Sample records for online signature verification

  1. An on-line human signature verification system 

    E-print Network

    Simsek, Burc A

    2000-01-01

    A study on human signature verification is presented. A literature survey of current and past methodologies for on-line signature verification is followed by a new approach to the problem of on-line signature verification. Several novel approaches...

  2. Enhanced Cancelable Biometrics for Online Signature Verification

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo; Inuma, Manabu; Shikata, Junji; Otsuka, Akira

    Cancelable approaches for biometric person authentication have been studied to protect enrolled biometric data, and several algorithms have been proposed. One drawback of cancelable approaches is that the performance is inferior to that of non-cancelable approaches. In this paper, we propose a scheme to improve the performance of a cancelable approach for online signature verification. Our scheme generates two cancelable dataset from one raw dataset and uses them for verification. Preliminary experiments were performed using a distance-based online signature verification algorithm. The experimental results show that our proposed scheme is promising.

  3. On-line signature verification for e-finance and e-commerce security system

    Microsoft Academic Search

    Bin Li; Kuan-Quan Wang; DAVID ZHANG

    2003-01-01

    Online signature verification is a new and active topic in the research and application fields of biometrics. This paper proposes a low cost online signature verification method based on the matching of curves about x- and y-axis attaching some dynamic features. Just as human being's behavior, different local weight and unfixed threshold are introduced to improve the performance of signature

  4. Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis

    PubMed Central

    Iranmanesh, Vahab; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Arigbabu, Olasimbo Ayodeji; Malallah, Fahad Layth

    2014-01-01

    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%. PMID:25133227

  5. Pattern recognition techniques in on-line hand written signature verification - A survey

    Microsoft Academic Search

    K. R. Radhika; G. N. Sekhar; M. K. Venkatesha

    2009-01-01

    Over the last two decades, in the field of secure communication and financial on-line applications, we have witnessed an explosive growth in biometric personal authentication systems which are covenant with a measurable physical characteristic or behavioral trait. On-line refers to making use of the time functions of the signing process. Verification of on-line signature as a biometric modality still is

  6. On using the Viterbi path along with HMM likelihood information for online signature verification.

    PubMed

    Van Bao, Ly; Garcia-Salicetti, Sonia; Dorizzi, Bernadette

    2007-10-01

    This paper describes a system using two complementary sorts of information issuing from a hidden Markov model (HMM) for online signature verification. At each point of the signature, 25 features are extracted. These features are normalized before training and testing in order to improve the performance of the system. This normalization is writer-dependent; it exploits only five genuine signatures used to train the writer HMM. A claimed identity is confirmed when the arithmetic mean of two similarity scores, obtained on an input signature, is higher than a threshold. The first score is related to the likelihood given by the HMM of the claimed identity; the second score is related to the segmentation given by such an HMM on the input signature. A personalized score normalization is also proposed before fusion. Our approach is evaluated on several online signature databases, such as BIOMET, PHILIPS, MCYT, and SVC2004, which were captured under different acquisition conditions. For the first time in signature verification, we show that the fusion of segmentation-based information generated by the HMM with likelihood-based information considerably improves the quality of the verification system. Finally, owing to our two-stage normalization (at the feature and score levels), we show that our system results in more stable client-score distributions across databases and in a better separation between the distributions of client and impostor scores. PMID:17926706

  7. An on-line human signature verification system

    E-print Network

    Simsek, Burc A

    2000-01-01

    and several forged signatures. Fig. 2 shows this situation where several authentic signature samples (classes) overlap in a sample feature space. Ideally, features should be designed such that there is no overlap between classes. It would then be an easy...

  8. HMM-Based On-Line Signature Verification: Feature Extraction and Signature Modeling

    E-print Network

    Autonoma de Madrid, Universidad

    ,000 signatures from 145 subjects. The system is compared to other state-of-the-art systems based on the results. This is mainly due to the large intra-class variations and, when considering forgeries, small inter

  9. State-of-the-art in offline signature verification system

    Microsoft Academic Search

    Yazan M. Al-Omari; Siti Norul Huda Sheikh Abdullah; Khairuddin Omar

    2011-01-01

    Biometrics can be classified into two types Behavioral (signature verification, keystroke dynamics, etc.) and Physiological (iris characteristics, fingerprint, etc.). Handwritten signature is one of the first few biometrics used even before computers. Signature verification is widely studied and discussed using two approaches. On-line approach and offline approach. Offline systems are more applicable and easy to use in comparison with on-line

  10. On-line Signature Verification Using Most Discriminating Features and Fisher Linear Discriminant Analysis (FLD)

    Microsoft Academic Search

    Muhammad Talal Ibrahim; Matthew J. Kyan; Ling Guan

    2008-01-01

    In this work, we employ a combination of strategies for partitioning and detecting abnormal fluctuations in the horizontal and vertical trajectories of an on-line generated signature profile. Alternative partitions of these spatial trajectories are generated by splitting each of the related angle, velocity and pressure profiles into two regions representing both high and low activity. The overall process can be

  11. Fingerprint and On-line signature Verification Competitions at ICB 2009

    E-print Network

    Boyer, Edmond

    of database and assessment tools of two present competitions on fingerprints and on-line signatures and the progress of the technology as well as tools such as databases and protocols for future benchmarking proposed to the participants and the associated protocols in terms of database and assessment tools. 2 FVC

  12. Biometric Hash based on Statistical Features of Online Signatures

    Microsoft Academic Search

    Claus Vielhauer; Ralf Steinrnetz; Astrid Mayerhöfer

    2002-01-01

    This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verification systems are threshold-based true-false decisions, based on a comparison between test sample signals and sets of reference signals, our system responds to a signature input with a biometric hash vector, which is calculated

  13. Machine Learning for Signature Verification Harish Srinivasan

    E-print Network

    Machine Learning for Signature Verification Harish Srinivasan , Sargur N. Srihari and Matthew J it can be viewed as one that involves machine learning from a population of signatures. There are two and performance phases is de- scribed. Keywords: machine learning, forensic signature examination, biometrics

  14. Signature Verification Based on Handwritten Text Recognition

    Microsoft Academic Search

    Serestina Viriri; Jules-R. Tapamo

    2009-01-01

    \\u000a Signatures continue to be an important biometric trait because it remains widely used primarily for authenticating the identity\\u000a of human beings. This paper presents an efficient text-based directional signature recognition algorithm which verifies signatures,\\u000a even when they are composed of special unconstrained cursive characters which are superimposed and embellished. This algorithm\\u000a extends the character-based signature verification technique. The experiments carried

  15. Signature verification with writing posture analysis

    NASA Astrophysics Data System (ADS)

    Cheng, Hsu-Yung; Yu, Chih-Chang

    2013-07-01

    A video-based handwritten signature verification framework is proposed in this paper. Using a camera as the sensor has the advantage that the entire writing processes can be captured along with the signatures. The main contribution of this work is that writing postures are analyzed to achieve the verification purpose because the writing postures cannot be easily imitated or forged. The proposed system is able to achieve low false rejection rates while maintaining low false acceptance rates for database containing both unskilled and skilled imitation signatures.

  16. New online signature acquisition system Adel Oulefki

    E-print Network

    Paris-Sud XI, Université de

    New online signature acquisition system Adel Oulefki Messaoud Mostefai Belkacem Abbadi Samira://electronicimaging.spiedigitallibrary.org/ on 03/19/2013 Terms of Use: http://spiedl.org/terms #12;New online signature acquisition system Adel

  17. Biometric Cryptosystem Using Online Signatures

    Microsoft Academic Search

    Alisher Kholmatov; Berrin A. Yanikoglu

    2006-01-01

    Biometric cryptosystems combine cryptography and biomet- rics to benefit from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the need to remember pass- words or to carry tokens etc. In this work we present a biometric cryp- tosystems which uses online signatures, based on the Fuzzy

  18. Dynamic Signature Verification on Smart Phones

    E-print Network

    Autonoma de Madrid, Universidad

    .krish,julian.fierrez,javier.galbally,marcos.martinez}@uam.es Abstract. This work is focused on dynamic signature verification for state-of-the-art smart phones. As a result of the algorithm adaptation to the mobile scenario, the use of a state-of-the-art smart phone devices, far from the capabilities of state-of-the-art touch-based and stylus-based smart phones [3

  19. Off-Line Signature Recognition and Verification by Kernel Principal Component Self-Regression

    Microsoft Academic Search

    Bai-ling Zhang

    2006-01-01

    Automatic signature verification is an active area of research with numerous applications such as bank check verification, ATM access, etc. In this research, a kernel principal component self-regression (KPCSR) model is proposed for offline signature verification and recognition problems. Developed from the kernel principal component regression (KPCR), the self-regression model selects a subset of the principal components from the kernel

  20. A hybrid opto-electronic method for fast off-line handwritten signature verification

    Microsoft Academic Search

    Jean-baptiste Fasquel; Michel Bruynooghe

    2004-01-01

    This paper proposes a hybrid opto-electronic method for the fast automatic verification of handwritten signatures. This method combines several statistical classifiers and consists of three steps. The first step aims to transform the original signatures using the identity and four Gabor transforms. For each image transform, the second step is to intercorrelate the analysed signature with the similarly transformed signatures

  1. 17 CFR 1.4 - Electronic signatures, acknowledgments and verifications.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...to accept electronic signatures, acknowledgments or...the use of electronic signatures for the purposes listed...That the electronic signature must comply with applicable...the use of electronic signatures, including at a minimum...which the electronic signature is associated,...

  2. 17 CFR 1.4 - Electronic signatures, acknowledgments and verifications.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...to accept electronic signatures, acknowledgments or...the use of electronic signatures for the purposes listed...That the electronic signature must comply with applicable...the use of electronic signatures, including at a minimum...which the electronic signature is associated,...

  3. Analyzing Personalized Policies for Online Biometric Verification

    PubMed Central

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M.

    2014-01-01

    Motivated by India’s nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident’s biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India’s program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India’s biometric program. The mean delay is sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32–41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident. PMID:24787752

  4. Off-Line Signature Verification and Forgery Detection System Based on Fuzzy Modeling

    Microsoft Academic Search

    Vamsi Krishna Madasu; Mohd. Hafizuddin Mohd. Yusof; Madasu Hanmandlu; Kurt Kubik

    2003-01-01

    \\u000a This paper presents an innovative approach for signature verification and forgery detection based on fuzzy modeling. The signature\\u000a image is binarized and resized to a fixed size window and is then thinned. The thinned image is then partitioned into a fixed\\u000a number of eight sub-images called boxes. This partition is done using the horizontal density approximation approach. Each\\u000a sub-image is

  5. Low-Latency ECDSA Signature Verification A Road Towards Safer Traffic

    E-print Network

    the precursors for ITS, the traffic control systems for air and rail traffic were already deployed in the lateLow-Latency ECDSA Signature Verification ­ A Road Towards Safer Traffic ­ Miroslav Knezevi caused by the rising traffic densities on our roads and in our cities. Traffic congestion is increasingly

  6. Fast Batch Verification for Modular Exponentiation and Digital Signatures

    Microsoft Academic Search

    Mihir Bellare; Juan A. Garay; Tal Rabin

    1998-01-01

    Abstract Many tasks in cryptography (e.g., digital signature veriflcation) call for veriflcation of a basic operation like modular exponentiation in some group: given (g; x; y) check that gDepartment of Computer Science & Engineering, Mail Code 0114, University of California at San Diego,

  7. Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification

    Microsoft Academic Search

    Sherman S. M. Chow; Duncan S. Wong

    2007-01-01

    Versatility in cryptography is interesting. Instead of building a secure scheme from another secure one, this paper presents\\u000a an oxymoron making use of the insecurity of a scheme to give useful feature in another context. We show the insecurity of\\u000a the batch verification algorithms in Cui et al.’s work about an identity-based (ID-based) signature scheme. Following Chow et al.’s idea

  8. Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy

    SciTech Connect

    Tai An, E-mail: atai@mcw.ed [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Christensen, James D.; Gore, Elizabeth [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Khamene, Ali [Imaging and Visualization Department, Siemens AG, Princeton, NJ (United States); Boettger, Thomas [Oncology Care Systems, Siemens AG, Heidelberg (Germany); Li, X. Allen [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States)

    2010-04-15

    Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

  9. SUSIG: an on-line signature database, associated protocols and benchmark results

    Microsoft Academic Search

    Alisher Kholmatov; Berrin A. Yanikoglu

    2009-01-01

    We present a new online signature database (SUSIG). The database consists of two parts that are collected using different\\u000a pressure-sensitive tablets (one with and the other without an LCD display). A total of 100 people contributed to each part,\\u000a resulting in a database of more than 3,000 genuine signatures and 2,000 skilled forgeries. The genuine signatures in the database\\u000a are

  10. On-line failure detection and damping measurement of aerospace structures by random decrement signatures

    NASA Technical Reports Server (NTRS)

    Cole, H. A., Jr.

    1973-01-01

    Random decrement signatures of structures vibrating in a random environment are studied through use of computer-generated and experimental data. Statistical properties obtained indicate that these signatures are stable in form and scale and hence, should have wide application in one-line failure detection and damping measurement. On-line procedures are described and equations for estimating record-length requirements to obtain signatures of a prescribed precision are given.

  11. Online text-independent speaker verification system using autoassociative neural network models

    Microsoft Academic Search

    S. P. Kishore; B. Yegnanarayana; Suryakanth V. Gangashetty

    2001-01-01

    In this paper, we present an approach based on autoassociative neural network (AANN) model for online implementation of text-independent speaker verification system. The distribution capturing ability of an AANN model is exploited to build the speaker model. A rank-based approach using individual background models is used to verify the claim of the speaker

  12. A method for online verification of adapted fields using an independent dose monitor

    SciTech Connect

    Chang Jina; Norrlinger, Bernhard D. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Heaton, Robert K.; Jaffray, David A.; Cho, Young-Bin; Islam, Mohammad K. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, Toronto, Ontario M5G 2M9 (Canada); Mahon, Robert [Department of Radiation Therapy, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada)

    2013-07-15

    Purpose: Clinical implementation of online adaptive radiotherapy requires generation of modified fields and a method of dosimetric verification in a short time. We present a method of treatment field modification to account for patient setup error, and an online method of verification using an independent monitoring system.Methods: The fields are modified by translating each multileaf collimator (MLC) defined aperture in the direction of the patient setup error, and magnifying to account for distance variation to the marked isocentre. A modified version of a previously reported online beam monitoring system, the integral quality monitoring (IQM) system, was investigated for validation of adapted fields. The system consists of a large area ion-chamber with a spatial gradient in electrode separation to provide a spatially sensitive signal for each beam segment, mounted below the MLC, and a calculation algorithm to predict the signal. IMRT plans of ten prostate patients have been modified in response to six randomly chosen setup errors in three orthogonal directions.Results: A total of approximately 49 beams for the modified fields were verified by the IQM system, of which 97% of measured IQM signal agree with the predicted value to within 2%.Conclusions: The modified IQM system was found to be suitable for online verification of adapted treatment fields.

  13. An Off-line Signature Verification System Based on Fusion of Local and Global Information

    E-print Network

    Autonoma de Madrid, Universidad

    for random and skilled forgeries. It is shown experimentally that the ma- chine expert based on local acoustic features out- performs the state-of-the-art acoustic approach [11]. Regarding off-line signature D

  14. Is Your Avatar Ethical? On-Line Course Tools that Are Methods for Student Identity and Verification

    ERIC Educational Resources Information Center

    Semple, Mid; Hatala, Jeffrey; Franks, Patricia; Rossi, Margherita A.

    2011-01-01

    On-line college courses present a mandate for student identity verification for accreditation and funding sources. Student authentication requires course modification to detect fraud and misrepresentation of authorship in assignment submissions. The reality is that some college students cheat in face-to-face classrooms; however, the potential for…

  15. A fast online hit verification method for the single ion hit system at GSI.

    PubMed

    Du, G; Fischer, B; Barberet, P; Heiss, M

    2006-01-01

    For a single ion hit facility built to irradiate specific targets inside biological cells, it is necessary to prove that the ions hit the selected targets reliably because the ion hits usually cannot be seen. That ability is traditionally tested either indirectly by aiming at pre-etched tracks in a nuclear track detector or directly by making the ion tracks inside cells visible using a stain coupled to special proteins produced in response to ion hits. However, both methods are time consuming and hits can be verified only after the experiment. This means that targeting errors in the experiment cannot be corrected during the experiment. Therefore, we have developed a fast online hit verification method that measures the targeting accuracy electronically with a spatial resolution of +/-1 microm before cell irradiation takes place. PMID:17164276

  16. Statistical evaluation of the influence of writing postures on on-line signatures. Study of the impact of time.

    PubMed

    Thiéry, A; Marquis, R; Montani, I

    2013-07-10

    The aim of this study is to investigate the influence of unusual writing positions on a person's signature, in comparison to a standard writing position. Ten writers were asked to sign their signature six times, in each of four different writing positions, including the standard one. In order to take into consideration the effect of the day-to-day variation, this same process was repeated over 12 sessions, giving a total of 288 signatures per subject. The signatures were collected simultaneously in an off-line and on-line acquisition mode, using an interactive tablet and a ballpoint pen. Unidimensional variables (height to width ratio; time with or without in air displacement) and time-dependent variables (pressure; X and Y coordinates; altitude and azimuth angles) were extracted from each signature. For the unidimensional variables, the position effect was assessed through ANOVA and Dunnett contrast tests. Concerning the time-dependent variables, the signatures were compared by using dynamic time warping, and the position effect was evaluated through classification by linear discriminant analysis. Both of these variables provided similar results: no general tendency regarding the position factor could be highlighted. The influence of the position factor varies according to the subject as well as the variable studied. The impact of the session factor was shown to cover the impact that could be ascribed to the writing position factor. Indeed, the day-to-day variation has a greater effect than the position factor on the studied signature variables. The results of this study suggest guidelines for best practice in the area of signature comparisons and demonstrate the importance of a signature collection procedure covering an adequate number of sampling sessions, with a sufficient number of samples per session. PMID:23153802

  17. Investigation of the spatial resolution of an online dose verification device

    SciTech Connect

    Asuni, G.; Rickey, D. W.; McCurdy, B. M. C. [Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9 (Canada) and Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada); Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9 (Canada); Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada) and Department of Radiology, University of Manitoba, Winnipeg, Manitoba R3A 1R9 (Canada)

    2012-02-15

    Purpose: The aim of this work is to characterize a new online dose verification device, COMPASS transmission detector array (IBA Dosimetry, Schwarzenbruck, Germany). The array is composed of 1600 cylindrical ionization chambers of 3.8 mm diameter, separated by 6.5 mm center-to-center spacing, in a 40 x 40 arrangement. Methods: The line spread function (LSF) of a single ion chamber in the detector was measured with a narrow slit collimator for a 6 MV photon beam. The 0.25 x 10 mm{sup 2} slit was formed by two machined lead blocks. The LSF was obtained by laterally translating the detector in 0.25 mm steps underneath the slit over a range of 24 mm and taking a measurement at each step. This measurement was validated with Monte Carlo simulation using BEAMnrc and DOSXYZnrc. The presampling modulation transfer function (MTF), the Fourier transform of the line spread function, was determined and compared to calculated (Monte Carlo and analytical) MTFs. Two head-and-neck intensity modulated radiation therapy (IMRT) fields were measured using the device and were used to validate the LSF measurement. These fields were simulated with the BEAMnrc Monte Carlo model, and the Monte Carlo generated incident fluence was convolved with the 2D detector response function (derived from the measured LSF) to obtain calculated dose. The measured and calculated dose distributions were then quantitatively compared using {chi}-comparison criteria of 3% dose difference and 3 mm distance-to-agreement for in-field points (defined as those above the 10% maximum dose threshold). Results: The full width at half-maximum (FWHM) of the measured detector response for a single chamber is 4.3 mm, which is comparable to the chamber diameter of 3.8 mm. The pre-sampling MTF was calculated, and the resolution of one chamber was estimated as 0.25 lp/mm from the first zero crossing. For both examined IMRT fields, the {chi}-comparison between measured and calculated data show good agreement with 95.1% and 96.3% of in-field points below {chi} of 1.0 for fields 1 and 2, respectively (with an average {chi} of 0.29 for IMRT field 1 and 0.24 for IMRT field 2). Conclusions: The LSF for a new novel online detector has been measured at 6 MV using a narrow slit technique, and this measurement has been validated by Monte Carlo simulation. The detector response function derived from line spread function has been applied to recover measured IMRT fields. The results have shown that the device measures IMRT fields accurately within acceptable tolerance.

  18. Modular Design and Verification of Component-Based Mechatronic Systems with Online-Reconfiguration

    Microsoft Academic Search

    Holger Giese; Sven Burmester; Wilhelm Schäfer; Oliver Oberschelp

    2004-01-01

    The development of complex mechatronic systems requires a careful and ideally verifiable design. In addition, engineers from different disciplines, namely mechanical, electrical and software engineering, have to cooperate. The current technology is to use block diagrams including discrete blocks with statecharts for the design and verification of such systems. This does not adequately support the verification of large systems which

  19. Off-Line Recognition of Signatures Using Revolving Active Deformable Models

    E-print Network

    have reached the point where both graphics and text can be recognized in machine-generated documents and verification systems. In an on-line system the user has to sign on an electronic tablet which gives a signal-line system the user does not use a tablet but instead he/she signs on a paper and his/her signature

  20. Skilled Forgery Detection in On-Line Signatures: A Multimodal Approach

    Microsoft Academic Search

    Anoop M. Namboodiri; Shailesh Saini; Xiaoguang Lu; Anil K. Jain

    2004-01-01

    \\u000a Signature recognition has a long history of usage in authentication of transactions and legal contracts and hence is easily\\u000a accepted by users in a variety of applications. However, the problem of skilled forgeries is an important challenge that needs\\u000a to be overcome before signature recognition systems will become viable in unsupervised authentication systems. In this paper,\\u000a we present a multimodal approach to forgery

  1. Towards Signature-Only Signature Schemes

    Microsoft Academic Search

    Adam Young; Moti Yung

    2000-01-01

    We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastruc- ture where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable\\/escrow cryptography. The basic dilemma

  2. Feature Selection Based on Gjenet'ic Alor'tithms for On-Line Signature Vterification

    E-print Network

    Autonoma de Madrid, Universidad

    solution in the complete space of 2100 possible solutions. is further investigated using a GA with integer groups dimension of the search space is d10according to the signature information they contain, namely: i the The task of selecting the most discriminative features for a Mahalanobis distance. GA showed remarkable

  3. Demo Abstract: BACHOL - Modeling and Verification of Cyber-Physical Systems Online

    Microsoft Academic Search

    Lei Bu; Dingbao Xie; Xin Chen; Linzhang Wang; Xuandong Li

    2012-01-01

    As most of the CPS systems are working in open environment, many control parameters used in the systems are generated online. The exact values of these parameters are unpredictable offline in advance. This causes the behavior of the CPS model has high nondeterminism and can not be verified by model checking in the design phase. To overcome this problem, we

  4. Please complete form in ink, or complete online, print, sign in ink and obtain required signatures Signature needed if adding after the 10th semester day or

    E-print Network

    Maxwell, Bruce D.

    dropddaadd Please complete form in ink, or complete online, print, sign in ink and obtain required in Montana Hall. Spring, Summer, or Fall ~Add/Drop Request Form~ 1. Enter your information - use ink or fill the form online 2. Enter the course information - use ink or fill the form online. 3. The course instructor

  5. Patient-Specific 3D Pretreatment and Potential 3D Online Dose Verification of Monte Carlo-Calculated IMRT Prostate Treatment Plans

    SciTech Connect

    Boggula, Ramesh, E-mail: ramesh.boggula@umm.de [Department of Radiation Oncology, University Medical Centre Mannheim, University of Heidelberg, Mannheim (Germany); Jahnke, Lennart; Wertz, Hansjoerg; Lohr, Frank; Wenz, Frederik [Department of Radiation Oncology, University Medical Centre Mannheim, University of Heidelberg, Mannheim (Germany)

    2011-11-15

    Purpose: Fast and reliable comprehensive quality assurance tools are required to validate the safety and accuracy of complex intensity-modulated radiotherapy (IMRT) plans for prostate treatment. In this study, we evaluated the performance of the COMPASS system for both off-line and potential online procedures for the verification of IMRT treatment plans. Methods and Materials: COMPASS has a dedicated beam model and dose engine, it can reconstruct three-dimensional dose distributions on the patient anatomy based on measured fluences using either the MatriXX two-dimensional (2D) array (offline) or a 2D transmission detector (T2D) (online). For benchmarking the COMPASS dose calculation, various dose-volume indices were compared against Monte Carlo-calculated dose distributions for five prostate patient treatment plans. Gamma index evaluation and absolute point dose measurements were also performed in an inhomogeneous pelvis phantom using extended dose range films and ion chamber for five additional treatment plans. Results: MatriXX-based dose reconstruction showed excellent agreement with the ion chamber (<0.5%, except for one treatment plan, which showed 1.5%), film ({approx}100% pixels passing gamma criteria 3%/3 mm) and mean dose-volume indices (<2%). The T2D based dose reconstruction showed good agreement as well with ion chamber (<2%), film ({approx}99% pixels passing gamma criteria 3%/3 mm), and mean dose-volume indices (<5.5%). Conclusion: The COMPASS system qualifies for routine prostate IMRT pretreatment verification with the MatriXX detector and has the potential for on-line verification of treatment delivery using T2D.

  6. Sequential Aggregate Signatures and Multisignatures Without Random Oracles

    Microsoft Academic Search

    Steve Lu; Rafail Ostrovsky; Amit Sahai; Hovav Shacham; Brent Waters

    2006-01-01

    We present the first aggregate signature, the first multisignature, and the first verifiably encrypted signature provably secure without random oracles. Our constructions derive from a novel application of a recent signature scheme due to Waters. Signatures in our aggregate signature scheme are sequentially constructed, but knowledge of the order in which messages were signed is not necessary for verification. The

  7. VERIFICATION OF THEORY BASED DESIGN FEATURES FOR DESIGNING ONLINE INSTRUCTION FOR STUDENTS WITH LEARNING DISABILITIES AND OTHER STRUGGLING LEARNERS

    E-print Network

    CHIU, CHI-HSUN

    2013-05-31

    theory, 2) design/development of online instruction for all K-12, and 3) design/development of online instruction for students with learning disabilities rated the importance of each principle. The Q-sort involved sorting along the dimensions of a quasi...

  8. Multiparty Quantum Signature Schemes

    E-print Network

    Juan Miguel Arrazola; Petros Wallden; Erika Andersson

    2015-05-27

    Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, using quantum communication, it is possible to construct signature schemes with security based on fundamental principles of quantum mechanics. Several quantum signature protocols have been proposed, but none of them has been explicitly generalized to more than three participants, and their security goals have not been formally defined. Here, we first extend the security definitions of Swanson and Stinson (2011) so that they can apply also to the quantum case, and introduce a formal definition of transferability based on different verification levels. We then prove several properties that multiparty signature protocols with information-theoretic security -- quantum or classical -- must satisfy in order to achieve their security goals. We also express two existing quantum signature protocols with three parties in the security framework we have introduced. Finally, we generalize a quantum signature protocol given in Wallden-Dunjko-Kent-Andersson (2015) to the multiparty case, proving its security against forging, repudiation and non-transferability. Notably, this protocol can be implemented using any point-to-point quantum key distribution network and therefore is ready to be experimentally demonstrated.

  9. A quantum proxy blind signature protocol

    Microsoft Academic Search

    Yu Xiaoqiang; Zhao Xiaohui

    2010-01-01

    A proxy blind signature protocol using quantum entanglement state for signature and verification was proposed, while nonorthogonal quantum state encoded proxy warrant message. The quantum key distribution and one-time pad encryption algorithm guaranteed the unconditional security and the message owner's anonymity.

  10. Attacks on the Birational Permutation Signature Schemes

    Microsoft Academic Search

    Don Coppersmith; Jacques Stern; Serge Vaudenay

    1993-01-01

    Shamir presents in [3] a family of cryptographic signature schemes based on birational permutations of the integers modulo a large integer N of unknown factorization. These schemes are attractive because of the low computational requirements, both for signature\\u000a generation and signature verification. However, the two schemes presented in Shamir’s paper are weak. We show here how to\\u000a break the first

  11. e-Portal Web Orders and Distribution Services SIGNATURE/ACCOUNT AUTHORIZATION AND MAINTENANCE FORM

    E-print Network

    Oliver, Douglas L.

    Management Signature MM-3 Print Form You Must Complete Forms On-Line. Hand Written Forms will be Rejectede-Portal Web Orders and Distribution Services SIGNATURE/ACCOUNT AUTHORIZATION AND MAINTENANCE FORM #: ________________ ________________________________ __________________________________ Name (please type/print) Signature

  12. Functional signatures

    E-print Network

    Ivan, Ioana (Ioana Elisabeta)

    2013-01-01

    In this thesis, we introduce the notion of functional signatures. In a functional signature scheme, in addition to a master signing key that can be used to sign any message, there are signing keys for a function f, which ...

  13. Signature Crossroads

    E-print Network

    Chong, Puifai Cyril

    1997-01-01

    Signature Crossroads, an urban form that grows out of an street intersection, combines both the sense of "transit" and the sense of "destination." Such dual character gives Signature Crossroads a superiority over traditional ...

  14. A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures

    E-print Network

    Markowitch, Olivier

    A Tripartite Strong Designated Verifier Scheme Based On Threshold RSA Signatures JĂ©rĂ´me Dossogne1 by the size of a RSA modulus. Moreover, in addition to the computation of a classical RSA signature scheme remains the same than a classical RSA signature verification. Keywords: Digital Signature

  15. Independent Verification Worksheet 20122013 A. Independent Student's Information

    E-print Network

    Heller, Barbara

    and Signatures Each person signing this worksheet certifies that all of the information reported information to be available for the IRS Data Retrieval Tool for elIndependent Verification Worksheet 20122013 A. Independent Student's Information

  16. Batch Computations Revisited: Combining Key Computations and Batch Verifications

    Microsoft Academic Search

    René Struik

    2010-01-01

    \\u000a We consider the effect of combining the key computation step in particular key agreement protocols, such as ECMQV and static-DH,\\u000a with verifying particular elliptic curve equations, such as those related to ECDSA signature verification. In particular,\\u000a we show that one can securely combine ECDSA signature verification and ECMQV and static-ECDH key computations, resulting in\\u000a significant performance improvements, due to saving

  17. Signature control

    NASA Astrophysics Data System (ADS)

    Pyati, Vittal P.

    The reduction of vehicle radar signature is accomplished by means of vehicle shaping, the use of microwave frequencies-absorbent materials, and either passive or active cancellation techniques; such techniques are also useful in the reduction of propulsion system-associated IR emissions. In some anticipated scenarios, the objective is not signature-reduction but signature control, for deception, via decoy vehicles that mimic the signature characteristics of actual weapons systems. As the stealthiness of airframes and missiles increases, their propulsion systems' exhaust plumes assume a more important role in detection by an adversary.

  18. Short Hash-Based Signatures for Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Dahmen, Erik; Krauß, Christoph

    We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measurements like the temperature, signature generation is 7 times faster and verification is 158 times faster than state-of-the-art implementations of ECDSA at the same security level. For message lengths sufficient for most sensor network applications, the signature generation time is comparable to ECDSA, while signature verification remains 20 times faster. Our scheme can be used to authenticate messages exchanged between sensor nodes, as well as for securing broadcast authentication. Our scheme minimizes the overhead introduced in the network by the signature verification done by each sensor before relaying the message.

  19. On-line high-performance liquid chromatography–ultraviolet–nuclear magnetic resonance method of the markers of nerve agents for verification of the Chemical Weapons Convention

    Microsoft Academic Search

    Avik Mazumder; Hemendra K. Gupta; Prabhat Garg; Rajeev Jain; Devendra K. Dubey

    2009-01-01

    This paper details an on-flow liquid chromatography–ultraviolet–nuclear magnetic resonance (LC–UV–NMR) method for the retrospective detection and identification of alkyl alkylphosphonic acids (AAPAs) and alkylphosphonic acids (APAs), the markers of the toxic nerve agents for verification of the Chemical Weapons Convention (CWC). Initially, the LC–UV–NMR parameters were optimized for benzyl derivatives of the APAs and AAPAs. The optimized parameters include stationary

  20. Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow

    E-print Network

    Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature of improved variants of the UOV and Rainbow signature schemes. In this paper we show how we can do even better by a slight variation of their algorithms. Keywords: Multivariate Cryptography, UOV Signature Scheme, Rainbow

  1. On-line detection of the breakage of small diameter drills using current signature wavelet transform 1 Supported by the China Defense Foundation. 1

    Microsoft Academic Search

    Li Xiaoli

    1999-01-01

    This paper presents on-line tool breakage detection of small diameter drills by monitoring the AC servo motor current. The continuous wavelet transform was used to decompose the spindle AC servo motor current signal and the discrete wavelet transform was used to decompose the feed AC servo motor current signal in time–frequency domain. The tool breakage features were extracted from the

  2. Modeling the Lexical Morphology of Western Handwritten Signatures

    PubMed Central

    Diaz-Cabrera, Moises; Ferrer, Miguel A.; Morales, Aythami

    2015-01-01

    A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures. PMID:25860942

  3. A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents.

    PubMed

    Tayan, Omar; Kabir, Muhammad N; Alginahi, Yasser M

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  4. Signatures of Reputation

    NASA Astrophysics Data System (ADS)

    Bethencourt, John; Shi, Elaine; Song, Dawn

    Reputation systems have become an increasingly important tool for highlighting quality information and filtering spam within online forums. However, the dependence of a user's reputation on their history of activities seems to preclude any possibility of anonymity. We show that useful reputation information can, in fact, coexist with strong privacy guarantees. We introduce and formalize a novel cryptographic primitive we call signatures of reputation which supports monotonic measures of reputation in a completely anonymous setting. In our system, a user can express trust in others by voting for them, collect votes to build up her own reputation, and attach a proof of her reputation to any data she publishes, all while maintaining the unlinkability of her actions.

  5. Characterization of a fiber-coupled Al{sub 2}O{sub 3}:C luminescence dosimetry system for online in vivo dose verification during {sup 192}Ir brachytherapy

    SciTech Connect

    Andersen, Claus E.; Nielsen, Soeren Kynde; Greilich, Steffen; Helt-Hansen, Jakob; Lindegaard, Jacob Christian; Tanderup, Kari [Department of Radiation Research, Risoe National Laboratory for Sustainable Energy, Technical University of Denmark, DK-4000 Roskilde (Denmark); Department of Medical Physics, Aarhus University Hospital, DK-8000 Aarhus C (Denmark); Department of Radiation Research, Risoe National Laboratory for Sustainable Energy, Technical University of Denmark, DK-4000 Roskilde (Denmark); Department of Oncology, Aarhus University Hospital, DK-8000 Aarhus C (Denmark); Department of Medical Physics, Aarhus University Hospital, DK-8000 Aarhus C (Denmark)

    2009-03-15

    A prototype of a new dose-verification system has been developed to facilitate prevention and identification of dose delivery errors in remotely afterloaded brachytherapy. The system allows for automatic online in vivo dosimetry directly in the tumor region using small passive detector probes that fit into applicators such as standard needles or catheters. The system measures the absorbed dose rate (0.1 s time resolution) and total absorbed dose on the basis of radioluminescence (RL) and optically stimulated luminescence (OSL) from aluminum oxide crystals attached to optical fiber cables (1 mm outer diameter). The system was tested in the range from 0 to 4 Gy using a solid-water phantom, a Varian GammaMed Plus {sup 192}Ir PDR afterloader, and dosimetry probes inserted into stainless-steel brachytherapy needles. The calibrated system was found to be linear in the tested dose range. The reproducibility (one standard deviation) for RL and OSL measurements was 1.3%. The measured depth-dose profiles agreed well with the theoretical expectations computed with the EGSNRC Monte Carlo code, suggesting that the energy dependence for the dosimeter probes (relative to water) is less than 6% for source-to-probe distances in the range of 2-50 mm. Under certain conditions, the RL signal could be greatly disturbed by the so-called stem signal (i.e., unwanted light generated in the fiber cable upon irradiation). The OSL signal is not subject to this source of error. The tested system appears to be adequate for in vivo brachytherapy dosimetry.

  6. Verification Testing Test Driven Development Testing with JUnit Verification

    E-print Network

    Peters, Dennis

    Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

  7. Columbus pressurized module verification

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Comandatore, Emanuele

    1986-01-01

    The baseline verification approach of the COLUMBUS Pressurized Module was defined during the A and B1 project phases. Peculiarities of the verification program are the testing requirements derived from the permanent manned presence in space. The model philosophy and the test program have been developed in line with the overall verification concept. Such critical areas as meteoroid protections, heat pipe radiators and module seals are identified and tested. Verification problem areas are identified and recommendations for the next development are proposed.

  8. Verification of VLSI designs

    NASA Technical Reports Server (NTRS)

    Windley, P. J.

    1991-01-01

    In this paper we explore the specification and verification of VLSI designs. The paper focuses on abstract specification and verification of functionality using mathematical logic as opposed to low-level boolean equivalence verification such as that done using BDD's and Model Checking. Specification and verification, sometimes called formal methods, is one tool for increasing computer dependability in the face of an exponentially increasing testing effort.

  9. Cryptanalysis on an Algorithm for Efficient Digital Signatures

    E-print Network

    counted) Signer's computations 1536 MMs (1.5 |d|) 240 MMs (1.5 |q|) Verifier's computations 2 MMs 480 MMs Total computation (Signer + Verifier) 1538 MMs 720 MMs The signer/verifier may be a host computer computation (computational cost of generation and verification signature) still requires hundreds of MMs

  10. WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT

    E-print Network

    WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT Clinical Fellows, Postdoc as not eligible for coverage. Clinical Fellow/Postdoc/Union Employee Signature Date Medical School Clinical Fellows/Postdocs ­ Complete and return this affidavit to Campus Box 8002 Danforth Postdocs/Union Employees

  11. Introduction Identity Based Signatures

    E-print Network

    Garcia, Flavio D.

    Introduction Identity Based Signatures The Construction Conclusions A Schnorr-like Lightweight Identity-Based Signature Scheme Flavio D. Garcia Institute for Computing and Information Sciences, Radboud-like Lightweight Identity-Based Signature Scheme #12;Introduction Identity Based Signatures The Construction

  12. Threshold Proxy Signature Schemes

    Microsoft Academic Search

    Kan Zhang

    1997-01-01

    Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a signature. In practice, it is important and,

  13. Electronic Signatures for Public Procurement across Europe

    NASA Astrophysics Data System (ADS)

    Řlnes, Jon; Andresen, Anette; Arbia, Stefano; Ernst, Markus; Hagen, Martin; Klein, Stephan; Manca, Giovanni; Rossi, Adriano; Schipplick, Frank; Tatti, Daniele; Wessolowski, Gesa; Windheuser, Jan

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but also post-award processes like orders and invoices. Signature policies, i.e. quality requirements and requirements on information captured in the signing process, will be developed. This as well as technical interoperability of e-signatures across Europe will finally be piloted in demonstrators starting late 2009 or early 2010.

  14. Verification of Adaptive Systems

    SciTech Connect

    Pullum, Laura L [ORNL] [ORNL; Cui, Xiaohui [New York Institute of Technology (NYIT)] [New York Institute of Technology (NYIT); Vassev, Emil [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Hinchey, Mike [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Rouff, Christopher [Lockheed Martin Corporation] [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation] [Lockheed Martin Corporation

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  15. Traceable Signatures Aggelos Kiayias

    E-print Network

    of the art group signature system, such wide opening of all signatures of a single user is a (centralized in cryptographic research to deal with the issue of privacy. The most flexible private authentication tool to date

  16. Environmental Technology Verification Program

    E-print Network

    .......................................................................................................7 2.6 Computer Hardware and Software ...........................................................................................................5 LIST OF TABLES Table 1.0 Personnel Responsibilities for the MMR Center for Verification Testing

  17. Digital Signature Schemes

    Microsoft Academic Search

    Nick Carruthers

    This thesis will attempt to describe in detail the concepts of digital signatures and the related background issues. We will begin with a general introduction to cryptography and digital signatures and follow with an overview of the requisite math involved in cryptographic applications. We will then discuss in detail two digital signature schemes based on the discrete logarithm problem: the

  18. Scientists Using TCGA Data Identify 21 Mutational Signatures in Cancer

    Cancer.gov

    Many mutations have been implicated in human cancer, but the biological mechanisms that produce them remain largely unknown. In a study published online in Nature on August 14, 2013, researchers identified 21 signatures of mutational processes underlying 30 types of cancer. Characterizing mutational signatures may provide a greater understanding of the mechanistic basis of cancer and potentially lead to better treatments that target its root causes.

  19. Study of Dynamic Characteristics of Aeroelastic Systems Utilizing Randomdec Signatures

    NASA Technical Reports Server (NTRS)

    Chang, C. S.

    1975-01-01

    The feasibility of utilizing the random decrement method in conjunction with a signature analysis procedure to determine the dynamic characteristics of an aeroelastic system for the purpose of on-line prediction of potential on-set of flutter was examined. Digital computer programs were developed to simulate sampled response signals of a two-mode aeroelastic system. Simulated response data were used to test the random decrement method. A special curve-fit approach was developed for analyzing the resulting signatures. A number of numerical 'experiments' were conducted on the combined processes. The method is capable of determining frequency and damping values accurately from randomdec signatures of carefully selected lengths.

  20. Cooperatively Formed Group Signatures

    Microsoft Academic Search

    Greg Maitland; Colin Boyd

    2002-01-01

    Group signatures and their applications have received considerable attention in the literature in recent times. Substantial\\u000a gains have been made with respect to designing provably secure and efficient schemes. In practice, as with all signature schemes,\\u000a deploying group signature schemes requires the group member’s signing keys to be both physically and electronically secure\\u000a from theft. Smartcards or similar devices are

  1. Toward Automatic Verification of Goal-Oriented Flow Simulations

    NASA Technical Reports Server (NTRS)

    Nemec, Marian; Aftosmis, Michael J.

    2014-01-01

    We demonstrate the power of adaptive mesh refinement with adjoint-based error estimates in verification of simulations governed by the steady Euler equations. The flow equations are discretized using a finite volume scheme on a Cartesian mesh with cut cells at the wall boundaries. The discretization error in selected simulation outputs is estimated using the method of adjoint-weighted residuals. Practical aspects of the implementation are emphasized, particularly in the formulation of the refinement criterion and the mesh adaptation strategy. Following a thorough code verification example, we demonstrate simulation verification of two- and three-dimensional problems. These involve an airfoil performance database, a pressure signature of a body in supersonic flow and a launch abort with strong jet interactions. The results show reliable estimates and automatic control of discretization error in all simulations at an affordable computational cost. Moreover, the approach remains effective even when theoretical assumptions, e.g., steady-state and solution smoothness, are relaxed.

  2. Voltage verification unit

    DOEpatents

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  3. Modular data structure verification

    E-print Network

    Kuncak, Viktor (Viktor Jaroslav), 1977-

    2007-01-01

    This dissertation describes an approach for automatically verifying data structures, focusing on techniques for automatically proving formulas that arise in such verification. I have implemented this approach with my ...

  4. Verification of RADTRAN

    SciTech Connect

    Kanipe, F.L.; Neuhauser, K.S.

    1995-12-31

    This document presents details of the verification process of the RADTRAN computer code which was established for the calculation of risk estimates for radioactive materials transportation by highway, rail, air, and waterborne modes.

  5. A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Huang, Jun; Yu, Yao-Feng; Jiang, Xiu-Li

    2014-09-01

    In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  6. Quantum Proxy Multi-Signature Scheme Using Genuinely Entangled Six Qubits State

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Wang, Huai-Sheng; Li, Peng-Fei

    2013-04-01

    A quantum proxy multi-signature scheme is presented based on controlled teleportation. Genuinely entangled six qubits quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  7. Verification in referral-based crowdsourcing.

    PubMed

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through "referral-based crowdsourcing": the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  8. Verification in Referral-Based Crowdsourcing

    PubMed Central

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  9. Requirement Assurance: A Verification Process

    NASA Technical Reports Server (NTRS)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  10. Signature extension studies

    NASA Technical Reports Server (NTRS)

    Vincent, R. K.; Thomas, G. S.; Nalepka, R. F.

    1974-01-01

    The importance of specific spectral regions to signature extension is explored. In the recent past, the signature extension task was focused on the development of new techniques. Tested techniques are now used to investigate this spectral aspect of the large area survey. Sets of channels were sought which, for a given technique, were the least affected by several sources of variation over four data sets and yet provided good object class separation on each individual data set. Using sets of channels determined as part of this study, signature extension was accomplished between data sets collected over a six-day period and over a range of about 400 kilometers.

  11. Uncertainty in hydrological signatures

    NASA Astrophysics Data System (ADS)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty magnitude and bias, and to test how uncertainty depended on the density of the raingauge network and flow gauging station characteristics. The uncertainties were sometimes large (i.e. typical intervals of ±10-40% relative uncertainty) and highly variable between signatures. Uncertainty in the mean discharge was around ±10% for both catchments, while signatures describing the flow variability had much higher uncertainties in the Mahurangi where there was a fast rainfall-runoff response and greater high-flow rating uncertainty. Event and total runoff ratios had uncertainties from ±10% to ±15% depending on the number of rain gauges used; precipitation uncertainty was related to interpolation rather than point uncertainty. Uncertainty distributions in these signatures were skewed, and meant that differences in signature values between these catchments were often not significant. We hope that this study encourages others to use signatures in a way that is robust to data uncertainty.

  12. Nuclear disarmament verification

    SciTech Connect

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  13. Performance of two one-time signature schemes in space\\/time constrained environments

    Microsoft Academic Search

    Diana Berbecaru

    2010-01-01

    One Time Signatures are based on the idea of committing a secret key via one-way functions, decreasing dramatically the signing and verification times when compared to asymmetric primitives. This important feature made them attractive for application fields (like wireless and sensor networks) that have limited memory or computing resources at disposal, but which require fast response times for security operations.

  14. Automated Verification of UMLsec Models

    E-print Network

    Jurjens, Jan

    Automated Verification of UMLsec Models for Security Requirements Jan Jürjens and Pasha Shabalin Jürjens, TU Munich: Automated Verification of UMLsec Models 2 Secure Systems Development High quality: Automated Verification of UMLsec Models 3 Quality vs. Cost Correctness in conflict with cost. Thorough

  15. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-print Network

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis to recover the RSA private key by computing the gcd of the public modulus and the faulty signature

  16. Telephone Usage Verification A detailed list of long distance charges is available to your department on e-print. In

    E-print Network

    Fernandez, Eduardo

    Telephone Usage Verification A detailed list of long distance charges is available to your calls, if any, on-line at http://controller.fau.edu/telephone/ and retain receipt. 5. File the form online at http://controller.fau.edu/telephone/ in the amount of ______. The funds have been deposited

  17. UV signature mutations.

    PubMed

    Brash, Douglas E

    2015-01-01

    Sequencing complete tumor genomes and exomes has sparked the cancer field's interest in mutation signatures for identifying the tumor's carcinogen. This review and meta-analysis discusses signatures and their proper use. We first distinguish between a mutagen's canonical mutations—deviations from a random distribution of base changes to create a pattern typical of that mutagen—and the subset of signature mutations, which are unique to that mutagen and permit inference backward from mutations to mutagen. To verify UV signature mutations, we assembled literature datasets on cells exposed to UVC, UVB, UVA, or solar simulator light (SSL) and tested canonical UV mutation features as criteria for clustering datasets. A confirmed UV signature was: ?60% of mutations are C?T at a dipyrimidine site, with ?5% CC?TT. Other canonical features such as a bias for mutations on the nontranscribed strand or at the 3' pyrimidine had limited application. The most robust classifier combined these features with criteria for the rarity of non-UV canonical mutations. In addition, several signatures proposed for specific UV wavelengths were limited to specific genes or species; UV's nonsignature mutations may cause melanoma BRAF mutations; and the mutagen for sunlight-related skin neoplasms may vary between continents. PMID:25354245

  18. RSA-Based Undeniable Signatures

    Microsoft Academic Search

    Rosario Gennaro; Hugo Krawczyk; Tal Rabin

    1997-01-01

    \\u000a We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of work\\u000a has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems.\\u000a In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the signature\\u000a and

  19. Online Pharmacies

    MedlinePLUS

    MENU Return to Web version Online Pharmacies Is it safe to buy medicines online? It can be safe to buy your medicines online, but you need to be very ... new or more serious health problems. Illegal online pharmacies might not be licensed; might send you medicines ...

  20. Better Verification Through Symmetry

    Microsoft Academic Search

    C. Norris Ip; David L. Dill

    1996-01-01

    We address the state explosion problem in automatic verification of finite-state systemsby exploiting symmetries in the system description.We make symmetries easy to detect by introducing a new data type scalarset, a finiteand unordered set, to our description language. The set of operations on scalarsets arerestricted so that states are guaranteed to have the same future behavior, up to permutationof the

  1. Computer Graphics Verification

    NASA Technical Reports Server (NTRS)

    1992-01-01

    Video processing creates technical animation sequences using studio quality equipment to realistically represent fluid flow over space shuttle surfaces, helicopter rotors, and turbine blades.Computer systems Co-op, Tim Weatherford, performing computer graphics verification. Part of Co-op brochure.

  2. Better Verification Through Symmetry

    Microsoft Academic Search

    C. Norris Ip

    1993-01-01

    We address the state explosion problem in automatic verification of finite-state systemsby exploiting symmetries in the system description.We make symmetries easy to detect by introducing a new data type scalarset, a finiteand unordered set, to our description language. The set of operations on scalarsets arerestricted so that states are guaranteed to have the same future behavior, up to permutationof the

  3. Online, Inc.

    NSDL National Science Digital Library

    The Online, Inc. site contains selections from four magazines including Online, Database, CD-ROM Professional, and MultiMedia Schools. Tables of contents, selected articles, columns, and indexes are available for these Online, Inc. magazines. General information about subscribing to and writing for these magazines is also included. Registration and program information for the Online CD-ROM Conference and Exposition, and other events sponsored by Online, Inc., is also available.

  4. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOEpatents

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  5. Manhattan Project Signature Facilities

    NSDL National Science Digital Library

    Christopher Griffith

    This collection is a list of the Department of Energy's Manhattan Project "Signature Facilities" approved by the Departmental Corporate Board on Historic Preservation in December 1999. Taken together, the eight Signature Facilities provide the core for DOE's ability to successfully interpret, whether in situ or through museum or other interpretive setting, the Manhattan Project mission of developing atomic bombs during World War II. This list does not preclude protection and preservation of other historic facilities in the nuclear-weapons complex. Just as these facilities constitute the core for DOE-wide preservation, access, and interpretation, sites may have site-specific signature facilities that best interpret that site's Manhattan Project mission from a local, state, regional, national or international perspective.

  6. Continuous verification using multimodal biometrics.

    PubMed

    Sim, Terence; Zhang, Sheng; Janakiraman, Rajkumar; Kumar, Sandeep

    2007-04-01

    Conventional verification systems, such as those controlling access to a secure room, do not usually require the user to reauthenticate himself for continued access to the protected resource. This may not be sufficient for high-security environments in which the protected resource needs to be continuously monitored for unauthorized use. In such cases, continuous verification is needed. In this paper, we present the theory, architecture, implementation, and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged-in user. Two modalities are currently used--face and fingerprint--but our theory can be readily extended to include more modalities. We show that continuous verification imposes additional requirements on multimodal fusion when compared to conventional verification systems. We also argue that the usual performance metrics of false accept and false reject rates are insufficient yardsticks for continuous verification and propose new metrics against which we benchmark our system. PMID:17299225

  7. On Distributed Verification

    Microsoft Academic Search

    Amos Korman; Shay Kutten

    2006-01-01

    This paper describes the invited talk given at the 8th International Conference on Distributed Computing and Networking (ICDCN\\u000a 2006), at the Indian Institute of Technology Guwahati, India. This talk was intended to give a partial survey and to motivate\\u000a further studies of distributed verification. To serve the purpose of motivating, we allow ourselves to speculate freely on\\u000a the potential impact

  8. TFE Verification Program

    SciTech Connect

    Not Available

    1990-03-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TF Verification Program builds directly on the technology and data base developed in the 1960s and 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern. The general logic and strategy of the program to achieve its objectives is shown on Fig. 1-1. Five prior programs form the basis for the TFE Verification Program: (1) AEC/NASA program of the 1960s and early 1970; (2) SP-100 concept development program;(3) SP-100 thermionic technology program; (4) Thermionic irradiations program in TRIGA in FY-86; (5) and Thermionic Technology Program in 1986 and 1987. 18 refs., 64 figs., 43 tabs.

  9. Quantum money with classical verification

    NASA Astrophysics Data System (ADS)

    Gavinsky, Dmitry

    2014-12-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  10. Program Verification and System Dependability

    Microsoft Academic Search

    Michael Jackson

    2010-01-01

    \\u000a Formal verification of program correctness is a long-standing ambition, recently given added prominence by a “Grand Challenge”\\u000a project. Major emphases have been on the improvement of languages for program specification and program development, and on\\u000a the construction of verification tools. The emphasis on tools commands general assent, but while some researchers focus on\\u000a narrow verification aimed only at program correctness,

  11. Motor current signature analysis

    Microsoft Academic Search

    P. Pillay; Z. Xu

    1996-01-01

    This paper shows how the speed of an induction motor (IM) can be extracted from the motor currents of an induction motor with a Labview implementation of motor current signature analysis (MCSA). The implementation is first applied to an IM driven by the 60 Hz mains. The estimation system consists of data acquisition, demodulation, and FFT spectrum analyses. The estimation

  12. Identity Based Undeniable Signatures

    Microsoft Academic Search

    Benoît Libert; Jean-jacques Quisquater

    2004-01-01

    In this paper, we give a first example of identity based un- deniable signature using pairings over elliptic curves. We extend to the identity based setting the security model for the notions of invisibil- ity and anonymity given by Galbraith and Mao in 2003 and we prove that our scheme is existentially unforgeable under the Bilinear Diffie- Hellman assumption in

  13. VERIFICATION AND VALIDATION OF CFD SIMULATIONS

    Microsoft Academic Search

    Fred Stern; Robert V. Wilson; Hugh W. Coleman; Eric G. Paterson

    1999-01-01

    Abstract ................................ ................................ ................................ ......................... iii Acknowledgements,................................ ................................ ................................ ........ iii Nomenclature................................ ................................ ................................ ................. iv 1 Introduction ................................ ................................ ................................ ................. 1 2 Verification and Validation Procedures ................................ ................................ ......... 2 3 Verification and Validation Methodology................................ ................................ ...... 3 3.1 Concepts and Definitions................................ ................................ ................ 3 3.2 Verification ................................ ................................ ................................ .... 4 3.2.1 Convergence Studies ................................ ................................ .......

  14. RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION

    E-print Network

    CALIFORNIA ENERGY COMMISSION RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION;#12;Acknowledgements The Renewables Portfolio Standard 2006 Procurement Verification Draft Staff Report was prepared Daniels, Lorraine Gonzalez. 2010. Renewables Portfolio Standard 2006 Procurement Verification Draft

  15. Lightweight Email Signatures (Extended Abstract)

    E-print Network

    Adida, Ben

    2006-01-01

    We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF effort to standardize domain-based email signatures. LES shares ...

  16. RSA-Based Undeniable Signatures

    Microsoft Academic Search

    Rosario Gennaro; Tal Rabin; Hugo Krawczyk

    2000-01-01

    .    We present the first undeniable signatures scheme based on RSA. Since their introduction in 1989 a significant amount of\\u000a work has been devoted to the investigation of undeniable signatures. So far, this work has been based on discrete log systems.\\u000a In contrast, our scheme uses regular RSA signatures to generate undeniable signatures. In this new setting, both the

  17. Software Verification and Testing Lecture Notes: Testing I

    E-print Network

    Struth, Georg

    Software Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence mathematical skills 1 #12;Motivation verification vs testing: · verification used often in early stages

  18. Provably Secure Blind Signature Schemes

    Microsoft Academic Search

    David Pointcheval; Jacques Stern

    1996-01-01

    In this paper, we give a provably secure design for blind signatures, the most important ingredient for anonymity in off-line electronic cash systems. Previous exam- ples of blind signature schemes were constructed from traditional signature schemes with only the additional proof of blindness. The designofsomeofthe underlying signa- ture schemes can be validated by a proof in the so-called random oracle

  19. 21 CFR 11.50 - Signature manifestations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Signature manifestations. 11...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. ...The date and time when the signature was executed; and...

  20. 21 CFR 11.50 - Signature manifestations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Signature manifestations. 11...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. ...The date and time when the signature was executed; and...

  1. 1 CFR 18.7 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 2012-01-01 false Signature. 18.7 Section 18...DOCUMENTS GENERALLY § 18.7 Signature. The original and each...typed or stamped beneath the signature. Initialed or impressed signatures will not be accepted....

  2. 21 CFR 11.50 - Signature manifestations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Signature manifestations. 11...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. ...The date and time when the signature was executed; and...

  3. 1 CFR 18.7 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 2012-01-01 true Signature. 18.7 Section 18...DOCUMENTS GENERALLY § 18.7 Signature. The original and each...typed or stamped beneath the signature. Initialed or impressed signatures will not be accepted....

  4. 1 CFR 18.7 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 2012-01-01 true Signature. 18.7 Section 18...DOCUMENTS GENERALLY § 18.7 Signature. The original and each...typed or stamped beneath the signature. Initialed or impressed signatures will not be accepted....

  5. 21 CFR 11.50 - Signature manifestations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Signature manifestations. 11...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. ...The date and time when the signature was executed; and...

  6. 1 CFR 18.7 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 2010-01-01 false Signature. 18.7 Section 18...DOCUMENTS GENERALLY § 18.7 Signature. The original and each...typed or stamped beneath the signature. Initialed or impressed signatures will not be accepted....

  7. 1 CFR 18.7 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 2011-01-01 false Signature. 18.7 Section 18...DOCUMENTS GENERALLY § 18.7 Signature. The original and each...typed or stamped beneath the signature. Initialed or impressed signatures will not be accepted....

  8. 21 CFR 11.50 - Signature manifestations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Signature manifestations. 11...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.50 Signature manifestations. ...The date and time when the signature was executed; and...

  9. 76 FR 30542 - Adult Signature Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ...POSTAL SERVICE 39 CFR Part 111 Adult Signature Services AGENCY: Postal Service...8, to add a new extra service called Adult Signature. This new service has two available options: Adult Signature Required and Adult Signature...

  10. Online Games

    NSDL National Science Digital Library

    This is the home of resource collections that support the use of online games and environments for teaching geoscience. There is now a collection of relevant references, examples of online games, and ideas for teaching with online games suggested by participants in the Spring 2008 workshop.

  11. An on-line interactive interviewing program for epidemiological studies.

    PubMed

    Kramer, S; Caplan, I; Sessions, R; Meadows, A T

    1984-04-01

    An on-line interactive verification and entry system (OLIVES) has been developed for conducting telephone interviews in large-scale epidemiological studies. Responses are automatically coded into a computer legible form suitable for analysis. Use of a question stack to control question flow allows on-line response modification, restart from any termination point, and minimal reprogramming in order to change question order. Numerical, coded, and text string data types are permitted. A multilevel hierarchical data structure reflects interview content. The advantages and disadvantages of the on-line approach are discussed. OLIVES is generalizable and is applicable to other on-line or off-line interview situations. PMID:6736817

  12. Verification of particle simulation of radio frequency waves in fusion Animesh Kuley,1,2,a)

    E-print Network

    Lin, Zhihong

    Verification of particle simulation of radio frequency waves in fusion plasmas Animesh Kuley,1,2,a (Received 14 May 2013; accepted 8 October 2013; published online 24 October 2013) Radio frequency (RF) waves. INTRODUCTION The importance of radio frequency (RF) waves as a source for heating and current drive has been

  13. VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY

    E-print Network

    Stevenson, D. E. "Steve"

    VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY D. E. STEVENSON Abstract. The National Science Digital Library is the Nation's online library for education and re- search Science Digital Library in a Nutshell "The National Science Foundation's (NSF) National Science

  14. Verification of the Completeness of Unification Algorithms ŕ la Robinson

    NASA Astrophysics Data System (ADS)

    Avelar, Andréia B.; de Moura, Flávio L. C.; Galdino, André Luiz; Ayala-Rincón, Mauricio

    This work presents a general methodology for verification of the completeness of first-order unification algorithms ŕ la Robinson developed in the higher-order proof assistant PVS. The methodology is based on a previously developed formalization of the theorem of existence of most general unifiers for unifiable terms over first-order signatures. Termination and soundness proofs of any unification algorithm are proved by reusing the formalization of this theorem and completeness should be proved according to the specific way in that non unifiable inputs are treated by the algorithm.

  15. Model-driven software verification

    NASA Technical Reports Server (NTRS)

    Holzmann, Gerard J.; Joshi, Rajeev

    2003-01-01

    In this paper we explore a different approach to software verification. With this approach, a software application can be included, without substantial change, into a verification test-harness and then verified directly, while presearving the ability to apply data abstraction techniques. Only the test-harness is written in the language of the model checker.

  16. Security and Verification Provable cryptography

    E-print Network

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  17. Combating Reverberation in Speaker Verification

    Microsoft Academic Search

    Joseph S. Gammal; Rafik A. Goubran

    2005-01-01

    This paper investigates reverberation in speaker verification. Reverberant test speech degrades the performance of speaker verification algorithms. The effect of training with speech originating from reverberant environments that are different from that of the test speech is investigated. It was found that with the room impulse responses used, that training with speech that is less reverberant than the test speech

  18. Use Pre-disinfection Verification

    E-print Network

    Paris-Sud XI, Université de

    Use Pre-disinfection Rinsing & Washing Verification PackingSterilization Transfer Storage 1 2 3 4 5 and pass the following steps: pre-disinfection, rinsing, washing, verification, packing, sterilization in a chemical substance, which enables pre-disinfection, and are transferred to the sterilization service. There

  19. Functional verification of large ASICs

    Microsoft Academic Search

    Adrian Evans; Allan Silburt; Gary Vrckovnik; Thane Brown; Mario Dufresne; Geoffrey Hall; Tung Ho; Ying Liu

    1998-01-01

    This paper describes the functional verification effort during a specific hardware development program that included three of the largest ASICs designed at Nortel. These devices marked a transition point in methodology as verification took front and centre on the critical path of the ASIC schedule. Both the simulation and emulation strategies are presented. The simulation methodology introduced new techniques such

  20. Knowledge Signatures for Information Integration

    SciTech Connect

    Thomson, Judi; Cowell, Andrew J.; Paulson, Patrick R.; Butner, R. Scott; Whiting, Mark A.

    2003-10-25

    This paper introduces the notion of a knowledge signature: a concise, ontologically-driven representation of the semantic characteristics of data. Knowledge signatures provide programmatic access to data semantics while allowing comparisons to be made across different types of data such as text, images or video, enabling efficient, automated information integration. Through observation, which determines the degree of association between data and ontological concepts, and refinement, which uses the axioms and structure of the domain ontology to place the signature more accurately within the context of the domain, knowledge signatures can be created. A comparison of such signatures for two different pieces of data results in a measure of their semantic separation. This paper discusses the definition of knowledge signatures along with the design and prototype implementation of a knowledge signature generator.

  1. Hybrid baryon signatures

    SciTech Connect

    Page, P.

    2000-04-01

    The authors discuss whether a low-lying hybrid baryon should be defined as a three quark--gluon bound state or as three quarks moving on an excited adiabatic potential. We show that the latter definition becomes exact, not only for very heavy quarks, but also for specific dynamics. We review the literature on the signatures of hybrid baryons, with specific reference to strong hadronic decays, electromagnetic couplings, diffractive production and production in {psi} decay.

  2. SPHERE Science Verification

    NASA Astrophysics Data System (ADS)

    Leibundgut, B.; Beuzit, J.-L.; Gibson, N.; Girard, J.; Kasper, M.; Kerber, F.; Lundin, L.; Mawet, D.; McClure, M.; Milli, J.; Petr-Gotzens, M.; Siebenmorgen, R.; van den Ancker, M.; Wahhaj, Z.

    2015-03-01

    Science Verification (SV) for the latest instrument to arrive on Paranal, the high-contrast and spectro-polarimetric extreme adaptive optics instrument SPHERE, is described. The process through which the SV proposals were solicited and evaluated is briefly outlined; the resulting observations took place in December 2014 and February 2015. A wide range of targets was observed, ranging from the Solar System, young stars with planets and discs, circumstellar environments of evolved stars to a galaxy nucleus. Some of the first results are previewed.

  3. TFE Verification Program

    SciTech Connect

    Not Available

    1993-05-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  4. Signature CERN-URSS

    ScienceCinema

    None

    2011-04-25

    Le DG W.Jentschke souhaite la bienvenue ŕ l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la premičre fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  5. CD volume design and verification

    NASA Technical Reports Server (NTRS)

    Li, Y. P.; Hughes, J. S.

    1993-01-01

    In this paper, we describe a prototype for CD-ROM volume design and verification. This prototype allows users to create their own model of CD volumes by modifying a prototypical model. Rule-based verification of the test volumes can then be performed later on against the volume definition. This working prototype has proven the concept of model-driven rule-based design and verification for large quantity of data. The model defined for the CD-ROM volumes becomes a data model as well as an executable specification.

  6. SCUDO: a tool for signature-based clustering of expression profiles.

    PubMed

    Lauria, Mario; Moyseos, Petros; Priami, Corrado

    2015-07-01

    SCUDO (Signature-based ClUstering for DiagnOstic purposes) is an online tool for the analysis of gene expression profiles for diagnostic and classification purposes. The tool is based on a new method for the clustering of profiles based on a subject-specific, as opposed to disease-specific, signature. Our approach relies on construction of a reference map of transcriptional signatures, from both healthy and affected subjects, derived from their respective mRNA or miRNA profiles. A diagnosis for a new individual can then be performed by determining the position of the individual's transcriptional signature on the map. The diagnostic power of our method has been convincingly demonstrated in an open scientific competition (SBV Improver Diagnostic Signature Challenge), scoring second place overall and first place in one of the sub-challenges. PMID:25958391

  7. SCUDO: a tool for signature-based clustering of expression profiles

    PubMed Central

    Lauria, Mario; Moyseos, Petros; Priami, Corrado

    2015-01-01

    SCUDO (Signature-based ClUstering for DiagnOstic purposes) is an online tool for the analysis of gene expression profiles for diagnostic and classification purposes. The tool is based on a new method for the clustering of profiles based on a subject-specific, as opposed to disease-specific, signature. Our approach relies on construction of a reference map of transcriptional signatures, from both healthy and affected subjects, derived from their respective mRNA or miRNA profiles. A diagnosis for a new individual can then be performed by determining the position of the individual's transcriptional signature on the map. The diagnostic power of our method has been convincingly demonstrated in an open scientific competition (SBV Improver Diagnostic Signature Challenge), scoring second place overall and first place in one of the sub-challenges. PMID:25958391

  8. Multimodal signature modeling of humans

    NASA Astrophysics Data System (ADS)

    Cathcart, J. Michael; Kocher, Brian; Prussing, Keith; Lane, Sarah; Thomas, Alan

    2010-04-01

    Georgia Tech been investigating method for the detection of covert personnel in traditionally difficult environments (e.g., urban, caves). This program focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification and characterization of potential observables. Both aspects are needed to support the development of personnel detection and tracking algorithms. The difficult nature of these personnel-related problems dictates a multimodal sensing approach. Human signature data of sufficient and accurate quality and quantity do not exist, thus the development of an accurate signature model for a human is needed. This model should also simulate various human activities to allow motion-based observables to be exploited. This paper will describe a multimodal signature modeling approach that incorporates human physiological aspects, thermoregulation, and dynamics into the signature calculation. This approach permits both passive and active signatures to be modeled. The focus of the current effort involved the computation of signatures in urban environments. This paper will discuss the development of a human motion model for use in simulating both electro-optical signatures and radar-based signatures. Video sequences of humans in a simulated urban environment will also be presented; results using these sequences for personnel tracking will be presented.

  9. Site Specific Verification Guidelines.

    SciTech Connect

    Harding, Steve; Gordon, Frederick M.; Kennedy, Mike

    1992-05-01

    The Bonneville Power Administration (BPA) and the Northwest region have moved from energy surplus to a time when demand for energy is likely to exceed available supplies. The Northwest Power Planning Council is calling for a major push to acquire new resources.'' To meet anticipated loads in the next decade, BPA and the region must more than double that rate at which we acquire conservation resources. BPA hopes to achieve some of this doubling by programs independently designed and implemented by utilities and other parties without intensive BPA involvement. BPA will accept proposals for programs using performance-based payments, in which BPA bases its reimbursement to the sponsor on measured energy savings rather than program costs. To receive payment for conservation projects developed under performance-based programs, utilities and other project developers must propose verification plans to measure the amount of energy savings. BPA has traditionally used analysis of billing histories, before and after measure installation, adjusted by a comparison group on non-participating customers to measure conservation savings. This approach does not work well for all conversation projects. For large or unusual facilities the comparison group approach is not reliable due to the absence of enough comparable non-participants to allow appropriate statistical analysis. For these facilities, which include large commercial and institutional buildings, industrial projects, and complex combinations of building types served by a single utility meter, savings must be verified on a site-specific basis. These guidelines were written to help proposers understand what Bonneville considers the important issues in site specific verification of conservation performance. It also provides a toolbox of methods with guidance on their application and use. 15 refs.

  10. Identifying, Visualizing, and Fusing Social Media Data to Support Nonproliferation and Arms Control Treaty Verification: Preliminary Results

    SciTech Connect

    Gastelum, Zoe N.; Cramer, Nicholas O.; Benz, Jacob M.; Kreyling, Sean J.; Henry, Michael J.; Corley, Courtney D.; Whattam, Kevin M.

    2013-07-11

    While international nonproliferation and arms control verification capabilities have their foundations in physical and chemical sensors, state declarations, and on-site inspections, verification experts are beginning to consider the importance of open source data to complement and support traditional means of verification. One of those new, and increasingly expanding, sources of open source information is social media, which can be ingested and understood through social media analytics (SMA). Pacific Northwest National Laboratory (PNNL) is conducting research to further our ability to identify, visualize, and fuse social media data to support nonproliferation and arms control treaty verification efforts. This paper will describe our preliminary research to examine social media signatures of nonproliferation or arms control proxy events. We will describe the development of our preliminary nonproliferation and arms control proxy events, outline our initial findings, and propose ideas for future work.

  11. Nondestructive verification with minimal movement of irradiated light-water-reactor fuel assemblies

    SciTech Connect

    Phillips, J.R.; Bosler, G.E.; Halbig, J.K.; Klosterbuer, S.F.; Menlove, H.O.

    1982-10-01

    Nondestructive verification of irradiated light-water reactor fuel assemblies can be performed rapidly and precisely by measuring their gross gamma-ray and neutron signatures. A portable system measured fuel assemblies with exposures ranging from 18.4 to 40.6 GWd/tU and with cooling times ranging from 1575 to 2638 days. Differences in the measured results for side or corner measurements are discussed. 25 figures, 20 tables.

  12. Novel signatures of cancer-associated fibroblasts.

    PubMed

    Bozóky, Benedek; Savchenko, Andrii; Csermely, Péter; Korcsmáros, Tamás; Dúl, Zoltán; Pontén, Fredrik; Székely, László; Klein, George

    2013-07-15

    Increasing evidence indicates the importance of the tumor microenvironment, in particular cancer-associated fibroblasts, in cancer development and progression. In our study, we developed a novel, visually based method to identify new immunohistochemical signatures of these fibroblasts. The method employed a protein list based on 759 protein products of genes identified by RNA profiling from our previous study, comparing fibroblasts with differential growth-modulating effect on human cancers cells, and their first neighbors in the human protein interactome. These 2,654 proteins were analyzed in the Human Protein Atlas online database by comparing their immunohistochemical expression patterns in normal versus tumor-associated fibroblasts. Twelve new proteins differentially expressed in cancer-associated fibroblasts were identified (DLG1, BHLHE40, ROCK2, RAB31, AZI2, PKM2, ARHGAP31, ARHGAP26, ITCH, EGLN1, RNF19A and PLOD2), four of them can be connected to the Rho kinase signaling pathway. They were further analyzed in several additional tumor stromata and revealed that the majority showed congruence among the different tumors. Many of them were also positive in normal myofibroblast-like cells. The new signatures can be useful in immunohistochemical analysis of different tumor stromata and may also give us an insight into the pathways activated in them in their true in vivo context. The method itself could be used for other similar analysis to identify proteins expressed in other cell types in tumors and their surrounding microenvironment. PMID:23319410

  13. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-print Network

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment )__________________________ Employer Identification Number_57-6000254______ Name of Student's Immediate Supervisor

  14. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-print Network

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment ) - ______________ Employer Identification Number 57-6000254 Name of Student's Immediate Supervisor

  15. Electric Utility Measurement & Verification Program 

    E-print Network

    Lau, K.; Henderson, G.; Hebert, D.

    2007-01-01

    for residential, commercial and industrial customers. The Measurement and Verification (M&V) of applicable Power Smart Industrial projects is the process of verifying the results of the implementation of energy conservation measures (ECMs) at industrial customer...

  16. PERSONAL IDENTITY VERIFICATION (PIV) OF

    E-print Network

    March 2005 PERSONAL IDENTITY VERIFICATION (PIV) OF FEDERAL EMPLOYEES AND CONTRACTORS: FEDERAL A new Federal Information Processing Standard (FIPS) for a government- wide personal identity enhance security, increase government efficiency, reduce identity fraud, and protect personal privacy

  17. Design for manufacturability Design verification

    E-print Network

    Patel, Chintan

    ITRS Design #12;Design · Design for manufacturability · Design verification #12;Design for Manufacturability · Architecture challenges · Logic and circuit challenges · Layout and physical design challenges · Expected to be the source of multiple DFM challenges · Invest in variability reduction or design

  18. Runtime verification for stochastic systems

    E-print Network

    Wilcox, Cristina M

    2010-01-01

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  19. On key issuing privacy in distributed online social networks

    Microsoft Academic Search

    Tao Yang; Liyong Tang; Lingbo Kong; Zhong Chen

    2012-01-01

    Recently, distributed online social networks (OSNs) are developed to address the security and privacy issues in centralized OSNs. Identity based cryptography (IBC) was introduced into distributed OSNs recently for better identity verification and authentication purposes. However, current IBC-based solutions in OSNs could not address the problem of secure private key issuing. In this paper we propose PEKING: a novel Pivacy

  20. Short Signatures Without Random Oracles

    Microsoft Academic Search

    Dan Boneh; Xavier Boyen

    2004-01-01

    We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random ora- cles. The security of our scheme depends on a new complexity assumption we call the Strong Die-Hellman assumption. This assumption has sim- ilar properties to the Strong RSA assumption, hence the name. Strong RSA was previously used to construct signature schemes

  1. Lightweight Email Signatures Susan Hohenberger,

    E-print Network

    Rivest, Ronald L.

    Lightweight Email Signatures Ben Adida David Chau Susan Hohenberger, Ronald L. Rivest February 1, 2006 Abstract We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenti- cating email. LES is an extension of DKIM, the recent IETF effort to standardize domain

  2. Confidential Signatures and Deterministic Signcryption

    E-print Network

    Manulis, Mark

    Confidential Signatures and Deterministic Signcryption Alexander W. Dent1 , Marc Fischlin2 , Mark encrypts and signs a message in parallel, is usually not recommended for confidential message trans of confidential signature schemes, which hide all information about (high-entropy) input messages. In this work we

  3. Lightweight Email Signatures (Extended Abstract)

    Microsoft Academic Search

    Ben Adida; David Chau; Susan Hohenberger; Ronald L. Rivest

    2006-01-01

    We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF eort to standardize domain-based email signatures. LES shares DKIM's ease of deployment: they both use the DNS to distribute a single public key for each domain. Importantly, LES supports common uses of email that DKIM jeopardizes: multiple email

  4. Signature extraction using mutual interdependencies

    Microsoft Academic Search

    Heiko Claussen; Justinian Rosca; Robert I. Damper

    2011-01-01

    Recently, mutual interdependence analysis (MIA) has been successfully used to extract representations, or “mutual features”, accounting for samples in the class. For example, a mutual feature is a face signature under varying illumination conditions or a speaker signature under varying channel conditions. A mutual feature is a linear regression that is equally correlated with all samples of the input class.

  5. Lattice-Based Proxy Signature

    Microsoft Academic Search

    Yali Jiang; Fanyu Kong; Xiuling Ju

    2010-01-01

    Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can't resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack. The key pair of proxy signer was generated using basis delegation technology. Combined with

  6. Signatures of aging revisited

    SciTech Connect

    Drell, S.; Jeanloz, R.; Cornwall, J.; Dyson, F.; Eardley, D.

    1998-03-18

    This study is a follow-on to the review made by JASON during its 1997 Summer Study of what is known about the aging of critical constituents, particularly the high explosives, metals (Pu, U), and polymers in the enduring stockpile. The JASON report (JSR-97-320) that summarized the findings was based on briefings by the three weapons labs (LANL, LLNL, SNL). They presented excellent technical analyses covering a broad range of scientific and engineering problems pertaining to determining signatures of aging. But the report also noted: `Missing, however, from the briefings and the written documents made available to us by the labs and DOE, was evidence of an adequately sharp focus and high priorities on a number of essential near-term needs of maintaining weapons in the stockpile.

  7. Ion Signatures of Reconnection

    NASA Technical Reports Server (NTRS)

    Chandler, Michael O.; Moore, T. E.; Mozer, F. S.; Russell, C. T.

    1998-01-01

    Magnetic reconnection during periods of northward interplanetary magnetic field results in complex field line behavior. It has been shown that the velocity distribution of ions can be used as a diagnostic to determine the location of the reconnection site as well as the resulting field line topology. Ion observations in the high altitude (6-9Re) cusp region from Polar/TIDE reveal a mix of distinct ion populations (including cold ionospheric ions and magnetosheath ions) which can be attributed to different sources. In addition, the phase-space distributions of these ions reveal features which are attributed to reconnection and interactions with the magnetopause current layer (e.g. acceleration, counterstreaming, mixing of magnetosheath and ionospheric ions, and "D"-shaped distributions). These signatures has been used in several cases to infer the location of the reconnection site, the topology of the resulting field lines, and the location of the observation point relative to the magnetopause.

  8. Online learning in online auctions

    Microsoft Academic Search

    Avrim Blum; Vijay Kumar; Atri Rudra; Felix Wu

    2003-01-01

    We consider the problem of revenue maximization in online auctions, that is, auc- tions in which bids are received and dealt with one-by-one. In this paper, we demon- strate that results from online learning can be usefully applied in this context, and we derive a new auction for digital goods that achieves a constant competitive ratio with respect to the

  9. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Contractor's signature. 4.102 Section 4.102 Federal...Execution 4.102 Contractor's signature. (a) Individuals. A contract...be signed by that individual, and the signature shall be followed by the...

  10. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 false Contractor's signature. 4.102 Section 4.102 Federal...Execution 4.102 Contractor's signature. (a) Individuals. A contract...be signed by that individual, and the signature shall be followed by the...

  11. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Contractor's signature. 4.102 Section 4.102 Federal...Execution 4.102 Contractor's signature. (a) Individuals. A contract...be signed by that individual, and the signature shall be followed by the...

  12. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 false Contractor's signature. 4.102 Section 4.102 Federal...Execution 4.102 Contractor's signature. (a) Individuals. A contract...be signed by that individual, and the signature shall be followed by the...

  13. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal...Execution 4.102 Contractor's signature. (a) Individuals. A contract...be signed by that individual, and the signature shall be followed by the...

  14. Oxygen exchange with water alters the oxygen isotopic signature of nitrate in soil ecosystems

    E-print Network

    van Kessel, Chris

    Oxygen exchange with water alters the oxygen isotopic signature of nitrate in soil ecosystems November 2010 Accepted 8 February 2011 Available online 24 February 2011 Keywords: Oxygen exchange Nitrate) and nitrogen (N) stable isotope analyses are commonly used in the source determination of nitrate đNOŔ 3 Ţ

  15. Phase signature for particle detection with digital in-line holography

    E-print Network

    Kostinski, Alex

    , the forward-scattered light from a group of small par- ticles, such as water droplets in clouds or seeding, in large-numerical-aperture applications such as micro- scopic imaging). The typical digital in. For clarity, we will use Fig. 1. (Color online) Phase signature reconstructed from a simulated hologram. (a

  16. Mantle wedge asymmetries and geochemical signatures along W-and ENE-directed subduction zones

    E-print Network

    Doglioni, Carlo

    Mantle wedge asymmetries and geochemical signatures along W- and E­NE-directed subduction zones: Received 27 March 2008 Accepted 26 January 2009 Available online xxxx Keywords: Mantle wedge Subduction of the asthenosphere in the hanging wall of the slab, whereas along the opposite second type, the mantle is pushed down

  17. Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest Wisconsin (USA)

    E-print Network

    Wisconsin at Madison, University of

    Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest online 20 November 2010 Keywords: Fire history Charcoal analysis Fire regime Wisconsin Sand plain CHAR Charster We show how sedimentary charcoal records from multiple sites within a single landscape can be used

  18. Hard and Soft Safety Verifications

    NASA Technical Reports Server (NTRS)

    Wetherholt, Jon; Anderson, Brenda

    2012-01-01

    The purpose of this paper is to examine the differences between and the effects of hard and soft safety verifications. Initially, the terminology should be defined and clarified. A hard safety verification is datum which demonstrates how a safety control is enacted. An example of this is relief valve testing. A soft safety verification is something which is usually described as nice to have but it is not necessary to prove safe operation. An example of a soft verification is the loss of the Solid Rocket Booster (SRB) casings from Shuttle flight, STS-4. When the main parachutes failed, the casings impacted the water and sank. In the nose cap of the SRBs, video cameras recorded the release of the parachutes to determine safe operation and to provide information for potential anomaly resolution. Generally, examination of the casings and nozzles contributed to understanding of the newly developed boosters and their operation. Safety verification of SRB operation was demonstrated by examination for erosion or wear of the casings and nozzle. Loss of the SRBs and associated data did not delay the launch of the next Shuttle flight.

  19. Protocol Online

    NSDL National Science Digital Library

    Long-Cheng Li (Protocol Online)

    2012-01-06

    Protocol Online is a database of research protocols in a variety of life science fields. It contains protocols contributed by worldwide researchers as well as links to web protocols hosted by worldwide research labs, biotech companies, personal web sites. The data is stored in a MySql relational database. Protocol Online also hosts discipline specific discussion forums (BioForum), and provides a free PubMed search and alerting service (PubAlert).

  20. RENEWABLES PORTFOLIO STANDARD 2005 PROCUREMENT VERIFICATION

    E-print Network

    CALIFORNIA ENERGY COMMISSION RENEWABLES PORTFOLIO STANDARD 2005 PROCUREMENT VERIFICATION, RENEWABLES, AND DEMAND ANALYSIS DIVISION #12;ABSTRACT This Renewables Portfolio Standard Verification Report procured by select retail sellers of electricity under California's Renewables Portfolio Standard (RPS

  1. RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION

    E-print Network

    0 CALIFORNIA ENERGY COMMISSION RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION AND RENEWABLES DIVISION #12;#12;i Acknowledgements The Renewables Portfolio Standard 2006 Procurement Renewables Portfolio Standard 2006 Procurement Verification Report. California Energy Commission. CEC

  2. RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION

    E-print Network

    CALIFORNIA ENERGY COMMISSION RENEWABLES PORTFOLIO STANDARD 2006 PROCUREMENT VERIFICATION AND RENEWABLES DIVISION #12;#12;Acknowledgements The Renewables Portfolio Standard 2006 Procurement Renewables Portfolio Standard 2006 Procurement Verification Report. California Energy Commission. CEC

  3. Generation of RTL verification input stimulus

    E-print Network

    Selvarathinam, Anand Manivannan

    2001-01-01

    intervention. Simulation is widely used for verifying RTL designs despite its limitation. For a given coverage metric, the verification input vectors are generated to attain a higher level of coverage. Many verification coverage measures were proposed...

  4. A proposed neutral line signature

    NASA Technical Reports Server (NTRS)

    Doxas, I.; Speiser, T. W.; Dusenbery, P. B.; Horton, W.

    1992-01-01

    An identifying signature is proposed for the existence and location of the neutral line in the magnetotail. The signature, abrupt density, and temperature changes in the Earthtail direction, was first discovered in test particle simulations. Such temperature variations have been observed in ISEE data (Huang et. al. 1992), but their connection to the possible existence of a neutral line in the tail has not yet been established. The proposed signature develops earlier than the ion velocity space ridge of Martin and Speiser (1988), but can only be seen by spacecraft in the vicinity of the neutral line, while the latter can locate a neutral line remotely.

  5. IMPROVED METHODS FOR ON-LINE SENSOR CALIBRATION VERIFICATION

    Microsoft Academic Search

    J. Wesley Hines; Andrei V. Gribok; Ibrahim Attieh; Robert E Uhrig

    2000-01-01

    Inferential sensing is the use of information related to a plant parameter to infer its actual value. The most common method of inferential sensing uses a mathematical model to infer a parameter value from correlated sensor values. Collinearity in the predictor variables leads to an ill-posed problem that causes inconsistent results when data based models such as linear regression and

  6. A verification system of RMAP protocol controller

    NASA Astrophysics Data System (ADS)

    Khanov, V. Kh; Shakhmatov, A. V.; Chekmarev, S. A.

    2015-01-01

    The functional verification problem of IP blocks of RMAP protocol controller is considered. The application of the verification method using fully- functional models of the processor and the internal bus of a system-on-chip is justified. Principles of construction of a verification system based on the given approach are proposed. The practical results of creating a system of verification of IP block of RMAP protocol controller is presented.

  7. UHECR: Signatures and models

    NASA Astrophysics Data System (ADS)

    Berezinsky, V.

    2013-06-01

    The signatures of Ultra High Energy (E ? 1 EeV) proton propagation through CMB radiation are pair-production dip and GZK cutoff. The visible characteristics of these two spectral features are ankle, which is intrinsic part of the dip, beginning of GZK cutoff in the differential spectrum and E1/2 in integral spectrum. Measured by HiRes and Telescope Array (TA) these characteristics agree with theoretical predictions. However, directly measured mass composition remains a puzzle. While HiRes and TA detectors observe the proton-dominated mass composition, the data of Auger detector strongly evidence for nuclei mass composition becoming progressively heavier at energy higher than 4 EeV and reaching Iron at energy about 35 EeV. The models based on the Auger and HiRes/TA data are considered independently and classified using the transition from galactic to extragalactic cosmic rays. The ankle cannot provide this transition. since data of all three detector at energy (1-3) EeV agree with pure proton composition (or at least not heavier than Helium). If produced in Galaxy these particles result in too high anisotropy. This argument excludes or strongly disfavours all ankle models with ankle energy Ea > 3 EeV. The calculation of elongation curves, Xmax(E), for different ankle models strengthens further this conclusion. Status of other models, the dip, mixed composition and Auger based models are discussed.

  8. Structural verification for GAS experiments

    NASA Technical Reports Server (NTRS)

    Peden, Mark Daniel

    1992-01-01

    The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

  9. Formal Verification: All Questions and Some Answers

    E-print Network

    Pnueli, Amir

    , WIS 9.5.99 CS Leading Teachers Course, WIS, 9.5.99 #12; Formal Verification: Questions and Answers A Leading Teachers Course, WIS, 9.5.99 1 #12; Formal Verification: Questions and Answers A. Pnueli Mathematics! CS Leading Teachers Course, WIS, 9.5.99 2 #12; Formal Verification: Questions and Answers A

  10. SECURE IRIS VERIFICATION Shenglin Yang1

    E-print Network

    Verbauwhede, Ingrid

    . Index Terms-- iris, personal verification, data security 1. INTRODUCTION Biometric verification provides the biometrics with modern cryptographic techniques [3]. 2. RELATED WORK Beginning from 1987, automatic irisSECURE IRIS VERIFICATION Shenglin Yang1 and Ingrid Verbauwhede1,2 1 Department of Electrical

  11. Biometrics verification in a real environment

    Microsoft Academic Search

    BelCn Ruiz-Mezcua; Dolores Garcia-Plaza; Cristina Fernandez; Paloma Domingo-Garcia; Fernando Fernandez

    1999-01-01

    This paper describes some of the biometrics verification applications developed within the project ACTS-102 M2VTS: multimodal verification for teleservices and applications. These prototypes provide identity authentication in two of the most promising application areas of biometrics: Secured access to financial services (ATM and Internet Teleservices) and building security applications. The verification modalities implemented into the prototypes are face and speech

  12. DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION

    E-print Network

    DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION ATISH DAS SARMA, STEPHAN HOLZER Abstract. We study the verification problem in distributed networks, stated as follows. Let H be a subgraph in a decentralized fashion via a distributed algorithm. The time complexity of verification is measured as the number

  13. Distributed Verification and Hardness of Distributed Approximation

    E-print Network

    Distributed Verification and Hardness of Distributed Approximation Atish Das Sarma Google wattenhofer@tik.ee.ethz.ch ABSTRACT We study the verification problem in distributed networks, stated like to perform this verification in a decentralized fashion via a distributed algorithm. The time

  14. Verification, validation and accreditation of simulation models

    Microsoft Academic Search

    Robert G. Sargent

    2000-01-01

    The paper discusses verification, validation, and accreditation of simulation models. The different approaches to deciding model validity are presented; how model verification and validation relate to the model development process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways to document results are given; a recommended procedure is presented;

  15. I-9 Completion/Correction Tips Section 1. Employee Information and Verification. This section must be filled out by the employee.

    E-print Network

    I-9 Completion/Correction Tips Section 1. Employee Information and Verification. This section must be sure to include start date, signature, name, title, address (should be your department info), and date employee name in Section 1 Enter original start date in the certification section Enter new document

  16. GRADUATION PLAN Name: Reviewer's Signature

    E-print Network

    Hart, Gus

    GRADUATION PLAN Name: Reviewer's Signature: Semester________Year________ Semester________Year________ Semester________Year________ Semester________Year________ Class #: Class Name: Hours: Class #: Class Name: Hours: Class #: Class Name: Hours: Class #: Class Name: Hours: Total Hours: Total Hours: Total Hours

  17. Formal verification of mathematical software

    NASA Technical Reports Server (NTRS)

    Sutherland, D.

    1984-01-01

    Methods are investigated for formally specifying and verifying the correctness of mathematical software (software which uses floating point numbers and arithmetic). Previous work in the field was reviewed. A new model of floating point arithmetic called the asymptotic paradigm was developed and formalized. Two different conceptual approaches to program verification, the classical Verification Condition approach and the more recently developed Programming Logic approach, were adapted to use the asymptotic paradigm. These approaches were then used to verify several programs; the programs chosen were simplified versions of actual mathematical software.

  18. 17 CFR 1.4 - Use of electronic signatures.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...advisor, an electronic signature executed by the...to accept electronic signatures; Provided, however, That the electronic signature must comply with applicable...the use of electronic signatures, including at a minimum...which the electronic signature is associated,...

  19. 47 CFR 54.419 - Validity of electronic signatures.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...Validity of electronic signatures. (a) For...an electronic signature, defined by the Electronic Signatures in Global...effect as a written signature. (b) For...the Electronic Signatures in Global...

  20. 47 CFR 54.680 - Validity of electronic signatures.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...Validity of electronic signatures. (a) For...an electronic signature (defined by the Electronic Signatures in Global...effect as a written signature. (b) For...the Electronic Signatures in Global...

  1. 47 CFR 54.419 - Validity of electronic signatures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...Validity of electronic signatures. (a) For...an electronic signature, defined by the Electronic Signatures in Global...effect as a written signature. (b) For...the Electronic Signatures in Global...

  2. 47 CFR 54.680 - Validity of electronic signatures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...Validity of electronic signatures. (a) For...an electronic signature (defined by the Electronic Signatures in Global...effect as a written signature. (b) For...the Electronic Signatures in Global...

  3. 17 CFR 1.4 - Use of electronic signatures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...advisor, an electronic signature executed by the...to accept electronic signatures; Provided, however, That the electronic signature must comply with applicable...the use of electronic signatures, including at a minimum...which the electronic signature is associated,...

  4. 47 CFR 54.419 - Validity of electronic signatures.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...Validity of electronic signatures. (a) For...an electronic signature, defined by the Electronic Signatures in Global...effect as a written signature. (b) For...the Electronic Signatures in Global...

  5. 17 CFR 1.4 - Use of electronic signatures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...advisor, an electronic signature executed by the...to accept electronic signatures; Provided, however, That the electronic signature must comply with applicable...the use of electronic signatures, including at a minimum...which the electronic signature is associated,...

  6. Hybrid Enrichment Assay Methods for a UF6 Cylinder Verification Station: FY10 Progress Report

    SciTech Connect

    Smith, Leon E.; Jordan, David V.; Orton, Christopher R.; Misner, Alex C.; Mace, Emily K.

    2010-08-01

    Pacific Northwest National Laboratory (PNNL) is developing the concept of an automated UF6 cylinder verification station that would be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until the arrival of International Atomic Energy Agency (IAEA) inspectors. At the center of this unattended system is a hybrid enrichment assay technique that combines the traditional enrichment-meter method (based on the 186 keV peak from 235U) with non-traditional neutron-induced high-energy gamma-ray signatures (spawned primarily by 234U alpha emissions and 19F(alpha, neutron) reactions). Previous work by PNNL provided proof-of-principle for the non-traditional signatures to support accurate, full-volume interrogation of the cylinder enrichment, thereby reducing the systematic uncertainties in enrichment assay due to UF6 heterogeneity and providing greater sensitivity to material substitution scenarios. The work described here builds on that preliminary evaluation of the non-traditional signatures, but focuses on a prototype field system utilizing NaI(Tl) and LaBr3(Ce) spectrometers, and enrichment analysis algorithms that integrate the traditional and non-traditional signatures. Results for the assay of Type-30B cylinders ranging from 0.2 to 4.95 wt% 235U, at an AREVA fuel fabrication plant in Richland, WA, are described for the following enrichment analysis methods: 1) traditional enrichment meter signature (186 keV peak) as calculated using a square-wave convolute (SWC) algorithm; 2) non-traditional high-energy gamma-ray signature that provides neutron detection without neutron detectors and 3) hybrid algorithm that merges the traditional and non-traditional signatures. Uncertainties for each method, relative to the declared enrichment for each cylinder, are calculated and compared to the uncertainties from an attended HPGe verification station at AREVA, and the IAEA’s uncertainty target values for feed, tail and product cylinders. A summary of the major findings from the field measurements and subsequent analysis follows: • Traditional enrichment-meter assay using specially collimated NaI spectrometers and a Square-Wave-Convolute algorithm can achieve uncertainties comparable to HPGe and LaBr for product, natural and depleted cylinders. • Non-traditional signatures measured using NaI spectrometers enable interrogation of the entire cylinder volume and accurate measurement of absolute 235U mass in product, natural and depleted cylinders. • A hybrid enrichment assay method can achieve lower uncertainties than either the traditional or non-traditional methods acting independently because there is a low degree of correlation in the systematic errors of the two individual methods (wall thickness variation and 234U/235U variation, respectively). This work has indicated that the hybrid NDA method has the potential to serve as the foundation for an unattended cylinder verification station. When compared to today’s handheld cylinder-verification approach, such a station would have the following advantages: 1) improved enrichment assay accuracy for product, tail and feed cylinders; 2) full-volume assay of absolute 235U mass; 3) assay of minor isotopes (234U and 232U) important to verification of feedstock origin; single instrumentation design for both Type 30B and Type 48 cylinders; and 4) substantial reduction in the inspector manpower associated with cylinder verification.

  7. Color signatures in Amorsolo paintings

    NASA Astrophysics Data System (ADS)

    Soriano, Maricor N.; Palomero, Cherry May; Cruz, Larry; Yambao, Clod Marlan Krister; Dado, Julie Mae; Salvador-Campaner, Janice May

    2010-02-01

    We present the results of a two-year project aimed at capturing quantifiable color signatures of oil paintings of Fernando Amorsolo, the Philippine's first National Artists. Color signatures are found by comparing CIE xy measurements of skin color in portraits and ground, sky and foliage in landscapes. The results are compared with results of visual examination and art historical data as well as works done by Amorsolo's contemporaries and mentors.

  8. Spamming botnets: signatures and characteristics

    Microsoft Academic Search

    Yinglian Xie; Fang Yu; Kannan Achan; Rina Panigrahy; Geoff Hulten; Ivan Osipkov

    2008-01-01

    In this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spam signature generation framework called AutoRE to detect botnet-based spam emails and botnet membership. AutoRE does not require pre-classified training data or white lists. Moreover, it outputs high quality regular expression signatures that can detect

  9. Visual Identification by Signature Tracking

    Microsoft Academic Search

    Mario E. Munich; Pietro Perona

    2003-01-01

    Abstract: We propose a new camera-based biometric: visual signature identification. We discuss the importance of the parameterization of the signatures in order to achieve good classification results, independently of variations in the position of the camera with respect to the writing surface. We show that ane arc-length parameterization performs better than conventional time and Euclidean arc-length ones. We find that

  10. CHEMICAL INDUCTION MIXER VERIFICATION - ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Wet-Weather Flow Technologies Pilot of the Environmental Technology Verification (ETV) Program, which is supported by the U.S. Environmental Protection Agency and facilitated by NSF International, has recently evaluated the performance of chemical induction mixers used for di...

  11. 42 CFR 424.36 - Signature requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... The beneficiary's own signature is required on the claim...individual that the purpose of the signature is to authorize a provider...efforts to locate and obtain the signature of one of the individuals... (e) Acceptance of other signatures for good cause. If...

  12. 42 CFR 424.36 - Signature requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... The beneficiary's own signature is required on the claim...individual that the purpose of the signature is to authorize a provider...efforts to locate and obtain the signature of one of the individuals... (e) Acceptance of other signatures for good cause. If...

  13. 42 CFR 424.36 - Signature requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... The beneficiary's own signature is required on the claim...individual that the purpose of the signature is to authorize a provider...efforts to locate and obtain the signature of one of the individuals... (e) Acceptance of other signatures for good cause. If...

  14. 42 CFR 424.36 - Signature requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... The beneficiary's own signature is required on the claim...individual that the purpose of the signature is to authorize a provider...efforts to locate and obtain the signature of one of the individuals... (e) Acceptance of other signatures for good cause. If...

  15. Progressive coding for hyperspectral signature characterization

    E-print Network

    Chang, Chein-I

    with significance of changes in spectral variation. Such MPCM- based progressive spectral signature coding MPCM-PSSC, and chemical/biological agent detection. Experiments are provided to demonstrate the utility of the MPCM-PSSC spectral signature coding MPCM-PSSC ; progressive spectral signature coding PSSC ; spectral signature

  16. Online Diagnosis of Induction Motors Using MCSA

    Microsoft Academic Search

    Jee-Hoon Jung; Jong-Jae Lee; Bong-Hwan Kwon

    2006-01-01

    In this paper, an online induction motor diagnosis system using motor current signature analysis (MCSA) with advanced signal-and-data-processing algorithms is proposed. MCSA is a method for motor diagnosis with stator-current signals. The proposed system diagnoses induction motors having four types of faults such as breakage of rotor bars and end rings, short-circuit of stator windings, bearing cracks, and air-gap eccentricity.

  17. Hoover's Online

    NSDL National Science Digital Library

    Hoover's Online features an accurate and comprehensive database of company information free on the Web. Called Hoover's MasterList Plus, the database of more than 8,500 of the largest public and private U.S. companies provides company name, key personnel, address, sales, number of employees, ticker symbol and other information for companies meeting the user's designated search criteria. Hoover's Online also includes the week's top business news stories, a directory of more than 1,000 corporate Web sites, a synopsis of the 25 top-selling business books and links to other business information resources on the Web, including stock quotes and SEC filings. The new List of Lists has dozens of rankings indicating which companies are the largest, which CEOs made the most money, which companies are the best employers, and more. Almost all of Hoover's Online is free, including the content mentioned here.

  18. Conservation Online

    NSDL National Science Digital Library

    Started as a germ of an idea back in 1987 (on a real, live bulletin board, as opposed to an electronic one), Conservation Online (CoOL) has been providing online resources for conservation professionals since 1993. As its website announces, it is a "full text library of conservation information," covering a wide array of topics ranging from digital imaging to reprographics, and quite a bit of material in between. By clicking on any given topic, visitors will receive a brief overview of the subject, its terminology, and then a list of general online resources for consideration. Another nice feature of the site is the mailing list archive, which contain the archives of various queries submitted to different professional conservation groups, such as the Association of Moving Image Archivists, the Textiles Conservation Discussion List, and the Conservation Framer's Mailing List. The site is rounded out by a timeline that traces the CoOL's history from the summer of 1987 to July 2003.

  19. Ozone Monitoring Instrument geolocation verification

    Microsoft Academic Search

    M. Kroon; M. R. Dobber; R. Dirksen; J. P. Veefkind; P. F. Levelt

    2008-01-01

    Verification of the geolocation assigned to individual ground pixels as measured by the Ozone Monitoring Instrument (OMI) aboard the NASA EOS-Aura satellite was performed by comparing geophysical Earth surface details as observed in OMI false color images with the high-resolution continental outline vector map as provided by the Interactive Data Language (IDL) software tool from ITT Visual Information Solutions. The

  20. Structural verification for GAS experiments

    Microsoft Academic Search

    Mark Daniel Peden

    1992-01-01

    The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review\\/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion

  1. Model Checking and Modular Verification

    Microsoft Academic Search

    Orna Grumberg; David E. Long

    1991-01-01

    We describe a framework for compositional verification of finite state processes. Theframework is based on two ideas: a subset of the logic CTL for which satisfaction ispreserved under composition; and a preorder on structures which captures the relationbetween a component and a system containing the component. Satisfaction of a formulain the logic corresponds to being below a particular structure (a

  2. Model checking and modular verification

    Microsoft Academic Search

    Orna Grumberg; David E. Long

    1994-01-01

    We describe a framework for compositional verification of finite-state processes. The framework is based on two ideas: a subset of the logic CTL for which satisfaction is preserved under composition, and a preorder on structures which captures the relation between a component and a system containing the component. Satisfaction of a formula in the logic corresponds to being below a

  3. SFT monitoring and design verification

    Microsoft Academic Search

    Ian Markey

    2010-01-01

    The Submerged Floating Tunnel (SFT) is still a prototype structure. To change this, SFTs have to be built and we have to learn from this process. This involves comparing the structure’s real behaviour with its design and transferring this knowledge to the engineering community. Monitoring and design verification is a step in this direction. The paper discusses various aspects that

  4. Verification of Categorical Probability Forecasts

    Microsoft Academic Search

    H. Zhang; T. Casey

    2000-01-01

    This paper compares a number of probabilistic weather forecasting verification approaches. Forecasting skill scores from linear error in probability space and relative operating characteristics are compared with results from an alternative approach that first transforms probabilistic forecasts to yes\\/no form and then assesses the model forecasting skill. This approach requires a certain departure between the categorical probability from forecast models

  5. NEXT Thruster Component Verification Testing

    Microsoft Academic Search

    Luis R. Pińero; James S. Sovey

    2007-01-01

    Component testing is a critical part of thruster life validation activities under NASA's Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life

  6. SD Online

    NSDL National Science Digital Library

    The European Foundation presents SD Online, a special feature of the Sustainable Development pages. SD Online is a full-text database of the Foundation's resources which "explore specific facets of the sustainability debate and take advantage of the Foundation's research in a variety of areas." Beginning in 1998, the databases have grown to include a Networks database, tools database, as well as databases on SME support initiatives and education and training. Each searchable and browseable database must be accessed separately using the sidebar menu on the right, and each offers a brief explanation of the information within the database, as well as fully cataloged records.

  7. Application of computer vision to automatic prescription verification in pharmaceutical mail order

    NASA Astrophysics Data System (ADS)

    Alouani, Ali T.

    2005-05-01

    In large volume pharmaceutical mail order, before shipping out prescriptions, licensed pharmacists ensure that the drug in the bottle matches the information provided in the patient prescription. Typically, the pharmacist has about 2 sec to complete the prescription verification process of one prescription. Performing about 1800 prescription verification per hour is tedious and can generate human errors as a result of visual and brain fatigue. Available automatic drug verification systems are limited to a single pill at a time. This is not suitable for large volume pharmaceutical mail order, where a prescription can have as many as 60 pills and where thousands of prescriptions are filled every day. In an attempt to reduce human fatigue, cost, and limit human error, the automatic prescription verification system (APVS) was invented to meet the need of large scale pharmaceutical mail order. This paper deals with the design and implementation of the first prototype online automatic prescription verification machine to perform the same task currently done by a pharmacist. The emphasis here is on the visual aspects of the machine. The system has been successfully tested on 43,000 prescriptions.

  8. Anglicans Online!

    NSDL National Science Digital Library

    Anglicans Online! has grown to be a comprehensive source of information for the world's Episcopal/Anglican church on the Internet. Topics offered are the Newsroom, Canada, USA, World, and Resources including reference links, biblical study. Ecumenical partners, and a listing of Discussion mailing lists and newsgroups are also provided.

  9. Biology Online

    NSDL National Science Digital Library

    Richard Lees

    Biology Online provides a dictionary of biological terms, tutorials, and biology-related links categorized into dozens of subfields. The tutorials cover the following topics: adaptation, cell biology, developmental biology, freshwater ecology, genetics and evolution, neurology, regulation in biological systems, and the origin and evolution of life.

  10. Ticketmaster Online

    NSDL National Science Digital Library

    Ticketmaster Online offers a browsable index of all events on sale throughout the U.S. including concerts, sports, arts, and family-oriented entertainment. Browse the entire alphabetical index or individual state, venue, or event indexes. Venue information includes phone numbers, directions, and parking. Backstage and Spotlight columns offer information about artists and events.

  11. Biometric Cryptosystem Using Online Alisher Kholmatov and Berrin Yanikoglu

    E-print Network

    Yanikoglu, Berrin

    , based on the Fuzzy Vault scheme of Jules et al. The Fuzzy Vault scheme releases a previously stored key in a vault. The online signature of a person is a behavioral biometric which is widely accepted as the formal of the vault. We present our preliminary results and demonstrate that high security level (128 bit encryption

  12. Graph Analytics for Signature Discovery

    SciTech Connect

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh; Lo, Chaomei

    2013-06-01

    Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform unstructured data into a graph representation. By doing this we expose underlying structure in the data and can take advantage of existing graph analytics capabilities, as well as develop new capabilities. Currently we focus on applications in cybersecurity and communication domains. Within cybersecurity we aim to find signatures for perpetrators using the pass-the-hash attack, and in communications we look for emails or phone calls going up or down a chain of command. In both of these areas, and in many others, the signature we look for is a path with certain temporal properties. In this paper we discuss our methodology for finding these temporal paths within large graphs.

  13. Signature Visualization of Software Binaries

    SciTech Connect

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  14. Verification and transparency in future arms control

    SciTech Connect

    Pilat, J.F.

    1996-09-01

    Verification`s importance has changed dramatically over time, although it always has been in the forefront of arms control. The goals and measures of verification and the criteria for success have changed with the times as well, reflecting such factors as the centrality of the prospective agreement to East-West relations during the Cold War, the state of relations between the United States and the Soviet Union, and the technologies available for monitoring. Verification`s role may be declining in the post-Cold War period. The prospects for such a development will depend, first and foremost, on the high costs of traditional arms control, especially those associated with requirements for verification. Moreover, the growing interest in informal, or non-negotiated arms control does not allow for verification provisions by the very nature of these arrangements. Multilateral agreements are also becoming more prominent and argue against highly effective verification measures, in part because of fears of promoting proliferation by opening sensitive facilities to inspectors from potential proliferant states. As a result, it is likely that transparency and confidence-building measures will achieve greater prominence, both as supplements to and substitutes for traditional verification. Such measures are not panaceas and do not offer all that we came to expect from verification during the Cold war. But they may be the best possible means to deal with current problems of arms reductions and restraints at acceptable levels of expenditure.

  15. Textural signatures for wetland vegetation

    NASA Technical Reports Server (NTRS)

    Whitman, R. I.; Marcellus, K. L.

    1973-01-01

    This investigation indicates that unique textural signatures do exist for specific wetland communities at certain times in the growing season. When photographs with the proper resolution are obtained, the textural features can identify the spectral features of the vegetation community seen with lower resolution mapping data. The development of a matrix of optimum textural signatures is the goal of this research. Seasonal variations of spectral and textural features are particularly important when performing a vegetations analysis of fresh water marshes. This matrix will aid in flight planning, since expected seasonal variations and resolution requirements can be established prior to a given flight mission.

  16. Propeller signatures and their use

    NASA Astrophysics Data System (ADS)

    Johnston, J. F.; Donham, R. E.; Guinn, W. A.

    1980-06-01

    The identification and use of the noise and vibration signatures of individual propellers, described herein, has provided a basis for rational advances in propeller-noise analysis and control. These signatures, or influence vectors, were used for (1) determining analytically optimum synchrophase angles and (2) diagnosing the specific paths - airborne and structure-borne - of the noise into the cabin. A number of significant conclusions are drawn from flight experiments in a Navy P-3C patrol aircraft. The results and techniques from this work are applicable to improving the passenger and crew comfort as well as equipment life in propeller-powered aircraft.

  17. Online MBA Programs Online Colleges

    E-print Network

    Ham, Donhee

    integrated into high-tech electronic circuits--which, among other things, could help manufacturers by Goooooogle High Quality Low Cost PCB PCB, assembly and turnkey solutions - Online instant Quote ! http://www.e-teknet.com PCB assembly services Hassle free & no surprises. Don't compromise quality of your products www

  18. Irma 5.2 multi-sensor signature prediction model

    NASA Astrophysics Data System (ADS)

    Savage, James; Coker, Charles; Thai, Bea; Aboutalib, Omar; Chow, Anthony; Yamaoka, Neil; Kim, Charles

    2007-04-01

    The Irma synthetic signature prediction code is being developed by the Munitions Directorate of the Air Force Research Laboratory (AFRL/MN) to facilitate the research and development of multi-sensor systems. There are over 130 users within the Department of Defense, NASA, Department of Transportation, academia, and industry. Irma began as a high-resolution, physics-based Infrared (IR) target and background signature model for tactical weapon applications and has grown to include: a laser (or active) channel (1990), improved scene generator to support correlated frame-to-frame imagery (1992), and passive IR/millimeter wave (MMW) channel for a co-registered active/passive IR/MMW model (1994). Irma version 5.0 was released in 2000 and encompassed several upgrades to both the physical models and software; host support was expanded to Windows, Linux, Solaris, and SGI Irix platforms. In 2005, version 5.1 was released after an extensive verification and validation of an upgraded and reengineered active channel. Since 2005, the reengineering effort has focused on the Irma passive channel. Field measurements for the validation effort include the unpolarized data collection. Irma 5.2 is scheduled for release in the summer of 2007. This paper will report the validation test results of the Irma passive models and discuss the new features in Irma 5.2.

  19. Irma 5.2 multi-sensor signature prediction model

    NASA Astrophysics Data System (ADS)

    Savage, James; Coker, Charles; Thai, Bea; Aboutalib, Omar; Pau, John

    2008-04-01

    The Irma synthetic signature prediction code is being developed by the Munitions Directorate of the Air Force Research Laboratory (AFRL/RW) to facilitate the research and development of multi-sensor systems. There are over 130 users within the Department of Defense, NASA, Department of Transportation, academia, and industry. Irma began as a high-resolution, physics-based Infrared (IR) target and background signature model for tactical weapon applications and has grown to include: a laser (or active) channel (1990), improved scene generator to support correlated frame-to-frame imagery (1992), and passive IR/millimeter wave (MMW) channel for a co-registered active/passive IR/MMW model (1994). Irma version 5.0 was released in 2000 and encompassed several upgrades to both the physical models and software; host support was expanded to Windows, Linux, Solaris, and SGI Irix platforms. In 2005, version 5.1 was released after extensive verification and validation of an upgraded and reengineered ladar channel. The reengineering effort then shifted focus to the Irma passive channel. Field measurements for the validation effort include both polarized and unpolarized data collection. Irma 5.2 was released in 2007 with a reengineered passive channel. This paper summarizes the capabilities of Irma and the progress toward Irma 5.3, which includes a reengineered radar channel.

  20. PERFORMANCE VERIFICATION OF STORMWATER TREATMENT DEVICES UNDER EPAżS ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program was created to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The programżs goal is to further environmental protection by a...

  1. PERFORMANCE VERIFICATION OF ANIMAL WATER TREATMENT TECHNOLOGIES THROUGH EPA'S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The U.S. Environmental Protection Agency created the Environmental Technology Verification Program (ETV) to further environmental protection by accelerating the commercialization of new and innovative technology through independent performance verification and dissemination of in...

  2. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP): LIQUID COATINGS--GENERIC VERIFICATION PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol or GVP which provides standards for testing liquid coatings for their enviornmental impacts under the Environmental Technology Verification program. It provides generic guidelines for product specific testing and quality assurance p...

  3. NEXT Thruster Component Verification Testing

    NASA Technical Reports Server (NTRS)

    Pinero, Luis R.; Sovey, James S.

    2007-01-01

    Component testing is a critical part of thruster life validation activities under NASA s Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life test of two NEXT isolators was therefore initiated and has accumulated more than 10,000 hr of operation. Measurements to date indicate only a negligibly small increase in leakage current. The cathode heaters were also selected for verification testing. The technology to fabricate these heaters, developed for the International Space Station plasma contactor hollow cathode assembly, was transferred to Aerojet for the fabrication of the NEXT prototype model ion thrusters. Testing the contractor-fabricated heaters is necessary to validate fabrication processes for high reliability heaters. This paper documents the status of the propellant isolator and cathode heater tests.

  4. Experimental verification of quantum computation

    NASA Astrophysics Data System (ADS)

    Barz, Stefanie; Fitzsimons, Joseph F.; Kashefi, Elham; Walther, Philip

    2013-11-01

    Quantum computers are expected to offer substantial speed-ups over their classical counterparts and to solve problems intractable for classical computers. Beyond such practical significance, the concept of quantum computation opens up fundamental questions, among them the issue of whether quantum computations can be certified by entities that are inherently unable to compute the results themselves. Here we present the first experimental verification of quantum computation. We show, in theory and experiment, how a verifier with minimal quantum resources can test a significantly more powerful quantum computer. The new verification protocol introduced here uses the framework of blind quantum computing and is independent of the experimental quantum-computation platform used. In our scheme, the verifier is required only to generate single qubits and transmit them to the quantum computer. We experimentally demonstrate this protocol using four photonic qubits and show how the verifier can test the computer's ability to perform quantum computation.

  5. Experimental verification of quantum computations

    E-print Network

    Stefanie Barz; Joseph F. Fitzsimons; Elham Kashefi; Philip Walther

    2013-08-30

    Quantum computers are expected to offer substantial speedups over their classical counterparts and to solve problems that are intractable for classical computers. Beyond such practical significance, the concept of quantum computation opens up new fundamental questions, among them the issue whether or not quantum computations can be certified by entities that are inherently unable to compute the results themselves. Here we present the first experimental verification of quantum computations. We show, in theory and in experiment, how a verifier with minimal quantum resources can test a significantly more powerful quantum computer. The new verification protocol introduced in this work utilizes the framework of blind quantum computing and is independent of the experimental quantum-computation platform used. In our scheme, the verifier is only required to generate single qubits and transmit them to the quantum computer. We experimentally demonstrate this protocol using four photonic qubits and show how the verifier can test the computer's ability to perform measurement-based quantum computations.

  6. Quantify Simulation Verification and Validation

    Microsoft Academic Search

    Peng Shi; Fei Liu; Ming Yang

    2009-01-01

    Verification and validation (V&V) are the primary means to assess accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence application military areas, such as, safety of nuclear weapons, and the trial of some missiles. In this paper we discuss how to quantify the V&V process for a better description

  7. Formal verification of AI software

    NASA Technical Reports Server (NTRS)

    Rushby, John; Whitehurst, R. Alan

    1989-01-01

    The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

  8. Verification & Validation in Medi SPICE

    Microsoft Academic Search

    M. S. Sivakumar; Valentine Casey; Fergal McCaffery; Gerry Coleman

    \\u000a Effective verification and validation are central to medical device software development and are essential for regulatory\\u000a approval. Although guidance is available in multiple standards in the medical device software domain, it is difficult for\\u000a the manufacturer to implement as there is no consolidated view of this information. Likewise, the standards and guidance documents\\u000a do not consider process improvement initiatives. This

  9. Functional Verification of DMA Controllers

    Microsoft Academic Search

    Michelangelo Grosso; Wilson Javier Perez Holguin; Danilo Ravotto; Ernesto Sanchez; Matteo Sonza Reorda; Alberto Tonda; Jaime Velasco Medina

    Today’s SoCs are composed of a wide variety of modules, such as microprocessor cores, memories, peripherals, and customized\\u000a blocks directly related to the targeted application. To effectively perform simulation-based design verification of peripheral\\u000a cores, it is necessary to stimulate the description in a broad range of behavior possibilities, checking the produced results.\\u000a Different strategies for generating suitable stimuli have been

  10. Formal verification of digital systems

    SciTech Connect

    Kijaich, J. Jr.

    1985-01-01

    A vital need brought on by the continuing VLSI revolution is the development of computer-aided tools that help to ameliorate the difficulties faced by logic designers when they are required to verify properties about their designs. Recently, interest has grown in the possibility of developing alternatives to standard simulation as a means of dealing with this problem. Several researchers suggest that use of artificial intelligence techniques as such an alternative. This thesis develops a framework under which formal verification tools can be developed and evaluated and describes a specific tool that uses an automated reasoning system together with Petri nets for analyzing and modeling digital systems at various levels of abstraction. This thesis expands the previous work in this area along several dimensions: (1) a more generic representation and methodology that permits the hierarchical verification of a wider range of properties of digital systems; (2) employment of a notation that provides coherence between various design verification tools, and models the linkage between software and hardware; and (3) demonstration of the above with a specific implementation that formally verifies realistic systems by utilizing an interactive theorem prover, ITP, based on a reasoning package developed at Argonne National Laboratory called Logic Machine Architecture (LMA).

  11. Nuclear Data Verification and Standardization

    SciTech Connect

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  12. Democrats Online

    NSDL National Science Digital Library

    Now that the political convention season is over, you may be looking for sites that offer a little more interactivity and are a little less concerned with the party line. Debuting this week is Democrats Online: A Community of American Voices. The emphasis on this site is user involvement; users are offered the opportunity to participate in real-time chat using Ewgie, a Java applet, and to post a personal web page indicating which accomplishments of the Clinton/Gore administration are most important to them. A highlight of the site is the Shockwave-driven "Help Dole Name his Cabinet," which allows users to spin the slot machine and imagine Dole's possible picks for Chief of Staff, Secretary of State, and Secretary of Defense. The results are discomforting or inspiring, depending on your perspective. A "question of the week" poll will come online on Labor Day.

  13. Speaker Verification Using Adapted Gaussian Mixture Models

    Microsoft Academic Search

    Douglas A. Reynolds; Thomas F. Quatieri; Robert B. Dunn

    2000-01-01

    Reynolds, Douglas A., Quatieri, Thomas F., and Dunn, Robert B., Speaker Verification Using Adapted Gaussian Mixture Models, Digital Signal Processing10(2000), 19–41.In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using

  14. Magnetic cleanliness verification approach on tethered satellite

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Braghin, Massimo; Grande, Maurizio

    1990-01-01

    Magnetic cleanliness testing was performed on the Tethered Satellite as the last step of an articulated verification campaign aimed at demonstrating the capability of the satellite to support its TEMAG (TEthered MAgnetometer) experiment. Tests at unit level and analytical predictions/correlations using a dedicated mathematical model (GANEW program) are also part of the verification activities. Details of the tests are presented, and the results of the verification are described together with recommendations for later programs.

  15. Learning to Teach Online

    ERIC Educational Resources Information Center

    Clark-Ibanez, Marisol; Scott, Linda

    2008-01-01

    The demand for online courses is growing. This paper offers suggestions on how to teach online courses that promote student engagement and learning. We discuss the benefits and challenges of teaching online. We share research-based strategies for designing an online course and draw upon our experience of developing fully online sociology courses.…

  16. Online Organic Chemistry

    ERIC Educational Resources Information Center

    Janowicz, Philip A.

    2010-01-01

    This is a comprehensive study of the many facets of an entirely online organic chemistry course. Online homework with structure-drawing capabilities was found to be more effective than written homework. Online lecture was found to be just as effective as in-person lecture, and students prefer an online lecture format with shorter Webcasts. Online

  17. Negotiating Femininities Online

    ERIC Educational Resources Information Center

    Davies, Julia

    2004-01-01

    Much has been written about the potential for online learning (Fryer, 1997; www. ngfl.gov.uk/ngfl/index.html). However this literature typically emphasizes not online learning but online education. In this paper I focus on the potential for online learning, specifically learning about issues surrounding femininity in the presence of online peers,…

  18. On Symmetric Signatures Holographic Algorithms

    E-print Network

    Cai, Jin-Yi

    recently introduced a beautiful theory called holographic algorithms. Holographic algorithms are custom nodes. 10 #12;Linear bases transformations The first ingredient of the theory of holographic algorithmsOn Symmetric Signatures in Holographic Algorithms Jin-Yi Cai University of Wisconsin, Madison

  19. Target identification from radar signatures

    Microsoft Academic Search

    R. Strattan

    1978-01-01

    Modern high resolution radar techniques and real time digital signal processing advances indicate the feasibility of extracting characteristic features of aircraft targets from their radar signatures. Two basic approaches have been suggested. The low frequency approach utilizes harmonically related radar frequencies with wavelengths comparable to the target dimensions. The microwave approach utilizes spread spectrum techniques to achieve high range resolution.

  20. Encryption and Digital Signatures Motivations

    E-print Network

    Newhall, Tia

    Encryption and Digital Signatures A Yie 1 #12;Motivations We want to safeguard data also assumes that the ma- chines being used support some fast method of encryption, possibly · False messages · Extraneous copies of valid messages · Network disruption 4 #12;Encryption

  1. Graph Signatures for Visual Analytics

    SciTech Connect

    Wong, Pak C.; Foote, Harlan P.; Chin, George; Mackey, Patrick S.; Perrine, Kenneth A.

    2006-11-17

    We present a visual analytics technique to explore graphs using the concept of a data signature. A data signature, in our context, is a multidimensional vector that captures the local topology information surrounding each graph node. Signature vectors extracted from a graph are projected onto a low-dimensional scatterplot through the use of scaling. The resultant scatterplot, which reflects the similarities of the vectors, allows analysts to examine the graph structures and their corresponding real-life interpretations through repeated use of brushing and linking between the two visualizations. The interpretation of the graph structures is based on the outcomes of multiple participatory analysis sessions with intelligence analysts conducted by the authors at the Pacific Northwest National Laboratory. The paper first uses three public domain datasets with either well-known or obvious features to explain the rationale of our design and illustrate its results. More advanced examples are then used in a customized usability study to evaluate the effectiveness and efficiency of our approach. The study results reveal not only the limitations and weaknesses of the traditional approach based solely on graph visualization but also the advantages and strengths of our signature-guided approach presented in the paper.

  2. Fully Leakage-Resilient Signatures

    Microsoft Academic Search

    Elette Boyle; Gil Segev; Daniel Wichs

    2011-01-01

    A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This is a strong and meaningful notion of security that captures

  3. Physiology Online

    NSDL National Science Digital Library

    Physiology Online, the electronic information service of the Physiological Society, provides information about its three journals: Journal of Physiology, Proceedings of the Physiological Society, and Experimental Physiology. Also included are selected abstracts, as well as information about recent monographs, job listings (mostly in the U.K.), information about Society grants, a physiology file and software archive for both PC and Mac platforms, pointers to other physiology resources on the Internet, and a listing of upcoming meetings and conferences within the field.

  4. Registration online.

    PubMed

    2014-11-27

    The Nursing and Midwifery Council has launched a secure service that allows nurses to register and manage their registration online. Users can view their registration status, update contact details, view and print a statement of entry, submit notification of practice, pay the annual retention or renewal fees, set up a direct debit for annual fee payments, provide equality and diversity information, and give the geographical location of employment. Go to tinyurl.com/mj2ahxk to set up an account. PMID:25428323

  5. Writers Online

    NSDL National Science Digital Library

    1998-01-01

    As part of the National Year of Reading effort in the UK (spearheaded by the National Literacy Trust to promote reading and literacy), Writers Online is aimed at piquing younger readers' interests. The site features interviews with popular children's writers as well as "writer-in-residence" workshops. Visitors to the site can try their hand at creative writing, learn tricks of the trade, and get personal feedback from their favorite authors.

  6. 45 CFR 95.626 - Independent Verification and Validation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...false Independent Verification and Validation. 95.626 Section 95.626 Public...626 Independent Verification and Validation. (a) An assessment for independent verification and validation (IV&V) analysis of a...

  7. 45 CFR 95.626 - Independent Verification and Validation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...false Independent Verification and Validation. 95.626 Section 95.626 Public...626 Independent Verification and Validation. (a) An assessment for independent verification and validation (IV&V) analysis of a...

  8. 21 CFR 120.11 - Verification and validation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Verification and validation. 120.11 Section 120.11 Food...Provisions § 120.11 Verification and validation. (a) Verification. Each...requirements of § 120.12. (b) Validation of the HACCP plan. Each...

  9. 45 CFR 95.626 - Independent Verification and Validation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...false Independent Verification and Validation. 95.626 Section 95.626 Public...626 Independent Verification and Validation. (a) An assessment for independent verification and validation (IV&V) analysis of a...

  10. 21 CFR 120.11 - Verification and validation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Verification and validation. 120.11 Section 120.11 Food...Provisions § 120.11 Verification and validation. (a) Verification. Each...requirements of § 120.12. (b) Validation of the HACCP plan. Each...

  11. 21 CFR 120.11 - Verification and validation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Verification and validation. 120.11 Section 120.11 Food...Provisions § 120.11 Verification and validation. (a) Verification. Each...requirements of § 120.12. (b) Validation of the HACCP plan. Each...

  12. 21 CFR 120.11 - Verification and validation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Verification and validation. 120.11 Section 120.11 Food...Provisions § 120.11 Verification and validation. (a) Verification. Each...requirements of § 120.12. (b) Validation of the HACCP plan. Each...

  13. 45 CFR 95.626 - Independent Verification and Validation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...false Independent Verification and Validation. 95.626 Section 95.626 Public...626 Independent Verification and Validation. (a) An assessment for independent verification and validation (IV&V) analysis of a...

  14. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2012-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  15. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 2013-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  16. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 2014-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  17. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 2013-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  18. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 2011-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  19. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 2014-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  20. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 2010-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  1. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2012-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  2. 3D Scanning for Biometric Identification and Verification

    E-print Network

    McShea, Daniel W.

    June 2010 3D Scanning for Biometric Identification and Verification Project Leads Anselmo Lastra. Statement of Problem Reliable and robust identification and verification of individuals is critical identity verification. Traditional biometrics, such as mug shots, fingerprints, and voice recognition, have

  3. SPEAKER VERIFICATION FROM CODED TELEPHONE SPEECH USING STOCHASTIC

    E-print Network

    Mak, Man-Wai

    SPEAKER VERIFICATION FROM CODED TELEPHONE SPEECH USING STOCHASTIC FEATURE TRANSFORMATION Abstract. A handset compensation technique for speaker verification from coded telephone speech is proposed' identity over the telephone. A chal- lenge of telephone-based speaker verification is that transducer

  4. WITHIN-RECORD VERIFICATION MAPSPROG USER'S MANUAL -73 VI. WITHIN-RECORD VERIFICATION OF TEMPMAPS

    E-print Network

    DeSante, David F.

    WITHIN-RECORD VERIFICATION MAPSPROG USER'S MANUAL - 73 VI. WITHIN-RECORD VERIFICATION OF TEMPMAPS A, and checked it against your raw data. Any data corrections you undertake that are the result of within-record verification must be done on the records in the "Within-Record Processing" sub-menu, which uses TEMPMAPS; do

  5. Department of Computer Science INCREMENTAL RUNTIME VERIFICATION

    E-print Network

    Oxford, University of

    Department of Computer Science INCREMENTAL RUNTIME VERIFICATION OF PROBABILISTIC SYSTEMS Vojtech of Probabilistic Systems (Extended Version) Vojtech Forejt1 , Marta Kwiatkowska1 , David Parker2 , Hongyang Qu1

  6. GRASShopper Complete Heap Verification with Mixed Specifications

    E-print Network

    Wies, Thomas

    GRASShopper Complete Heap Verification with Mixed Specifications Ruzica Piskac1 , Thomas Wies2GRASShopper guarantees enable GRASShopper to produce detailed counterex- amples for incorrect or underspecified programs

  7. Verification after Synthesis Alan Mishchenko Robert Brayton

    E-print Network

    Brayton, Robert K.

    Verification after Synthesis Alan Mishchenko Robert Brayton Department of EECS University of California, Berkeley Berkeley, CA 94720 {alanmi, brayton}@eecs.berkeley.edu Abstract The disconnect between

  8. Verification Technologies, first/second quarters 1992

    SciTech Connect

    Staehle, G.; Talaber, C.; Stull, S. (eds.) (Lawrence Livermore National Lab., CA (United States)); Staehle, G.; Talaber, C.; Stull, S. [eds.] [Lawrence Livermore National Lab., CA (United States)

    1992-10-01

    The purpose of this document is to enhance communication between the technologists who study the means to verify compliance with the policy makers who negotiate treaties. Topics discussed include: microwave dielectrometer for chemical weapon (cw) verification; fourier-transform ultrasonic interrogation of sealed chemical and conventional munitions; low-power portable x-ray system for chemical treaty verification; portable isotopic neutron spectroscopy for nondestructive evaluation of cw; laser acoustic spectroscopy for cw verification; ion-tube neutron spectroscopy; frequency response method; acoustic resonance spectroscopy; ultrasonic pulse-echo measurements for cw verification; and investigating fluid-filled munitions with inertial damping.

  9. Verification Technologies, first/second quarters 1992

    SciTech Connect

    Staehle, G.; Talaber, C.; Stull, S. (eds.) (Lawrence Livermore National Lab., CA (United States))

    1992-01-01

    The purpose of this document is to enhance communication between the technologists who study the means to verify compliance with the policy makers who negotiate treaties. Topics discussed include: microwave dielectrometer for chemical weapon (cw) verification; fourier-transform ultrasonic interrogation of sealed chemical and conventional munitions; low-power portable x-ray system for chemical treaty verification; portable isotopic neutron spectroscopy for nondestructive evaluation of cw; laser acoustic spectroscopy for cw verification; ion-tube neutron spectroscopy; frequency response method; acoustic resonance spectroscopy; ultrasonic pulse-echo measurements for cw verification; and investigating fluid-filled munitions with inertial damping.

  10. CORRECTIONS VERIFICATION Academic Year 20132014 Student information

    E-print Network

    Blanchette, Robert A.

    ). You are not allowed to update this data to reflect any changes that have taken place after this date in Adobe Reader (free at Adobe.com). Please add the required signature(s) in blue or black ink. Return

  11. CORRECTIONS VERIFICATION Academic Year 20122013 Student information

    E-print Network

    Blanchette, Robert A.

    ). You are not allowed to update this data to reflect any changes that have taken place after this date in Adobe Reader (free at Adobe.com). Please add the required signature(s) in blue or black ink. Return

  12. A Quantum Proxy Weak Blind Signature Scheme

    NASA Astrophysics Data System (ADS)

    Cao, Hai-Jing; Zhu, Yan-Yan; Li, Peng-Fei

    2013-09-01

    We present a weak blind signature scheme based on a genuinely entangled six qubits state. Different from classical blind signature schemes and current quantum signature schemes, our quantum weak blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Our scheme has the characteristics of classical security and quantum security.

  13. Quantum group blind signature scheme without entanglement

    NASA Astrophysics Data System (ADS)

    Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao

    2011-07-01

    In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.

  14. Lead isotopes by LA-MC-ICPMS: Tracking the emergence of mantle signatures in an evolving silicic magma system

    E-print Network

    Lead isotopes by LA-MC-ICPMS: Tracking the emergence of mantle signatures in an evolving silicic form 30 January 2007; available online 3 February 2007 Abstract At Long Valley (LV) model Sr isotope discrepancies a new in situ Pb isotope tech- nique has been developed to measure the compositions of 113

  15. Signatures of gene expression noise in cellular systems Julia Rausenberger a,b,*, Christian Fleck b,c

    E-print Network

    Timmer, Jens

    Review Signatures of gene expression noise in cellular systems Julia Rausenberger a,b,*, Christian t i c l e i n f o Article history: Available online 11 June 2009 Keywords: Gene expression noise Stochastic modeling Transcription factor Population distribution a b s t r a c t Noise in gene expression

  16. 27 CFR 17.6 - Signature authority.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 2013-04-01 false Signature authority. 17.6 Section 17.6...PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond...attorney or other proper notification of signature authority has been filed...

  17. 7 CFR 97.155 - Signatures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Signatures. 97.155 Section 97.155 Agriculture... Attorneys and Agents § 97.155 Signatures. Every document filed by an attorney...proceeding in the Office shall bear the signature of such attorney or agent, except...

  18. 7 CFR 718.9 - Signature requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Signature requirements. 718.9 Section 718...PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program...Chapter XIV of this title requires the signature of a producer; landowner;...

  19. 7 CFR 97.155 - Signatures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 2010-01-01 false Signatures. 97.155 Section 97.155 Agriculture... Attorneys and Agents § 97.155 Signatures. Every document filed by an attorney...proceeding in the Office shall bear the signature of such attorney or agent, except...

  20. 17 CFR 12.12 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Signature. 12.12 Section 12.12 Commodity...Consideration of Pleadings § 12.12 Signature. (a) By whom. All documents...another person. (b) Effect. The signature on any document of any person...

  1. 27 CFR 17.6 - Signature authority.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 2012-04-01 false Signature authority. 17.6 Section 17.6...PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond...attorney or other proper notification of signature authority has been filed...

  2. 25 CFR 213.10 - Lessor's signature.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 2010-04-01 false Lessor's signature. 213.10 Section 213.10 Indians...Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name...right” or “left” thumbmark. Such signatures must be witnessed by two persons,...

  3. 17 CFR 12.12 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 2014-04-01 false Signature. 12.12 Section 12.12 Commodity...Consideration of Pleadings § 12.12 Signature. (a) By whom. All documents...another person. (b) Effect. The signature on any document of any person...

  4. 7 CFR 97.155 - Signatures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Signatures. 97.155 Section 97.155 Agriculture... Attorneys and Agents § 97.155 Signatures. Every document filed by an attorney...proceeding in the Office shall bear the signature of such attorney or agent, except...

  5. 25 CFR 213.10 - Lessor's signature.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 2013-04-01 false Lessor's signature. 213.10 Section 213.10 Indians...Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name...right” or “left” thumbmark. Such signatures must be witnessed by two persons,...

  6. 7 CFR 97.155 - Signatures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Signatures. 97.155 Section 97.155 Agriculture... Attorneys and Agents § 97.155 Signatures. Every document filed by an attorney...proceeding in the Office shall bear the signature of such attorney or agent, except...

  7. 25 CFR 213.10 - Lessor's signature.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 2011-04-01 true Lessor's signature. 213.10 Section 213.10 Indians...Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name...right” or “left” thumbmark. Such signatures must be witnessed by two persons,...

  8. 25 CFR 213.10 - Lessor's signature.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 2011-04-01 false Lessor's signature. 213.10 Section 213.10 Indians...Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name...right” or “left” thumbmark. Such signatures must be witnessed by two persons,...

  9. 17 CFR 12.12 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 2012-04-01 false Signature. 12.12 Section 12.12 Commodity...Consideration of Pleadings § 12.12 Signature. (a) By whom. All documents...another person. (b) Effect. The signature on any document of any person...

  10. 7 CFR 97.155 - Signatures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Signatures. 97.155 Section 97.155 Agriculture... Attorneys and Agents § 97.155 Signatures. Every document filed by an attorney...proceeding in the Office shall bear the signature of such attorney or agent, except...

  11. 7 CFR 718.9 - Signature requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Signature requirements. 718.9 Section 718...PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program...Chapter XIV of this title requires the signature of a producer; landowner;...

  12. 27 CFR 17.6 - Signature authority.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 2011-04-01 false Signature authority. 17.6 Section 17.6...PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond...attorney or other proper notification of signature authority has been filed...

  13. 7 CFR 718.9 - Signature requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Signature requirements. 718.9 Section 718...PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program...Chapter XIV of this title requires the signature of a producer; landowner;...

  14. 27 CFR 17.6 - Signature authority.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 2014-04-01 false Signature authority. 17.6 Section 17.6...PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond...attorney or other proper notification of signature authority has been filed...

  15. 7 CFR 718.9 - Signature requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Signature requirements. 718.9 Section 718...PROGRAMS General Provisions § 718.9 Signature requirements. (a) When a program...Chapter XIV of this title requires the signature of a producer; landowner;...

  16. 25 CFR 213.10 - Lessor's signature.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 2014-04-01 false Lessor's signature. 213.10 Section 213.10 Indians...Acquire Leases § 213.10 Lessor's signature. Any Indian who cannot write his name...right” or “left” thumbmark. Such signatures must be witnessed by two persons,...

  17. 17 CFR 12.12 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 2013-04-01 false Signature. 12.12 Section 12.12 Commodity...Consideration of Pleadings § 12.12 Signature. (a) By whom. All documents...another person. (b) Effect. The signature on any document of any person...

  18. 17 CFR 12.12 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 2011-04-01 false Signature. 12.12 Section 12.12 Commodity...Consideration of Pleadings § 12.12 Signature. (a) By whom. All documents...another person. (b) Effect. The signature on any document of any person...

  19. 27 CFR 17.6 - Signature authority.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Signature authority. 17.6 Section 17.6...PRODUCTS General Provisions § 17.6 Signature authority. No claim, bond...attorney or other proper notification of signature authority has been filed...

  20. Compact Group Signatures Without Random Oracles

    Microsoft Academic Search

    Xavier Boyen; Brent Waters

    2006-01-01

    We present the first ecient group signature scheme that is provably secure without random oracles. We achieve this result by combining provably secure hierarchical signatures in bilinear groups with a novel adaptation of the recent Non-Interactive Zero Knowledge proofs of Groth, Ostrovsky, and Sahai. The size of signatures in our scheme is logarithmic in the number of signers; we prove

  1. Signature Extension Using the MASC Algorithm

    Microsoft Academic Search

    R. G. Henderson

    1975-01-01

    A new signature extension method for use with LANDSAT data has been developed. The MASC (Multiplicative and Additive Signature Correction) algorithm uses an unsupervised clustering routine to gain relative information from two data sets. This information is then used to map the signatures derived from one data set onto the other data set. The MASC algorithm can be totally automated,

  2. Signature Extension Using the MASC Algorithm

    Microsoft Academic Search

    R. G. Henderson

    1976-01-01

    A new signature extension method for use with LANDSAT data has been developed. The MASC (Multiplicative and Additive Signature Correction) algorithm uses an unsupervised clustering routine to gain relative information from two data sets. This information is then used to map the signatures derived from one data set onto the other data set. The MASC algorithm can be totally automated,

  3. The Elliptic Curve Digital Signature Algorithm (ECDSA)

    E-print Network

    The Elliptic Curve Digital Signature Algorithm (ECDSA) Don Johnson and Alfred Menezes of Waterloo, Canada Emails: ¤ djohnson, amenezes, svanstone¥ @certicom.com Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA

  4. Signature Tree Generation for Polymorphic Worms

    E-print Network

    Xiao, Bin

    Signature Tree Generation for Polymorphic Worms Yong Tang, Bin Xiao, Member, IEEE, and Xicheng Lu generate accurate signatures for worms, especially polymorphic worms. In this paper, we propose a new NSG system--PolyTree, to defend against polymorphic worms. We observe that signatures from worms

  5. A Step Towards QC Blind Signatures

    E-print Network

    . This is the first blind signature scheme which can not be bro- ken by quantum computers via cryptanalyzing of blind signa- tures the situation in the (hypothetical) quantum computer world is thus quite desperate computational assumptions on which blind signatures can be based. We achieve blind signatures by a different

  6. The Limited Verifier Signature and Its Application

    Microsoft Academic Search

    Shunsuke ARAKI; Satoshi UEHARA; Kyoki IMAMURA

    1999-01-01

    SUMMARY In ordinary digital signature schemes, anyone can verify signatures with signer's public key. However it is not necessary for anyone to be convinced a justification of signer's dis- honorable message such as a bill. It is enough for a receiver only to convince outsiders of signature's justification if the signer does not execute a contract. On the other hand

  7. A Scala DSL for RETE-Based Runtime Verification

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    2013-01-01

    Runtime verification (RV) consists in part of checking execution traces against formalized specifications. Several systems have emerged, most of which support specification notations based on state machines, regular expressions, temporal logic, or grammars. The field of Artificial Intelligence (AI) has for an even longer period of time studied rule-based production systems, which at a closer look appear to be relevant for RV, although seemingly focused on slightly different application domains, such as for example business processes and expert systems. The core algorithm in many of these systems is the Rete algorithm. We have implemented a Rete-based runtime verification system, named LogFire (originally intended for offline log analysis but also applicable to online analysis), as an internal DSL in the Scala programming language, using Scala's support for defining DSLs. This combination appears attractive from a practical point of view. Our contribution is in part conceptual in arguing that such rule-based frameworks originating from AI may be suited for RV.

  8. The Ideal Online Course.

    ERIC Educational Resources Information Center

    Carr-Chellman, Alison; Duchastel, Philip

    2001-01-01

    Addresses key issues facing designers of Web-based university courses. Topics include online courses; the technologies involved; online study guides; assignments; online examples; course communications; interactive skill building; theoretical bases; and constructivism and instructional design. (Author/LRW)

  9. Online Staff Development.

    ERIC Educational Resources Information Center

    Pease, Pamela S.; Magnuson, Peter

    2003-01-01

    Describes the benefits for principals of online staff development for teachers. Sources of online courses and training include local and state departments of education, professional associations, colleges and universities, online universities, and commercial suppliers. (PKP)

  10. 21 CFR 11.70 - Signature/record linking.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 2010-04-01 false Signature/record linking. 11.70...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten...

  11. 25 CFR 82.7 - Notarization of petition signatures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Notarization of petition signatures. (a) Signatures to a petition must be authenticated...subscribe or acknowledge his/her signature before a notary public; ...Through having the collector of signatures appeal before a notary...

  12. 17 CFR 230.471 - Signatures to amendments.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  13. 17 CFR 230.402 - Number of copies; binding; signatures.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  14. 17 CFR 230.471 - Signatures to amendments.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  15. 25 CFR 82.7 - Notarization of petition signatures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Notarization of petition signatures. (a) Signatures to a petition must be authenticated...subscribe or acknowledge his/her signature before a notary public; ...Through having the collector of signatures appeal before a notary...

  16. 17 CFR 230.471 - Signatures to amendments.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  17. 17 CFR 230.402 - Number of copies; binding; signatures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  18. 12 CFR 563g.5 - Filing and signature requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed signatures. [54 FR 49641,...

  19. 25 CFR 82.7 - Notarization of petition signatures.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Notarization of petition signatures. (a) Signatures to a petition must be authenticated...subscribe or acknowledge his/her signature before a notary public; ...Through having the collector of signatures appeal before a notary...

  20. 25 CFR 82.7 - Notarization of petition signatures.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Notarization of petition signatures. (a) Signatures to a petition must be authenticated...subscribe or acknowledge his/her signature before a notary public; ...Through having the collector of signatures appeal before a notary...

  1. 12 CFR 563g.5 - Filing and signature requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed signatures. [54 FR 49641,...

  2. 17 CFR 230.402 - Number of copies; binding; signatures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  3. 21 CFR 11.70 - Signature/record linking.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 2014-04-01 false Signature/record linking. 11.70...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten...

  4. 21 CFR 11.70 - Signature/record linking.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 2012-04-01 false Signature/record linking. 11.70...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten...

  5. 21 CFR 11.70 - Signature/record linking.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 2011-04-01 false Signature/record linking. 11.70...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten...

  6. 12 CFR 563g.5 - Filing and signature requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed signatures. [54 FR 49641,...

  7. 25 CFR 82.7 - Notarization of petition signatures.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Notarization of petition signatures. (a) Signatures to a petition must be authenticated...subscribe or acknowledge his/her signature before a notary public; ...Through having the collector of signatures appeal before a notary...

  8. 12 CFR 563g.5 - Filing and signature requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed signatures. [54 FR 49641,...

  9. 17 CFR 230.471 - Signatures to amendments.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  10. 12 CFR 563g.5 - Filing and signature requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed signatures. [54 FR 49641,...

  11. 17 CFR 230.402 - Number of copies; binding; signatures.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  12. 17 CFR 230.402 - Number of copies; binding; signatures.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  13. 21 CFR 11.70 - Signature/record linking.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 2013-04-01 false Signature/record linking. 11.70...ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Records § 11.70 Signature/record linking. Electronic signatures and handwritten...

  14. 17 CFR 230.471 - Signatures to amendments.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...signed using either typed signatures or duplicated or facsimile versions of manual signatures. Where typed, duplicated or facsimile signatures are used, each signatory...filing shall manually sign a signature page or other document...

  15. A mobile network operator-independent mobile signature service

    Microsoft Academic Search

    Antonio Ruiz-Martínez; Juan Sánchez-Montesinos; Daniel Sánchez-Martínez

    2011-01-01

    Electronic signature (e-signature) is an important element in electronic commerce and government applications because it guarantees non-repudiation of transactions. E-signatures generated in a secure signature creation device can be considered legally equivalent to a handwritten signature. Mobile devices based on SIM\\/USIM cards, which are broadly extended, are the ideal devices to create these e-signatures (named mobile signatures or m-signatures). Furthermore,

  16. Efficient Extension of Standard Schnorr\\/RSA Signatures into Universal Designated-Verifier Signatures

    Microsoft Academic Search

    Ron Steinfeld; Huaxiong Wang; Josef Pieprzyk

    2004-01-01

    Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with ad- ditional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when

  17. Infrared signature studies of aerospace vehicles

    NASA Astrophysics Data System (ADS)

    Mahulikar, Shripad P.; Sonawane, Hemant R.; Arvind Rao, G.

    2007-10-01

    Infrared (IR) emissions from aircraft are used to detect, track, and lock-on to the target. MAN Portable Air Defence Systems (MANPADS) have emerged as a major cause of aircraft and helicopter loss. Therefore, IR signature studies are important to counter this threat for survivability enhancement, and are an important aspect of stealth technology. This paper reviews contemporary developments in this discipline, with particular emphasis on IR signature prediction from aerospace vehicles. The role of atmosphere in IR signature analysis, and relation between IR signature level and target susceptibility are illustrated. Also, IR signature suppression systems and countermeasure techniques are discussed, to highlight their effectiveness and implications in terms of penalties.

  18. Comparison of MMW ground vehicle signatures

    NASA Astrophysics Data System (ADS)

    Saylor, Ph. D., Annie V.; Kissell, Ann

    2006-05-01

    A continuing question asked of MMW target signature and model providers is the applicability of data from one frequency band to another. Recent monopulse Ka-band ground target signature measurements made by US Army programs provide an opportunity to do an in-depth comparison of signatures of several ground vehicles. The vehicles measured correspond to those measured at W-band by another Army program. This paper provides a comparison of vehicle signatures produced by models derived by AMRDEC from the measurements. The results have implications for missile programs that do not have an extensive measurement budget but require target signatures and models for algorithm development.

  19. Online Writery

    NSDL National Science Digital Library

    The Online Writery at the University of Missouri, Columbia, is a student-oriented writing and learning environment that includes both communication and information resources: e-mail, access to two MOOs , writing resources, teaching resources, and paperless papers. It is a place to write and read and talk, a place to learn stuff. It is a resource you can use whether you are writing for a class or not. These pages are made of the stuff writers (of any kind) need: information about writing, and opportunities to talk with other writers.

  20. Kidsource Online

    NSDL National Science Digital Library

    1997-01-01

    Kidsource Online is an extensive collection of information about raising children from newborns to adolescents. A sampling of the publications they've pulled together at the site includes "Children and Bilingualism" from the American Speech-Language-Hearing Association; "Testing Your Child's Hearing" by Carol Knightly, Pediatric Audiologist; and the Asthma and Allergy Foundation of America (AAFA) Provides Tips to Help Parents and Kids Cope with Allergy Season. Resources are organized under top-level categories of Newborns, Toddlers, Preschoolers, K-12, Education, Health, Recreation, Forums, Organizations, and Guide to Best Software, among others.

  1. Maths Online

    NSDL National Science Digital Library

    Maths Online is a site operated at the University of Vienna in Austria. Its purpose is to provide an interactive multimedia learning environment for high school and college level mathematics students and teachers. Its main section is the Gallery. Here, users can choose from a large selection of over twenty topics; each one has Java applets or other activities that demonstrate the associated principles. Interactive tests are also given that cover areas such as sets, functions, limiting processes, differentiation, and integration. The material presented on this site can be downloaded for offline use.

  2. Armadillo Online!

    NSDL National Science Digital Library

    Nixon, Joshua

    Are armadillos mammals? Find the answer to this question and many more at Armadillo Online!, a comprehensive armadillo website created by Joshua Nixon, a doctoral student in Zoology at Michigan State University. Nixon's site contains biological information on all twenty species of armadillo as well as photos of eight species. This website also includes a short Natural History article, "a short description of the scientific and medical research uses of the armadillo," a Fact File page, and more. Links to other armadillo information websites are provided as well.

  3. Design and implementation of remote online examination system based on integration framework

    Microsoft Academic Search

    Jia qiaojie; Li juanli; Wang yuanyuan; Liao kaihua; Yun liqing

    2011-01-01

    An online examination system was designed by using B\\/S mode multi-tier architecture based on Struts, Spring and Hibernate integration framework, which combined the education examination system with advanced network technology. The verification shows, this system can achieve the standardization and paperless of exam. Not only can it reflect the fairness of the examination, but save the resource and improve the

  4. Turbulence Modeling Verification and Validation

    NASA Technical Reports Server (NTRS)

    Rumsey, Christopher L.

    2014-01-01

    Computational fluid dynamics (CFD) software that solves the Reynolds-averaged Navier-Stokes (RANS) equations has been in routine use for more than a quarter of a century. It is currently employed not only for basic research in fluid dynamics, but also for the analysis and design processes in many industries worldwide, including aerospace, automotive, power generation, chemical manufacturing, polymer processing, and petroleum exploration. A key feature of RANS CFD is the turbulence model. Because the RANS equations are unclosed, a model is necessary to describe the effects of the turbulence on the mean flow, through the Reynolds stress terms. The turbulence model is one of the largest sources of uncertainty in RANS CFD, and most models are known to be flawed in one way or another. Alternative methods such as direct numerical simulations (DNS) and large eddy simulations (LES) rely less on modeling and hence include more physics than RANS. In DNS all turbulent scales are resolved, and in LES the large scales are resolved and the effects of the smallest turbulence scales are modeled. However, both DNS and LES are too expensive for most routine industrial usage on today's computers. Hybrid RANS-LES, which blends RANS near walls with LES away from walls, helps to moderate the cost while still retaining some of the scale-resolving capability of LES, but for some applications it can still be too expensive. Even considering its associated uncertainties, RANS turbulence modeling has proved to be very useful for a wide variety of applications. For example, in the aerospace field, many RANS models are considered to be reliable for computing attached flows. However, existing turbulence models are known to be inaccurate for many flows involving separation. Research has been ongoing for decades in an attempt to improve turbulence models for separated and other nonequilibrium flows. When developing or improving turbulence models, both verification and validation are important steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

  5. Motor current signature analysis during accelerated life testing of form wound induction motors

    Microsoft Academic Search

    Prabhakar Neti; Manoj R. Shah; Karim Younsi; John Krahn; Joe Yingneng Zhou; C. David Whitefield

    2010-01-01

    The work presented in this paper describes motor accelerated thermo-mechanical aging and helps set the stage for on-line monitoring\\/data analysis as an effective means to detect a fault as electrical machine develops it and identify its type in real time. As a first step towards this goal, Motor Current Signature Analysis (MCSA) is applied to the data collected during accelerated

  6. Trajectory based Behavior Analysis for User Verification

    E-print Network

    Chen, Sheng-Wei

    type without pre-defined identity. Keywords: Verification, Behavior analysis, Account security, Trajec design some illegal programs which learn decisions of humans, the behavior patterns are generallyTrajectory based Behavior Analysis for User Verification Hsing-Kuo Pao1 , Hong-Yi Lin1 , and Kuan

  7. Secure Fuzzy Vault Based Fingerprint Verification System

    E-print Network

    Verbauwhede, Ingrid

    Secure Fuzzy Vault Based Fingerprint Verification System Abstract--This paper describes a secure fingerprint verification system based on the fuzzy vault scheme, where the sensitive biometric template as the lock set for the fuzzy vault. We investigate the parameters of the fuzzy vault and the number

  8. Identity Verification, Control, and Aggression in Marriage

    ERIC Educational Resources Information Center

    Stets, Jan E.; Burke, Peter J.

    2005-01-01

    In this research we study the identity verification process and its effects in marriage. Drawing on identity control theory, we hypothesize that a lack of verification in the spouse identity (1) threatens stable self-meanings and interaction patterns between spouses, and (2) challenges a (nonverified) spouse's perception of control over the…

  9. Modular verification of software components in C

    Microsoft Academic Search

    Sagar Chaki; Edmund M. Clarke; Alex Groce; Somesh Jha; Helmut Veith

    2003-01-01

    We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompose the verification of large software system into subproblems of manageable complexity. The decomposition reflects the modularity in the software design. We use weak simulation as the notion of conformance between the program and its specification.

  10. Delivery verification in sequential and helical tomotherapy

    Microsoft Academic Search

    J. M. Kapatoes; G. H. Olivera; P. J. Reckwerdt; E. E. Fitchard; E. A. Schloesser; T. R. Mackie

    1999-01-01

    Conformal and conformal avoidance radiation therapy are new therapeutic techniques that are generally characterized by high dose gradients. The success of this kind of treatment relies on quality assurance procedures in order to verify the delivery of the treatment. A delivery verification technique should consider quality assurance procedures for patient positioning and radiation delivery verification. A methodology for radiation delivery

  11. Lunar Mass Spectrometer Design Verification Thermal

    E-print Network

    Rathbun, Julie A.

    the testing of the LMS Prototype model in the BxA Thermal Vacuum Test Chamber. 2. 0 INTRODUCTION The LunarLunar Mass Spectrometer Design Verification Thermal Vacuum Test LUNAR MASS SPECTROMETER DESIGN VERIFICATION THERMAL VACUUM TEST REPORT Prepared By: Approved By: NO. RI!V. MO. ATM-1097 1 40 PAGI OF DATI 4

  12. System Description: Embedding Verification into Microsoft Excel ?

    E-print Network

    Dennis, Louise

    System Description: Embedding Verification into Microsoft Excel ? Graham Collins 1 and Louise A toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial embedding verification into Mi­ crosoft Excel without inventing or re­implementing any existing theorem

  13. Taximeter verification using imprecise data from GPS

    Microsoft Academic Search

    José Villar; Adolfo Otero; José Otero; Luciano Sánchez

    2009-01-01

    Until recently, local governments in Spain were using machines with rolling cylinders for testing and verification of taximeters. However, the tyres condition can lead to errors in the process and the mechanical construction of the test equipment is not compatible with certain vehicles. Thus, a new measurement device should be designed. In our opinion, the verification of a taximeter will

  14. Ontology Verification with Repositories Michael GRNINGER a

    E-print Network

    Grüninger, Michael

    Ontology Verification with Repositories Michael GRÜNINGER a , Torsten HAHMANN b , Ali HASHEMI within a repository can be used to support ontology verification. We discuss the use of representation theorems and classification theorems to characterize the mod- els of an ontology, and then show how

  15. Supporting Formal Verification of Crosscutting Concerns

    Microsoft Academic Search

    Torsten Nelson; Donald D. Cowan; Paulo S. C. Alencar

    2001-01-01

    This paper presents an approach to formal verification of the proper- ties of systems composed of multiple crosscutting concerns. The approach mod- els concerns as sets of concurrent processes, and provides a method of compo- sition that mimics the composition operators of existing multiple-concern im- plementation languages. A case study demonstrates the composition process and shows how formal verification of

  16. Verification of logic programs and imperative programs

    E-print Network

    Naish, Lee

    Verification of logic programs and imperative programs Lee Naish Technical Report 90/6 (Revised May@cs.mu.OZ.AU Abstract This paper explores the relationship between verification of logic programs and imperative programs with the aim of uncovering the kinds of reasoning used to construct logic programs. We discuss

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION FOR INDOOR AIR PRODUCTS

    EPA Science Inventory

    The paper discusses environmental technology verification (ETV) for indoor air products. RTI is developing the framework for a verification testing program for indoor air products, as part of EPA's ETV program. RTI is establishing test protocols for products that fit into three...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION AND INDOOR AIR

    EPA Science Inventory

    The paper discusses environmental technology verification and indoor air. RTI has responsibility for a pilot program for indoor air products as part of the U.S. EPA's Environmental Technology Verification (ETV) program. The program objective is to further the development of sel...

  19. Validation, Verification, and Testing of Computer Software

    Microsoft Academic Search

    W. Richards Adrion; Martha A. Branstad; John C. Cherniavsky

    1982-01-01

    Software quahty is achieved through the apphcatlon of development techniques and the use of verification procedures throughout the development process Careful consideratmn of specific quality attmbutes and validation reqmrements leads to the selection of a balanced collection of review, analysis, and testing techmques for use throughout the life cycle. This paper surveys current verification, validation, and testing approaches and discusses

  20. Modelling and Verification of Layered Security Protocols

    E-print Network

    Jurjens, Jan

    Modelling and Verification of Layered Security Protocols: A Bank Application Software & Systems Engineering Informatics, TU Munich Germany Helia Hollmann Johannes GrĂĽnbauer, Jan JĂĽrjens, Guido Wimmel secaron AG Munich #12;Jan JĂĽrjens (TU Munich) et. al.: Verification of Layered Security Protocols 2 A Need

  1. Verification and validation of simulation models

    Microsoft Academic Search

    Jack P. C. Kleijnen

    1995-01-01

    This paper surveys verification and validation of models, especially simulation models in operations research. For verification it discusses 1) general good programming practice (such as modular programming), 2) checking intermediate simulation outputs through tracing and statistical testing per module, 3) statistical testing of final simulation outputs against analytical results, and 4) animation. For validation it discusses 1) obtaining real-worl data,

  2. TCAS Software Verification using Constraint Programming

    E-print Network

    Flener, Pierre

    1 TCAS Software Verification using Constraint Programming Arnaud Gotlieb INRIA Rennes ­ Bretagne proving for safety-critical C programs · TCAS (Traffic Anti-Collision Avoidance System) software is a real · Motivations · TCAS software verification · A Constraint Programming approach · Experimental results · Further

  3. Declarative Network Verification Anduo Wang1

    E-print Network

    Loo, Boon Thau

    settings. Keywords: declarative networking, network protocol verification, domain- specific languages-based query language called Network Datalog (NDlog). In prior work, it has been shown that traditional routingDeclarative Network Verification Anduo Wang1 Prithwish Basu2 Boon Thau Loo1 Oleg Sokolsky1 1

  4. Evolutionary Signatures of River Networks

    NASA Astrophysics Data System (ADS)

    Paik, K.

    2014-12-01

    River networks exhibit fractal characteristics and it has long been wondered how such regular patterns have been formed. This subject has been actively investigated mainly by two great schools of thoughts, i.e., chance and organization. Along this line, several fundamental questions have partially been addressed or remained. They include whether river networks pursue certain optimal conditions, and if so what is the ultimate optimality signature. Hydrologists have traditionally perceived this issue from fluvial-oriented perspectives. Nevertheless, geological processes can be more dominant in the formation of river networks in reality. To shed new lights on this subject, it is necessary to better understand complex feedbacks between various processes over different time scales, and eventually the emerging characteristic signature. Here, I will present highlights of earlier studies on this line and some noteworthy approaches being tried recently.

  5. Polarization signatures of airborne particulates

    NASA Astrophysics Data System (ADS)

    Raman, Prashant; Fuller, Kirk A.; Gregory, Don A.

    2013-07-01

    Exploratory research has been conducted with the aim of completely determining the polarization signatures of selected particulates as a function of wavelength. This may lead to a better understanding of the interaction between electromagnetic radiation and such materials, perhaps leading to the point detection of bio-aerosols present in the atmosphere. To this end, a polarimeter capable of measuring the complete Mueller matrix of highly scattering samples in transmission and reflection (with good spectral resolution from 300 to 1100 nm) has been developed. The polarization properties of Bacillus subtilis (surrogate for anthrax spore) are compared to ambient particulate matter species such as pollen, dust, and soot. Differentiating features in the polarization signatures of these samples have been identified, thus demonstrating the potential applicability of this technique for the detection of bio-aerosol in the ambient atmosphere.

  6. Signatures of a shadow biosphere.

    PubMed

    Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere. PMID:19292603

  7. Signatures of a Shadow Biosphere

    NASA Astrophysics Data System (ADS)

    Davies, Paul C. W.; Benner, Steven A.; Cleland, Carol E.; Lineweaver, Charles H.; McKay, Christopher P.; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere.

  8. Spamming botnets: signatures and characteristics

    Microsoft Academic Search

    Yinglian Xie; Fang Yu; Kannan Achan; Rina Panigrahy; Geoff Hulten; Ivan Osipkov

    2008-01-01

    In this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spamsignaturegeneration frame- work called AutoRE to detect botnet-based spam emails and botnet membership. AutoRE does not require pre-classified training data or white lists. Moreover, it outputs high quality regular expression signatures that can detect botnet

  9. Analysis of bistatic SAR signatures

    NASA Technical Reports Server (NTRS)

    Kasischke, E. S.; Larson, R. W.; Jackson, P. L.; Burns, B. A.

    1984-01-01

    Bistatic SAR imagery was collected over urban and rural areas using a range of bistatic angles. The expected signatures of various targets within these areas under bistatic and monostatic imaging geometry are discussed in terms of basic imaging concepts. An analysis of the SAR imagery collected gererally supports these expectations. Observed differences result primarily from surfaces having row structure and surfaces oriented so as to produce a specular return when imaged either monostatically or bistatically, but not both.

  10. Lattice-Based Blind Signatures

    Microsoft Academic Search

    Markus Rückert

    2010-01-01

    \\u000a Blind signatures (BS), introduced by Chaum, have become a cornerstone in privacy-oriented cryptography. Using hard lattice\\u000a problems, such as the shortest vector problem, as the basis of security has advantages over using the factoring or discrete\\u000a logarithm problems. For instance, lattice operations are more efficient than modular exponentiation and lattice problems remain\\u000a hard for quantum and subexponential-time adversaries. Generally speaking,

  11. Structural dynamics verification facility study

    NASA Technical Reports Server (NTRS)

    Kiraly, L. J.; Hirchbein, M. S.; Mcaleese, J. M.; Fleming, D. P.

    1981-01-01

    The need for a structural dynamics verification facility to support structures programs was studied. Most of the industry operated facilities are used for highly focused research, component development, and problem solving, and are not used for the generic understanding of the coupled dynamic response of major engine subsystems. Capabilities for the proposed facility include: the ability to both excite and measure coupled structural dynamic response of elastic blades on elastic shafting, the mechanical simulation of various dynamical loadings representative of those seen in operating engines, and the measurement of engine dynamic deflections and interface forces caused by alternative engine mounting configurations and compliances.

  12. Conformance Verification of Privacy Policies

    NASA Astrophysics Data System (ADS)

    Fu, Xiang

    Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

  13. SHIELD verification and validation report

    SciTech Connect

    Boman, C.

    1992-02-01

    This document outlines the verification and validation effort for the SHIELD, SHLDED, GEDIT, GENPRT, FIPROD, FPCALC, and PROCES modules of the SHIELD system code. Along with its predecessors, SHIELD has been in use at the Savannah River Site (SRS) for more than ten years. During this time the code has been extensively tested and a variety of validation documents have been issued. The primary function of this report is to specify the features and capabilities for which SHIELD is to be considered validated, and to reference the documents that establish the validation.

  14. Brain oscillatory signatures of motor tasks.

    PubMed

    Ramos-Murguialday, Ander; Birbaumer, Niels

    2015-06-01

    Noninvasive brain-computer-interfaces (BCI) coupled with prosthetic devices were recently introduced in the rehabilitation of chronic stroke and other disorders of the motor system. These BCI systems and motor rehabilitation in general involve several motor tasks for training. This study investigates the neurophysiological bases of an EEG-oscillation-driven BCI combined with a neuroprosthetic device to define the specific oscillatory signature of the BCI task. Controlling movements of a hand robotic orthosis with motor imagery of the same movement generates sensorimotor rhythm oscillation changes and involves three elements of tasks also used in stroke motor rehabilitation: passive and active movement, motor imagery, and motor intention. We recorded EEG while nine healthy participants performed five different motor tasks consisting of closing and opening of the hand as follows: 1) motor imagery without any external feedback and without overt hand movement, 2) motor imagery that moves the orthosis proportional to the produced brain oscillation change with online proprioceptive and visual feedback of the hand moving through a neuroprosthetic device (BCI condition), 3) passive and 4) active movement of the hand with feedback (seeing and feeling the hand moving), and 5) rest. During the BCI condition, participants received contingent online feedback of the decrease of power of the sensorimotor rhythm, which induced orthosis movement and therefore proprioceptive and visual information from the moving hand. We analyzed brain activity during the five conditions using time-frequency domain bootstrap-based statistical comparisons and Morlet transforms. Activity during rest was used as a reference. Significant contralateral and ipsilateral event-related desynchronization of sensorimotor rhythm was present during all motor tasks, largest in contralateral-postcentral, medio-central, and ipsilateral-precentral areas identifying the ipsilateral precentral cortex as an integral part of motor regulation. Changes in task-specific frequency power compared with rest were similar between motor tasks, and only significant differences in the time course and some narrow specific frequency bands were observed between motor tasks. We identified EEG features representing active and passive proprioception (with and without muscle contraction) and active intention and passive involvement (with and without voluntary effort) differentiating brain oscillations during motor tasks that could substantially support the design of novel motor BCI-based rehabilitation therapies. The BCI task induced significantly different brain activity compared with the other motor tasks, indicating neural processes unique to the use of body actuators control in a BCI context. PMID:25810484

  15. Space transportation system payload interface verification

    NASA Technical Reports Server (NTRS)

    Everline, R. T.

    1977-01-01

    The paper considers STS payload-interface verification requirements and the capability provided by STS to support verification. The intent is to standardize as many interfaces as possible, not only through the design, development, test and evaluation (DDT and E) phase of the major payload carriers but also into the operational phase. The verification process is discussed in terms of its various elements, such as the Space Shuttle DDT and E (including the orbital flight test program) and the major payload carriers DDT and E (including the first flights). Five tools derived from the Space Shuttle DDT and E are available to support the verification process: mathematical (structural and thermal) models, the Shuttle Avionics Integration Laboratory, the Shuttle Manipulator Development Facility, and interface-verification equipment (cargo-integration test equipment).

  16. Waste Online

    NSDL National Science Digital Library

    2004-01-01

    Sure enough, there is a good deal of "waste" online, so it's nice to learn about the Waste Online website which serves as a great repository for information about an entirely different set of waste-related matters. This British-based website has been funded by the New Opportunities Fund Digitise project. The project is overseen by Waste Watch, which is "the leading environmental charity dedicated to the reduction, reuse and recycling of household waste." First-time visitors can get started by clicking on "Wacky waste facts", which contains some basic facts about the nature of waste in the United Kingdom. In the same vicinity, visitors can dig deeper by looking into sections titled "The problem with waste", "Waste in the workplace", and "Waste at home". Moving on, the "Search our library" area allows guests to the site to look for specific items of interest related to dozens of topics, such as household recycling, office recycling, and metal recycling. Moving along, the "Information Sheets" area features almost two dozen fact sheets that can be used as guides to composting, battery recycling, and the history of waste.

  17. Online Instructors Must Be Online Students First.

    ERIC Educational Resources Information Center

    Beam, Terri; Zamora, Victor

    This document describes an online/hybrid course at Mt. San Antonio College (MSAC) (California) that gives faculty the experience of being a student in an online class. The course is 6 weeks long and the participating faculty members meet on campus only 3 times; the rest of the course work is conducted in an online mode. Each week's learning module…

  18. RISKIND verification and benchmark comparisons

    SciTech Connect

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  19. Automated UF6 Cylinder Enrichment Assay: Status of the Hybrid Enrichment Verification Array (HEVA) Project: POTAS Phase II

    SciTech Connect

    Jordan, David V.; Orton, Christopher R.; Mace, Emily K.; McDonald, Benjamin S.; Kulisek, Jonathan A.; Smith, Leon E.

    2012-06-01

    Pacific Northwest National Laboratory (PNNL) intends to automate the UF6 cylinder nondestructive assay (NDA) verification currently performed by the International Atomic Energy Agency (IAEA) at enrichment plants. PNNL is proposing the installation of a portal monitor at a key measurement point to positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until inspector arrival. This report summarizes the status of the research and development of an enrichment assay methodology supporting the cylinder verification concept. The enrichment assay approach exploits a hybrid of two passively-detected ionizing-radiation signatures: the traditional enrichment meter signature (186-keV photon peak area) and a non-traditional signature, manifested in the high-energy (3 to 8 MeV) gamma-ray continuum, generated by neutron emission from UF6. PNNL has designed, fabricated, and field-tested several prototype assay sensor packages in an effort to demonstrate proof-of-principle for the hybrid assay approach, quantify the expected assay precision for various categories of cylinder contents, and assess the potential for unsupervised deployment of the technology in a portal-monitor form factor. We refer to recent sensor-package prototypes as the Hybrid Enrichment Verification Array (HEVA). The report provides an overview of the assay signatures and summarizes the results of several HEVA field measurement campaigns on populations of Type 30B UF6 cylinders containing low-enriched uranium (LEU), natural uranium (NU), and depleted uranium (DU). Approaches to performance optimization of the assay technique via radiation transport modeling are briefly described, as are spectroscopic and data-analysis algorithms.

  20. Agronomy Journal Online

    NSDL National Science Digital Library

    The American Society of Agronomy has announced online availability of this journal, in conjunction with Stanford University's HighWire Press. Online full-text content for the Agronomy Journal begins with the July-August 1999 issue, with online abstracts from January-February 1998. Note that the free trial period for the online journal ends May 1, 2001.

  1. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  2. STATE OF CALIFORNIA VERIFICATION OF HIGH EER EQUIPMENT

    E-print Network

    STATE OF CALIFORNIA VERIFICATION OF HIGH EER EQUIPMENT CEC-CF-6R-MECH-23-HERS (Revised 08/09) CALIFORNIA ENERGY COMMISSION INSTALLATION CERTIFICATE CF-6R-MECH-23-HERS Verification of High EER Equipment 2009 Verification of High EER Equipment Procedures for verification of High EER Equipment are described

  3. Health Services Queen's University Policy on Verification of Illness

    E-print Network

    Abolmaesumi, Purang

    Health Services Queen's University Policy on Verification of Illness Health Counselling and Disability Services (HCDS) first developed a policy on issuing Verification of Illness (VOI) documentation Verification of Illness ("sick notes") 1. A "Verification of Illness" should only be required in situations

  4. HSIS: a BDD-based environment for formal verification

    Microsoft Academic Search

    Adnan Aziz; Felice Balarin; Szu-Tsung Cheng; Ramin Hojati; Timothy Kam; Sriram C. Krishnan; Rajeev K. Ranjan; Thomas R. Shiple; Vigyan Singhal; Serdar Tasiran; Huey-Yih Wang; Robert K. Brayton; Alberto L. Sangiovanni-Vincentelli

    1994-01-01

    Functional and timing verification are currently the bottlenecks in many design efforts. Simulation and emulation are extensively used for verification. Formal verification is now gaining acceptance in advanced design groups. This has been facilitated by the use of binary decision diagrams (BDDs). This paper describes the essential features of HSIS, a BDD-based environment for formal verification: 1. Open language design,

  5. Utterance verification for spontaneous Mandarin speech keyword spotting

    Microsoft Academic Search

    Liu Xin; BingXi Wang

    2001-01-01

    Utterance verification represents an important technology in the design of user-friendly speech recognition systems. In this paper we introduce four confidence measures of utterance verification for Mandarin speech keyword spotting. The spotting system adopts a two-stage strategy, with recognition followed by verification and the basic unit of the system is syllable. In the second stage, a keyword verification function with

  6. Requirements, Verification, and Compliance (RVC) Database Tool

    NASA Technical Reports Server (NTRS)

    Rainwater, Neil E., II; McDuffee, Patrick B.; Thomas, L. Dale

    2001-01-01

    This paper describes the development, design, and implementation of the Requirements, Verification, and Compliance (RVC) database used on the International Space Welding Experiment (ISWE) project managed at Marshall Space Flight Center. The RVC is a systems engineer's tool for automating and managing the following information: requirements; requirements traceability; verification requirements; verification planning; verification success criteria; and compliance status. This information normally contained within documents (e.g. specifications, plans) is contained in an electronic database that allows the project team members to access, query, and status the requirements, verification, and compliance information from their individual desktop computers. Using commercial-off-the-shelf (COTS) database software that contains networking capabilities, the RVC was developed not only with cost savings in mind but primarily for the purpose of providing a more efficient and effective automated method of maintaining and distributing the systems engineering information. In addition, the RVC approach provides the systems engineer the capability to develop and tailor various reports containing the requirements, verification, and compliance information that meets the needs of the project team members. The automated approach of the RVC for capturing and distributing the information improves the productivity of the systems engineer by allowing that person to concentrate more on the job of developing good requirements and verification programs and not on the effort of being a "document developer".

  7. Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes

    E-print Network

    by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under not necessarily represent the official views of the HHS. Supported in part by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under contract FA8750

  8. Quantum signatures of Chimera states

    E-print Network

    V. M. Bastidas; I. Omelchenko; A. Zakharova; E. Schöll; T. Brandes

    2015-05-11

    Chimera states are complex spatiotemporal patterns in networks of identical oscillators, characterized by the coexistence of synchronized and desynchronized dynamics. Here we propose to extend the phenomenon of chimera states to the quantum regime, and uncover intriguing quantum signatures of these states. We calculate the quantum fluctuations about semiclassical trajectories and demonstrate that chimera states in the quantum regime can be characterized by bosonic squeezing, weighted quantum correlations, and measures of mutual information. Our findings reveal the relation of chimera states to quantum information theory, and give promising directions for experimental realization of chimera states in quantum systems.

  9. Satellite signatures in SLR observations

    NASA Technical Reports Server (NTRS)

    Appleby, G. M.

    1993-01-01

    We examine the evidence for the detection of satellite-dependent signatures in the laser range observations obtained by the UK single-photon Satellite Laser Ranging (SLR) System models of the expected observation distributions from Ajisai and Lageos are developed from the published satellite spread functions and from the characteristics of the SLR System and compared with the observations. The effects of varying return strengths are discussed using the models and by experimental observations of Ajisai, during which a range of return levels from single to multiple photons is achieved. The implications of these results for system-dependent center for mass corrections are discussed.

  10. Spectroscopic signature for ferroelectric ice

    NASA Astrophysics Data System (ADS)

    Wójcik, Marek J.; G?ug, Maciej; Boczar, Marek; Boda, ?ukasz

    2014-09-01

    Various forms of ice exist within our galaxy. Particularly intriguing type of ice - ‘ferroelectric ice' was discovered experimentally and is stable in temperatures below 72 K. This form of ice can generate enormous electric fields and can play an important role in planetary formation. In this letter we present Car-Parrinello simulation of infrared spectra of ferroelectric ice and compare them with spectra of hexagonal ice. Librational region of the spectra can be treated as spectroscopic signature of ice XI and can be of help to identify ferroelectric ice in the Universe.

  11. Observational Signatures of Magnetic Reconnection

    NASA Technical Reports Server (NTRS)

    Savage, Sabrina

    2014-01-01

    Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

  12. Liquefied Natural Gas (LNG) dispenser verification device

    NASA Astrophysics Data System (ADS)

    Xiong, Maotao; Yang, Jie-bin; Zhao, Pu-jun; Yu, Bo; Deng, Wan-quan

    2013-01-01

    The composition of working principle and calibration status of LNG (Liquefied Natural Gas) dispenser in China are introduced. According to the defect of weighing method in the calibration of LNG dispenser, LNG dispenser verification device has been researched. The verification device bases on the master meter method to verify LNG dispenser in the field. The experimental results of the device indicate it has steady performance, high accuracy level and flexible construction, and it reaches the international advanced level. Then LNG dispenser verification device will promote the development of LNG dispenser industry in China and to improve the technical level of LNG dispenser manufacture.

  13. AGIS: Towards automatic generation of infection signatures

    Microsoft Academic Search

    Zhuowei Lit; XiaoFeng Wangt; Zhenkai Liang; Michael K. Reiter

    2008-01-01

    Abstract An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that characterize the behavior of malware residing on a system. To this end, we develop AGIS, the first host-based technique that detects infections by novel malware,and automatically generates an infection signature of the malware. AGIS monitors

  14. Exploring Signature Schemes with Subliminal Channel

    Microsoft Academic Search

    Fangguo Zhang; Byoungcheon Lee; Kwangjo Kim

    2003-01-01

    The subliminal channel in a cryptographic protocol such as an authentication system or a signature scheme provides an additional channel from the sender to an authorized receiver and can't be read by any unauthorized receiver. In this paper, we rstly show that Hess's ID-Based signature scheme in SAC'02 can provide digital signature with the broadband and narrowband subliminal channels. Secondly,

  15. Metric Signature Transitions in Optical Metamaterials

    E-print Network

    Igor I. Smolyaninov; Evgenii E. Narimanov

    2010-07-07

    We demonstrate that the extraordinary waves in indefinite metamaterials experience (- - + +) effective metric signature. During a metric signature change transition in such a metamaterial, a Minkowski space-time is "created" together with large number of particles populating this space-time. Such metamaterial models provide a table top realization of metric signature change events suggested to occur in Bose-Einstein condensates and quantum gravity theories.

  16. Comparison of MMW ground vehicle signatures

    Microsoft Academic Search

    Saylor Annie V; Ann Kissell

    2006-01-01

    A continuing question asked of MMW target signature and model providers is the applicability of data from one frequency band to another. Recent monopulse Ka-band ground target signature measurements made by US Army programs provide an opportunity to do an in-depth comparison of signatures of several ground vehicles. The vehicles measured correspond to those measured at W-band by another Army

  17. Process signatures in metal stamping: Basic concepts

    Microsoft Academic Search

    M. Karima; N. Chandrasekaran; W. Tse

    1989-01-01

    The article establishes the basic concepts relating to a novel approach for representing grid analysis data termed “process\\u000a signatures.” The process signature is the shape of the strain envelope, which depicts the strain state of contiguous elements\\u000a in a stamping, corresponding to a given forming depth. Apart from inheriting unique process characteristics, the signatures\\u000a represent the total response of a

  18. Verification of NASA Emergent Systems

    NASA Technical Reports Server (NTRS)

    Rouff, Christopher; Vanderbilt, Amy K. C. S.; Truszkowski, Walt; Rash, James; Hinchey, Mike

    2004-01-01

    NASA is studying advanced technologies for a future robotic exploration mission to the asteroid belt. This mission, the prospective ANTS (Autonomous Nano Technology Swarm) mission, will comprise of 1,000 autonomous robotic agents designed to cooperate in asteroid exploration. The emergent properties of swarm type missions make them powerful, but at the same time are more difficult to design and assure that the proper behaviors will emerge. We are currently investigating formal methods and techniques for verification and validation of future swarm-based missions. The advantage of using formal methods is their ability to mathematically assure the behavior of a swarm, emergent or otherwise. The ANT mission is being used as an example and case study for swarm-based missions for which to experiment and test current formal methods with intelligent swam. Using the ANTS mission, we have evaluated multiple formal methods to determine their effectiveness in modeling and assuring swarm behavior.

  19. Seismic verification of underground explosions

    SciTech Connect

    Glenn, L.A.

    1985-06-01

    The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper.

  20. NUMERICAL VERIFICATION OF EQUILIBRIUM CHEMISTRY

    SciTech Connect

    Piro, Markus [Royal Military College of Canada; Lewis, Brent [Royal Military College of Canada; Thompson, Dr. William T. [Royal Military College of Canada; Simunovic, Srdjan [ORNL; Besmann, Theodore M [ORNL

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  1. Entanglement verification via nonlinear witnesses

    E-print Network

    Megan Agnew; Jeff Z. Salvail; Jonathan Leach; Robert W. Boyd

    2012-10-03

    The controlled generation of entangled states and their subsequent detection are integral aspects of quantum information science. In this work, we analyse the application of nonlinear witnesses to the verification of entanglement, and we demonstrate experimentally that nonlinear witnesses perform significantly better than linear witnesses. Specifically, we demonstrate that a single non- linear entanglement witness is able to determine to a high degree of certainty that a mixed state containing orbital angular momentum (OAM) entanglement of specific forms is entangled for any relative phase and sufficient fidelity. This is a significant improvement over linear witnesses, which cannot provide the same level of performance. We envisage that nonlinear witnesses and our method of state preparation will have further uses in areas of quantum science such as superdense coding and quantum key distribution.

  2. Automated claim and payment verification.

    PubMed

    Segal, Mark J; Morris, Susan; Rubin, James M O

    2002-01-01

    Since the start of managed care, there has been steady deterioration in the ability of physicians, hospitals, payors, and patients to understand reimbursement and the contracts and payment policies that drive it. This lack of transparency has generated administrative costs, confusion, and mistrust. It is therefore essential that physicians, hospitals, and payors have rapid access to accurate information on contractual payment terms. This article summarizes problems with contract-based reimbursement and needed responses by medical practices. It describes an innovative, Internet-based claims and payment verification service, Phynance, which automatically verifies the accuracy of all claims and payments by payor, contract and line item. This service enables practices to know and apply the one, true, contractually obligated allowable. The article details implementation costs and processes and anticipated return on investment. The resulting transparency improves business processes throughout health care, increasing efficiency and lowering costs for physicians, hospitals, payors, employers--and patients. PMID:12122814

  3. Task-specific style verification

    NASA Astrophysics Data System (ADS)

    Pataki, Norbert; Cséri, Tamás; Szügyi, Zalán

    2012-09-01

    Programming antipatterns are commonly used patterns that make the code unnecessary complex and unmaintainable. However, beginner programmers such as students, often use them. Usage of antipatterns should be eliminated from source code. Many antipatterns can be detected at compilation-time with an appropriate parser tool. In this paper we argue for a new lint-like tool that does detect typical programming antipatterns, and it is extensible to task-specific verifications. This tool mainly developed to evaluate students' programs, however it can be used in industrial projects as well. Our approach based on pattern matching on abstract syntax tree provided by Clang parser. We present our description language that specifies the antipatterns.

  4. Intrusion signature creation via clustering anomalies

    NASA Astrophysics Data System (ADS)

    Hendry, Gilbert R.; Yang, Shanchieh J.

    2008-03-01

    Current practices for combating cyber attacks typically use Intrusion Detection Systems (IDSs) to detect and block multistage attacks. Because of the speed and impacts of new types of cyber attacks, current IDSs are limited in providing accurate detection while reliably adapting to new attacks. In signature-based IDS systems, this limitation is made apparent by the latency from day zero of an attack to the creation of an appropriate signature. This work hypothesizes that this latency can be shortened by creating signatures via anomaly-based algorithms. A hybrid supervised and unsupervised clustering algorithm is proposed for new signature creation. These new signatures created in real-time would take effect immediately, ideally detecting new attacks. This work first investigates a modified density-based clustering algorithm as an IDS, with its strengths and weaknesses identified. A signature creation algorithm leveraging the summarizing abilities of clustering is investigated. Lessons learned from the supervised signature creation are then leveraged for the development of unsupervised real-time signature classification. Automating signature creation and classification via clustering is demonstrated as satisfactory but with limitations.

  5. Novel Quantum Proxy Signature without Entanglement

    NASA Astrophysics Data System (ADS)

    Xu, Guang-bao

    2015-01-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  6. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    NASA Astrophysics Data System (ADS)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  7. Thermal AGN Signatures in Blazars

    E-print Network

    Eric S. Perlman; Brett Addison; Markos Georganopoulos; Brian Wingert; Philip Graff

    2008-07-15

    Long ignored in blazars because of the dominance of the beamed radiation from the jet, the topic of thermal emissions in these objects is just beginning to be explored. While this emission is weak in most blazars compared to the dominant nonthermal jet components, there is a growing body of evidence that suggests that thermal emission is observable even in the most highly beamed objects. The emitting regions, which can include the accretion disk as well as the torus, are key parts of the central engine which also powers the jets. They also may be of critical importance in helping us decide between unified scheme models. We will review the observational evidence for thermal emissions in blazars, with an emphasis on recent work, and the spectral and variability characteristics that have been observed. The majority of the evidence for thermal emission in blazars (now observed in several objects) has come as a result of multiwavelength campaigns, where the object showed a clear bump in the optical-UV in a faint state. However, evidence exists from other avenues as well, including both purely spectral and variability based arguments as well as statistical analyses of large samples of objects. We will also discuss the impact of thermal emission on an object's overall SED, including its Comptonized signatures. Finally, we will assess the current standing of unified scheme models as respects thermal signatures and the prospects for detecting thermal emission with new telescopes and missions, and further utilizing it as a probe of the central engine of blazars.

  8. Collider signatures of Goldstone bosons

    NASA Astrophysics Data System (ADS)

    Cheung, Kingman; Keung, Wai-Yee; Yuan, Tzu-Chiang

    2014-01-01

    Recently Weinberg suggested that Goldstone bosons arising from the spontaneous breakdown of some global hidden symmetries can interact weakly in the early Universe and account for a fraction of the effective number of neutrino species Neff, which has been reported persistently 1? away from its expected value of three. In this work, we study in some details a number of experimental constraints on this interesting idea based on the simplest possibility of a global U(1), as studied by Weinberg. We work out the decay branching ratios of the associated light scalar field ? and suggest a possible collider signature at the Large Hadron Collider. In some corners of the parameter space, the scalar field ? can decay into a pair of pions with a branching ratio of order O(1)% while the rest is mostly a pair of Goldstone bosons. The collider signature would be gluon fusion into the standard model Higgs boson gg?H or associated production with a W gauge boson qq stretchy="false">Ż'?HW, followed by H????(??)(??) where ? is the Goldstone boson.

  9. Marcus Hutter -1 -Online Prediction Bayes versus Experts Online Prediction

    E-print Network

    Hutter, Marcus

    Marcus Hutter - 1 - Online Prediction ­ Bayes versus Experts Online Prediction: Bayes versus;Marcus Hutter - 2 - Online Prediction ­ Bayes versus Experts Table of Contents · Sequential/online prediction: Setup · Bayesian Sequence Prediction (Bayes) · Prediction with Expert Advice (PEA) · PEA Bounds

  10. 9 CFR 417.8 - Agency verification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part...

  11. MAMA Software Features: Quantification Verification Documentation-1

    SciTech Connect

    Ruggiero, Christy E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Porter, Reid B. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-05-21

    This document reviews the verification of the basic shape quantification attributes in the MAMA software against hand calculations in order to show that the calculations are implemented mathematically correctly and give the expected quantification results.

  12. Runtime verification of object lifetime specifications

    E-print Network

    Benjamin, Zev (Zev A.)

    2009-01-01

    This thesis reports on the implementation of a runtime verification system for object lifetime specifications. This system is used to explore and evaluate the expressiveness object lifetime specifications. Object lifetime ...

  13. CPS: Verification and Certification John Rushby

    E-print Network

    Rajkumar, Ragunathan "Raj"

    CPS: Verification and Certification John Rushby Computer Science Laboratory SRI International Menlo will be pervasive, high impact on society · Requires assurance to stakeholders that systems do what they want

  14. VERIFICATION OF GLOBAL CLIMATE CHANGE MITIGATION TECHNOLOGIES

    EPA Science Inventory

    This is a continuation of independent performance evaluations of environmental technologies under EPA's Environmental Technology Verification Program. Emissions of some greenhouse gases, most notably methane. can be controlled profitably now, even in the absence of regulations. ...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  16. Environmental Technology Verification Program (ETV) Policy Compendium

    EPA Science Inventory

    The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

  17. Mutual features for robust identification and verification

    Microsoft Academic Search

    Heiko Claussen; Justinian Rosca; Robert I. Damper

    2008-01-01

    Noisy or distorted video\\/audio training sets represent constant challenges in automated identification and verification tasks. We propose the method of Mutual Interdependence Analy- sis (MIA) to extract \\

  18. 9 CFR 417.8 - Agency verification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...Animals and Animal Products FOOD SAFETY AND INSPECTION...ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification...verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the...

  19. A relational framework for bounded program verification

    E-print Network

    Dennis, Gregory D. (Gregory David), 1980-

    2009-01-01

    All software verification techniques, from theorem proving to testing, share the common goal of establishing a program's correctness with both (1) a high degree of confidence and (2) a low cost to the user, two criteria ...

  20. Fluorescence Imaging for Nuclear Arms Control Verification

    E-print Network

    Feener, Jessica S

    2014-08-14

    GEANT 4 was used to model the experimental setups and to compare with the experimental results. The results verified the proof-of-concept of fluorescence imaging for use in nuclear arms control treaty verification. Fluorescence imaging would be most...

  1. Existence Verification for Singular Zeros of Nonlinear

    E-print Network

    Kearfott, R. Baker

    verification May, 1999 SIAM--4 #12; Singularities When the Jacobi matrix F 0 (x \\Lambda ) is singular, computations as above cannot possibly prove existence and uniqueness. For such systems, the best

  2. A watermarking-based medical image integrity control system and an image moment signature for tampering characterization.

    PubMed

    Coatrieux, Gouenou; Huang, Hui; Shu, Huazhong; Luo, Limin; Roux, Christian

    2013-11-01

    In this paper, we present a medical image integrity verification system to detect and approximate local malevolent image alterations (e.g., removal or addition of lesions) as well as identifying the nature of a global processing an image may have undergone (e.g., lossy compression, filtering, etc.). The proposed integrity analysis process is based on nonsignificant region watermarking with signatures extracted from different pixel blocks of interest, which are compared with the recomputed ones at the verification stage. A set of three signatures is proposed. The first two devoted to detection and modification location are cryptographic hashes and checksums, while the last one is issued from the image moment theory. In this paper, we first show how geometric moments can be used to approximate any local modification by its nearest generalized 2-D Gaussian. We then demonstrate how ratios between original and recomputed geometric moments can be used as image features in a classifier-based strategy in order to determine the nature of a global image processing. Experimental results considering both local and global modifications in MRI and retina images illustrate the overall performances of our approach. With a pixel block signature of about 200 bit long, it is possible to detect, to roughly localize, and to get an idea about the image tamper. PMID:24240724

  3. Poynter Online

    NSDL National Science Digital Library

    Founded in 1975, the Poynter Institute was created by Nelson Poynter, who served as chairman of the St. Petersburg Times and the Congressional Quarterly. Over the past three decades, the organization has worked to train new cadres of journalists through a variety of intensive seminars and educational formats. Poynter Online provides interested parties access to a wide range of articles and columns created by well-regarded members of their organization and other working journalists from around the United States. Visitors can view job postings in the field, look over career columns, and even submit questions to columnists. Along with this vocationally oriented material, there are sections such as â??diversityâ?ť, â??photojournalismâ?ť, and â??ethicsâ?ť, which contain insightful pieces on these subjects. As might be expected given the general trends in media, there are a number of helpful blogs here that address writing for general audiences, ethical considerations for journalists, and so on. For aspiring journalists and those currently working in the profession, this site is tremendously useful.

  4. Anonymous signature scheme Chunbo Ma and Jun Ao

    E-print Network

    Anonymous signature scheme Chunbo Ma and Jun Ao School of Information and Communication, Guilin. In order to hide the identity of a signer, an anonymous signature scheme is presented in this paper the signature to its source is impossible. The proposed anonymous signature is similarly to ring signature

  5. Integration of pattern matching into verification flows

    NASA Astrophysics Data System (ADS)

    Desouky, Tamer; Saeed, Omnia

    2012-03-01

    The OPC verification problems tend to get more complicated in terms of coding complexity and TAT (turnaround time) increase as the gate length get smaller. A well known example of coding complexity is waivers (OPC verification errors that are priory known to be safe on silicon) detection and elimination. Potential locations for hot spots extraction as well could be a time consuming process if executed on full chips. And finally, OPC verification flows run time is sometimes even larger than OPC runs. In this work, we introduce the use of pattern matching as a potential solution for many verification flows problems. Pattern matching offers a great TAT advantage since it is a DRC based process, thus it is much faster than time consuming LITHO operations. Also, its capability to match geometries directly and operability on many layers simultaneously eliminates complex SVRF coding from our flows. Firstly, we will use the pattern matching in order not to run OPC verification on basic designs identified by the OPC engineer to be error free, which is a very useful technique especially in Memory designs and improves the run time. Then, it will be used to detect waivers, which is hard to code, while running verification flows and eliminate it from the output, and consequently the reviewer will not be distracted by it and concentrate on real errors. And finally, it will be used to detect hot spots in a separate very quick run before standard LITHO verification run which gives the designer/OPC engineer the opportunity to fix design/OPC issues without waiting for lengthy verification flows, and that in turns further improves TAT.

  6. EMP simulation for hardness verification testing

    NASA Astrophysics Data System (ADS)

    Beilfuss, J.; Capobianco, J.; Gray, R.

    A serious problem in the development of NEMP (nuclear electromagnetic pulse)-hardened systems is lack of adequate verification testing of the system hardness. The authors describe the development and use of a direct injection system designed specifically for threat-level hardness verification testing of complex systems with a number of electronic shelters interconnected by cables. Details of the theory and design of the synchronous injection system are presented. Experimental results related to the validity of the simulation technique are included.

  7. Computational Soundness Results for ProVerif

    Microsoft Academic Search

    Michael Backes; Esfandiar Mohammadi; Tim Ruffing

    2014-01-01

    Dolev-Yao models of cryptographic operations constitute the foundation of many successful verification tools for security protocols, such as the protocol verifier ProVerif. Research over the past decade has shown that many of these symbolic abstractions are computationally sound, i.e., the absence of attacks against the abstraction entails the security of suitable cryptographic realizations. Most of these computational soundness (CS) results,

  8. The NPARC Alliance Verification and Validation Archive

    NASA Technical Reports Server (NTRS)

    Slater, John W.; Dudek, Julianne C.; Tatum, Kenneth E.

    2000-01-01

    The NPARC Alliance (National Project for Applications oriented Research in CFD) maintains a publicly-available, web-based verification and validation archive as part of the development and support of the WIND CFD code. The verification and validation methods used for the cases attempt to follow the policies and guidelines of the ASME and AIAA. The emphasis is on air-breathing propulsion flow fields with Mach numbers ranging from low-subsonic to hypersonic.

  9. Approaches to Formal Verification of Security Protocols

    Microsoft Academic Search

    Suvansh Lal; Mohit Jain; Vikrant Chaplot

    2011-01-01

    In recent times, many protocols have been proposed to provide security for\\u000avarious information and communication systems. Such protocols must be tested\\u000afor their functional correctness before they are used in practice. Application\\u000aof formal methods for verification of security protocols would enhance their\\u000areliability thereby, increasing the usability of systems that employ them.\\u000aThus, formal verification of security protocols

  10. A verification library for multibody simulation software

    NASA Technical Reports Server (NTRS)

    Kim, Sung-Soo; Haug, Edward J.; Frisch, Harold P.

    1989-01-01

    A multibody dynamics verification library, that maintains and manages test and validation data is proposed, based on RRC Robot arm and CASE backhoe validation and a comparitive study of DADS, DISCOS, and CONTOPS that are existing public domain and commercial multibody dynamic simulation programs. Using simple representative problems, simulation results from each program are cross checked, and the validation results are presented. Functionalities of the verification library are defined, in order to automate validation procedure.

  11. Measurement and Verification (M&V)

    E-print Network

    Masuda, H

    2014-01-01

    Workshop on the Continuous Commissioning® Process Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko Masuda, Juan-Carlos Baltazar, PhD, PE Ahmet Ugursal, PhD Clean Air Through Energy Efficiency (CATEE) Conference, Dallas, Texas. November 18, 2014... 5. Continuous Commissioning Measures 6. Measurement and Verification 2 ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Measurement and Verification (M&V) Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko...

  12. The Internet and clinical trials: background, online resources, examples and issues. | accrualnet.cancer.gov

    Cancer.gov

    The Internet is increasingly being used to improve clinical trial knowledge and awareness and facilitate participant recruitment. Online clinical trial registries connect potential clinical trial participants with research teams. Individual clinical trial Web sites provide easy-to-understand information to the public. Potential participants can be screened using online questionnaires, and enrollment and consent forms can be made available for download or digital signature.

  13. Signatures of Collisionless Magnetic Reconnection

    NASA Astrophysics Data System (ADS)

    Rogers, B. N.

    2002-12-01

    Recent numerical studies of collisionless magnetic reconnection, associated for example with the GEM Reconnection Challenge project, have stimulated widespread efforts to compare the predictions of reconnection simulations to observations in the magnetosphere and laboratory reconnection experiments. In addition to the reconnection rate, the simulations predict the structure of the magnetic field, plasma flows, and other profiles across the reconnection zone. In the case of a reversed-field configuration (no out-of-plane guide field prior to reconnection), for example, a now well-known theoretical prediction is the formation of a localized, spatially antisymmetric (ie, quadrupole) structure in the out-of-plane magnetic field. Evidence supporting this prediction was recently obtained through spacecraft observations of reversed-field configurations in the magnetotail [Oieroset et. al. 2001] and at the subsolar magnetopause [Mozer et. al. 2002], which linked the plasma flows generated by a reconnection event with the expected quadrupole signature in the magnetic field. Such quadrupole structures have now come to be viewed as a hallmark signature of reconnection in collisionless plasmas, and have become a target for studies of other reconnecting systems seeking to test the predictions of the reconnection simulations. The main point of this paper is to show that a quadrupole magnetic field signature is not in fact a generic feature of collisionless reconnecting systems. Across the wide range of configurations found in the Earth's magnetopause or laboratory reconnection experiments, for example, in which a significant guide field component (comparable to or exceeding the reconnecting component) is often present, the symmetry of the profiles exhibited by the simulations can be very different from the reversed-field case. The perturbation in the out-of-plane magnetic field generated by nonlinear reconnection, for example, becomes fully symmetric (rather than antisymmetric) across the reconnection zone in the strong guide-field limit. The spatial symmetry of the plasma pressure, which is symmetric in the absence of a guide field, also reverses in the presence of a strong guide field. The physical processes and important parameters that govern this transition will be discussed.

  14. MMW, IR, and SAM signature collection

    Microsoft Academic Search

    Fred Reichstetter; Mary E. Ward

    2002-01-01

    During the development of smart weapon's seeker\\/sensors, it is imperative to collect high quality signatures of the targets the system is intended to engage. These signatures are used to support algorithm development so the system can find and engage the targets of interest in the specific kill area on the target. Englin AFB FL is the AF development center for

  15. Chemical and Physical Signatures for Microbial Forensics

    Microsoft Academic Search

    John B. Cliff; Helen W. Kreuzer; Christopher J. Ehrhardt; David S. Wunschel

    2012-01-01

    Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special

  16. Cyclostationary Signatures in Practical Cognitive Radio Applications

    Microsoft Academic Search

    Paul D. Sutton; Keith E. Nolan; Linda E. Doyle

    2008-01-01

    We define a cyclostationary signature as a feature which may be intentionally embedded in a digital communications signal, detected through cyclostationary analysis and used as a unique identifier. The purpose of this paper is to demonstrate how cyclostationary signatures can be exploited to overcome a number of the challenges associated with network coordination in emerging cognitive radio applications and spectrum

  17. 12 CFR 269b.731 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...and Banking 4 2012-01-01 2012-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking ...OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be signed...

  18. 12 CFR 269b.731 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...and Banking 4 2013-01-01 2013-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking ...OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be signed...

  19. 43 CFR 3102.4 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...Interior 2 2014-10-01 2014-10-01 false Signature. 3102.4 Section 3102.4 Public Lands: Interior...AND GAS LEASING Qualifications of Lessees § 3102.4 Signature. (a) The original of an offer or bid shall be...

  20. 12 CFR 269b.731 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...and Banking 3 2011-01-01 2011-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking ...OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be signed...

  1. 43 CFR 3102.4 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...Interior 2 2012-10-01 2012-10-01 false Signature. 3102.4 Section 3102.4 Public Lands: Interior...AND GAS LEASING Qualifications of Lessees § 3102.4 Signature. (a) The original of an offer or bid shall be...

  2. 43 CFR 3102.4 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...Interior 2 2013-10-01 2013-10-01 false Signature. 3102.4 Section 3102.4 Public Lands: Interior...AND GAS LEASING Qualifications of Lessees § 3102.4 Signature. (a) The original of an offer or bid shall be...

  3. 43 CFR 3102.4 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...Interior 2 2011-10-01 2011-10-01 false Signature. 3102.4 Section 3102.4 Public Lands: Interior...AND GAS LEASING Qualifications of Lessees § 3102.4 Signature. (a) The original of an offer or bid shall be...

  4. 12 CFR 269b.731 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...and Banking 3 2010-01-01 2010-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking ...OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be signed...

  5. 12 CFR 269b.731 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...and Banking 4 2014-01-01 2014-01-01 false Signature. 269b.731 Section 269b.731 Banks and Banking ...OF UNFAIR LABOR PRACTICES General Rules § 269b.731 Signature. The original of each document filed shall be signed...

  6. SECTION 3 -CONDITIONS SECTION 4 -SIGNATURES

    E-print Network

    Tobar, Michael

    that changes to FTE (ie regular hours) should be managed through a reduction in FTE and not through purchased a reimbursement for purchased leave not taken you must notify HR Services, in writing, of the period you have been. No. Employee signature (please print) Date (dd/mm/yy) Employee name (please print) Signature

  7. Passive sonar signature estimation using bispectral techniques

    Microsoft Academic Search

    R. K. Lennartsson; J. W. C. Robinson; L. Persson; M. J. Hinich; S. McLaughlin

    2000-01-01

    An important task in underwater passive sonar signal processing is the determination of target signatures based on the narrow-band signal content in the received signal. To achieve good classification performance it is important to be able to separate the different sources (e.g. engine, hull and drive) present in the signature, and to determine the distinct frequency coupling pattern of each

  8. Verifiable Encryption of Digital Signatures and Applications

    E-print Network

    Amir, Yair

    Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make, ver- ifiable encryption schemes appeared in [Ateniese 1999] and the certified email protocol appeared

  9. Polygraph: Automatically Generating Signatures for Polymorphic Worms

    Microsoft Academic Search

    James Newsome; Brad Karp; Dawn Xiaodong Song

    2005-01-01

    It is widely believed that content-signature-based intru- sion detection systems (IDSes) are easily evaded by poly- morphic worms, which vary their payload on every infec- tion attempt. In this paper, we present Polygraph, a sig- nature generation system that successfully produces signa- tures that match polymorphic worms. Polygraph gener- ates signatures that consist of multiple disjoint content sub- strings. In

  10. Allergy Attack Against Automatic Signature Generation

    Microsoft Academic Search

    Simon P. Chung; Aloysius K. Mok

    2006-01-01

    Research in systems that automatically generate signatures to filter out zero-day worm instances at perimeter defense has received a lot of attention recently. While a well known problem with these sys- tems is that the signatures generated are usually not very useful against polymorphic worms, we shall in this paper investigate a different, and potentially more serious problem facing automatic

  11. Polygraph: Automatically Generating Signatures for Polymorphic Worms

    E-print Network

    Song, Dawn

    Polygraph: Automatically Generating Signatures for Polymorphic Worms James Newsome Carnegie Mellon- morphic worms, which vary their payload on every infec- tion attempt. In this paper, we present Polygraph. Polygraph gener- ates signatures that consist of multiple disjoint content sub- strings. In doing so

  12. Conditional health monitoring using vibration signatures

    Microsoft Academic Search

    Gary G. Yen; Kuo-Chung Lin

    1999-01-01

    Condition health monitoring of dynamic systems based on vibration signatures has generally relied upon Fourier based analysis as a means of translating vibration signals in time domain into the frequency domain. The wavelet packet transform is introduced as an alternative means of extracting time-frequency information from vibration signatures. Moreover, with the aid of statistical based feature selection criteria, many feature

  13. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-04-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  14. Lattice-based Blind Signatures Markus Ruckert

    E-print Network

    ¨at Darmstadt Department of Computer Science Cryptography and Computeralgebra Germany Abstract. Blind signatures. Keywords. Blind signatures, post-quantum, lattices, provable security, leakage resilience This work comput- ers as a metaphor for these future developments. In the quantum-age, the cryptographic

  15. Infrared ship signature analysis and optimisation

    Microsoft Academic Search

    Filip Neele

    2005-01-01

    The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and superstructure are cooled with dedicated spray systems, in addition to special paint systems that are

  16. Does Social Work Have a Signature Pedagogy?

    ERIC Educational Resources Information Center

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  17. Anonymous Signature Schemes Guomin Yang1

    E-print Network

    Anonymous Signature Schemes Guomin Yang1 , Duncan S. Wong1 , Xiaotie Deng1 , and Huaxiong Wang2 1, it is generally unclear or suspicious of whether a signature scheme itself can guarantee the anonymity of the signer. In this paper, we give some affirmative answers to it. We formally define the signer anonymity

  18. Recent advances at the European Microwave Signature Laboratory

    NASA Astrophysics Data System (ADS)

    Nesti, Giuseppe; Sieber, Alois J.; de Grandi, Gianfranco D.; Fortuny-Guasch, Joaquim; Ohlmer, E.

    1994-12-01

    The European Microwave Signature Laboratory (EMSL), recently built at the Joint Research Center of the Commission of European Communities (CEC) at Ispra, is a state-of-the-art experimental facility which provides unique opportunities in terms of measurement capabilities and data processing. The laboratory is mainly devoted to polarimetric radar measurements aimed to complement air- and spaceborne remote sensing experiments by providing stable and reproducible environmental conditions and flexible operational modes for well-controlled experiments. As one of the European Large Facilities, the EMSL is open to collaboration with all interested research groups both within the European Union and outside. The EMSL anechoic chamber has an hemispherical shape with a diameter of 20 m and hosts two independently movable TX/RX modules plus a set of fixed receiving antennae. A positioner with linear and rotary movements is used to transport and accurately move the target under test inside the chamber. The selection of different geometrical configurations (mono-, bi-, multi-static) and measurement modes (scatterometric, 2D and 3D imaging) is made possible by this special architecture of the facility. In this paper, first a description of the main components of the laboratory is given, then the performances of the measurement system are discussed on the basis of the results of verification tests (Stability, Sensitivity, Antenna pattern characterization) and finally a selection is presented of the most significant outcomes of the experiments undertaken until now.

  19. Holographic signatures of cosmological singularities.

    PubMed

    Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T

    2014-09-19

    To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N=4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function. PMID:25279620

  20. Holographic Signatures of Cosmological Singularities

    NASA Astrophysics Data System (ADS)

    Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T.

    2014-09-01

    To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N =4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

  1. Connecting to On-line Data

    NASA Astrophysics Data System (ADS)

    Eichhorn, G.; Astrophysics Datacenter Executive Committee (ADEC)

    2004-05-01

    The Astrophysics Datacenter Executive Committee (ADEC) is coordinating the development of a system to facilitate the linking to on-line data. This system has three components: 1. Unique dataset identifiers. 2. A verification system for identifiers. 3. Permanent links to on-line data sets. 1. The ADEC has agreed on a naming scheme for data sets that allows for the unique identification of any data set. The ADEC data centers will clearly mark their data with these identifiers to allow the generation of links to these data. 2. Each data center has a utility that can check whether a data set identifier is a valid identifier at that center. A central verifier allows third parties access to these individual verifiers through a single portal. 3. The central verifier also provides permanent links to data sets through a central link forwarding system. This makes it possible to move data sets between data centers while maintaining the permanent links. The ADEC plans to first use this system to implement the linking from the literature to on-line data in a collaboration with the AAS and the University of Chicago Press for the AAS journals.

  2. SELECTIVE SERVICE VERIFICATION Return this form

    E-print Network

    Amin, S. Massoud

    States before age 26 on a valid non-immigrant visa, and remained in that status until age 26. Attach, open in Adobe Reader (free at Adobe.com). Please add the required signature(s) in blue or black ink

  3. GHG MITIGATION TECHNOLOGY PERFORMANCE EVALUATIONS UNDERWAY AT THE GHG TECHNOLOGY VERIFICATION CENTER

    EPA Science Inventory

    The paper outlines the verification approach and activities of the Greenhouse Gas (GHG) Technology Verification Center, one of 12 independent verification entities operating under the U.S. EPA-sponsored Environmental Technology Verification (ETV) program. (NOTE: The ETV program...

  4. Signatures of mutational processes in human cancer

    PubMed Central

    Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Aparicio, Samuel A.J.R.; Behjati, Sam; Biankin, Andrew V.; Bignell, Graham R.; Bolli, Niccolo; Borg, Ake; Břrresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P.; Caldas, Carlos; Davies, Helen R.; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A.; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinsk, Marcin; Jäger, Natalie; Jones, David T.W.; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R.; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C.; Nakamura, Hiromi; Northcott, Paul A.; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V.; Puente, Xose S.; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L.; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N.; Span, Paul N.; Teague, Jon W.; Totoki, Yasushi; Tutt, Andrew N.J.; Valdés-Mas, Rafael; van Buuren, Marit M.; van ’t Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R.; Zucman-Rossi, Jessica; Futreal, P. Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M.; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M.; Campbell, Peter J.; Stratton, Michael R.

    2013-01-01

    All cancers are caused by somatic mutations. However, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here, we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, kataegis, is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer with potential implications for understanding of cancer etiology, prevention and therapy. PMID:23945592

  5. Real time gamma-ray signature identifier

    SciTech Connect

    Rowland, Mark (Alamo, CA); Gosnell, Tom B. (Moraga, CA); Ham, Cheryl (Livermore, CA); Perkins, Dwight (Livermore, CA); Wong, James (Dublin, CA)

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  6. Signatures of mutational processes in human cancer.

    PubMed

    Alexandrov, Ludmil B; Nik-Zainal, Serena; Wedge, David C; Aparicio, Samuel A J R; Behjati, Sam; Biankin, Andrew V; Bignell, Graham R; Bolli, Niccolň; Borg, Ake; Břrresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P; Caldas, Carlos; Davies, Helen R; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinski, Marcin; Imielinsk, Marcin; Jäger, Natalie; Jones, David T W; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C; Nakamura, Hiromi; Northcott, Paul A; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V; Puente, Xose S; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N; Span, Paul N; Teague, Jon W; Totoki, Yasushi; Tutt, Andrew N J; Valdés-Mas, Rafael; van Buuren, Marit M; van 't Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R; Zucman-Rossi, Jessica; Futreal, P Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M; Campbell, Peter J; Stratton, Michael R

    2013-08-22

    All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single cancer class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, 'kataegis', is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer, with potential implications for understanding of cancer aetiology, prevention and therapy. PMID:23945592

  7. Metabolic Signatures of Bacterial Vaginosis

    PubMed Central

    Morgan, Martin T.; Fiedler, Tina L.; Djukovic, Danijel; Hoffman, Noah G.; Raftery, Daniel; Marrazzo, Jeanne M.

    2015-01-01

    ABSTRACT Bacterial vaginosis (BV) is characterized by shifts in the vaginal microbiota from Lactobacillus dominant to a microbiota with diverse anaerobic bacteria. Few studies have linked specific metabolites with bacteria found in the human vagina. Here, we report dramatic differences in metabolite compositions and concentrations associated with BV using a global metabolomics approach. We further validated important metabolites using samples from a second cohort of women and a different platform to measure metabolites. In the primary study, we compared metabolite profiles in cervicovaginal lavage fluid from 40 women with BV and 20 women without BV. Vaginal bacterial representation was determined using broad-range PCR with pyrosequencing and concentrations of bacteria by quantitative PCR. We detected 279 named biochemicals; levels of 62% of metabolites were significantly different in women with BV. Unsupervised clustering of metabolites separated women with and without BV. Women with BV have metabolite profiles marked by lower concentrations of amino acids and dipeptides, concomitant with higher levels of amino acid catabolites and polyamines. Higher levels of the signaling eicosanoid 12-hydroxyeicosatetraenoic acid (12-HETE), a biomarker for inflammation, were noted in BV. Lactobacillus crispatus and Lactobacillus jensenii exhibited similar metabolite correlation patterns, which were distinct from correlation patterns exhibited by BV-associated bacteria. Several metabolites were significantly associated with clinical signs and symptoms (Amsel criteria) used to diagnose BV, and no metabolite was associated with all four clinical criteria. BV has strong metabolic signatures across multiple metabolic pathways, and these signatures are associated with the presence and concentrations of particular bacteria. PMID:25873373

  8. Irma multisensor predictive signature model

    NASA Astrophysics Data System (ADS)

    Watson, John S.; Flynn, David S.; Wellfare, Michael R.; Richards, Mike; Prestwood, Lee

    1995-06-01

    The Irma synthetic signature model was one of the first high resolution synthetic infrared (IR) target and background signature models to be developed for tactical air-to-surface weapon scenarios. Originally developed in 1980 by the Armament Directorate of the Air Force Wright Laboratory (WL/MN), the Irma model was used exclusively to generate IR scenes for smart weapons research and development. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser channel. This two channel version, Irma 3.0, was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model which supported correlated frame-to-frame imagery. This and other improvements were released in Irma 2.2. Recently, Irma 3.2, a passive IR/millimeter wave (MMW) code, was completed. Currently, upgrades are underway to include an active MMW channel. Designated Irma 4.0, this code will serve as a cornerstone of sensor fusion research in the laboratory from 6.1 concept development to 6.3 technology demonstration programs for precision guided munitions. Several significant milestones have been reached in this development process and are demonstrated. The Irma 4.0 software design has been developed and interim results are available. Irma is being developed to facilitate multi-sensor smart weapons research and development. It is currently in distribution to over 80 agencies within the U.S. Air Force, U.S. Army, U.S. Navy, ARPA, NASA, Department of Transportation, academia, and industry.

  9. Signature of the Simplicial Supermetric

    E-print Network

    James B. Hartle; Warner A. Miller; Ruth M. Williams

    1997-03-06

    We investigate the signature of the Lund-Regge metric on spaces of simplicial three-geometries which are important in some formulations of quantum gravity. Tetrahedra can be joined together to make a three-dimensional piecewise linear manifold. A metric on this manifold is specified by assigning a flat metric to the interior of the tetrahedra and values to their squared edge-lengths. The subset of the space of squared edge-lengths obeying triangle and analogous inequalities is simplicial configuration space. We derive the Lund-Regge metric on simplicial configuration space and show how it provides the shortest distance between simplicial three-geometries among all choices of gauge inside the simplices for defining this metric (Regge gauge freedom). We show analytically that there is always at least one physical timelike direction in simplicial configuration space and provide a lower bound on the number of spacelike directions. We show that in the neighborhood of points in this space corresponding to flat metrics there are spacelike directions corresponding to gauge freedom in assigning the edge-lengths. We evaluate the signature numerically for the simplicial configuration spaces based on some simple triangulations of the three-sphere (S^3) and three-torus (T^3). For the surface of a four-simplex triangulation of S^3 we find one timelike direction and all the rest spacelike over all of the simplicial configuration space. For the triangulation of T^3 around flat space we find degeneracies in the simplicial supermetric as well as a few gauge modes corresponding to a positive eigenvalue. Moreover, we have determined that some of the negative eigenvalues are physical, i.e. the corresponding eigenvectors are not generators of diffeomorphisms. We compare our results with the known properties of continuum superspace.

  10. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2008; 18:125148

    E-print Network

    Perkins, Richard A.

    ; multi-way testing; software testing Correspondence to: Yu Lei, Department of Computer ScienceSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2008; 18-way testing, consider an elementary software system consisting of three Boolean parameters. Denote the two

  11. TOXLINE (TOXICOLOGY INFORMATION ONLINE)

    EPA Science Inventory

    TOXLINE? (TOXicology information onLINE) are the National Library of Medicines extensive collection of online bibliographic information covering the pharmacological, biochemical, physiological, and toxicological effects of drugs and other chemicals. TOXLINE and TOXLINE65 together...

  12. 12 CFR 197.5 - Filing and signature requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed...

  13. 12 CFR 197.5 - Filing and signature requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed...

  14. 12 CFR 390.414 - Filing and signature requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...an attached manually signed signature page which authorizes the...typed or printed beneath the signature; (ii) State the capacity or capacities in which the signature is provided; (iii) Provide...signed, bear typed or printed...

  15. 43 CFR 1.5 - Signature to constitute certificate.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 2010-10-01 false Signature to constitute certificate. 1.5...DEPARTMENT OF THE INTERIOR § 1.5 Signature to constitute certificate. When...in practice before the Department, his signature shall constitute his...

  16. 48 CFR 204.101 - Contracting officer's signature.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal... 204.101 Contracting officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR...

  17. 48 CFR 204.101 - Contracting officer's signature.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Contracting officer's signature. 204.101 Section 204.101 Federal... 204.101 Contracting officer's signature. Follow the procedures at PGI 204.101 for signature of contract documents. [71 FR...

  18. 43 CFR 1.5 - Signature to constitute certificate.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 2011-10-01 false Signature to constitute certificate. 1.5...DEPARTMENT OF THE INTERIOR § 1.5 Signature to constitute certificate. When...in practice before the Department, his signature shall constitute his...

  19. 22 CFR 92.28 - Signature of affiant on affidavit.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 2010-04-01 2010-04-01 false Signature of affiant on affidavit. 92.28 Section...SERVICES Specific Notarial Acts § 92.28 Signature of affiant on affidavit. The signature of the affiant is indispensable. The...

  20. 43 CFR 1.5 - Signature to constitute certificate.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2011-10-01 true Signature to constitute certificate. 1.5...DEPARTMENT OF THE INTERIOR § 1.5 Signature to constitute certificate. When...in practice before the Department, his signature shall constitute his...