting Edge" website of geoscience teaching resources, and here they present some helpful materials for those wishing to teach geoscience online. The resources were developed as part of their 2010 workshop titled "Teaching Geoscience Online". Visitors can scroll through the list of resources, which are divided into sections that include "pedagogy" and "online activities and courses". The materials include titles like "Student Motivation and Engagement in Online Courses", "Using Data to Teach Geology in College-Level Online Classes", and "Course Platforms for Teaching Online". A number of these resources could be used by anyone teaching online courses, not just those in the field of geoscience.

297

Earth Science Online Resources  

NSDL National Science Digital Library

These resources are designed to accompany the textbook 'Earth Science' by Pearson Prentice Hall. Materials include quizzes, online field trips, Powerpoint presentations, study guides, animations, and links to online resources.

298

Holographic Signatures of Cosmological Singularities  

NASA Astrophysics Data System (ADS)

To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N =4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T.

2014-09-01

299

Holographic signatures of cosmological singularities.  

PubMed

To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N=4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function. PMID:25279620

Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T

2014-09-19

300

Holographic Signatures of Cosmological Singularities  

E-print Network

To gain insight in the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge/gravity duality. The dual description of the bulk evolution towards the singularity involves N = 4 super Yang-Mills on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

Engelhardt, Netta; Horowitz, Gary T

2014-01-01

301

Holographic Signatures of Cosmological Singularities  

E-print Network

To gain insight in the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge/gravity duality. The dual description of the bulk evolution towards the singularity involves N = 4 super Yang-Mills on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

Netta Engelhardt; Thomas Hertog; Gary T. Horowitz

2014-11-19

302

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2011 CFR

...be in typed form rather than manual format. Signatures in an...to, be presented in an HTML graphic or image file within the electronic...requirements of the EDGAR Filer Manual. When used in connection...30a-2 of this chapter) shall manually sign a signature...

2011-04-01

303

Polygraph: Automatically Generating Signatures for Polymorphic Worms  

Microsoft Academic Search

It is widely believed that content-signature-based intru- sion detection systems (IDSes) are easily evaded by poly- morphic worms, which vary their payload on every infec- tion attempt. In this paper, we present Polygraph, a sig- nature generation system that successfully produces signa- tures that match polymorphic worms. Polygraph gener- ates signatures that consist of multiple disjoint content sub- strings. In

James Newsome; Brad Karp; Dawn Xiaodong Song

2005-01-01

304

AUTHORITY FOR CONTRACT NEGOTIATIONS AND SIGNATURE APPROVAL  

E-print Network

AUTHORITY FOR CONTRACT NEGOTIATIONS AND SIGNATURE APPROVAL After University Counsel or Purchasing and Approval and Signature Authority, the following persons have been delegated authority to sign various types authority to: Alan Boyette ­ All documents that fall within the purview of the Provost and Vice Chancellor

Saidak, Filip

305

Transmutation Fuel Performance Code Thermal Model Verification  

SciTech Connect

FRAPCON fuel performance code is being modified to be able to model performance of the nuclear fuels of interest to the Global Nuclear Energy Partnership (GNEP). The present report documents the effort for verification of the FRAPCON thermal model. It was found that, with minor modifications, FRAPCON thermal model temperature calculation agrees with that of the commercial software ABAQUS (Version 6.4-4). This report outlines the methodology of the verification, code input, and calculation results.

Gregory K. Miller; Pavel G. Medvedev

2007-09-01

306

Performance Evaluation of Fingerprint Verification Systems  

Microsoft Academic Search

This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the theoretical and practical issues related to performance evaluation by presenting the outcomeoftherecentFingerprintVerificationCompetition(FVC2004).FVC2004wasorganizedbytheauthorsofthisworkforthepurpose ofassessingthestate-of-the-artinthischallengingpatternrecognitionapplicationandmakingavailableanewcommonbenchmarkforan unambiguouscomparisonoffingerprint-basedbiometricsystems.FVC2004isanindependent,stronglysupervisedevaluationperformed at the evaluators' site on evaluators' hardware. This allowed the test to be completely controlled and the computation times of different algorithms

Raffaele Cappelli; Dario Maio; Davide Maltoni; James L. Wayman; Anil K. Jain

2006-01-01

307

EMP simulation for hardness verification testing  

NASA Astrophysics Data System (ADS)

A serious problem in the development of NEMP (nuclear electromagnetic pulse)-hardened systems is lack of adequate verification testing of the system hardness. The authors describe the development and use of a direct injection system designed specifically for threat-level hardness verification testing of complex systems with a number of electronic shelters interconnected by cables. Details of the theory and design of the synchronous injection system are presented. Experimental results related to the validity of the simulation technique are included.

Beilfuss, J.; Capobianco, J.; Gray, R.

308

A verification library for multibody simulation software  

NASA Technical Reports Server (NTRS)

A multibody dynamics verification library, that maintains and manages test and validation data is proposed, based on RRC Robot arm and CASE backhoe validation and a comparitive study of DADS, DISCOS, and CONTOPS that are existing public domain and commercial multibody dynamic simulation programs. Using simple representative problems, simulation results from each program are cross checked, and the validation results are presented. Functionalities of the verification library are defined, in order to automate validation procedure.

Kim, Sung-Soo; Haug, Edward J.; Frisch, Harold P.

1989-01-01

309

Irma multisensor predictive signature model  

NASA Astrophysics Data System (ADS)

The Irma synthetic signature model was one of the first high resolution infrared (IR) target and background signature models to be developed for tactical weapons application. Originally developed in 1980 by the Munitions Directorate of the Air Force Research Laboratory, the Irma model was used exclusively to generate IR scenes for smart weapons research and development. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser channel. This two channel version, Irma 3.0, was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model which supported correlated frame-to-frame imagery. This and other improvements were released in Irma 2.2. Irma 3.2, a passive IR/millimeter wave (MMW) code, was completed in 1994. This served as the cornerstone for the development of the co- registered active/passive IR/MMW model, Irma 4.0. Currently, upgrades are underway to include a near IR (NIR)/visible channel; a facet editor; utilities to support image viewing and scaling; and additional target/data files. The Irma 4.1 software development effort is nearly completion. The purpose of this paper is to illustrate the results of the development. Planned upgrades for Irma 5.0 will be provided as well. Irma is being developed to facilitate multi-sensor research and development. It is currently being used to support a number of civilian and military applications. The current Irma user base includes over 100 agencies within the Air Force, Army, Navy, DARPA, NASA, Department of Transportation, academia, and industry.

Watson, John S.; Wellfare, Michael R.; Foster, Joseph; Owens, Monte A.; Vechinski, Douglas A.; Richards, Mike; Resnick, Andrew; Underwood, Vincent

1998-07-01

310

CV Surgery Online  

NSDL National Science Digital Library

Stanford University's HighWire Press has announced the online publication of several journals. CV Surgery Online offers "a fully searchable online compilation of articles pertinent to the cardiothoracic and vascular surgeon from the 5 American Heart Association Journals: Circulation, Circulation Research, Hypertension, Stroke, and Arteriosclerosis, Thrombosis, and Vascular Surgery." Published by the American Heart Association in conjunction with HighWire Press, the free trial period for CV Surgery Online ended December 31, 2000.

1999-01-01

311

Online Gaming Perpetrators Model  

Microsoft Academic Search

Online gaming carries high economic value in e-business. Online gaming players have reasonable expectation in online gaming\\u000a property and associate them with values in real world markets. This phenomenon emerges as a new research issue related to\\u000a the development of e-society. This study briefly digests the characteristics of online gaming perpetrators and proposes the\\u000a perpetrators model in order to explain

Yungchang Ku; Saurabh Gupta

2008-01-01

312

DNA Methylation Signature of Childhood Chronic Physical Aggression in T Cells of Both Men and Women  

PubMed Central

Background High frequency of physical aggression is the central feature of severe conduct disorder and is associated with a wide range of social, mental and physical health problems. We have previously tested the hypothesis that differential DNA methylation signatures in peripheral T cells are associated with a chronic aggression trajectory in males. Despite the fact that sex differences appear to play a pivotal role in determining the development, magnitude and frequency of aggression, most of previous studies focused on males, so little is known about female chronic physical aggression. We therefore tested here whether or not there is a signature of physical aggression in female DNA methylation and, if there is, how it relates to the signature observed in males. Methodology/Principal Findings Methylation profiles were created using the method of methylated DNA immunoprecipitation (MeDIP) followed by microarray hybridization and statistical and bioinformatic analyses on T cell DNA obtained from adult women who were found to be on a chronic physical aggression trajectory (CPA) between 6 and 12 years of age compared to women who followed a normal physical aggression trajectory. We confirmed the existence of a well-defined, genome-wide signature of DNA methylation associated with chronic physical aggression in the peripheral T cells of adult females that includes many of the genes similarly associated with physical aggression in the same cell types of adult males. Conclusions This study in a small number of women presents preliminary evidence for a genome-wide variation in promoter DNA methylation that associates with CPA in women that warrant larger studies for further verification. A significant proportion of these associations were previously observed in men with CPA supporting the hypothesis that the epigenetic signature of early life aggression in females is composed of a component specific to females and another common to both males and females. PMID:24475181

Guillemin, Claire; Provençal, Nadine; Suderman, Matthew; Côté, Sylvana M.; Vitaro, Frank; Hallett, Michael; Tremblay, Richard E.; Szyf, Moshe

2014-01-01

313

Online Monitoring of Plant Assets in the Nuclear Industry  

SciTech Connect

Today’s online monitoring technologies provide opportunities to perform predictive and proactive health management of assets within many different industries, in particular the defense and aerospace industries. The nuclear industry can leverage these technologies to enhance safety, productivity, and reliability of the aging fleet of existing nuclear power plants. The U.S. Department of Energy’s Light Water Reactor Sustainability Program is collaborating with the Electric Power Research Institute’s (EPRI’s) Long-Term Operations program to implement online monitoring in existing nuclear power plants. Proactive online monitoring in the nuclear industry is being explored using EPRI’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software, a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. This paper focuses on development of asset fault signatures used to assess the health status of generator step-up transformers and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. Fault signatures are developed based on the results of detailed technical research and on the knowledge and experience of technical experts. The Diagnostic Advisor of the FW-PHM Suite software matches developed fault signatures with operational data to provide early identification of critical faults and troubleshooting advice that could be used to distinguish between faults with similar symptoms. This research is important as it will support the automation of predictive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

Nancy Lybeck; Vivek Agarwal; Binh Pham; Richard Rusaw; Randy Bickford

2013-10-01

314

Security Weaknesses in Arbitrated Quantum Signature Protocols  

NASA Astrophysics Data System (ADS)

Arbitrated quantum signature (AQS) is a cryptographic scenario in which the sender (signer), Alice, generates the signature of a message and then a receiver (verifier), Bob, can verify the signature with the help of a trusted arbitrator, Trent. In this paper, we point out there exist some security weaknesses in two AQS protocols. Our analysis shows Alice can successfully disavow any of her signatures by a simple attack in the first protocol. Furthermore, we study the security weaknesses of the second protocol from the aspects of forgery and disavowal. Some potential improvements of this kind of protocols are given. We also design a new method to authenticate a signature or a message, which makes AQS protocols immune to Alice's disavowal attack and Bob's forgery attack effectively.

Liu, Feng; Zhang, Kejia; Cao, Tianqing

2014-01-01

315

Signatures of mutational processes in human cancer  

PubMed Central

All cancers are caused by somatic mutations. However, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here, we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, kataegis, is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer with potential implications for understanding of cancer etiology, prevention and therapy. PMID:23945592

Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Aparicio, Samuel A.J.R.; Behjati, Sam; Biankin, Andrew V.; Bignell, Graham R.; Bolli, Niccolo; Borg, Ake; Børresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P.; Caldas, Carlos; Davies, Helen R.; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A.; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinsk, Marcin; Jäger, Natalie; Jones, David T.W.; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R.; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C.; Nakamura, Hiromi; Northcott, Paul A.; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V.; Puente, Xose S.; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L.; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N.; Span, Paul N.; Teague, Jon W.; Totoki, Yasushi; Tutt, Andrew N.J.; Valdés-Mas, Rafael; van Buuren, Marit M.; van ’t Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R.; Zucman-Rossi, Jessica; Futreal, P. Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M.; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M.; Campbell, Peter J.; Stratton, Michael R.

2013-01-01

316

Implementing Online Physical Education  

ERIC Educational Resources Information Center

Online physical education, although seemingly an oxymoron, appears to be the wave of the future at least for some students. The purpose of this article is to explore research and options for online learning in physical education and to examine a curriculum, assessment, and instructional model for online learning. The article examines how physical…

Mohnsen, Bonnie

2012-01-01

317

Online Education Interim Report  

ERIC Educational Resources Information Center

This interim report produced by the Colorado State Board of Education Online Education Task Force examines key issues related to online education. Task force members agree that: (1) online education has become a viable element of Colorado's public education system; (2) the role of technology in educating our children will continue to grow; and (3)…

Protopsaltis, Spiros, Ed.

2007-01-01

318

Online Higher Education Commodity  

ERIC Educational Resources Information Center

This article analyzes the current trend towards online education. It examines some of the reasons for the trend and the ramifications it may have on students, faculty and institutions of higher learning. The success and profitability of online programs and institutions such as the University of Phoenix has helped to make the move towards online…

Chau, Paule

2010-01-01

319

Creating an Online Program  

Microsoft Academic Search

Good planning is key to the development of a successful online learning program. For online learning (as with any form of distance education), initial planning should primarily center on two issues: identifying the educational goal of the program, and identifying the practical issues of implementation. Planners must recognize that while online learning is a technology-based activity, it must be organized

Sandy Kyrish

320

Recent advances at the European Microwave Signature Laboratory  

NASA Astrophysics Data System (ADS)

The European Microwave Signature Laboratory (EMSL), recently built at the Joint Research Center of the Commission of European Communities (CEC) at Ispra, is a state-of-the-art experimental facility which provides unique opportunities in terms of measurement capabilities and data processing. The laboratory is mainly devoted to polarimetric radar measurements aimed to complement air- and spaceborne remote sensing experiments by providing stable and reproducible environmental conditions and flexible operational modes for well-controlled experiments. As one of the European Large Facilities, the EMSL is open to collaboration with all interested research groups both within the European Union and outside. The EMSL anechoic chamber has an hemispherical shape with a diameter of 20 m and hosts two independently movable TX/RX modules plus a set of fixed receiving antennae. A positioner with linear and rotary movements is used to transport and accurately move the target under test inside the chamber. The selection of different geometrical configurations (mono-, bi-, multi-static) and measurement modes (scatterometric, 2D and 3D imaging) is made possible by this special architecture of the facility. In this paper, first a description of the main components of the laboratory is given, then the performances of the measurement system are discussed on the basis of the results of verification tests (Stability, Sensitivity, Antenna pattern characterization) and finally a selection is presented of the most significant outcomes of the experiments undertaken until now.

Nesti, Giuseppe; Sieber, Alois J.; de Grandi, Gianfranco D.; Fortuny-Guasch, Joaquim; Ohlmer, E.

1994-12-01

321

Dynamic characteristics of signatures: effects of writer style on genuine and simulated signatures.  

PubMed

The aims of this study were to determine if computer-measured dynamic features (duration, size, velocity, jerk, and pen pressure) differ between genuine and simulated signatures. Sixty subjects (3 equal groups of 3 signature styles) each provided 10 naturally written (genuine) signatures. Each of these subjects then provided 15 simulations of each of three model signatures. The genuine (N = 600) and simulated (N = 2700) signatures were collected using a digitizing tablet. MovAlyzeR(®) software was used to estimate kinematic parameters for each pen stroke. Stroke duration, velocity, and pen pressure were found to discriminate between genuine and simulated signatures regardless of the simulator's own style of signature or the style of signature being simulated. However, there was a significant interaction between style and condition for size and jerk (a measure of smoothness). The results of this study, based on quantitative analysis and dynamic handwriting features, indicate that the style of the simulator's own signature and the style of signature being simulated can impact the characteristics of handwriting movements for simulations. Writer style characteristics might therefore need to be taken into consideration as potentially significant when evaluating signature features with a view to forming opinions regarding authenticity. PMID:25420668

Mohammed, Linton; Found, Bryan; Caligiuri, Michael; Rogers, Doug

2015-01-01

322

21 CFR 11.200 - Electronic signature components and controls.  

Code of Federal Regulations, 2010 CFR

... 1 2010-04-01 2010-04-01 false Electronic signature components and controls. 11.200...DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures §...

2010-04-01

323

Formal Verification of an Autonomous Vehicle System Tichakorn Wongpiromsarn and Richard M. Murray  

E-print Network

and unmanageable. Formal specification and verification, an alternative approach which guarantees in order to ensure the reliability of these systems. Formal specification and verification of robotic formal verification of complex systems possible. Second, we apply formal specification and verification

Murray, Richard M.

324

GHG MITIGATION TECHNOLOGY PERFORMANCE EVALUATIONS UNDERWAY AT THE GHG TECHNOLOGY VERIFICATION CENTER  

EPA Science Inventory

The paper outlines the verification approach and activities of the Greenhouse Gas (GHG) Technology Verification Center, one of 12 independent verification entities operating under the U.S. EPA-sponsored Environmental Technology Verification (ETV) program. (NOTE: The ETV program...

325

Online Journalism Review  

NSDL National Science Digital Library

Based at the Annenberg School for Communication at the University of Southern California, the Online Journalism Review was launched in 1998 with the intention of "evaluating the emerging field of online journalism, providing readers commentary, monthly features, and Web resource databases." The Review is also committed "to identify who is best serving the public on the Web, and who, hiding in the cloak of journalism, belongs in different garb." To that end, the Review's team of journalists reports on a host of online topics, ranging from Web site designs, private online news sources, and ongoing developments within the world of online journalism. Some of the primary resources available here include the Japan Media Review (focusing on the electronic media coverage within, and about, Japan) and a number of online forums. Additionally, interested visitors can elect to subscribe to the Online Journalism Review via email.

1999-01-01

326

Simulation and Experimental Validation of Electromagnetic Signatures for Monitoring of Nuclear Material Storage Containers  

SciTech Connect

Previous research at the Pacific Northwest National Laboratory (PNNL) has demonstrated that the low frequency electromagnetic (EM) response of a sealed metallic container interrogated with an encircling coil is a strong function of its contents and can be used to form a distinct signature which can confirm the presence of specific components without revealing hidden geometry or classified design information. Finite element simulations have recently been performed to further investigate this response for a variety of configurations composed of an encircling coil and a typical nuclear material storage container. Excellent agreement was obtained between simulated and measured impedance signatures of electrically conducting spheres placed inside an AT-400R nuclear container. Simulations were used to determine the effects of excitation frequency and the geometry of the encircling coil, nuclear container, and internal contents. The results show that it is possible to use electromagnetic models to evaluate the application of the EM signature technique to proposed versions of nuclear weapons containers which can accommodate restrictions imposed by international arms control and treaty verification legislation.

Aker, Pamela M.; Bunch, Kyle J.; Jones, Anthony M.

2013-01-01

327

Learning Assumptions for Compositional Verification  

NASA Technical Reports Server (NTRS)

Compositional verification is a promising approach to addressing the state explosion problem associated with model checking. One compositional technique advocates proving properties of a system by checking properties of its components in an assume-guarantee style. However, the application of this technique is difficult because it involves non-trivial human input. This paper presents a novel framework for performing assume-guarantee reasoning in an incremental and fully automated fashion. To check a component against a property, our approach generates assumptions that the environment needs to satisfy for the property to hold. These assumptions are then discharged on the rest of the system. Assumptions are computed by a learning algorithm. They are initially approximate, but become gradually more precise by means of counterexamples obtained by model checking the component and its environment, alternately. This iterative process may at any stage conclude that the property is either true or false in the system. We have implemented our approach in the LTSA tool and applied it to the analysis of a NASA system.

Cobleigh, Jamieson M.; Giannakopoulou, Dimitra; Pasareanu, Corina; Clancy, Daniel (Technical Monitor)

2002-01-01

328

Cold Flow Verification Test Facility  

SciTech Connect

The cold flow verification test facility consists of a 15-foot high, 3-foot diameter, domed vessel made of clear acrylic in two flanged sections. The unit can operate up to pressures of 14 psig. The internals include a 10-foot high jetting fluidized bed, a cylindrical baffle that hangs from the dome, and a rotating grate for control of continuous solids removal. The fluid bed is continuously fed solids (20 to 150 lb/hr) through a central nozzle made up of concentric pipes. It can either be configured as a half or full cylinder of various dimensions. The fluid bed has flow loops for separate air flow control for conveying solids (inner jet, 500 to 100000 scfh) , make-up into the jet (outer jet, 500 to 8000 scfh), spargers in the solids removal annulus (100 to 2000 scfh), and 6 air jets (20 to 200 scfh) on the sloping conical grid. Additional air (500 to 10000 scfh) can be added to the top of the dome and under the rotating grate. The outer vessel, the hanging cylindrical baffles or skirt, and the rotating grate can be used to study issues concerning moving bed reactors. There is ample allowance for access and instrumentation in the outer shell. Furthermore, this facility is available for future Cooperative Research and Development Program Manager Agreements (CRADA) to study issues and problems associated with fluid- and fixed-bed reactors. The design allows testing of different dimensions and geometries.

Shamsi, A.; Shadle, L.J.

1996-12-31

329

Visual inspection for CTBT verification  

SciTech Connect

On-site visual inspection will play an essential role in future Comprehensive Test Ban Treaty (CTBT) verification. Although seismic and remote sensing techniques are the best understood and most developed methods for detection of evasive testing of nuclear weapons, visual inspection can greatly augment the certainty and detail of understanding provided by these more traditional methods. Not only can visual inspection offer ``ground truth`` in cases of suspected nuclear testing, but it also can provide accurate source location and testing media properties necessary for detailed analysis of seismic records. For testing in violation of the CTBT, an offending party may attempt to conceal the test, which most likely will be achieved by underground burial. While such concealment may not prevent seismic detection, evidence of test deployment, location, and yield can be disguised. In this light, if a suspicious event is detected by seismic or other remote methods, visual inspection of the event area is necessary to document any evidence that might support a claim of nuclear testing and provide data needed to further interpret seismic records and guide further investigations. However, the methods for visual inspection are not widely known nor appreciated, and experience is presently limited. Visual inspection can be achieved by simple, non-intrusive means, primarily geological in nature, and it is the purpose of this report to describe the considerations, procedures, and equipment required to field such an inspection.

Hawkins, W.; Wohletz, K.

1997-03-01

330

Monitoring and verification R&D  

SciTech Connect

The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

2011-01-01

331

A) Fill in your personal information: D) Certification & Signature SSN Birth I understand that the choice I make between the ORP and OPSRP/PERS is  

E-print Network

) until the fund sponsor receives my online or signed application form indicating my investment choice: Processing Date: Contact:Identification: Dateof: ORP or PERS Election Form #12;A) Fill in your personalA) Fill in your personal information: D) Certification & Signature SSN Birth I understand

Cina, Jeff

332

Improved Quantum Signature Scheme with Weak Arbitrator  

NASA Astrophysics Data System (ADS)

In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

Su, Qi; Li, Wen-Min

2013-09-01

333

Recognizing impactor signatures in the planetary record  

NASA Technical Reports Server (NTRS)

Crater size reflects the target response to the combined effects of impactor size, density, and velocity. Isolating the effects of each variable in the cratering record is generally considered masked, if not lost, during late stages of crater modification (e.g., floor uplift and rim collapse). Important clues, however, come from the distinctive signatures of the impactor created by oblique impacts. In summary, oblique impacts allow for the identification of distinctive signatures of the impactor created during early penetration. Such signatures may further allow first-order testing of scaling relations for late crater excavation from the planetary surface record. Other aspects of this study are discussed.

Schultz, Peter H.; Gault, Donald E.

1992-01-01

334

Transcriptional Signatures in Huntington's Disease  

PubMed Central

While selective neuronal death has been an influential theme in Huntington's disease (HD), there is now a preponderance of evidence that significant neuronal dysfunction precedes frank neuronal death. The best evidence for neuronal dysfunction is the observation that gene expression is altered in HD brain, suggesting that transcriptional dysregulation is a central mechanism. Studies of altered gene expression began with careful observations of post-mortem human HD brain and subsequently were accelerated by the development of transgenic mouse models. The application of DNA microarray technology has spurred tremendous progress with respect to the altered transcriptional processes that occur in HD, through gene expression studies of both transgenic mouse models as well as cellular models of HD. Gene expression profiles are remarkably comparable across these models, bolstering the idea that transcriptional signatures reflect an essential feature of disease pathogenesis. Finally, gene expression studies have been applied to human HD, thus not only validating the approach of using model systems, but also solidifying the idea that altered transcription is a key mechanism in HD pathogenesis. In the future, gene expression profiling will be used as a readout in clinical trials aimed at correcting transcriptional dysregulation in Huntington's disease. PMID:17467140

2007-01-01

335

Accreting Circumplanetary Disks: Observational Signatures  

NASA Astrophysics Data System (ADS)

I calculate the spectral energy distributions of accreting circumplanetary disks using atmospheric radiative transfer models. Circumplanetary disks only accreting at 10-10 M ? yr-1 around a 1 MJ planet can be brighter than the planet itself. A moderately accreting circumplanetary disk (\\dot{M}˜ 10-8 M? yr-1; enough to form a 10 MJ planet within 1 Myr) around a 1 MJ planet has a maximum temperature of ~2000 K, and at near-infrared wavelengths (J, H, K bands), this disk is as bright as a late-M-type brown dwarf or a 10 MJ planet with a "hot start." To use direct imaging to find the accretion disks around low-mass planets (e.g., 1 MJ ) and distinguish them from brown dwarfs or hot high-mass planets, it is crucial to obtain photometry at mid-infrared bands (L', M, N bands) because the emission from circumplanetary disks falls off more slowly toward longer wavelengths than those of brown dwarfs or planets. If young planets have strong magnetic fields (gsim100 G), fields may truncate slowly accreting circumplanetary disks (\\dot{M}? 10-9 M? yr-1) and lead to magnetospheric accretion, which can provide additional accretion signatures, such as UV/optical excess from the accretion shock and line emission.

Zhu, Zhaohuan

2015-01-01

336

ONLINE SELLERS' TRUST AND USE OF ONLINE AUCTION MARKETPLACES  

Microsoft Academic Search

More and more people sell things online and trust is an important factor in online selling. This research is aimed at understanding the roles of trust in online sellers' continued use of online auction marketplaces. Given the uniqueness of online auction practice, we identify the need for differentiating sellers' trust in the intermediary and in buyers. A balanced view of

Heshan Sun

337

Online Courses: NSTA Online Short Course: Energy  

NSDL National Science Digital Library

Confounded by kinetic and potential energy? Intimidated by thermal energy and heat? Mystified by the concepts of conduction, convection, and radiation? You are not alone. The NSTA Online Short Course: Energy is the perfect course for science teachers inte

1900-01-01

338

Verification of COSMO model over Poland  

NASA Astrophysics Data System (ADS)

The Polish National Weather Service and Institute of Meteorology and Water Management - National Research Institute (IMWM-NRI, Warsaw, Poland) joined the Consortium for Small-Scale Modeling (COSMO) in 2002. Thanks to cooperation in the consortium the meteorological model COSMO is run operationally at IMWM-NRI at both 2.8km and 7km horizontal resolutions. In research mode, data assimilation tests have been carried out using a 6-hourly cycle nudging scheme. We would like to present verification results of the COSMO model, comparing model generated surface temperature, wind and rain fall rates with the Synop measurements. In addition, verification results of vertical profiles for chosen variables will also be analyzed and presented. The verification is divided into the following areas: i) assessing impact of data assimilation on the quality of 2.8km resolution model forecasts by switching data assimilation on and off, ii) spatio-temporal verification of model results at 7km resolution and iii) conditional verification of selected parameters against chosen meteorological condition(s).

Linkowska, Joanna; Mazur, Andrzej; Wyszogrodzki, Andrzej

2014-05-01

339

7 CFR 983.67 - Random verification audits.  

Code of Federal Regulations, 2012 CFR

...Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA, ARIZONA, AND NEW MEXICO Reports...67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification...

2012-01-01

340

7 CFR 983.67 - Random verification audits.  

Code of Federal Regulations, 2014 CFR

...FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA, ARIZONA, AND NEW MEXICO Reports...67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification...

2014-01-01

341

7 CFR 983.67 - Random verification audits.  

Code of Federal Regulations, 2011 CFR

...Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA, ARIZONA, AND NEW MEXICO Reports...67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification...

2011-01-01

342

7 CFR 983.67 - Random verification audits.  

Code of Federal Regulations, 2013 CFR

...FRUITS, VEGETABLES, NUTS), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA, ARIZONA, AND NEW MEXICO Reports...67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification...

2013-01-01

343

7 CFR 983.67 - Random verification audits.  

Code of Federal Regulations, 2010 CFR

...Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE PISTACHIOS GROWN IN CALIFORNIA, ARIZONA, AND NEW MEXICO Reports...67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification...

2010-01-01

344

40 CFR 1066.265 - Acceleration and deceleration verification.  

Code of Federal Regulations, 2013 CFR

...2013-07-01 2013-07-01 false Acceleration and deceleration verification. 1066...Dynamometer Specifications § 1066.265 Acceleration and deceleration verification. ...dynamometer's ability to achieve targeted acceleration and deceleration rates....

2013-07-01

345

ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM FOR MONITORING AND CHARACTERIZATION  

EPA Science Inventory

The Environmental Technology Verification Program is a service of the Environmental Protection Agency designed to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of performance. The goal of ETV i...

346

Optimization of Lyapunov Invariants in Verification of Software Systems  

E-print Network

The paper proposes a control-theoretic framework for verification of numerical software systems, and puts forward software verification as an important application of control and systems theory. The idea is to transfer ...

Roozbehani, Mardavij

347

ETV INTERNATIONAL OUTREACH ACTIVITIES (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM  

EPA Science Inventory

The Environmental Technology Verification (ETV) Program's international outrearch activities have extended as far as Canada, Germany, Taiwan and the Philippines. Vendors from Canada and Germany were hosted at verification tests of turbidimeters. In May 1999, EPA's ETV Coordinator...

348

Verification of full functional correctness for imperative linked data structures  

E-print Network

We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

Zee, Karen K

2010-01-01

349

VERIFICATION OF A TOXIC ORGANIC SUBSTANCE TRANSPORT AND BIOACCUMULATION MODEL  

EPA Science Inventory

A field verification of the Toxic Organic Substance Transport and Bioaccumulation Model (TOXIC) was conducted using the insecticide dieldrin and the herbicides alachlor and atrazine as the test compounds. The test sites were two Iowa reservoirs. The verification procedure include...

350

Generic Protocol for the Verification of Ballast Water Treatment Technology  

EPA Science Inventory

In anticipation of the need to address performance verification and subsequent approval of new and innovative ballast water treatment technologies for shipboard installation, the U.S Coast Guard and the Environmental Protection Agency?s Environmental Technology Verification Progr...

351

25 CFR 213.10 - Lessor's signature.  

Code of Federal Regulations, 2010 CFR

...BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEASING OF RESTRICTED LANDS OF MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot...

2010-04-01

352

25 CFR 213.10 - Lessor's signature.  

Code of Federal Regulations, 2011 CFR

...BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEASING OF RESTRICTED LANDS OF MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot...

2011-04-01

353

5 CFR 850.106 - Electronic signatures.  

Code of Federal Regulations, 2012 CFR

... (1) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice...

2012-01-01

354

5 CFR 850.106 - Electronic signatures.  

Code of Federal Regulations, 2013 CFR

... (1) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice...

2013-01-01

355

5 CFR 850.106 - Electronic signatures.  

Code of Federal Regulations, 2014 CFR

... (1) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice...

2014-01-01

356

5 CFR 850.106 - Electronic signatures.  

Code of Federal Regulations, 2011 CFR

... (1) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice...

2011-01-01

357

5 CFR 850.106 - Electronic signatures.  

Code of Federal Regulations, 2010 CFR

... (1) Non-cryptographic methods, including— (i) Personal Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice...

2010-01-01

358

76 FR 30542 - Adult Signature Services  

Federal Register 2010, 2011, 2012, 2013, 2014

...Signature labels are located in the Intelligent Mail Package Barcode Specification and...addendum to Publication 91, Addendum for Intelligent Mail Package Barcode (IMpb) and 3-digit...qualified shipping labels that bear an Intelligent Mail package...

2011-05-26

359

Composite Signature Based Watermarking for Fingerprint Authentication  

E-print Network

Composite Signature Based Watermarking for Fingerprint Authentication Farid Ahmed Department of fingerprints. Keywords PhasemarkTM, biometric authentication, fingerprint, watermarking, composite filter their physiological and behavioral characteristics such as fingerprint, face, iris, hand geometry, keystroke, voice

Ahmed, Farid

360

TUITION/FEES APPEAL Name ______________________________________ Signature ___________________________________  

E-print Network

TUITION/FEES APPEAL Name ______________________________________ Signature ________ (Year) First Summer Session ________ (Year) Second Summer Session ________ (Year) Appeal Reason: Please provide the Tuition Appeals Committee a detailed description of your reason why a refund should be consid

MacAdam, Keith

361

25 CFR 213.10 - Lessor's signature.  

Code of Federal Regulations, 2014 CFR

...AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEASING OF RESTRICTED LANDS OF MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name will be...

2014-04-01

362

25 CFR 213.10 - Lessor's signature.  

Code of Federal Regulations, 2012 CFR

...AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEASING OF RESTRICTED LANDS OF MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name will be...

2012-04-01

363

25 CFR 213.10 - Lessor's signature.  

Code of Federal Regulations, 2013 CFR

...AFFAIRS, DEPARTMENT OF THE INTERIOR ENERGY AND MINERALS LEASING OF RESTRICTED LANDS OF MEMBERS OF FIVE CIVILIZED TRIBES, OKLAHOMA, FOR MINING How to Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name will be...

2013-04-01

364

Angular Contour Parameterization for Signature Identification  

Microsoft Academic Search

This present work presents a parameterization system based on angles from signature edge (2D-shape) for off-line signature\\u000a identification. We have used three different classifiers, the Nearest Neighbor classifier (K-NN), Neural Networks (NN) and\\u000a Hidden Markov Models (HMM). Our off-line database has 800 writers with 24 samples per each writer; in total, 19200 images\\u000a have been used in our experiments. We

Juan Carlos Briceño; Carlos M. Travieso; Miguel A. Ferrer; Jesús B. Alonso; Francisco Vargas

2009-01-01

365

Research Plan for Fire Signatures and Detection  

NASA Technical Reports Server (NTRS)

Viewgraphs on the prevention, suppression, and detection of fires aboard a spacecraft is presented. The topics include: 1) Fire Prevention, Detection, and Suppression Sub-Element Products; 2) FPDS Organizing Questions; 3) FPDS Organizing Questions; 4) Signatures, Sensors, and Simulations; 5) Quantification of Fire and Pre-Fire Signatures; 6) Smoke; 7) DAFT Hardware; 8) Additional Benefits of DAFT; 9) Development and Characterization of Sensors 10) Simulation of the Transport of Smoke and Fire Precursors; and 11) FPDS Organizing Questions.

2004-01-01

366

Reducing Design Verification Cycle Time through Testbench Redundancy  

Microsoft Academic Search

Design flows for modern-day system-on-chip (SoC) designs focus on reducing the design cycle time, but not on design verification time. Nearly 70% of SoC design cycle time is consumed by design verification (Raynaud, 2003). Most functional verification happens through simulation. This paper proposes a technique by which the simulation times of time consuming verification steps can be reduced. The proposed

Aman Kokrady; Theo J. Powell; S. Ramakrishnan

2006-01-01

367

A digital flight control system verification laboratory  

NASA Technical Reports Server (NTRS)

A NASA/FAA program has been established for the verification and validation of digital flight control systems (DFCS), with the primary objective being the development and analysis of automated verification tools. In order to enhance the capabilities, effectiveness, and ease of using the test environment, software verification tools can be applied. Tool design includes a static analyzer, an assertion generator, a symbolic executor, a dynamic analysis instrument, and an automated documentation generator. Static and dynamic tools are integrated with error detection capabilities, resulting in a facility which analyzes a representative testbed of DFCS software. Future investigations will ensue particularly in the areas of increase in the number of software test tools, and a cost effectiveness assessment.

De Feo, P.; Saib, S.

1982-01-01

368

Verification and validation for magnetic fusion  

SciTech Connect

Dramatic progress in the scope and power of plasma simulations over the past decade has extended our understanding of these complex phenomena. However, as codes embody imperfect models for physical reality, a necessary step toward developing a predictive capability is demonstrating agreement, without bias, between simulations and experimental results. While comparisons between computer calculations and experimental data are common, there is a compelling need to make these comparisons more systematic and more quantitative. Tests of models are divided into two phases, usually called verification and validation. Verification is an essentially mathematical demonstration that a chosen physical model, rendered as a set of equations, has been accurately solved by a computer code. Validation is a physical process which attempts to ascertain the extent to which the model used by a code correctly represents reality within some domain of applicability, to some specified level of accuracy. This paper will cover principles and practices for verification and validation including lessons learned from related fields.

Greenwald, Martin [Massachusetts Institute of Technology, 175 Albany St., Cambridge, Massachusetts 02139 (United States)

2010-05-15

369

Chemical and Physical Signatures for Microbial Forensics  

SciTech Connect

Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special considerations for the forensic arena - quality control, sample integrity, etc. Mark Wilson (retired FBI): Western Carolina University Chapter 4. Physical signatures: Light and electron microscopy, atomic force microscopy, gravimetry etc. Joseph Michael, Sandia National Laboratory Chapter 5. Lipids: FAME, PLFA, steroids, LPS, etc. James Robertson, Federal Bureau of Investigation Chapter 6. Carbohydrates: Cell wall components, cytoplasm components, methods Alvin Fox, University of South Carolina School of Medicine David Wunschel, Pacific Northwest National Laboratory Chapter 7. Peptides: Peptides, proteins, lipoproteins David Wunschel, Pacific Northwest National Laboratory Chapter 8. Elemental content: CNOHPS (treated in passing), metals, prospective cell types John Cliff, International Atomic Energy Agency Chapter 9. Isotopic signatures: Stable isotopes C,N,H,O,S, 14C dating, potential for heavy elements. Helen Kreuzer-Martin, Pacific Northwest National Laboratory Michaele Kashgarian, Lawrence Livermore National Laboratory Chapter 10. Extracellular signatures: Cellular debris, heme, agar, headspace, spent media, etc Karen Wahl, Pacific Northwest National Laboratory Chapter 11. Data Reduction and Integrated Microbial Forensics: Statistical concepts, parametric and multivariate statistics, integrating signatures Kristin Jarman, Pacific Northwest National Laboratory

Cliff, John B.; Kreuzer, Helen W.; Ehrhardt, Christopher J.; Wunschel, David S.

2012-01-03

370

Peripheral Blood Signatures of Lead Exposure  

PubMed Central

Background Current evidence indicates that even low-level lead (Pb) exposure can have detrimental effects, especially in children. We tested the hypothesis that Pb exposure alters gene expression patterns in peripheral blood cells and that these changes reflect dose-specific alterations in the activity of particular pathways. Methodology/Principal Finding Using Affymetrix Mouse Genome 430 2.0 arrays, we examined gene expression changes in the peripheral blood of female Balb/c mice following exposure to per os lead acetate trihydrate or plain drinking water for two weeks and after a two-week recovery period. Data sets were RMA-normalized and dose-specific signatures were generated using established methods of supervised classification and binary regression. Pathway activity was analyzed using the ScoreSignatures module from GenePattern. Conclusions/Significance The low-level Pb signature was 93% sensitive and 100% specific in classifying samples a leave-one-out crossvalidation. The high-level Pb signature demonstrated 100% sensitivity and specificity in the leave-one-out crossvalidation. These two signatures exhibited dose-specificity in their ability to predict Pb exposure and had little overlap in terms of constituent genes. The signatures also seemed to reflect current levels of Pb exposure rather than past exposure. Finally, the two doses showed differential activation of cellular pathways. Low-level Pb exposure increased activity of the interferon-gamma pathway, whereas high-level Pb exposure increased activity of the E2F1 pathway. PMID:21829687

LaBreche, Heather G.; Meadows, Sarah K.; Nevins, Joseph R.; Chute, John P.

2011-01-01

371

Network Signatures of Survival in Glioblastoma Multiforme  

PubMed Central

To determine a molecular basis for prognostic differences in glioblastoma multiforme (GBM), we employed a combinatorial network analysis framework to exhaustively search for molecular patterns in protein-protein interaction (PPI) networks. We identified a dysregulated molecular signature distinguishing short-term (survival<225 days) from long-term (survival>635 days) survivors of GBM using whole genome expression data from The Cancer Genome Atlas (TCGA). A 50-gene subnetwork signature achieved 80% prediction accuracy when tested against an independent gene expression dataset. Functional annotations for the subnetwork signature included “protein kinase cascade,” “I?B kinase/NF?B cascade,” and “regulation of programmed cell death” – all of which were not significant in signatures of existing subtypes. Finally, we used label-free proteomics to examine how our subnetwork signature predicted protein level expression differences in an independent GBM cohort of 16 patients. We found that the genes discovered using network biology had a higher probability of dysregulated protein expression than either genes exhibiting individual differential expression or genes derived from known GBM subtypes. In particular, the long-term survivor subtype was characterized by increased protein expression of DNM1 and MAPK1 and decreased expression of HSPA9, PSMD3, and CANX. Overall, we demonstrate that the combinatorial analysis of gene expression data constrained by PPIs outlines an approach for the discovery of robust and translatable molecular signatures in GBM. PMID:24068912

Patel, Vishal N.; Gokulrangan, Giridharan; Chowdhury, Salim A.; Chen, Yanwen; Sloan, Andrew E.; Koyutürk, Mehmet; Barnholtz-Sloan, Jill; Chance, Mark R.

2013-01-01

372

Kinematics of signature writing in healthy aging.  

PubMed

Forensic document examiners (FDE) called upon to distinguish a genuine from a forged signature of an elderly person are often required to consider the question of age-related deterioration and whether the available exemplars reliably capture the natural effects of aging of the original writer. An understanding of the statistical relationship between advanced age and handwriting movements can reduce the uncertainty that may exist in an examiner's approach to questioned signatures formed by elderly writers. The primary purpose of this study was to systematically examine age-related changes in signature kinematics in healthy writers. Forty-two healthy subjects between the ages of 60-91 years participated in this study. Signatures were recorded using a digitizing tablet, and commercial software was used to examine the temporal and spatial stroke kinematics and pen pressure. Results indicated that vertical stroke duration and dysfluency increased with age, whereas vertical stroke amplitude and velocity decreased with age. Pen pressure decreased with age. We found that a linear model characterized the best-fit relationship between advanced age and handwriting movement parameters for signature formation. Male writers exhibited stronger age effects than female writers, especially for pen pressure and stroke dysfluency. The present study contributes to an understanding of how advanced age alters signature formation in otherwise healthy adults. PMID:24673648

Caligiuri, Michael P; Kim, Chi; Landy, Kelly M

2014-07-01

373

Online! Citation Styles  

NSDL National Science Digital Library

This Internet version of Online!: A Reference Guide to Using Internet Resources from Bedford/ St. Martin's Press is for any student, professional, or scholar who has ever been frustrated by the inadequate and/or out-of-date information provided in most standard handbooks and style guides regarding citing online materials. With chapters five through eight of the printed text posted and updated regularly, Online! is one of the most recent and comprehensive guides to online documentation available on the Web. The Website shows how to document ten different categories of online sources in APA, MLA, CBE, and Chicago styles, including Websites; email, discussion, electronic mailing list, and news group postings; Telnet sites; and linkage data. The site provides general principles and specific examples for each type of citation. Additional links for other styles and guides are also provided. Finally, unlike some online guides to documentation, the site is attractive and easily navigable.

374

Online Market Coordination  

Microsoft Academic Search

The aim of this paper is to deal with the problem of coordination for online markets where a seller registers to an online\\u000a market to sell an item. The seller and the owner of the market then form an alliance to generate revenue through online sales.\\u000a However, the efficiency and stability of the alliance highly relies on the contract that

Masabumi Furuhata; Dongmo Zhang; Laurent Perrussel

2008-01-01

375

Authorized Signature Form -Agency Account -Student Organization Exhibit 5-C(3)  

E-print Network

Authorized Signature Form - Agency Account - Student Organization Exhibit 5-C(3) (MINIMUM OF TWO) (INK SIGNATURES ONLY) TITLE - Authorized Person Name - Authorized Person *REQUIRED* Authorized signatures only. Faxed, copied or stamped signatures are not allowed. Instructions - Authorized Signature

Liu, Taosheng

376

Ecosystem engineers and geomorphological signatures in landscapes  

NASA Astrophysics Data System (ADS)

Biogeomorphologists study the roles of biota in landscape formation and decay. Ecologists interested in ecosystem engineering study environmental change caused by biota and the consequences for the engineer, other organisms, and ecological processes. The interface is geomorphological change, an interface both are aware of but study somewhat independently and differently. Interaction and integration among the two fields is the goal of this special issue. Here I take an ecological perspective of geomorphological change caused by ecosystem engineers in patches within landscapes that I hope can help facilitate this goal. I ask the following general questions: When will an ecosystem engineering species create a geomorphological signature in a landscape? What, in qualitative terms, is such a signature? How can the signature be estimated and how long will it last? What engineer attributes and ecological factors will determine signature change? What creates complications? How do the answers inform whether or not life leaves a geomorphological signature? To attempt answers, I develop a provisional, general theory of ecosystem engineering signatures that draws on and integrates a geomorphological foundation of balance between formation and decay; landscape patch dynamics; a general framework for ecosystem engineering; and empirical studies. I treat a landscape engineering signature as the balance of rates of formation (F) and rates of decay (D) across patches whose ratio value (F/D) can be transformed (> 1), intermediate (1) or untransformed (< 1). I suggest amenable systems for study. I describe how the signature can be estimated and evaluated for potential persistence, and how to identify when decay or engineer density and per capita engineering activity control the signature. I examine the influences on shifts from transformed to untransformed signatures, and vice versa, at constant and changing rates of decay. I show how the likelihood of signature shifts depends on: 1. engineer density in the landscape and per patch; 2. per capita engineering activity as structure per patch and patches per engineer, or its contribution for engineers occurring in groups; 3. the degree of patch maintenance, abandonment, and re-engineering of abandoned patches; and in some situations, 4. the direction of the signature shift that is considered. I use this to illustrate how different ecological factors affecting engineer species (e.g., abiotic resources and conditions, natural enemies) and engineer feedbacks can drive signature transitions. I address complications and how they might be dealt with for situations where an engineer species causes formation and decay; when multiple engineering species co-occur; and when patches are materially interconnected. I end by considering whether life leaves a geomorphological signature, using this to contrast my approach with biogeomorphology, and asking what a hypothetical analysis of signature patterns across many engineer species/landscape combinations might imply for the interface of ecology and biogeomorphology.

Jones, Clive G.

2012-07-01

377

MELCOR Verification, Benchmarking, and Applications experience at BNL  

Microsoft Academic Search

This paper presents a summary of MELCOR Verification, Benchmarking and Applications experience at Brookhaven National Laboratory (BNL), sponsored by the US Nuclear Regulatory Commission (NRC). Under MELCOR verification over the past several years, all released versions of the code were installed on BNL's computer system, verification exercises were performed, and defect investigation reports were sent to SNL. Benchmarking calculations of

Madni

1992-01-01

378

MELCOR Verification, Benchmarking, and Applications experience at BNL  

Microsoft Academic Search

This paper presents a summary of MELCOR Verification, Benchmarking and Applications experience at Brookhaven National Laboratory (BNL), sponsored by the US Nuclear Regulatory Commission (NRC). Under MELCOR verification over the past several years, all released versions of the code were installed on BNL`s computer system, verification exercises were performed, and defect investigation reports were sent to SNL. Benchmarking calculations of

Madni

1992-01-01

379

Massachusetts Institute of Technology Efficient Memory Integrity Verification and  

E-print Network

and Artificial Intelligence Laboratory #12;#12;Efficient Memory Integrity Verification and Encryption for Secure on the computation. Given off-chip memory integrity verification, secure pro- cessors can provide tamper-evident (TECSAIL Massachusetts Institute of Technology Efficient Memory Integrity Verification and Encryption

Gummadi, Ramakrishna

380

Efficient Memory Integrity Verification and Encryption for Secure Processors  

E-print Network

Efficient Memory Integrity Verification and Encryption for Secure Processors G. Edward Suh, Dwaine required in single­ chip secure processors. The integrity verification mecha­ nism offers significant a performance penalty on the computation. Given off­chip memory integrity verification, secure processors can

Devadas, Srinivas

381

Is methodology the highway out of verification hell?  

Microsoft Academic Search

Few would disagree that verification takes the lion's share of today's project resources. If we examine the available research, we quickly discover that verification is a significant pain point that consumes massive amounts of time and resources across a multitude of market segments. Per Gary Smith at Gartner Dataquest, verification consumes 30% to 70% of total schedule, depending on design

Francine Bacchini; Gabe Moretti; Harry Foster; Janick Bergeron; Masayuki Nakamura; Shrenik Mehta; Laurent Ducousso

2005-01-01

382

15 CFR 748.13 - Delivery Verification (DV).  

Code of Federal Regulations, 2013 CFR

...2013-01-01 2013-01-01 false Delivery Verification (DV). 748.13 Section...LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope...the licensee to obtain verifications of delivery on a selective basis. A...

2013-01-01

383

15 CFR 748.13 - Delivery Verification (DV).  

Code of Federal Regulations, 2014 CFR

...2014-01-01 2014-01-01 false Delivery Verification (DV). 748.13 Section...LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope...the licensee to obtain verifications of delivery on a selective basis. A...

2014-01-01

384

15 CFR 748.13 - Delivery Verification (DV).  

Code of Federal Regulations, 2012 CFR

...2012-01-01 2012-01-01 false Delivery Verification (DV). 748.13 Section...LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope...the licensee to obtain verifications of delivery on a selective basis. A...

2012-01-01

385

15 CFR 748.13 - Delivery Verification (DV).  

Code of Federal Regulations, 2010 CFR

...2010-01-01 2010-01-01 false Delivery Verification (DV). 748.13 Section...LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope...the licensee to obtain verifications of delivery on a selective basis. A...

2010-01-01

386

15 CFR 748.13 - Delivery Verification (DV).  

Code of Federal Regulations, 2011 CFR

...2011-01-01 2011-01-01 false Delivery Verification (DV). 748.13 Section...LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope...the licensee to obtain verifications of delivery on a selective basis. A...

2011-01-01

387

Electronic Signatures: They're Legal, Now What?  

ERIC Educational Resources Information Center

In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…

Broderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter

2001-01-01

388

Verification of Plan Models Using UPPAAL  

NASA Technical Reports Server (NTRS)

This paper describes work on the verification of HSTS, the planner and scheduler of the Remote Agent autonomous control system deployed in Deep Space 1 (DS1). The verification is done using UPPAAL, a real time model checking tool. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify. Finally, we conclude with a summary.

Khatib, Lina; Muscettola, Nicola; Haveland, Klaus; Lau, Sonic (Technical Monitor)

2001-01-01

389

Proton Therapy Verification with PET Imaging  

PubMed Central

Proton therapy is very sensitive to uncertainties introduced during treatment planning and dose delivery. PET imaging of proton induced positron emitter distributions is the only practical approach for in vivo, in situ verification of proton therapy. This article reviews the current status of proton therapy verification with PET imaging. The different data detecting systems (in-beam, in-room and off-line PET), calculation methods for the prediction of proton induced PET activity distributions, and approaches for data evaluation are discussed. PMID:24312147

Zhu, Xuping; Fakhri, Georges El

2013-01-01

390

Measurement and Verification (M&V)  

E-print Network

ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Agenda 1. Introduction and Agenda 2. Definitions: Types of Commissioning 3. Introduction to Continuous Commissioning® 4. Tools and Measurements Coffee Break... 5. Continuous Commissioning Measures 6. Measurement and Verification 2 ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Measurement and Verification (M&V) Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko...

Masuda, H

2014-01-01

391

Structural verification of an aged composite reflector  

NASA Technical Reports Server (NTRS)

A structural verification program applied to qualifying two heritage composite antenna reflectors for flight on the TOPEX satellite is outlined. The verification requirements and an integrated analyses/test approach employed to meet these requirements are described. Structural analysis results and qualification vibration test data are presented and discussed. It was determined that degradation of the composite and bonding materials caused by long-term exposure to an uncontrolled environment had not severely impaired the integrity of the reflector structures. The reflectors were assessed to be structurally adequate for the intended TOPEX application.

Lou, Michael C.; Tsuha, Walter S.

1991-01-01

392

Fuel Retrieval System Design Verification Report  

SciTech Connect

The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

GROTH, B.D.

2000-04-11

393

Asia Times Online  

NSDL National Science Digital Library

As the world's news flows increasingly from Asian nations, those people looking for a credible online source that concentrates on this region will find it in Asia Times Online. The site's front page features top stories from Asia Times journalists as well as from other online dailies and reports, including the South China Morning Post, Business Times Online, and the Australian Financial Review. The site offers separate sections for China, Southeast Asia, Japan, the Koreas, India/ Pakistan, Central Asia, and Oceania as well as departments devoted to Business Briefs, Global Economy, and Media and Industrial Technology. The entire site, including archives, is searchable.

394

Online shopping hesitation.  

PubMed

This study was designed to understand which factors influence consumer hesitation or delay in online product purchases. The study examined four groups of variables (i.e., consumer characteristics, contextual factors perceived uncertainty factors, and medium/channel innovation factors) that predict three types of online shopping hesitation (i.e., overall hesitation, shopping cart abandonment, and hesitation at the final payment stage). We found that different sets of delay factors are related to different aspects of online shopping hesitation. The study concludes with suggestion for various delay-reduction devices to help consumers close their online decision hesitation. PMID:16780394

Cho, Chang-Hoan; Kang, Jaewon; Cheon, Hongsik John

2006-06-01

395

The Exploratorium: Online Exhibits  

NSDL National Science Digital Library

Visitors can see online versions of some exhibits from the Exploratorium. These exhibits involve optical illusions of color, space and perception. Spanish, French, and Italian translations are available.

396

Irma 5.1 multisensor signature prediction model  

NASA Astrophysics Data System (ADS)

The Irma synthetic signature prediction code is being developed to facilitate the research and development of multi-sensor systems. Irma was one of the first high resolution, physics-based Infrared (IR) target and background signature models to be developed for tactical weapon applications. Originally developed in 1980 by the Munitions Directorate of the Air Force Research Laboratory (AFRL/MN), the Irma model was used exclusively to generate IR scenes. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser (or active) channel. This two-channel version was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model, which supported correlated frame-to-frame imagery. A passive IR/millimeter wave (MMW) code was completed in 1994. This served as the cornerstone for the development of the co-registered active/passive IR/MMW model, Irma 4.0. In 2000, Irma version 5.0 was released which encompassed several upgrades to both the physical models and software. Circular polarization was added to the passive channel, and a Doppler capability was added to the active MMW channel. In 2002, the multibounce technique was added to the Irma passive channel. In the ladar channel, a user-friendly Ladar Sensor Assistant (LSA) was incorporated which provides capability and flexibility for sensor modeling. Irma 5.0 runs on several platforms including Windows, Linux, Solaris, and SGI Irix. Irma is currently used to support a number of civilian and military applications. The Irma user base includes over 130 agencies within the Air Force, Army, Navy, DARPA, NASA, Department of Transportation, academia, and industry. In 2005, Irma version 5.1 was released to the community. In addition to upgrading the Ladar channel code to an object oriented language (C++) and providing a new graphical user interface to construct scenes, this new release significantly improves the modeling of the ladar channel and includes polarization effects, time jittering, speckle effect, and atmospheric turbulence. More importantly, the Munitions Directorate has funded three field tests to verify and validate the re-engineered ladar channel. Each of the field tests was comprehensive and included one month of sensor characterization and a week of data collection. After each field test, the analysis included comparisons of Irma predicted signatures with measured signatures, and if necessary, refining the model to produce realistic imagery. This paper will focus on two areas of the Irma 5.1 development effort: report on the analysis results of the validation and verification of the Irma 5.1 ladar channel, and the software development plan and validation efforts of the Irma passive channel. As scheduled, the Irma passive code is being re-engineered using object oriented language (C++), and field data collection is being conducted to validate the re-engineered passive code. This software upgrade will remove many constraints and limitations of the legacy code including limits on image size and facet counts. The field test to validate the passive channel is expected to be complete in the second quarter of 2006.

Savage, James; Coker, Charles; Edwards, Dave; Thai, Bea; Aboutalib, Omar; Chow, Anthony; Yamaoka, Neil; Kim, Charles

2006-05-01

397

Efficient Unrestricted Identity-Based Aggregate Signature Scheme  

PubMed Central

An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption. PMID:25329777

Yuan, Yumin; Zhan, Qian; Huang, Hua

2014-01-01

398

Verification, Seismology, and Negative Evidence  

NASA Astrophysics Data System (ADS)

During the senatorial debate on the merits of ratifying the CTBT it was often stated that the treaty was "unverifiable". This is inherently a political statement since verification always has some level of uncertainty. However, opponents and advocates of the treaty alike, cast this as a technical problem: either the IMS monitoring system has the ability to detect small clandestine nuclear weapons tests or it does not. In the year and a half since the vote on ratification studies have been commissioned to determine the capability of various monitoring systems (IMS, IMS plus other networks) in an attempt to determine the "largest" test that could avoid detection. Unfortunately, the standard for this evaluation is a hypothetical test, an event that has not occurred. In other words, the metric for success is proving an event did not happen, or negative evidence. There are no known examples of full nuclear weapons tests that were undetected, although some were not recognized until after the fact. One example of an explosion that was only recognized later is a small PNE used to suppress a dangerous buildup of methane in a Ukrainian coal mine in Sept. 1979. The experiment, which was 0.3 kt, was on the lists of PNEs that were released in the late 1980s; in fact, the event was recorded on NORSAR and had a magnitude of 3.3. Today this event would be routinely located and flagged as suspicious. A true example of the null hypothesis test arose on Feb. 25 of this year when the London Sunday Times reported a detailed account of a clandestine Iraqi test of a simple nuclear weapon in 1989. This test was alleged to be a 10 kt device detonated in a decoupling cavity. The reports also state that the explosion produced a seismic signal of magnitude 2.7, and went unreported by any catalog outside Iraq. We examined seismic catalogs from Israeli, Jordan and Iran and could find no evidence of this event. Examination of continuous seismic data provides a baseline for the detection capability for the suspect test site. In 1989 the detection threshold was approximately 3.1 from regional stations. Using a conservative estimate of a decoupling factor of 50, and the lack of a seismic signal, gives a yield of 0.8 kt. The number of seismic stations in operation in the middle east has increased significantly since 1989, and the detection capability decreased by .25 magnitude units. The usefulness of negative evidence is providing a baseline for measuring monitoring capability.

Wallace, T. C.; Koper, K. D.; Paquette, A. M.

2001-05-01

399

Supplemental Online Materials Cytoskeletal Organization  

E-print Network

bar = 5 microns. #12;Supplemental Online Materials 3 Cryptosporidium Movies depicting gliding motilitySupplemental Online Materials 1 Cytoskeletal Organization The phylum Apicomplexa (1, 2) is defined C Figure 1 #12;Supplemental Online Materials 2 Gliding Motility Apicomplexan parasites display

Sibley, David

400

Verification jig for implant-supported prostheses: A comparison of standard impressions with verification jigs made of different materials  

Microsoft Academic Search

Statement of Problem. Implant verification jigs are routinely used during the fabrication of implant-supported prostheses. The dimensional accuracy of these jigs is unknown. Purpose. The purposes of this study were to (1) compare the dimensional accuracy of verification jigs with that of conventional impression procedures and (2) measure the dimensional accuracy of 3 resin materials used to fabricate verification jigs.

Jorge E. De La Cruz; Paul D. Funkenbusch; Carlo Ercoli; Mark E. Moss; Gerald N. Graser; Ross H. Tallents

2002-01-01

401

Optical Verification Laboratory Demonstration System for High Security Identification Cards  

NASA Technical Reports Server (NTRS)

Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.

Javidi, Bahram

1997-01-01

402

Harvard Medical School 20142015 Verification Worksheet  

E-print Network

Harvard Medical School 2014­2015 Verification Worksheet Independent Student Your 2014­2015 Free your FAFSA with the information on this worksheet and with any other required documents. If there are differences, your FAFSA information may need to be corrected. You must complete and sign this worksheet

Goodrich, Lisa V.

403

Harvard Medical School 20132014 Verification Worksheet  

E-print Network

Harvard Medical School 2013­2014 Verification Worksheet Independent Student Your 2013­2014 Free your FAFSA with the information on this worksheet and with any other required documents. If there are differences, your FAFSA information may need to be corrected. You must complete and sign this worksheet

Chou, James

404

SOCIAL SECURITY NUMBER AND NAME VERIFICATION  

E-print Network

SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2014­2015 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

Amin, S. Massoud

405

SOCIAL SECURITY NUMBER AND NAME VERIFICATION  

E-print Network

SOCIAL SECURITY NUMBER AND NAME VERIFICATION Academic Year 2013­2014 *FA552-A* Please recycle. DIRECTIONS--You must verify your name and Social Security number for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your Social Security

Amin, S. Massoud

406

HUMAN RESOURCES Verification of Sickness -Physician's Report  

E-print Network

HUMAN RESOURCES Verification of Sickness - Physician's Report The information provided will be used the release of the information requested in Part 2 below to the University of Winnipeg Human Resources will be treated as strictly confidential, with access limited only to authorized Human Resources employees who

Martin, Jeff

407

Personal identity verification for regional emergency workers.  

PubMed

South Central Texas emergency planners have organised a regional Personal Identity Verification (PIV) project for hospital and emergency workers. This paper describes the development and administrative challenges in designing and implementing an electronic PIV system across multiple organisations in a 22-county region. PMID:18676341

McLeod, Alexander; Epley, Eric; Silenas, Rasa

2008-01-01

408

WWV 2005 Preliminary Version Web Verification  

E-print Network

WWV 2005 Preliminary Version Web Verification: Perspective and Challenges Shriram Krishnamurthi 1 Computer Science Department Brown University Providence, RI, USA Abstract The Web poses novel provides a personal outline of one thread of work on this topic. Key words: Web applications, temporal

Krishnamurthi, Shriram

409

Distilling the Verification Process for Prognostics Algorithms  

NASA Technical Reports Server (NTRS)

The goal of prognostics and health management (PHM) systems is to ensure system safety, and reduce downtime and maintenance costs. It is important that a PHM system is verified and validated before it can be successfully deployed. Prognostics algorithms are integral parts of PHM systems. This paper investigates a systematic process of verification of such prognostics algorithms. To this end, first, this paper distinguishes between technology maturation and product development. Then, the paper describes the verification process for a prognostics algorithm as it moves up to higher maturity levels. This process is shown to be an iterative process where verification activities are interleaved with validation activities at each maturation level. In this work, we adopt the concept of technology readiness levels (TRLs) to represent the different maturity levels of a prognostics algorithm. It is shown that at each TRL, the verification of a prognostics algorithm depends on verifying the different components of the algorithm according to the requirements laid out by the PHM system that adopts this prognostics algorithm. Finally, using simplified examples, the systematic process for verifying a prognostics algorithm is demonstrated as the prognostics algorithm moves up TRLs.

Roychoudhury, Indranil; Saxena, Abhinav; Celaya, Jose R.; Goebel, Kai

2013-01-01

410

Timing verification and the timing analysis program  

Microsoft Academic Search

Timing Verification consists of validating the path delays (primary input or storage element to primary output or storage element) to be sure they are not too long or too short and checking the clock pulses to be sure they are not too wide or too narrow. The programs addressing these problems neither produce input patterns like test pattern generators nor

Robert B. Hitchcock

1988-01-01

411

Timing Verification and the Timing Analysis program  

Microsoft Academic Search

Timing Verification consists of validating the path delays (primary input or storage element to primary output or storage element) to be sure they are not too long or too short and checking the clock pulses to be sure they are not too wide or too narrow. The programs addressing these problems neither produce input patterns like test pattern generators nor

Robert B. Hitchcock Sr.

1982-01-01

412

Memory Consistency and Program Verification Rodrigo Ferreira  

E-print Network

Abstract Memory Consistency and Program Verification Rodrigo Ferreira 2010 Formal reasoning about in Candidacy for the Degree of Doctor of Philosophy by Rodrigo Ferreira Dissertation Director: Zhong Shao April 2010 #12;#12;Copyright c 2010 by Rodrigo Ferreira All rights reserved. #12;#12;Contents 1 Introduction

413

Image processing verification tool-IPVT  

Microsoft Academic Search

Validation is an important part of image processing. Automated extraction of structures from medical images like MRI or CT is becoming a routine process for diagnosis. Therefore, the accurate region detection is necessary. The proposed Image Processing Verification Tool-IPVT is as a tool for statistical validation of the image processing results. The IPVT tool statistically evaluates the segmentation ability of

Dusan Heric; Bozidar Potocnik

2004-01-01

414

RELAP-7 SOFTWARE VERIFICATION AND VALIDATION PLAN  

SciTech Connect

This INL plan comprehensively describes the software for RELAP-7 and documents the software, interface, and software design requirements for the application. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

Smith, Curtis L [Idaho National Laboratory; Choi, Yong-Joon [Idaho National Laboratory; Zou, Ling [Idaho National Laboratory

2014-09-01

415

PROMOTING AIR QUALITY THROUGH ENVIRONMENTAL TECHNOLOGY VERIFICATION  

EPA Science Inventory

The paper discusses the promotion of improved air quality through environmental technology verifications (ETVs). In 1995, the U.S. EPA's Office of Research and Development began the ETV Program in response to President Clinton's "Bridge to a Sustainable Future" and Vice Presiden...

416

ENVIRONMENTAL TECHNOLOGY VERIFICATION OF URBAN RUNOFF MODELS  

EPA Science Inventory

This paper will present the verification process and available results of the XP-SWMM modeling system produced by XP-Software conducted unde the USEPA's ETV Program. Wet weather flow (WWF) models are used throughout the US for the evaluation of storm and combined sewer systems. M...

417

Formal Verification of a Pipelined Microprocessor  

Microsoft Academic Search

The application of modern functional languages and supporting verification technology to a scaled-down but realistic microprocessor is described. The model is of an infinite stream of machine instructions consuming an infinite stream of interrupt signals and is specified at two levels: instruction and hardware design. A correctness criterion is stated for an appropriate sense of equivalent behavior of these levels

Mandayam K. Srivas; Mark Bickford

1990-01-01

418

Automatic verification of Pipelined Microprocessor Control  

Microsoft Academic Search

We describe a technique for verifying the control logic ofpipelined microprocessors. It handles more complicated designs, and requiresless human intervention, than existing methods. The techniqueautomaticMly compares a pipelined implementation to an architecturaldescription. The CPU time needed for verification is independent of thedata path width, the register file size, and the number of ALU operations.

Jerry R. Burch

1994-01-01

419

WORKSHOP ON VERIFICATION OF WATER QUALITY MODELS  

EPA Science Inventory

The U.S. Environmental Protection Agency sponsored a 'National Workshop on the Verification of Water Quality Models' to evaluate the state-of-the-art of water quality modeling and make specific recommendations for the direction of future modeling efforts. Participants represented...

420

Design and verification of controllers for airships  

Microsoft Academic Search

Robotic airships have several beneficial properties such as low operation cost, low noise, and low speed flight capability. We present in this paper the design and verification of a feedback control algorithm for waypoint to waypoint navigation of an outdoor blimp. A rapidly exploring random tree (RRT) is used for the validation of the blimp system control law. We describe

Jongwoo Kim; Jim Keller; Vijay Kumar

2003-01-01

421

Automatic Memory Reductions for RTL Model Verification  

E-print Network

1 Automatic Memory Reductions for RTL Model Verification Panagiotis Manolios Sudarshan K Number of words in memory Verificationtime(sec) State-of-the-Art 2 Stage Pipelined Machine TO #12;4 0.1 1 10 100 1000 10000 4 8 16 32 64 Number of words in memory Verificationtime(sec) State-of-the-Art BAT 2

Manolios, Panagiotis "Pete"

422

Focus on Isabelle: From Specification to Verification  

E-print Network

of a specification frame- work with a verification system. Given a system, represented in a formal specification will reduce the lavishness and error-proneness of system specifications. A formal specification is in general with requirements. Therefore, for safety critical systems it is not enough to have detached formal specifications

423

Environmental Technology Verification (ETV) Quality Program (Poster)  

EPA Science Inventory

This is a poster created for the ETV Quality Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The...

424

Environmental Technology Verification Program Fact Sheet  

EPA Science Inventory

This is a Fact Sheet for the ETV Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The program ...

425

DATE OF BIRTH VERIFICATION RETURN FORM  

E-print Network

DATE OF BIRTH VERIFICATION RETURN FORM: BY MAIL TO: Office of Student Finance 20 Fraser Hall 106. DIRECTIONS--You must verify your date of birth for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your birth certificate, U.S. passport

Amin, S. Massoud

426

DATE OF BIRTH VERIFICATION RETURN FORM  

E-print Network

DATE OF BIRTH VERIFICATION RETURN FORM: BY MAIL TO: Office of Student Finance 20 Fraser Hall 106. DIRECTIONS--You must verify your date of birth for processing of your 2013­2014 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your birth certificate, U.S. passport

Amin, S. Massoud

427

Verification of Giotto based Embedded Control Systems  

Microsoft Academic Search

Abstract. An implementation,of a control system design may not preserve the functional and timing requirements of the application. Our goal is to verify that an implementation meets the high-level timing and functional specifications of a control application. We take Giotto as the implementation model, and verify Giotto models using ??????, a tool box for modelling, simulation and verification of timed

Rajiv Kumar Poddar; Purandar Bhaduri

2006-01-01

428

Business Traveler Online  

NSDL National Science Digital Library

Covering issues important to business travelers, Business Traveler Online is the online version of the UK and US editions of Business Traveler. This magazine offers germane advice for those who travel extensively for work, with full-text articles dealing with issues including transportation, destinations, and lifestyle.

429

Online Collaboration: Curriculum Unbound!  

ERIC Educational Resources Information Center

Freed from the nuisances of paper-based methods, districts are making creative use of digital tools to move their curricular documents online, where educators can collaborate on course development and lesson planning. Back in 2003, Amarillo Independent School District (Texas) had begun using the Blackboard Content System to provide lessons online

Waters, John K.

2007-01-01

430

Procurement Card Access Online  

E-print Network

Procurement Card U.S. Bank Access Online Cardholder Transaction Management #12;Procurement Card-users to procure low dollar purchases o authorized commodities and services. · U.S. Bank is the new Visa P-Card provider. · Access Online is the new software used to manage P-Card transactions. · Financial & Tax

Sorin, Eric J.

431

Frontiers of Online Banking  

Microsoft Academic Search

This paper surveys the changing dynamics, banking products, technology, and management challenges in the nascent online banking industry. The paper also examines the critical role of aligning internal processes, back-office systems, and the retail interface in the delivery of the next generation of financial services. A central theme of the paper is the need to look at online banking as

R. Kalakota; F. Frei

1996-01-01

432

Authoritative Online Editions  

ERIC Educational Resources Information Center

In this article, the author discusses how it is now very easy for anyone to find formerly hard-to-find books such as the works of Walt Whitman with the help of online booksellers. The author also describes the efforts made by various institutions to produce online editions of the works of major writers. One such prominent project is the archive…

Benton, Thomas H.

2007-01-01

433

ONLINE CONTINUING DENTAL EDUCATION  

Microsoft Academic Search

Background. An increasing number of continuing dental education, or CDE, courses are available on the Internet. The authors conducted this study to determine general characteristics of online CDE course offerings. Methods. The authors found online CDE courses through Internet search engines and dental indexes. They recorded each course's Web page address, title, topic, length, credit hours and cost. Then they

TITUS K. L. SCHLEYER; TUAN PHAM

2001-01-01

434

Selling Luxury Brands Online  

Microsoft Academic Search

This research examines the issue of online selling of luxury brands. Of key interest is first, to determine what Internet presence luxury brands have and second, whether luxury brands sell their products and services online. This is the first study to undertake a content analysis of luxury brands on the Internet, and thus is largely exploratory. A survey of 190

F. H. Rolf Seringhaus

2005-01-01

435

NUFinancials Online Voucher  

E-print Network

NUFinancials Online Voucher Job Aid Using the Visitor's Expense Report Using the Visitor's Expense University Page 1 of 2 The Visitor's Expense Report is used with the Online Voucher to reimburse individuals-approved, business-related expenses, including transportation, lodging, and other travel or non-travel costs

Shull, Kenneth R.

436

NUFinancials Online Voucher  

E-print Network

NUFinancials Online Voucher Job Aid ContractedServicesAid Last Updated 10/3/2013 rb © 2013. · The Contracted Services Form is also used for honoraria, regardless of dollar amount. · For reimbursable travel the Contracted Services form and Online Voucher. · For further information about the Contracted Services Form

Shull, Kenneth R.

437

Evaluating Online Learning Communities  

ERIC Educational Resources Information Center

This article reviews recent evaluation studies of online learning communities to provide a systematic understanding of how such communities are evaluated. Forty-two representative studies were selected and categorized into a newly developed taxonomy of online learning community evaluations. This taxonomy is divided into four components: evaluation…

Ke, Fengfeng; Hoadley, Christopher

2009-01-01

438

Children's Online Privacy.  

ERIC Educational Resources Information Center

The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

Aidman, Amy

2000-01-01

439

What's Next Online  

NSDL National Science Digital Library

What's Next Online is a free online newsletter which focuses on business marketing tips and discussion. Written and edited by B.L. Ochman, each issue contains several short articles about current issues in marketing as well as a list of annotated, notable links. Past issues are archived, and interested users may subscribe to the email version of the newsletter.

440

Verification of data in congenital cardiac surgery.  

PubMed

Accurate, complete data is now the expectation of patients, families, payers, government, and even media. It has become an obligation of those practising congenital cardiac surgery. Appropriately, major professional organizations worldwide are assuming responsibility for the data quality in their respective registry databases. The purpose of this article is to review the current strategies used for verification of the data in the congenital databases of The Society of Thoracic Surgeons, The European Association for Cardio-Thoracic Surgery, and The United Kingdom Central Cardiac Audit Database. Because the results of the initial efforts to verify data in the congenital databases of the United Kingdom and Europe have been previously published, this article provides a more detailed look at the current efforts in North America, which prior to this article have not been published. The discussion and presentation of the strategy for the verification of data in the congenital heart surgery database of The Society of Thoracic Surgeons is then followed by a review of the strategies utilized in the United Kingdom and Europe. The ultimate goal of sharing the information in this article is to provide information to the participants in the databases that track the outcomes of patients with congenitally malformed hearts. This information should help to improve the quality of the data in all of our databases, and therefore increase the utility of these databases to function as a tool to optimise the management strategies provided to our patients. The need for accurate, complete and high quality Congenital Heart Surgery outcome data has never been more pressing. The public interest in medical outcomes is at an all time high and "pay for performance" is looming on the horizon. Information found in administrative databases is not risk or complexity adjusted, notoriously inaccurate, and far too imprecise to evaluate performance adequately in congenital cardiac surgery. The Society of Thoracic Surgeons and European Association for Cardio-Thoracic Surgery databases contain the elements needed for assessment of quality of care provided that a mechanism exists within these organizations to guarantee the completeness and accuracy of the data. The Central Cardiac Audit Database in the United Kingdom has an advantage in this endeavour with the ability to track and verify mortality independently, through their National Health Service. A combination of site visits with "Source Data Verification", in other words, verification of the data at the primary source of the data, and external verification of the data from independent databases or registries, such as governmental death registries, may ultimately be required to allow for optimal verification of data. Further research in the area of verification of data is also necessary. Data must be verified for both completeness and accuracy. PMID:19063789

Clarke, David R; Breen, Linda S; Jacobs, Marshall L; Franklin, Rodney C G; Tobota, Zdzislaw; Maruszewski, Bohdan; Jacobs, Jeffrey P

2008-12-01

441

Terahertz signature characterization of bio-simulants  

NASA Astrophysics Data System (ADS)

Collaboration with the University of Virginia (UVa) and the University of California, Santa Barbara (UCSB) has resulted in the collection of signature data in the THz region of the spectrum for ovalbumin, Bacillus Subtilis (BG) and RNA from MS2 phage. Two independent experimental measurement systems were used to characterize the bio-simulants. Prior to our efforts, only a limited signature database existed. The goal was to evaluate a larger ensemble of biological agent simulants (BG, MS2 and ovalbumin) by measuring their THz absorption spectra. UCSB used a photomixer spectrometer and UVa a Fourier Transform spectrometer to measure absorption spectra. Each group used different sample preparation techniques and made multiple measurements to provide reliable statistics. Data processing culminated in applying proprietary algorithms to develop detection filters for each simulant. Through a covariance matrix approach, the detection filters extract signatures over regions with strong absorption and ignore regions with large signature variation (noise). The discrimination capability of these filters was also tested. The probability of detection and false alarm for each simulant was analyzed by each simulant specific filter. We analyzed a limited set of Bacillus thuringiensis (BT) data (a near neighbor to BG) and were capable of discriminating between BT and BG. The signal processing and filter construction demonstrates signature specificity and filter discrimination capabilities.

Majewski, Alexander J.; Miller, Peter; Abreu, Rene; Grotts, Jeffrey; Globus, Tatiana; Brown, Elliott

2005-05-01

442

Survey: Online Finance  

NSDL National Science Digital Library

This lengthy article from The Economist gives an excellent, far-reaching overview of the industry of online banking. "Online Finance" considers the role of online banking within the finance industry as well as examining the benefits and pitfalls of banks transferring their services to the Internet. The survey is broken into nineteen sections which explore this phenomenon from a variety of angles including banking technology, online brokerage firms, and some of the obstacles of online finance, as well as looking at banking on the Internet in Japan and Scandinavia. The article also includes related titles in The Economist archive, as well as linking to several sections of the SEC Website that were mentioned in the article.

443

Verification of exceptional points in the collapse dynamics of Bose-Einstein condensates  

NASA Astrophysics Data System (ADS)

In Bose-Einstein condensates with an attractive contact interaction the stable ground state and an unstable excited state emerge in a tangent bifurcation at a critical value of the scattering length. At the bifurcation point both the energies and the wave functions of the two states coalesce, which is the characteristic of an exceptional point. In numerical simulations signatures of the exceptional point can be observed by encircling the bifurcation point in the complex extended space of the scattering length, however, this method cannot be applied in an experiment. Here we show in which way the exceptional point effects the collapse dynamics of the Bose-Einstein condensate. The harmonic inversion analysis of the time signal given as the spatial extension of the collapsing condensate wave function can provide clear evidence for the existence of an exceptional point. This method can be used for an experimental verification of exceptional points in Bose-Einstein condensates.

Brinker, Jonas; Fuchs, Jacob; Main, Jörg; Wunner, Günter; Cartarius, Holger

2015-01-01

444

Detection of hail signatures from single-polarization C-band radar reflectivity  

NASA Astrophysics Data System (ADS)

Five different criteria that estimate hail signatures from single-polarization radar data are statistically evaluated over a 15-year period by categorical verification against loss data provided by a building insurance company. The criteria consider different levels or thresholds of radar reflectivity, some of them complemented by estimates of the 0 °C level or cloud top temperature. Applied to reflectivity data from a single C-band radar in southwest Germany, it is found that all criteria are able to reproduce most of the past damage-causing hail events. However, the criteria substantially overestimate hail occurrence by up to 80%, mainly due to the verification process using damage data. Best results in terms of highest Heidke Skill Score HSS or Critical Success Index CSI are obtained for the Hail Detection Algorithm (HDA) and the Probability of Severe Hail (POSH). Radar-derived hail probability shows a high spatial variability with a maximum on the lee side of the Black Forest mountains and a minimum in the broad Rhine valley.

Kunz, Michael; Kugel, Petra I. S.

2015-02-01

445

Explosives Detection: Exploitation of the Physical Signatures  

NASA Astrophysics Data System (ADS)

Explosives based terrorism is an ongoing threat that is evolving with respect to implementation, configuration and materials used. There are a variety of devices designed to detect explosive devices, however, each technology has limitations and operational constraints. A full understanding of the signatures available for detection coupled with the array of detection choices can be used to develop a conceptual model of an explosives screening operation. Physics based sensors provide a robust approach to explosives detection, typically through the identification of anomalies, and are currently used for screening in airports around the world. The next generation of detectors for explosives detection will need to be more sensitive and selective, as well as integrate seamlessly with devices focused on chemical signatures. An appreciation for the details of the physical signature exploitation in cluttered environments with time, space, and privacy constraints is necessary for effective explosives screening of people, luggage, cargo, and vehicles.

Atkinson, David

2010-10-01

446

Syntactic pattern recognition for HRR signatures  

NASA Astrophysics Data System (ADS)

A classifier based on a syntactic approach is developed for High range resolution (HRR) radar target recognition. An attribute grammar is used to represent the structure of an HRR signature and an error-correcting parsing mechanism is implemented to extract peaks in the HRR profile and suppress the extraneous spikes. In the training phase, an error correcting grammatical inference technique is employed for structural inference of HRR signatures using a positive sample set. Recognition is done using a minimum distance classifier where Levenshtein error measure is used as the distance metric. The error-correcting parsing procedure for peak extraction is used to perform both inference and recognition. Experiments performed using public release MSTAR database indicate that this approach has sufficient discrimination power to perform target detection in HRR signatures.

Bhatnagar, Raj K.; Williams, Robert L.; Tennety, Vijay

2000-08-01

447

Biomarker Gene Signature Discovery Integrating Network Knowledge  

PubMed Central

Discovery of prognostic and diagnostic biomarker gene signatures for diseases, such as cancer, is seen as a major step towards a better personalized medicine. During the last decade various methods, mainly coming from the machine learning or statistical domain, have been proposed for that purpose. However, one important obstacle for making gene signatures a standard tool in clinical diagnosis is the typical low reproducibility of these signatures combined with the difficulty to achieve a clear biological interpretation. For that purpose in the last years there has been a growing interest in approaches that try to integrate information from molecular interaction networks. Here we review the current state of research in this field by giving an overview about so-far proposed approaches. PMID:24832044

Cun, Yupeng; Fröhlich, Holger

2012-01-01

448

Cryptanalysis of the arbitrated quantum signature protocols  

SciTech Connect

As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.

Gao Fei; Qin Sujuan; Guo Fenzhuo; Wen Qiaoyan [State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876 (China)

2011-08-15

449

Thermal signatures of personnel in urban environments  

NASA Astrophysics Data System (ADS)

Georgia Tech has initiated a research program into the detection of covert personnel in traditionally difficult environments (e.g., urban, caves). This program focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification and characterization of potential observables--particularly in the context of urban environments. For this current effort, several electro-optical sensing modalities have been evaluated for use as a component in an unattended sensor suite designed to detect personnel. These modalities include active sensors (e.g., vibrometry) and passive sensors (e.g., multi-spectral, thermal). Within the urban environment, illumination conditions can vary widely and change dynamically during the course of a day. This paper will discuss those issues and present a computational approach to computing the radiative exchange environment and the corresponding thermal signatures of personnel in these environments. Consideration will also be given to the impact of these variations on thermal signatures of clutter objects.

Cathcart, J. Michael; Kocher, Brian; Camann, Ken

2008-04-01

450

On leadership. Signature strenghths: achieving your destiny.  

PubMed

All of us have signature strengths that make us unique and valuable. There are talents we were born with and the ones we have perfected over the years. If these are utilized well it will allow us to live out our inborn destiny. The good news about nursing is that there are many very different kinds of positions where one can find a niche that fits her signature strengths. Without a match, we will live our lives as a sundial in the shade. Where there is a match, we will live as we were born to live, as sundials in the sun, creating value for those around us. Our task is to find that sunlight for ourselves and our staff and to position all of us to work in the light of our signature strengths. PMID:16447836

Kerfoot, Karlene

2005-12-01

451

Selection Signatures in Worldwide Sheep Populations  

PubMed Central

The diversity of populations in domestic species offers great opportunities to study genome response to selection. The recently published Sheep HapMap dataset is a great example of characterization of the world wide genetic diversity in sheep. In this study, we re-analyzed the Sheep HapMap dataset to identify selection signatures in worldwide sheep populations. Compared to previous analyses, we made use of statistical methods that (i) take account of the hierarchical structure of sheep populations, (ii) make use of linkage disequilibrium information and (iii) focus specifically on either recent or older selection signatures. We show that this allows pinpointing several new selection signatures in the sheep genome and distinguishing those related to modern breeding objectives and to earlier post-domestication constraints. The newly identified regions, together with the ones previously identified, reveal the extensive genome response to selection on morphology, color and adaptation to new environments. PMID:25126940

Fariello, Maria-Ines; Servin, Bertrand; Tosser-Klopp, Gwenola; Rupp, Rachel; Moreno, Carole; Cristobal, Magali San; Boitard, Simon

2014-01-01

452

Attack and improvements of fair quantum blind signature schemes  

NASA Astrophysics Data System (ADS)

Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.

Zou, Xiangfu; Qiu, Daowen

2013-06-01

453

Marcus Hutter -1 -Online Prediction Bayes versus Experts Online Prediction  

E-print Network

Marcus Hutter - 1 - Online Prediction ­ Bayes versus Experts Online Prediction: Bayes versus;Marcus Hutter - 2 - Online Prediction ­ Bayes versus Experts Table of Contents · Sequential/online prediction: Setup · Bayesian Sequence Prediction (Bayes) · Prediction with Expert Advice (PEA) · PEA Bounds

Hutter, Marcus

454

Experimental Validation of the Methodology for Partial Defect Verification of the Pressurized Water Reactor Spent Fuel Assemblies  

SciTech Connect

A set of controlled experiments and Monte Carlo simulation studies with actual commercial pressurized water reactor (PWR) spent fuel assemblies were performed in order to validate an earlier proposal for partial defect testing of the PWR spent fuel assemblies. The proposed methodology involved insertion of tiny neutron and gamma detectors into the guide tubes of PWR assemblies, measurements and data evaluation. One of the key features of the data evaluation method was the concept of the base signature obtained by normalizing the ratio of gamma to neutron signals at each measurement position. As the base signature is relatively invariant to the characteristic variations of spent fuel assemblies such as initial fuel enrichment, cooling time, and burn-up, the methodology could be a powerful verification method which does not require operator declared information on the spent fuel. The benchmarking experiments indeed demonstrated that the methodology can be used for partial defect verification of the PWR spent fuel assemblies without operator declared data. The results from the experiments were compared with the simulations and the agreement between the two was well within ten percent. Thus, based on the simulation studies and benchmarking measurements, the methodology developed promises to be a powerful and practical way to detect partial defects that constitute 10% or more of the total active fuel pins. This far exceeds the detection threshold of 50% missing pins from a spent fuel assembly, a threshold defined by the IAEA Safeguards Criteria.

Ham, Y S; Sitaraman, S; Shin, H; Eom, S; Kim, H

2009-06-01

455

Security problem on arbitrated quantum signature schemes  

E-print Network

Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.

Jeong Woon Choi; Ku-Young Chang; Dowon Hong

2011-06-27

456

Remote sensing of chiral signatures on Mars  

NASA Astrophysics Data System (ADS)

We describe circular polarization as a remote sensing diagnostic of chiral signatures which may be applied to Mars. The remarkable phenomenon of homochirality provides a unique biosignature which can be amenable to remote sensing through circular polarization spectroscopy. The natural tendency of microbes to congregate in close knit communities would be beneficial for such a survey. Observations of selected areas of the Mars surface could reveal chiral signatures and hence explore the possibility of extant or preserved biological material. We describe a new instrumental technique that may enable observations of this form.

Sparks, William; Hough, James H.; Germer, Thomas A.; Robb, Frank; Kolokolova, Ludmilla

2012-11-01

457

Security problem on arbitrated quantum signature schemes  

NASA Astrophysics Data System (ADS)

Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

2011-12-01

458

Security problem on arbitrated quantum signature schemes  

SciTech Connect

Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

2011-12-15

459

Radar Signatures for Severe Convective Weather  

NSDL National Science Digital Library

This resource is intended for use as a job aid by operational weather forecasters in live warning situations and as a reference tool to better understand some aspects of severe thunderstorm warning events. Thumbnail images show typical representatives for sixteen radar reflectivity and velocity signatures as well as three primary severe storm types. Each signature links to content describing detection techniques and conceptual and diagnostic information to help determine storm severity. The majority of the examples shown are southern hemisphere storms in Australia; examples from the northern hemisphere are noted.

2014-09-14

460

Cryptanalysis of the Quantum Group Signature Protocols  

NASA Astrophysics Data System (ADS)

Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

2013-11-01

461

Lyman edges - Signatures of accretion disks  

NASA Astrophysics Data System (ADS)

Accretion disks are thought to provide the ultraviolet emission seen in the big blue bump of quasars. However, observations of the UV spectra of quasars do not show the additional signatures predicted by the accretion disk models. This paper will concentrate on just one of those signatures - the Lyman edge. Two studies are briefly discussed which explore the Lyman edge region of both high and low redshift quasars (Antonucci, Kinney, and Ford 1989 and Koratkar, Kinney, and Bohlin 1992). Both studies find that Lyman edges are not present in quasar spectra as frequently as predicted by the models or at the strength predicted by accretion disk models.

Kinney, A. L.

1992-05-01

462

Characterization of marine macroalgae by fluorescence signatures  

NASA Technical Reports Server (NTRS)

The feasibility of distinguishing macroalgal classes by their fluorescence signatures was investigated using narrow-waveband light to excite groups of accessory pigments in brown, red, and green macroalgae and measuring fluorescence emission at 685 nm. Results obtained on 20 marine macroalgae field-collected samples showed that fluorescence excitation signatures were relatively uniform within phylogenetic classes but were substantially different for different classes. It is suggested that it may be possible to characterize the type and the abundance of subtidal macroalgae from low-flying aircraft using existing laser-induced fluorescence methodology.

Topinka, J. A.; Bellows, W. Korjeff; Yentsch, C. S.

1990-01-01

463

Defect site prediction based upon statistical analysis of fault signatures  

E-print Network

. A defect signature is compatible with a fault signature if the defect signature is equal to the fault signature. If this defect signature is compatible with the fault signature for one of the two stuck-at faults, F, at site S, then defect site... with Stuck-at Fault Dictionaries,? in Proceedings International Test Conference 1990, Washington, DC, September 1990, pp. 860-870. [10] D. B. Lavo, B. Chess, T. Larrabee, and F. J. Ferguson, ?Diagnosing Realistic Bridging Faults With Single Stuck-at...

Trinka, Michael Robert

2004-09-30

464

A group signature scheme based on quantum teleportation  

NASA Astrophysics Data System (ADS)

In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

2010-05-01

465

Precise on-line position measurement for particle therapy  

NASA Astrophysics Data System (ADS)

An on-line beam position monitoring and regular beam stability tests are of utmost importance for the Quality Assurance (QA) of the patient treatment at any particle therapy facility. The Gantry 2 at the Paul Scherrer Institute uses a strip ionization chamber for the on-line beam position verification. The design of the strip chamber placed in the beam in front of the patient allows for a small beam penumbra in order to achieve a high-quality lateral beam delivery. The position error of 1 mm in a lateral plane (plane perpendicular to the beam direction) can result in a dose inhomogeneity of more than 5%. Therefore the goal of Gantry 2 commissioning was to reach a sub-millimeter level of the reconstruction accuracy in order to bring a dose uncertainty to a level of 1%. In fact, we observed that for beams offered by Gantry 2 signal profiles in a lateral plane can be reconstructed with a precision of 0.1 mm. This is a necessary criterion to perform a reliable patient treatment. The front end electronics and the whole data processing sequence have been optimized for minimizing the dead time in between two consecutive spots to about 2 ms: the charge collection is performed in about 1 ms, read-out takes place in about 100?s while data verification and logging are completed in less than 1 ms.

Actis, O.; Meer, D.; König, S.

2014-12-01

466

The Online Learning Definitions Project  

ERIC Educational Resources Information Center

The mission of the International Association for K-12 Online Learning (iNACOL) is to ensure all students have access to a world-class education and quality online learning opportunities that prepare them for a lifetime of success. "The Online Learning Definitions Project" is designed to provide states, districts, online programs, and other…

International Association for K-12 Online Learning, 2011

2011-01-01

467

Online Games: Categorization of Attacks  

Microsoft Academic Search

With the emergence of Internet technology, online games have recently become a very successful industry. As a consequence, the numbers of thefts, cheats, vandalisms, threats and illegal gambling cases from online gaming have increased. This paper presents an analysis of the attacks in online games; we define a classification of the attacks in online game with respect to the objectives

Y. Lyhyaoui; A. Lyhyaoui; S. Natkin

2005-01-01

468

Online Small Business Workshop  

NSDL National Science Digital Library

Created and maintained by the Canada Business Service Centres, the Online Small Business Workshop is a highly-detailed and thorough online course on arming new business owners with the tools they need to start a new business. The class is broken down into five lessons. The course begins with "Starting with a Good Idea" and walks users through the rest of the steps ending with "Basic Regulations for Getting Started" including taxes, incorporation, and even a start-up checklist. The Online Small Business Workshop offers an enormous amount of information, and it is best digested in smaller sessions rather than all at once.

469

The only official copy of this file is the one online in the Photon Sciences Training website. Before using a printed copy, verify that it is the most current version by checking the document effective date on the PS Training website.  

E-print Network

The only official copy of this file is the one online in the Photon Sciences Training website effective date on the PS Training website. Brookhaven National Laboratory/ Photon Sciences Directorate and satisfactory completion of course: Instructor's signature: ______________________________ Date

Ohta, Shigemi

470

Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network  

E-print Network

The associatie memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication.This paper outlines an optimization relaxation approach for signature verification based on the Hopfield neural network (HNN)which is a recurrent network.The standard sample signature of the customer is cross matched with the one supplied on the Cheque.The difference percentage is obtained by calculating the different pixels in both the images.The network topology is built so that each pixel in the difference image is a neuron in the network.Each neuron is categorized by its states,which in turn signifies that if the particular pixel is changed.The network converges to unwavering condition based on the energy function which is derived in experiments.The Hopfield's model allows each node to take on two binary state values (changed/unchanged)for each pixel.The performance of the proposed technique is evaluated by applying it in various binary and gray scale images.This paper con...

Rao, Mukta; Dhaka, Vijaypal Singh

2010-01-01

471

Joint Invariant Signatures Peter J. Olver  

E-print Network

Joint Invariant Signatures Peter J. Olver School of Mathematics University of Minnesota Minneapolis­Carlo Rota Abstract. A new, algorithmic theory of moving frames is applied to classify joint invariants and joint differential invariants of transformation groups. Equivalence and sym- metry properties

Olver, Peter

472

The Pedagogic Signature of Special Needs Education  

ERIC Educational Resources Information Center

The goal of the following study is to identify a pedagogic signature, according to LS Shulman, for working with students who have special educational needs. Special educational needs are defined as significant limitations in personal development and learning which require particular educational measures beyond regular education. The development of…

Weiß, Sabine; Kollmannsberger, Markus; Lerche, Thomas; Oubaid, Viktor; Kiel, Ewald

2014-01-01

473

Strong Key-Insulated Signature Schemes  

Microsoft Academic Search

Abstract Digital signing is at the heart of Internet based transactio ns and e-commerce. In this global communication environment, signature computation will be frequentl y performed on a relatively insecure device (e.g., a mobile phone) that cannot be trusted to completely (and at all times) maintain the secrecy of the private key. Loss of private keys has a devastating effect

Yevgeniy Dodis; Jonathan Katz; Shouhuai Xu; Moti Yung

2003-01-01

474

Efficient Signature Generation by Smart Cards  

Microsoft Academic Search

We present a new public-key signature scheme and a corresponding authentication scheme that are based on discrete logarithms in a subgroup of units in Zp where p is a sufficiently large prime, e.g., p = 2512. A key idea is to use for the base of the discrete logarithm an integer a in Zp such that the order of a

Claus-peter Schnorr

1991-01-01

475

Modification of infrared signature of naval vessels  

NASA Astrophysics Data System (ADS)

Every naval vessel can be detected and identified on the basis of its characteristics. The reduction of signature or matching it to the surrounding environment are one of the key tasks regarding survivability on a modern battlefield. The typical coatings applied on the outer surfaces of vessels are various kinds of paints. Their purpose is to protect the hull from aggressive sea environment and to provide camouflage in the visual spectrum as well as scatter and deflect microwave radiation. Apart from microwave and visual, infrared is most important spectral band used for detection purposes. In order to obtain effective protection in infrared the thermal signature of a vessel is required. It is determined on the basis of thermal contrast between a vessel itself and actual background and depends mostly on radiant properties of the hull. Such signature can be modified by altering apparent temperature values or the directions, in which the infrared radiation is emitted. The paper discusses selected methods of modification of vessel's infrared signature and effectiveness of infrared camouflage. Theoretical analyses were preceded by experimental measurements. The measurement-class infrared cameras and imaging spectroradiometers were used in order to determine the radiant exitance from different surface types. Experiments were conducted in selected conditions taking into account solar radiation and radiation reflected from elements of the surrounding scenery. Theoretical analysis took into account radiant angular properties of a vessel hull and attenuation of radiation after passing through the atmosphere. The study was performed in MWIR and LWIR ranges.

Milewski, S.; Dulski, R.; Kastek, M.; Trzaskawka, P.; Barela, J.; Firmanty, K.

2012-06-01

476

SIGNATURE IN THE INTERPLANETARY MEDIUM FOR SUBSTORMS  

Microsoft Academic Search

A detailed signature for individual substorms is sought in the interplanetary medium. Hourly values of interplanetary field and plasma parameters are correlated with hourly averages of the AE index. An interplanetary variable involving the southward component of the interplanetary field in the solar magnetospheric coordinate system is shown to be singularly important for the generation of substorms. The parameter best

Roger L. Arnoldy

1971-01-01

477

A new decomposition of radar polarization signatures  

Microsoft Academic Search

A method for the decomposition of radar polarization signatures is developed. The polarization backscattering model is assumed to consist of odd, double, Bragg, and cross backscattering components, and the Mueller matrix is the sum of the Mueller matrices of these four scattering mechanisms. The technique of least squares (LS) is then used to find the best combination of these four

Yunhan Dong; Bruce C. Forster; Catherine Ticehurst

1998-01-01

478

Autograph: Toward Automated, Distributed Worm Signature Detection  

Microsoft Academic Search

Today's Internet intrusion detection systems (IDSes) moni - tor edge networks' DMZs to identify and\\/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreadi ng of novel Internet worms. Generation of the worm signatures required by an

Hyang-ah Kim; Brad Karp

2004-01-01

479

Microbiomic Signatures of Psoriasis: Feasibility and Methodology  

E-print Network

Microbiomic Signatures of Psoriasis: Feasibility and Methodology Comparison Alexander Statnikov1 York. Psoriasis is a common chronic inflammatory disease of the skin. We sought to use bacterial of psoriasis result in significant accuracy ranging from 0.75 to 0.89 AUC, depending on the classification task

Statnikov, Alexander

480

Codon thermoelectric signature in molecular junctions  

NASA Astrophysics Data System (ADS)

The thermoelectric power of trimer oligonucleotides connected in between metallic contacts at different temperatures is theoretically studied. The obtained analytical expressions reveal the existence of important resonance effects leading to a significant thermopower enhancement for certain characteristic energies which depend on the specific electronic structure of considered codons. This result suggests the existence of a thermoelectric signature for different triplet associations of biological interest.

Maciá, Enrique

2010-07-01

481

Subsurface signatures of the Atlantic Multidecadal Oscillation  

Microsoft Academic Search

Sub-surface signatures of the Atlantic Multidecadal Oscillation (AMO) are identified using expendable bathythermograph (XBT) measurements of temperature from the surface down to a depth of 400 m. Basin averaged temperature anomalies in the North Atlantic at different depths display multidecadal variability with a phase shift between temperature anomalies at the surface and at depth. Westward propagation of temperature anomalies is

L. M. Frankcombe; H. A. Dijkstra; A. von der Heydt

2008-01-01

482

Using signatures to improve URL routing  

Microsoft Academic Search

Devices which forward or route at layers higher than the IP layer are emerging to support growing World Wide Web content distribution networks (CDN). URL routing can be used to forward or redirect a client HTTP request to the nearest or otherwise best content source. We develop and evaluate a new look-up method that uses fixed-length URL signatures based on

Z. Genova; K. J. Christensen

2002-01-01

483

Digital signature with a threshold subliminal channel  

Microsoft Academic Search

Simmons first proposed the concept of subliminal channel in 1983. Since then, many subliminal channels based on digital signatures are proposed. A (t,n) threshold scheme allows a secret to be shared among n users so that only t or more users can reconstruct the secret. In this paper, we combine both concepts to propose the first threshold subliminal channel which

Narn-Yih Lee; Pei-Hsiu Ho

2003-01-01

484

Environmental signatures associated with cholera epidemics  

E-print Network

Environmental signatures associated with cholera epidemics Guillaume Constantin de Magnya , Raghu; fNational Institute of Cholera and Enteric Diseases, Beliaghata, Kolkata 700010, India; g) The causative agent of cholera, Vibrio cholerae, has been shown to be autochthonous to riverine, estuarine

Roche, Benjamin

485

DECIPHERING MOLECULAR SIGNATURES OF PHYTOCHEMICALS IN CELLS  

Technology Transfer Automated Retrieval System (TEKTRAN)

The present study utilizes microarray technology as a tool to elucidate the molecular signatures of soy-derived phytochemcials in the LNCaP human androgen-responsive prostate cancer cell line. Global gene expression pattern analyses of LNCaP cells exposed to 0, 1, 5, or 25 microM of the soy-derived ...

486

Digital gene expression signatures for maize development  

Technology Transfer Automated Retrieval System (TEKTRAN)

Genome-wide expression signatures detect specific perturbations in developmental programs and contribute to functional resolution of key regulatory networks. In maize (Zea mays) inflorescences, mutations in the RAMOSA (RA) genes affect determinacy of axillary meristems and thus alter branching patt...

487

HXR and EUV Signatures Electron Acceleration  

E-print Network

HXR and EUV Signatures of Electron Acceleration during a Failed Eruption of a Filament Mrozek, T.1 mass and magnetic structure is erupted. 2. Partial: - class A ­ the eruption of the entire magnetic structure with small amount or even no mass. - class B ­ the partial eruption of magnetic structure

Mrozek, Tomasz

488

VICE CHANCELLOR Signature of Head of School  

E-print Network

VICE CHANCELLOR Signature of Head of School Date (dd/mm/yy) Following is a report on the professional and consultative work of my School/section over the twelve months of (year) School/Section One. Yes No (Nil Return) Total number of staff within School/Section at year end who are eligible to engage

Tobar, Michael

489

The geophysical signature of terrestrial impact craters  

Microsoft Academic Search

Terrestrial impact craters are examined in terms of their geophysical characteristics which can be used to identify additional impact craters. The geophysical signatures examined include the circular gravity low which is modeled for the cases of bowl-shaped and complex craters. The size of the gravity anomaly for both types of craters is established and modeled with known morphometric parameters of

M. Pilkington; R. A. F. Grieve

1992-01-01

490

Observational Signatures of the First Quasars  

Microsoft Academic Search

We study the observational signatures of a potential population of low-luminosity quasars at high redshifts in a Lamda CDM cosmology. We derive the evolution of the quasar luminosity function at fainter luminosities and higher redshifts than currently detected based on three assumptions: (1) the formation of dark matter halos follows the Press-Schechter theory, (2) the ratio of central black hole

Zoltan Haiman; Abraham Loeb

1998-01-01

491

Test load verification through strain data analysis  

NASA Technical Reports Server (NTRS)

A traditional binding acceptance criterion on polycrystalline structures is the experimental verification of the ultimate factor of safety. At fracture, the induced strain is inelastic and about an order-of-magnitude greater than designed for maximum expected operational limit. At this extreme strained condition, the structure may rotate and displace at the applied verification load such as to unknowingly distort the load transfer into the static test article. Test may result in erroneously accepting a submarginal design or rejecting a reliable one. A technique was developed to identify, monitor, and assess the load transmission error through two back-to-back surface-measured strain data. The technique is programmed for expediency and convenience. Though the method was developed to support affordable aerostructures, the method is also applicable for most high-performance air and surface transportation structural systems.

Verderaime, V.; Harrington, F.

1995-01-01

492

Formal verification of human-automation interaction.  

PubMed

This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machine interaction and focuses on verifying the correctness of the interaction in complex and automated control systems. The paper describes a systematic methodology for evaluating whether the interface provides the necessary information about the machine to enable the operator to perform a specified task successfully and unambiguously. It also addresses the adequacy of information provided to the user via training material (e.g., user manual) about the machine's behavior. The essentials of the methodology, which can be automated and applied to the verification of large systems, are illustrated by several examples and through a case study of pilot interaction with an autopilot aboard a modern commercial aircraft. The expected application of this methodology is an augmentation and enhancement, by formal verification, of human-automation interfaces. PMID:12118871

Degani, Asaf; Heymann, Michael

2002-01-01

493

Formal verification of human-automation interaction  

NASA Technical Reports Server (NTRS)

This paper discusses a formal and rigorous approach to the analysis of operator interaction with machines. It addresses the acute problem of detecting design errors in human-machine interaction and focuses on verifying the correctness of the interaction in complex and automated control systems. The paper describes a systematic methodology for evaluating whether the interface provides the necessary information about the machine to enable the operator to perform a specified task successfully and unambiguously. It also addresses the adequacy of information provided to the user via training material (e.g., user manual) about the machine's behavior. The essentials of the methodology, which can be automated and applied to the verification of large systems, are illustrated by several examples and through a case study of pilot interaction with an autopilot aboard a modern commercial aircraft. The expected application of this methodology is an augmentation and enhancement, by formal verification, of human-automation interfaces.

Degani, Asaf; Heymann, Michael

2002-01-01

494

Online Statistical Tools  

NSDL National Science Digital Library

This collection of online analysis tools allows users to compute probabilities from various distributions and to generate random numbers. Other tools include probability and Bayes' rule calculators and an event counter. Each tool provides instructions and review materials.

Berman, Harvey

2009-08-07

495

Otolaryngology online resources  

NSDL National Science Digital Library

A home for free online otolaryngology learning resources. Features of this site: manuscripts, sugrical videos, case records, examination topics, surgical tips, tutorials, CME quiz, presentations, and others. Topics cover otology, rhinology, and laryngology.

496

MEDLINE (MEDLARS ONLINE)  

EPA Science Inventory

MEDLINE (MEDlars onLINE) is the National Library of Medicines (NLM) premier bibliographic database covering the fields of medicine, nursing, dentistry, veterinary medicine, the health care system, and the preclinical sciences. It contains bibliographic citations (e.g., authors, ...

497

Nutrition Online GRADUATE CERTIFICATE  

E-print Network

Nutrition Online GRADUATE CERTIFICATE PROGRAMS Reach your career goals while you continue to work: Applied Positive Deviance Delivery Science in International Nutrition Nutrition Science and Communications for Public Relations Professionals FriedmanSchoolofNutritionScienceandPolicy #12;Students entering

Tufts University

498

Online bartering motivations.  

PubMed

This study examined the role of enjoyment in people's decision to barter online. A survey in barter BBS/discussion forums and websites collected data from 135 participants (30 men, 105 women; 71% in the age group of 21-30 years) who barter online. To test a modification of the Expectation Confirmation Model, perceived enjoyment, confirmation of expectations, perceived usefulness, satisfaction, and continuance intention were measured. The data analysis showed that the expanded ECM had good explanatory power, with all paths supported except for perceived usefulness-satisfaction. In the proposed model, 33.1% of the variance in continuance intentions was predicted by the independent variables. Thus, the expanded ECM can provide supplementary information that is relevant for understanding continued online bartering usage. Barter website managers may encourage users' intentions to continue using these websites by emphasizing enjoyable aspects of online bartering. PMID:25153951

Lee, Hsiang-Ming; Chen, Tsai; Hung, Min-Li

2014-08-01

499

Online polymer crystallization experiment  

E-print Network

An architecture for online remote operation of a polymer crystallization experiment was refined, beta tested in actual use conditions, and extended based on feedback from those tests. In addition, an application for ...

Pridmore, Derik A. (Derik Arnold), 1978-

2005-01-01

500

Free online medical books  

NSDL National Science Digital Library

Freebookcentre.net's medical section contains links to many technical books offered free online, either as html pages or downloadable pdfs. Books are arranged by subject: cardiology, nutrition, oncology, microbiology, anatomy, neurology, infectious disease, allergy and immunology, and others.