Sample records for online signature verification

  1. Online Signature Verification using Dynamic Time Warping

    Microsoft Academic Search

    Siew Keng Chan; Yong Haur Tay

    2004-01-01

    Biometrics authentication has been gaining popularity among the industries that highly incorporate securities in their daily activities. Signature verification is one of the biometrics authentication techniques which has been used for years and publicly accepted. The ease of use of signature verification coupled with lower cost and technology advances in tablet technologies, signature verification has been adapted into applications such

  2. Glove-based approach to online signature verification.

    PubMed

    Kamel, Nidal S; Sayeed, Shohel; Ellis, Grant A

    2008-06-01

    Utilizing the multiple degrees of freedom offered by the data glove for each finger and the hand, a novel on-line signature verification system using the Singular Value Decomposition (SVD) numerical tool for signature classification and verification is presented. The proposed technique is based on the Singular Value Decomposition in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, so the effective dimensionality of A can be reduced. Having modeled the data glove signature through its r-principal subspace, signature authentication is performed by finding the angles between the different subspaces. A demonstration of the data glove is presented as an effective high-bandwidth data entry device for signature verification. This SVD-based signature verification technique is tested and its performance is shown to be able to recognize forgery signatures with a false acceptance rate of less than 1.2%. PMID:18421114

  3. On-line signature verification method by Laplacian spectral analysis and dynamic time warping

    NASA Astrophysics Data System (ADS)

    Li, Changting; Peng, Liangrui; Liu, Changsong; Ding, Xiaoqing

    2013-12-01

    As smartphones and touch screens are more and more popular, on-line signature verification technology can be used as one of personal identification means for mobile computing. In this paper, a novel Laplacian Spectral Analysis (LSA) based on-line signature verification method is presented and an integration framework of LSA and Dynamic Time Warping (DTW) based methods for practical application is proposed. In LSA based method, a Laplacian matrix is constructed by regarding the on-line signature as a graph. The signature's writing speed information is utilized in the Laplacian matrix of the graph. The eigenvalue spectrum of the Laplacian matrix is analyzed and used for signature verification. The framework to integrate LSA and DTW methods is further proposed. DTW is integrated at two stages. First, it is used to provide stroke matching results for the LSA method to construct the corresponding graph better. Second, the on-line signature verification results by DTW are fused with that of the LSA method. Experimental results on public signature database and practical signature data on mobile phones proved the effectiveness of the proposed method.

  4. Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis

    PubMed Central

    Iranmanesh, Vahab; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Arigbabu, Olasimbo Ayodeji; Malallah, Fahad Layth

    2014-01-01

    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%. PMID:25133227

  5. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  6. Improvement of On-line Signature Verification Based on Gradient Features

    NASA Astrophysics Data System (ADS)

    Kawazoe, Yumiko; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

    This paper proposes a new on-line signature verification technique which employs gradient features and a pooled within-covariance matrix of training samples not only of the user but also of the others. Gradient features are extracted from a signature image reflecting the velocity of pen movement as the grayscale so that both on-line and off-line features are exploited. All training samples of different signatures collected in design stage are pooled together with the user's samples and used for learning within-individual variation matrix to reduce required sample size of the user to minimum number. The result of evaluation test shows that the proposed technique improves the verification accuracy by 4.9% when user's sample of size three is pooled with samples with others. This result shows that the samples of different signatures are useful for training within-individual variation of a specific user.

  7. A new online signature verification system based on combining Mellin transform, MFCC and neural network

    Microsoft Academic Search

    Asghar Fallah; Mahdi Jamaati; Ali Soleamani

    2011-01-01

    In this work a new online signature verification system based on Mellin transform in combination with an MFCC is presented. In the first step we extract signals x(t) and y(t) from each signature and then the novel pre-processing algorithm by Mellin transform is performed. The key property of Mellin transform is the scale invariance which makes the features insensitive to

  8. An on-line human signature verification system

    E-print Network

    Simsek, Burc A

    2000-01-01

    and several forged signatures. Fig. 2 shows this situation where several authentic signature samples (classes) overlap in a sample feature space. Ideally, features should be designed such that there is no overlap between classes. It would then be an easy...

  9. Fusion of Local and Regional Approaches for On-Line Signature Verification

    E-print Network

    Autonoma de Madrid, Universidad

    an automatic assessment of identity is crucial. Within biometrics, automatic signature verification has been the performance against skilled forgeries. The two methods are compared following the protocol defined in the Sig nature of these two approaches. 1 Introduction The goal of biometrics is to infer the identity of people

  10. Machine verification of traced signatures

    NASA Astrophysics Data System (ADS)

    Krishnan, Ganapathy; Jones, David E.

    1991-03-01

    The handwritten signature is the most widely employed source of secure identification in the United States, especially for cashing checks, and verifying credit card transactions. Currently, all signature verification is based on visual inspection by a teller or a store clerk. Previous successful techniques for forgery detection have primarily been on-line techniques. This research is an extension of the first author's work on forgery detection and describes an algorithm to detect forgeries perpetrated by using a tracing paper or a glass plate. This algorithm is very successful when used in conjunction with the algorithm developed earlier by the first author.

  11. An On-Line Signature Verification System Based on Fusion of Local and Global Information

    E-print Network

    Autonoma de Madrid, Universidad

    Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de Cantoblanco, C/ Francisco Tomas y Valiente 11, 28049 Madrid, Spain {julian.fierrez,jaime.lopez,javier.ortega}@uam.es 2 Biometric on the large MCYT signature database (330 signers, 16500 signatures) for random and skilled forgeries. Feature

  12. Application of hidden Markov models for signature verification

    Microsoft Academic Search

    L. Yang; B. K. Widjaja; R. Prasad

    1995-01-01

    This paper describes a technique for on-line signature verification using Hidden Markov Models (HMMs). Signatures are captured and digitized in real-time using a graphic tablet. For each signature a HMM is constructed using a set of sample signatures described by the normalized directional angle function of the distance along the signature trajectory. The Baum-Welch algorithm is used for both training

  13. Retail applications of signature verification

    NASA Astrophysics Data System (ADS)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  14. Generic Verification Protocol for Verification of Online Turbidimeters

    EPA Science Inventory

    This protocol provides generic procedures for implementing a verification test for the performance of online turbidimeters. The verification tests described in this document will be conducted under the Environmental Technology Verification (ETV) Program. Verification tests will...

  15. Online fingerprint verification.

    PubMed

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications. PMID:17365425

  16. Constructing a High Performance Signature Verification System Using a GA Method

    Microsoft Academic Search

    Xuhua Yang; Takeshi Furuhashi; Kenzo Obata; Yoshiki Uchikawa

    1995-01-01

    To realize a high-peformance automatic signature verification system, it is necessary that the selected features are potentially difficult to imitate. One of the advantages of online signature verification is that the virtual strokes which are left in the pen-up situation can be obtained. These virtual strokes can be memorized by the computer but are invisible to humans. So there is

  17. FIR signature verification system characterizing dynamics of handwriting features

    NASA Astrophysics Data System (ADS)

    Thumwarin, Pitak; Pernwong, Jitawat; Matsuura, Takenobu

    2013-12-01

    This paper proposes an online signature verification method based on the finite impulse response (FIR) system characterizing time-frequency characteristics of dynamic handwriting features. First, the barycenter determined from both the center point of signature and two adjacent pen-point positions in the signing process, instead of one pen-point position, is used to reduce the fluctuation of handwriting motion. In this paper, among the available dynamic handwriting features, motion pressure and area pressure are employed to investigate handwriting behavior. Thus, the stable dynamic handwriting features can be described by the relation of the time-frequency characteristics of the dynamic handwriting features. In this study, the aforesaid relation can be represented by the FIR system with the wavelet coefficients of the dynamic handwriting features as both input and output of the system. The impulse response of the FIR system is used as the individual feature for a particular signature. In short, the signature can be verified by evaluating the difference between the impulse responses of the FIR systems for a reference signature and the signature to be verified. The signature verification experiments in this paper were conducted using the SUBCORPUS MCYT-100 signature database consisting of 5,000 signatures from 100 signers. The proposed method yielded equal error rate (EER) of 3.21% on skilled forgeries.

  18. Handwritten Signature Verification Using Complementary Statistical Models

    Microsoft Academic Search

    Alan McCabe; Jarrod Trevathan

    2009-01-01

    This paper describes a system for performing handwritten signature verification using complementary sta- tistical models. The system analyses both the static features of a signature (e.g., shape, slant, size), and its dynamic fea- tures (e.g., velocity, pen-tip pressure, timing) to form a judg- ment about the signer's identity. This approach's novelty lies in combining output from existing Neural Network and

  19. The Graphology Applied to Signature Verification

    Microsoft Academic Search

    Luiz S. OLIVEIRA; Edson JUSTINO; Cinthia FREITAS; Robert SABOURIN

    In this paper we discuss automatic signature verification in the context of the graphology. Graphology is claimed to be useful for everything from understanding health issues, morality and past experiences to hidden talents, and mental problems. It is not restricted to this, though. Forensic document examiners use the concepts of graphology to examine handwriting in order to detect authenticity or

  20. An individuality model for online signatures using global Fourier descriptors

    NASA Astrophysics Data System (ADS)

    Kholmatov, Alisher; Yanikoglu, Berrin

    2008-03-01

    The discriminative capability of a biometric is based on its individuality/uniqueness and is an important factor in choosing a biometric for a large-scale deployment. Individuality studies have been carried out rigorously for only certain biometrics, in particular fingerprint and iris, while work on establishing handwriting and signature individuality has been mainly on feature level. In this study, we present a preliminary individuality model for online signatures using the Fourier domain representation of the signature. Using the normalized Fourier coefficients as global features describing the signature, we derive a formula for the probability of coincidentally matching a given signature. Estimating model parameters from a large database and making certain simplifying assumptions, the probability of two arbitrary signatures to match in 13 of the coefficients is calculated as 4.7x10 -4. When compared with the results of a verification algorithm that parallels the theoretical model, the results show that the theoretical model fits the random forgery test results fairly well. While online signatures are sometimes dismissed as not very secure, our results show that the probability of successfully guessing an online signature is very low. Combined with the fact that signature is a behavioral biometric with adjustable complexity, these results support the use of online signatures for biometric authentication.

  1. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION

    E-print Network

    Autonoma de Madrid, Universidad

    -Fernandeza, M C. Fairhurstb, J Fierrez' andJ Ortega-Garciaa. aBiometric Recognition Group - ATVS, Escuela]. random and skilled forgeries. We use for our experiments Signature verification systems have been shown with a long history, involving the this paper, signature legibility and type are assessed by a hu

  2. A STROKE BASED ALGORITHM FOR DYNAMIC SIGNATURE VERIFICATION

    E-print Network

    Adler, Andy

    A STROKE BASED ALGORITHM FOR DYNAMIC SIGNATURE VERIFICATION Tong Qu, Abdulmotaleb El Saddik, Andy a novel stroke-based algorithm for DSV. An algorithm is developed to convert sample signatures of individual strokes. Individual strokes are identified by finding the points where there is a 1) decrease

  3. Discriminative Features Mining for Offline Handwritten Signature Verification

    NASA Astrophysics Data System (ADS)

    Neamah, Karrar; Mohamad, Dzulkifli; Saba, Tanzila; Rehman, Amjad

    2014-03-01

    Signature verification is an active research area in the field of pattern recognition. It is employed to identify the particular person with the help of his/her signature's characteristics such as pen pressure, loops shape, speed of writing and up down motion of pen, writing speed, pen pressure, shape of loops, etc. in order to identify that person. However, in the entire process, features extraction and selection stage is of prime importance. Since several signatures have similar strokes, characteristics and sizes. Accordingly, this paper presents combination of orientation of the skeleton and gravity centre point to extract accurate pattern features of signature data in offline signature verification system. Promising results have proved the success of the integration of the two methods.

  4. On-Line Fingerprint Verification

    Microsoft Academic Search

    Anil K. Jain; Lin Hong; Ruud M. Bolle

    1997-01-01

    Abstract: We describe the design and implementation of an onlinefingerprint verification system which operates in twostages: (i) minutia extraction and (ii) minutia matching. Animproved minutia extraction algorithm that is much fasterand more accurate than our earlier algorithm [8] has beenimplemented. For minutia matching, an alignment-basedelastic matching algorithm has been developed. This algorithmis capable of finding the correspondences between inputminutiae and

  5. Markov Model-Based Handwritten Signature Verification

    Microsoft Academic Search

    Alan Mccabe; Jarrod Trevathan

    2008-01-01

    Biometric security devices are now permeating all facets of modern society. All manner of items including passports, driver's licences and laptops now incorporate some form of biometric data and\\/or authentication device. As handwritten signatures have long been considered the most natural method of verifying one's identity, it makes sense that pervasive computing environments try to capitalise on the use of

  6. Applications of a hologram watermarking protocol: aging-aware biometric signature verification and time validity check with personal documents

    NASA Astrophysics Data System (ADS)

    Vielhauer, Claus; Croce Ferri, Lucilla

    2003-06-01

    Our paper addresses two issues of a biometric authentication algorithm for ID cardholders previously presented namely the security of the embedded reference data and the aging process of the biometric data. We describe a protocol that allows two levels of verification, combining a biometric hash technique based on handwritten signature and hologram watermarks with cryptographic signatures in a verification infrastructure. This infrastructure consists of a Trusted Central Public Authority (TCPA), which serves numerous Enrollment Stations (ES) in a secure environment. Each individual performs an enrollment at an ES, which provides the TCPA with the full biometric reference data and a document hash. The TCPA then calculates the authentication record (AR) with the biometric hash, a validity timestamp, and a document hash provided by the ES. The AR is then signed with a cryptographic signature function, initialized with the TCPA's private key and embedded in the ID card as a watermark. Authentication is performed at Verification Stations (VS), where the ID card will be scanned and the signed AR is retrieved from the watermark. Due to the timestamp mechanism and a two level biometric verification technique based on offline and online features, the AR can deal with the aging process of the biometric feature by forcing a re-enrollment of the user after expiry, making use of the ES infrastructure. We describe some attack scenarios and we illustrate the watermarking embedding, retrieval and dispute protocols, analyzing their requisites, advantages and disadvantages in relation to security requirements.

  7. An Off-line Signature Verification System Based on Fusion of Local and Global Information

    Microsoft Academic Search

    Julian Fiérrez-aguilar; N. Alonso-hermira; G. Moreno-marquez; Javier Ortega-garcia

    2004-01-01

    An off-line signature verification system based on fusion of two machine experts is presented. One of the experts is based on global image analysis and a statistical distance measure while the second one is based on local image analysis and Hidden Markov Models. Experimental results are given on a subcorpus of the large MCYT signature database for random and skilled

  8. Analyzing Personalized Policies for Online Biometric Verification

    PubMed Central

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M.

    2014-01-01

    Motivated by India’s nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident’s biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India’s program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India’s biometric program. The mean delay is sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32–41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident. PMID:24787752

  9. Analyzing personalized policies for online biometric verification.

    PubMed

    Sadhwani, Apaar; Yang, Yan; Wein, Lawrence M

    2014-01-01

    Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess similarity scores for 10 fingerprints and two irises between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio (i.e., the likelihood of observing these scores if the resident is genuine divided by the corresponding likelihood if the resident is an imposter) to decide whether a resident is genuine or an imposter. We also consider two-stage policies, where additional images are acquired in a second stage if the first-stage results are inconclusive. Using performance data from India's program, we develop a new probabilistic model for the joint distribution of the 12 similarity scores and find near-optimal individualized strategies that minimize the false reject rate (FRR) subject to constraints on the false accept rate (FAR) and mean verification delay for each resident. Our individualized policies achieve the same FRR as a policy that acquires (and optimally fuses) 12 biometrics for each resident, which represents a five (four, respectively) log reduction in FRR relative to fingerprint (iris, respectively) policies previously proposed for India's biometric program. The mean delay is [Formula: see text] sec for our proposed policy, compared to 30 sec for a policy that acquires one fingerprint and 107 sec for a policy that acquires all 12 biometrics. This policy acquires iris scans from 32-41% of residents (depending on the FAR) and acquires an average of 1.3 fingerprints per resident. PMID:24787752

  10. Backpropagation Networks Prototype For Off-Line Signature Verification

    Microsoft Academic Search

    Rasha Abbas

    Signatures are used everyday to authorise the transfer of funds of millions of people.Bank checks, credit cards and legal documents all require our signatures. Forgeries in suchtransactions cost millions of dollars each year. By forgery is meant copying, falsifying, oraltering any kind of written or printed matter for the purpose of defrauding others. Signatureverification is the process carried out to

  11. A comparison of SVM and HMM classifiers in the off-line signature verification

    Microsoft Academic Search

    Edson J. R. Justino; Flávio Bortolozzi; Robert Sabourin

    2005-01-01

    The SVM is a new classification technique in the field of statistical learning theory which has been applied with suc- cess in pattern recognition applications like face and speaker recognition, while the HMM has been found to be a power- ful statistical technique which is applied to handwriting recognition and signature verification. This paper reports on a comparison of the

  12. Low-Latency ECDSA Signature Verification A Road Towards Safer Traffic

    E-print Network

    the precursors for ITS, the traffic control systems for air and rail traffic were already deployed in the lateLow-Latency ECDSA Signature Verification ­ A Road Towards Safer Traffic ­ Miroslav Knezevi caused by the rising traffic densities on our roads and in our cities. Traffic congestion is increasingly

  13. Age and gender-invariant features of handwritten signatures for verification systems

    NASA Astrophysics Data System (ADS)

    AbdAli, Sura; Putz-Leszczynska, Joanna

    2014-11-01

    Handwritten signature is one of the most natural biometrics, the study of human physiological and behavioral patterns. Behavioral biometrics includes signatures that may be different due to its owner gender or age because of intrinsic or extrinsic factors. This paper presents the results of the author's research on age and gender influence on verification factors. The experiments in this research were conducted using a database that contains signatures and their associated metadata. The used algorithm is based on the universal forgery feature idea, where the global classifier is able to classify a signature as a genuine one or, as a forgery, without the actual knowledge of the signature template and its owner. Additionally, the reduction of the dimensionality with the MRMR method is discussed.

  14. ROBUSTNESS OF SIGNATURE VERIFICATION SYSTEMS TO IMITATORS WITH INCREASING SKILLS

    E-print Network

    Autonoma de Madrid, Universidad

    to analyze the vulnerabilities of biometric systems, in or- der to find their limitations and to develop source of information and more reliability [3]. Despite the evident advantages of biometric systems useful counter- measures for foreseeable attacks [5]. Like other biometric systems, signature

  15. On-line computer monitoring by signature analysis

    SciTech Connect

    Bergeson, G.C.; Chick, D.R.

    1986-10-01

    This report describes the signature analysis method of monitoring an on-line (in operation) computer system without disturbing its operation, modifying its computer program or changing its wiring. It is shown how the computer instruction sequence and corresponding control and status signals are verified for a 8085 microprocessor system. If these are correct, there is a high probability that the computer is functioning correctly. A possible hardware implementation of a monitor for a 8085 system is given. Data from an existing computer system is used to illustrate how a monitor can be used.

  16. Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy

    SciTech Connect

    Tai An, E-mail: atai@mcw.ed [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Christensen, James D.; Gore, Elizabeth [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Khamene, Ali [Imaging and Visualization Department, Siemens AG, Princeton, NJ (United States); Boettger, Thomas [Oncology Care Systems, Siemens AG, Heidelberg (Germany); Li, X. Allen [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States)

    2010-04-15

    Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

  17. Complete Signal Modeling and Score Normalization for Function-Based Dynamic Signature Verification

    Microsoft Academic Search

    Javier Ortega-garcia; Julian Fiérrez-aguilar; J. Martin-rello; Joaquin Gonzalez-rodriguez

    2003-01-01

    Abstract.In this contribution a function-basedapproach,to on-line sig- nature verification is presented. An initial set of 8 time sequences ,is used; then first and second time derivates of each ,function are com- puted over these, so 24 time sequences are simultaneously considered. Avaluable,function normalization is applied as a previous stage to a continuous-density HMM-based complete ,signal modeling ,scheme ,of these 24

  18. A method for online verification of adapted fields using an independent dose monitor

    SciTech Connect

    Chang Jina; Norrlinger, Bernhard D. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Heaton, Robert K.; Jaffray, David A.; Cho, Young-Bin; Islam, Mohammad K. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, Toronto, Ontario M5G 2M9 (Canada); Mahon, Robert [Department of Radiation Therapy, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada)

    2013-07-15

    Purpose: Clinical implementation of online adaptive radiotherapy requires generation of modified fields and a method of dosimetric verification in a short time. We present a method of treatment field modification to account for patient setup error, and an online method of verification using an independent monitoring system.Methods: The fields are modified by translating each multileaf collimator (MLC) defined aperture in the direction of the patient setup error, and magnifying to account for distance variation to the marked isocentre. A modified version of a previously reported online beam monitoring system, the integral quality monitoring (IQM) system, was investigated for validation of adapted fields. The system consists of a large area ion-chamber with a spatial gradient in electrode separation to provide a spatially sensitive signal for each beam segment, mounted below the MLC, and a calculation algorithm to predict the signal. IMRT plans of ten prostate patients have been modified in response to six randomly chosen setup errors in three orthogonal directions.Results: A total of approximately 49 beams for the modified fields were verified by the IQM system, of which 97% of measured IQM signal agree with the predicted value to within 2%.Conclusions: The modified IQM system was found to be suitable for online verification of adapted treatment fields.

  19. An Optimized Online Verification Imaging Procedure for External Beam Partial Breast Irradiation

    SciTech Connect

    Willis, David J., E-mail: David.Willis@petermac.or [Division of Radiation Oncology, Peter MacCallum Cancer Centre, East Melbourne, Victoria (Australia); Royal Melbourne Institute of Technology University, Melbourne, Victoria (Australia) and Melbourne University, Melbourne, Victoria (Australia); Kron, Tomas; Chua, Boon [Division of Radiation Oncology, Peter MacCallum Cancer Centre, East Melbourne, Victoria (Australia); Royal Melbourne Institute of Technology University, Melbourne, Victoria (Australia) and Melbourne University, Melbourne, Victoria (Australia)

    2011-07-01

    The purpose of this study was to evaluate the capabilities of a kilovoltage (kV) on-board imager (OBI)-equipped linear accelerator in the setting of on-line verification imaging for external-beam partial breast irradiation. Available imaging techniques were optimized and assessed for image quality using a modified anthropomorphic phantom. Imaging dose was also assessed. Imaging techniques were assessed for physical clearance between patient and treatment machine using a volunteer. Nonorthogonal kV image pairs were identified as optimal in terms of image quality, clearance, and dose. After institutional review board approval, this approach was used for 17 patients receiving accelerated partial breast irradiation. Imaging was performed before every fraction verification with online correction of setup deviations >5 mm (total image sessions = 170). Treatment staff rated risk of collision and visibility of tumor bed surgical clips where present. Image session duration and detected setup deviations were recorded. For all cases, both image projections (n = 34) had low collision risk. Surgical clips were rated as well as visualized in all cases where they were present (n = 5). The average imaging session time was 6 min, 16 sec, and a reduction in duration was observed as staff became familiar with the technique. Setup deviations of up to 1.3 cm were detected before treatment and subsequently confirmed offline. Nonorthogonal kV image pairs allowed effective and efficient online verification for partial breast irradiation. It has yet to be tested in a multicenter study to determine whether it is dependent on skilled treatment staff.

  20. Is Your Avatar Ethical? On-Line Course Tools that Are Methods for Student Identity and Verification

    ERIC Educational Resources Information Center

    Semple, Mid; Hatala, Jeffrey; Franks, Patricia; Rossi, Margherita A.

    2011-01-01

    On-line college courses present a mandate for student identity verification for accreditation and funding sources. Student authentication requires course modification to detect fraud and misrepresentation of authorship in assignment submissions. The reality is that some college students cheat in face-to-face classrooms; however, the potential for…

  1. Aging in Biometrics: An Experimental Analysis on On-Line Signature

    PubMed Central

    Galbally, Javier; Martinez-Diaz, Marcos; Fierrez, Julian

    2013-01-01

    The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system’s performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given. PMID:23894557

  2. Authentication Based on Pole-zero Models of Signature Velocity

    PubMed Central

    Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

    2013-01-01

    With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

  3. Towards Signature-Only Signature Schemes

    Microsoft Academic Search

    Adam Young; Moti Yung

    2000-01-01

    We consider a problem which was stated in a request for comments made by NIST in the FIPS97 document. The question is the following: Can we have a digital signature public key infrastruc- ture where the public (signature verification) keys cannot be abused for performing encryption? This may be applicable in the context of, say, exportable\\/escrow cryptography. The basic dilemma

  4. Please complete form in ink, or complete online, print, sign in ink and obtain required signatures Signature needed if adding after the 10th semester day or

    E-print Network

    Maxwell, Bruce D.

    Signature of Academic College Dean DateSignature of Academic Advisor Date Student Athlete's Athletic must sign approval. 5. Ask your Academic College Dean to sign the form, if needed. 4. Ask your advisor. Picture ID required when submitting this form 6. Student Athletes must have an Athletic Academic

  5. MARQ: an online tool to mine GEO for experiments with similar or opposite gene expression signatures.

    PubMed

    Vazquez, Miguel; Nogales-Cadenas, Ruben; Arroyo, Javier; Botías, Pedro; García, Raul; Carazo, Jose M; Tirado, Francisco; Pascual-Montano, Alberto; Carmona-Saez, Pedro

    2010-07-01

    The enormous amount of data available in public gene expression repositories such as Gene Expression Omnibus (GEO) offers an inestimable resource to explore gene expression programs across several organisms and conditions. This information can be used to discover experiments that induce similar or opposite gene expression patterns to a given query, which in turn may lead to the discovery of new relationships among diseases, drugs or pathways, as well as the generation of new hypotheses. In this work, we present MARQ, a web-based application that allows researchers to compare a query set of genes, e.g. a set of over- and under-expressed genes, against a signature database built from GEO datasets for different organisms and platforms. MARQ offers an easy-to-use and integrated environment to mine GEO, in order to identify conditions that induce similar or opposite gene expression patterns to a given experimental condition. MARQ also includes additional functionalities for the exploration of the results, including a meta-analysis pipeline to find genes that are differentially expressed across different experiments. The application is freely available at http://marq.dacya.ucm.es. PMID:20513648

  6. A Comparison of the Use of Bony Anatomy and Internal Markers for Offline Verification and an Evaluation of the Potential Benefit of Online and Offline Verification Protocols for Prostate Radiotherapy

    SciTech Connect

    McNair, Helen A. [Department of Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom)], E-mail: Helen.McNair@rmh.nhs.uk; Hansen, Vibeke N. [Joint Department of Physics and Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Parker, Christopher [Academic Unit of Urology, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Evans, Phil M. [Joint Department of Physics and Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Norman, Andrew [Department of Computing, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Miles, Elizabeth [Department of Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Harris, Emma J. [Joint Department of Physics and Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Del-Acroix, Louise; Smith, Elizabeth; Keane, Richard [Department of Radiotherapy, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom); Khoo, Vincent S.; Thompson, Alan C.; Dearnaley, David P. [Academic Unit of Urology, Royal Marsden NHS Trust and Institute of Cancer Research, Sutton, Surrey (United Kingdom)

    2008-05-01

    Purpose: To evaluate the utility of intraprostatic markers in the treatment verification of prostate cancer radiotherapy. Specific aims were: to compare the effectiveness of offline correction protocols, either using gold markers or bony anatomy; to estimate the potential benefit of online correction protocol's using gold markers; to determine the presence and effect of intrafraction motion. Methods and Materials: Thirty patients with three gold markers inserted had pretreatment and posttreatment images acquired and were treated using an offline correction protocol and gold markers. Retrospectively, an offline protocol was applied using bony anatomy and an online protocol using gold markers. Results: The systematic errors were reduced from 1.3, 1.9, and 2.5 mm to 1.1, 1.1, and 1.5 mm in the right-left (RL), superoinferior (SI), and anteroposterior (AP) directions, respectively, using the offline correction protocol and gold markers instead of bony anatomy. The subsequent decrease in margins was 1.7, 3.3, and 4 mm in the RL, SI, and AP directions, respectively. An offline correction protocol combined with an online correction protocol in the first four fractions reduced random errors further to 0.9, 1.1, and 1.0 mm in the RL, SI, and AP directions, respectively. A daily online protocol reduced all errors to <1 mm. Intrafraction motion had greater impact on the effectiveness of the online protocol than the offline protocols. Conclusions: An offline protocol using gold markers is effective in reducing the systematic error. The value of online protocols is reduced by intrafraction motion.

  7. Quantum threshold group signature

    NASA Astrophysics Data System (ADS)

    Yang, Yuguang; Wen, Qiaoyan

    2008-10-01

    In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem. Generally speaking, as an authority which can be trusted by all members does not exist, a threshold signature scheme without a trusted party appears more attractive. Following some ideas of the classical Shamir’s threshold signature scheme, a quantum threshold group signature one is proposed. In the proposed scheme, only t or more of n persons in the group can generate the group signature and any t - 1 or fewer ones cannot do that. In the verification phase, any t or more of n signature receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the signature.

  8. Online Kidney Position Verification Using Non-Contrast Radiographs on a Linear Accelerator with on Board KV X-Ray Imaging Capability

    SciTech Connect

    Willis, David J. [Division of Radiation Oncology, Peter MacCallum Cancer Centre, Melbourne, Victoria (Australia)], E-mail: David.Willis@petermac.org; Kron, Tomas; Hubbard, Patricia; Haworth, Annette; Wheeler, Greg; Duchesne, Gillian M. [Division of Radiation Oncology, Peter MacCallum Cancer Centre, Melbourne, Victoria (Australia)

    2009-01-01

    The kidneys are dose-limiting organs in abdominal radiotherapy. Kilovoltage (kV) radiographs can be acquired using on-board imager (OBI)-equipped linear accelerators with better soft tissue contrast and lower radiation doses than conventional portal imaging. A feasibility study was conducted to test the suitability of anterior-posterior (AP) non-contrast kV radiographs acquired at treatment time for online kidney position verification. Anthropomorphic phantoms were used to evaluate image quality and radiation dose. Institutional Review Board approval was given for a pilot study that enrolled 5 adults and 5 children. Customized digitally reconstructed radiographs (DRRs) were generated to provide a priori information on kidney shape and position. Radiotherapy treatment staff performed online evaluation of kidney visibility on OBI radiographs. Kidney dose measured in a pediatric anthropomorphic phantom was 0.1 cGy for kV imaging and 1.7 cGy for MV imaging. Kidneys were rated as well visualized in 60% of patients (90% confidence interval, 34-81%). The likelihood of visualization appears to be influenced by the relative AP separation of the abdomen and kidneys, the axial profile of the kidneys, and their relative contrast with surrounding structures. Online verification of kidney position using AP non-contrast kV radiographs on an OBI-equipped linear accelerator appears feasible for patients with suitable abdominal anatomy. Kidney position information provided is limited to 2-dimensional 'snapshots,' but this is adequate in some clinical situations and potentially advantageous in respiratory-correlated treatments. Successful clinical implementation requires customized partial DRRs, appropriate imaging parameters, and credentialing of treatment staff.

  9. On-line detection of the breakage of small diameter drills using current signature wavelet transform1

    Microsoft Academic Search

    Li Xiaoli

    This paper presents on-line tool breakage detection of small diameter drills by monitoring the AC servo motor current. The continuous wavelet transform was used to decompose the spindle AC servo motor current signal and the discrete wavelet transform was used to decompose the feed AC servo motor current signal in time-frequency domain. The tool breakage features were extracted from the

  10. Oregon Secretary of State Kate Brown has until August 1 to verify which of the six measures that have submitted signatures for verification

    E-print Network

    Escher, Christine

    Sonnen last month dropped out of the race. For an article · Initiative 28: Establishes medical marijuana supply system and assistance and research programs; allows limited selling of marijuana. Since both percent were determined to be valid. The marijuana initiative gathered 130,702 signatures, 66 percent

  11. An Assessment of Dynamic Signature Forgery and Perception of Signature Strength

    Microsoft Academic Search

    Stephen Elliott; Adam Hunt

    2006-01-01

    Dynamic signature verification has many challenges associated with the creation of the impostor dataset. The literature discusses several ways of determining the impostor signature provider, but this paper takes a different approach - that of the opportunistic forger and his or her relationship to the genuine signature holder. The paper examines the accuracy with which an opportunistic forger assesses the

  12. CORRECTIONS VERIFICATION Academic Year 20132014 Student information

    E-print Network

    Blanchette, Robert A.

    Photocopy of parents' 2012 W-2 form(s). Verification of family information. You changed information. Please submit the items indicated in Section C on the reverse side. Phone (include area code) Birthdate in Adobe Reader (free at Adobe.com). Please add the required signature(s) in blue or black ink. Return

  13. CORRECTIONS VERIFICATION Academic Year 20122013 Student information

    E-print Network

    Blanchette, Robert A.

    Photocopy of parents' 2011 W-2 form(s). Verification of family information. You changed information. Please submit the items indicated in Section C on the reverse side. Phone (include area code) Birthdate in Adobe Reader (free at Adobe.com). Please add the required signature(s) in blue or black ink. Return

  14. Signature Crossroads

    E-print Network

    Chong, Puifai Cyril

    1997-01-01

    Signature Crossroads, an urban form that grows out of an street intersection, combines both the sense of "transit" and the sense of "destination." Such dual character gives Signature Crossroads a superiority over traditional ...

  15. Group Signatures

    Microsoft Academic Search

    David Chaum; Eugène Van Heyst

    1991-01-01

    Abstract. In this paper we present a new type of signature for a group of persons, called a group signature, which has the following propertjes: (i) only members,of the group can sign messages; (ii) the receiver can verify that it is a valid group signaa~e, but cannot discover which gr~up member made (i) if necessary, the signature can be \\

  16. SEPARATED/DIVORCED INCOME VERIFICATION Student's Name: ______________________________________________MSU ID: _________________________

    E-print Network

    Dyer, Bill

    PARENT SEPARATED/DIVORCED INCOME VERIFICATION Student's Name application for federal financial aid indicates that your parents are divorced or separated as of the date: ____________________________________________________________________________________ Signature of Parent Date Please attach a copy of parental divorce, separation, or interlocutory agreement

  17. SEPARATED/DIVORCED INCOME VERIFICATION Student Name: _______________________________________MSU ID: _________________________

    E-print Network

    Dyer, Bill

    STUDENT SEPARATED/DIVORCED INCOME VERIFICATION Student Name for federal financial aid indicates that you are divorced or separated and filed a joint ________ tax return: _____________________________________________________________________________ Signature of Applicant Date Please attach a copy of your divorce, separation, or interlocutory agreement

  18. Classification of signature-only signature models

    Microsoft Academic Search

    Zhengjun Cao; Mulan Liu

    2008-01-01

    We introduce a set of criterions for classifying signature-only signature models. By the criterions, we classify signature models into 5 basic types and 69 general classes. Theoretically, 21140 kinds of signature models can be deduced by appropriately combining difierent general classes. The result comprises almost exist- ing signature models. We also contribute a lot of new signature models. Moreover, we

  19. On-line detection of the breakage of small diameter drills using current signature wavelet transform 1 Supported by the China Defense Foundation. 1

    Microsoft Academic Search

    Li Xiaoli

    1999-01-01

    This paper presents on-line tool breakage detection of small diameter drills by monitoring the AC servo motor current. The continuous wavelet transform was used to decompose the spindle AC servo motor current signal and the discrete wavelet transform was used to decompose the feed AC servo motor current signal in time–frequency domain. The tool breakage features were extracted from the

  20. Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow

    E-print Network

    Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature of improved variants of the UOV and Rainbow signature schemes. In this paper we show how we can do even better by a slight variation of their algorithms. Keywords: Multivariate Cryptography, UOV Signature Scheme, Rainbow

  1. ETV - VERIFICATION TESTING (ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM)

    EPA Science Inventory

    Verification testing is a major component of the Environmental Technology Verification (ETV) program. The ETV Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantia...

  2. Modeling the Lexical Morphology of Western Handwritten Signatures

    PubMed Central

    Diaz-Cabrera, Moises; Ferrer, Miguel A.; Morales, Aythami

    2015-01-01

    A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures. PMID:25860942

  3. Electronic Signatures for Public Procurement across Europe

    Microsoft Academic Search

    Jon Ølnes; Anette Andresen; Stefano Arbia; Markus Ernst; Martin Hagen; Stephan Klein; Giovanni Manca; Adriano Rossi; Frank Schipplick; Daniele Tatti; Gesa Wessolowski; Jan Windheuser

    2008-01-01

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but

  4. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    PubMed Central

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  5. Towards a Better Understanding of the Oxygen Isotope Signature of Atmospheric CO2: Determining the 18O-Exchange Between CO2 and H2O in Leaves and Soil On-line with Laser-Based Spectroscopy

    NASA Astrophysics Data System (ADS)

    Gangi, L.; Rothfuss, Y.; Vereecken, H.; Brueggemann, N.

    2013-12-01

    The oxygen isotope signature of carbon dioxide (?18O-CO2) is a powerful tool to disentangle CO2 fluxes in terrestrial ecosystems, as CO2 attains a contrasting 18O signature by the interaction with isotopically different soil and leaf water pools during soil respiration and photosynthesis, respectively. However, using the ?18O-CO2 signal to quantify plant-soil-atmosphere CO2 fluxes is still challenging due to a lack of knowledge concerning the magnitude and effect of individual fractionation processes during CO2 and H2O diffusion and during CO2-H2O isotopic exchange in soils and leaves, especially related to short-term changes in environmental conditions (non-steady state). This study addresses this research gap by combined on-line monitoring of the oxygen isotopic signature of CO2 and water vapor during gas exchange in soil and plant leaves with laser-based spectroscopy, using soil columns and plant chambers. In both experimental setups, the measured ?18O of water vapor was used to infer the ?18O of liquid water, and, together with the ?18O-CO2, the degree of oxygen isotopic equilibrium between the two species (?). Gas exchange experiments with different functional plant types (C3 coniferous, C3 monocotyledonous, C3 dicotyledonous, C4) revealed that ? and the influence of the plant on the ambient ?18O-CO2 (CO18O-isoforcing) not only varied on a diurnal timescale but also when plants were exposed to limited water availability, elevated air temperature, and abrupt changes in light intensity (sunflecks). Maximum ? before treatments ranged between 0.7 and 0.8 for the C3 dicotyledonous (poplar) and C3 monocotyledonous (wheat) plants, and between 0.5 and 0.6 for the conifer (spruce) and C4 plant (maize) while maximum CO18O-isoforcing was highest in wheat (0.03 m s-1 ‰), similar in poplar and maize (0.02 m s-1 ‰), and lowest in spruce (0.01 m s-1 ‰). Multiple regression analysis showed that up to 97 % of temporal dynamics in CO18O-isoforcing could be explained by variations in stomatal conductance, ?, and ?18O of H2O at the evaporation site. The determined maximum in vivo activity of carbonic anhydrase, the enzyme which catalyzes the CO2-H2O oxygen isotope exchange inside leaves, varied between the different plant species and was, as observed for ?, higher in poplar and wheat, and lower in maize and spruce. Preliminary experiments with soil columns filled with sand demonstrated that gas-permeable microporous polypropylene tubing, which was installed at different depths in the soil columns, was appropriate for determining ?18O-H2O and ?18O-CO2 simultaneously without fractionation. Hence, this new methodology is promising for further studies on the oxygen isotopic exchange between CO2 and H2O in soils. Altogether, this study highlights that the ?18O-CO2 exchange in the soil-plant-atmosphere continuum is highly dynamic in response to short-term variations in environmental conditions, and emphasizes the need for an improved parameterization of models simulating ?18O-CO2.

  6. Biometric verification in dynamic writing

    NASA Astrophysics Data System (ADS)

    George, Susan E.

    2002-03-01

    Pen-tablet devices capable of capturing the dynamics of writing record temporal and pressure information as well as the spatial pattern. This paper explores biometric verification based upon the dynamics of writing where writers are distinguished not on the basis of what they write (ie the signature), but how they write. We have collected samples of dynamic writing from 38 Chinese writers. Each writer was asked to provide 10 copies of a paragraph of text and the same number of signature samples. From the data we have extracted stroke-based primitives from the sentence data utilizing pen-up/down information and heuristic rules about the shape of the character. The x, y and pressure values of each primitive were interpolated into an even temporal range based upon a 20 msec sampling rate. We applied the Daubechies 1 wavelet transform to the x signal, y signal and pressure signal using the coefficients as inputs to a multi-layer perceptron trained with back-propagation on the sentence data. We found a sensitivity of 0.977 and specificity of 0.990 recognizing writers based on test primitives extracted from sentence data and measures of 0.916 and 0.961 respectively, from test primitives extracted from signature data.

  7. Columbus pressurized module verification

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Comandatore, Emanuele

    1986-01-01

    The baseline verification approach of the COLUMBUS Pressurized Module was defined during the A and B1 project phases. Peculiarities of the verification program are the testing requirements derived from the permanent manned presence in space. The model philosophy and the test program have been developed in line with the overall verification concept. Such critical areas as meteoroid protections, heat pipe radiators and module seals are identified and tested. Verification problem areas are identified and recommendations for the next development are proposed.

  8. Secure M-commerce Transactions: A Third Party Based Signature Protocol

    Microsoft Academic Search

    Lisha He; Ning Zhang; Lirong He; Ian Rogers

    2007-01-01

    In this paper, we present a novel joint signature protocol suited to applications run on UMTS and heterogeneous networks. The protocol enables a mobile user to securely delegate his\\/her signing power to an assisted server so that the assisted server can perform signature generation and verification on behalf of the user. By shifting computational expensive cryptographic operations to a third

  9. CORRECTIONS VERIFICATION Academic Year 20142015 DIRECTIONS--The corrections you made to your 20142015 Student

    E-print Network

    Minnesota, University of

    .com). Please add the required signature(s) in blue or black ink. Return this form By mail to: Office of Student (last, first, middle initial) University ID Phone (include area code) Birthdate (mm tax return(s). Photocopy of parents' 2013 W-2 form(s). Verification of family information. You changed

  10. Threshold Proxy Signature Schemes

    Microsoft Academic Search

    Kan Zhang

    1997-01-01

    Delegation of rights is a common practice in the real world. Proxy signature schemes have been invented to delegate signing capability efficiently and transparently. In this paper, we present a new nonrepudiable proxy signature scheme. Nonrepudiation means the signature signers, both original and proxy signers, cannot falsely deny later that he generated a signature. In practice, it is important and,

  11. Introduction Identity Based Signatures

    E-print Network

    Garcia, Flavio D.

    Introduction Identity Based Signatures The Construction Conclusions A Schnorr-like Lightweight Identity-Based Signature Scheme Flavio D. Garcia Institute for Computing and Information Sciences, Radboud-like Lightweight Identity-Based Signature Scheme #12;Introduction Identity Based Signatures The Construction

  12. SEPARATED/DIVORCED INCOME VERIFICATION Student Name: _______________________________________MSU ID: _________________________

    E-print Network

    Dyer, Bill

    STUDENT SEPARATED/DIVORCED INCOME VERIFICATION Student Name application for federal financial aid indicates that you are divorced or separated as of the date your FAFSA: ____________________________________________________________________________ Signature of Applicant Date Please attach a copy of your divorce, separation, or interlocutory agreement

  13. Electronic Signatures for Public Procurement across Europe

    NASA Astrophysics Data System (ADS)

    Ølnes, Jon; Andresen, Anette; Arbia, Stefano; Ernst, Markus; Hagen, Martin; Klein, Stephan; Manca, Giovanni; Rossi, Adriano; Schipplick, Frank; Tatti, Daniele; Wessolowski, Gesa; Windheuser, Jan

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but also post-award processes like orders and invoices. Signature policies, i.e. quality requirements and requirements on information captured in the signing process, will be developed. This as well as technical interoperability of e-signatures across Europe will finally be piloted in demonstrators starting late 2009 or early 2010.

  14. Request for Online Payment Site ETSU Bursar Office

    E-print Network

    Karsai, Istvan

    Request for Online Payment Site ETSU Bursar Office PO Box 70732 Date*: _____________ (*allow), dates, costs and any other information to develop the online payment site, logos. Signature, Site: ________________________________________________________ (The Online Site Manager is a department designee with responsibility for the Online Marketplace Ustore

  15. Verification of Adaptive Systems

    SciTech Connect

    Pullum, Laura L [ORNL] [ORNL; Cui, Xiaohui [New York Institute of Technology (NYIT)] [New York Institute of Technology (NYIT); Vassev, Emil [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Hinchey, Mike [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Rouff, Christopher [Lockheed Martin Corporation] [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation] [Lockheed Martin Corporation

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  16. Verification Tools Secure Online Shopping, Banking

    NASA Technical Reports Server (NTRS)

    2010-01-01

    Just like rover or rocket technology sent into space, the software that controls these technologies must be extensively tested to ensure reliability and effectiveness. Ames Research Center invented the open-source Java Pathfinder (JPF) toolset for the deep testing of Java-based programs. Fujitsu Labs of America Inc., based in Sunnyvale, California, improved the capabilities of the JPF Symbolic Pathfinder tool, establishing the tool as a means of thoroughly testing the functionality and security of Web-based Java applications such as those used for Internet shopping and banking.

  17. Simulation verification techniques study

    NASA Technical Reports Server (NTRS)

    Schoonmaker, P. B.; Wenglinski, T. H.

    1975-01-01

    Results are summarized of the simulation verification techniques study which consisted of two tasks: to develop techniques for simulator hardware checkout and to develop techniques for simulation performance verification (validation). The hardware verification task involved definition of simulation hardware (hardware units and integrated simulator configurations), survey of current hardware self-test techniques, and definition of hardware and software techniques for checkout of simulator subsystems. The performance verification task included definition of simulation performance parameters (and critical performance parameters), definition of methods for establishing standards of performance (sources of reference data or validation), and definition of methods for validating performance. Both major tasks included definition of verification software and assessment of verification data base impact. An annotated bibliography of all documents generated during this study is provided.

  18. Application for admission to exam Please register online! Use this form only if registering online is not possible.

    E-print Network

    Pfeifer, Holger

    Application for admission to exam Please register online! Use this form only if registering online is not possible. Matrikelnummer: Name, first name: Study programme: Final degree: Phone: E-mail: Date, Signature: Exam no./exam name: Exam date: Time: Examiner: Signature of examiner: (with oral exams only) yes no

  19. Software verification and testing

    NASA Technical Reports Server (NTRS)

    1985-01-01

    General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

  20. Signatures support program

    NASA Astrophysics Data System (ADS)

    Hawley, Chadwick T.

    2009-05-01

    The Signatures Support Program (SSP) leverages the full spectrum of signature-related activities (collections, processing, development, storage, maintenance, and dissemination) within the Department of Defense (DOD), the intelligence community (IC), other Federal agencies, and civil institutions. The Enterprise encompasses acoustic, seismic, radio frequency, infrared, radar, nuclear radiation, and electro-optical signatures. The SSP serves the war fighter, the IC, and civil institutions by supporting military operations, intelligence operations, homeland defense, disaster relief, acquisitions, and research and development. Data centers host and maintain signature holdings, collectively forming the national signatures pool. The geographically distributed organizations are the authoritative sources and repositories for signature data; the centers are responsible for data content and quality. The SSP proactively engages DOD, IC, other Federal entities, academia, and industry to locate signatures for inclusion in the distributed national signatures pool and provides world-wide 24/7 access via the SSP application.

  1. Multibody modeling and verification

    Microsoft Academic Search

    Gloria J. Wiens

    1989-01-01

    A summary of a ten week project on flexible multibody modeling, verification and control is presented. Emphasis was on the need for experimental verification. A literature survey was conducted for gathering information on the existence of experimental work related to flexible multibody systems. The first portion of the assigned task encompassed the modeling aspects of flexible multibodies that can undergo

  2. Body Motion Analysis for Multi-Modal Identity Verification George Williams Graham Taylor Kirill Smolskiy Christoph Bregler

    E-print Network

    Taylor, Graham

    Body Motion Analysis for Multi-Modal Identity Verification George Williams Graham Taylor Kirill Smolskiy Christoph Bregler Dept. of Computer Science, Courant Institute, New York University george,graham. Examples of Motion Signatures. The green colored signature shows how the orientation of the sparse flow

  3. Scientists Using TCGA Data Identify 21 Mutational Signatures in Cancer

    Cancer.gov

    Many mutations have been implicated in human cancer, but the biological mechanisms that produce them remain largely unknown. In a study published online in Nature on August 14, 2013, researchers identified 21 signatures of mutational processes underlying 30 types of cancer. Characterizing mutational signatures may provide a greater understanding of the mechanistic basis of cancer and potentially lead to better treatments that target its root causes.

  4. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification

    E-print Network

    . Schuldt and Kanta Matsuura Institute of Industrial Science, University of Tokyo, 4-6-1 Komaba, Meguro for schemes allowing dele- gation, and highlight a new essential security property, token soundness, which, for example, is the case for the problem of keeping digital records of confidential political decision (e

  5. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    SciTech Connect

    Paul, J. N.; Chin, M. R.; Sjoden, G. E. [Nuclear and Radiological Engineering Program, George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, 770 State St, Atlanta, GA 30332-0745 (United States)

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  6. Electronic health records: what does your signature signify?

    PubMed Central

    2012-01-01

    Electronic health records serve multiple purposes, including clinical communication, legal documentation, financial transaction capture, research and analytics. Electronic signatures attached to entries in EHRs have different logical and legal meanings for different users. Some of these are vestiges from historic paper formats that require reconsideration. Traditionally accepted functions of signatures, such as identity verification, attestation, consent, authorization and non-repudiation can become ambiguous in the context of computer-assisted workflow processes that incorporate functions like logins, auto-fill and audit trails. This article exposes the incompatibility of expectations among typical users of electronically signed information. PMID:22888846

  7. A Blind Quantum Signature Scheme with ?-type Entangled States

    NASA Astrophysics Data System (ADS)

    Yin, Xun-Ru; Ma, Wen-Ping; Liu, Wei-Yan

    2012-02-01

    A blind quantum signature scheme with ?-type entangled states is proposed, which can be applied to E-voting system. In this scheme, the particles in ?-type state sequence are used for quantum key distribution first, and then for quantum signature. Our scheme is characterized by its blindness, impossibility of forgery, impossibility of disavowal. In addition, our scheme can perform an audit program with respect to the validity of the verification process in the light of actual requirements. The security of the scheme is also analyzed.

  8. IR polarimetric signatures

    NASA Astrophysics Data System (ADS)

    Pezzaniti, J. L.; Chenault, David; Vaden, Justin; Gurton, Kris; Felton, Melvin

    2014-06-01

    Infrared polarization relies on surface temperature, roughness, material properties, aspect angle to the sensor, sky down-welling and background radiance reflecting from the target. Often times, the polarization signature of a manmade target is different than the surrounding background. Furthermore, that difference is often present even when the thermal signature of the same target blends into the background. This paper will present maritime, airborne and ground data sets of polarization signatures of several objects that allow detection when other methods fall short.

  9. Study of Dynamic Characteristics of Aeroelastic Systems Utilizing Randomdec Signatures

    NASA Technical Reports Server (NTRS)

    Chang, C. S.

    1975-01-01

    The feasibility of utilizing the random decrement method in conjunction with a signature analysis procedure to determine the dynamic characteristics of an aeroelastic system for the purpose of on-line prediction of potential on-set of flutter was examined. Digital computer programs were developed to simulate sampled response signals of a two-mode aeroelastic system. Simulated response data were used to test the random decrement method. A special curve-fit approach was developed for analyzing the resulting signatures. A number of numerical 'experiments' were conducted on the combined processes. The method is capable of determining frequency and damping values accurately from randomdec signatures of carefully selected lengths.

  10. Voltage verification unit

    DOEpatents

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  11. Modular data structure verification

    E-print Network

    Kuncak, Viktor (Viktor Jaroslav), 1977-

    2007-01-01

    This dissertation describes an approach for automatically verifying data structures, focusing on techniques for automatically proving formulas that arise in such verification. I have implemented this approach with my ...

  12. Toward Automatic Verification of Goal-Oriented Flow Simulations

    NASA Technical Reports Server (NTRS)

    Nemec, Marian; Aftosmis, Michael J.

    2014-01-01

    We demonstrate the power of adaptive mesh refinement with adjoint-based error estimates in verification of simulations governed by the steady Euler equations. The flow equations are discretized using a finite volume scheme on a Cartesian mesh with cut cells at the wall boundaries. The discretization error in selected simulation outputs is estimated using the method of adjoint-weighted residuals. Practical aspects of the implementation are emphasized, particularly in the formulation of the refinement criterion and the mesh adaptation strategy. Following a thorough code verification example, we demonstrate simulation verification of two- and three-dimensional problems. These involve an airfoil performance database, a pressure signature of a body in supersonic flow and a launch abort with strong jet interactions. The results show reliable estimates and automatic control of discretization error in all simulations at an affordable computational cost. Moreover, the approach remains effective even when theoretical assumptions, e.g., steady-state and solution smoothness, are relaxed.

  13. A General Quality Classification System for eIDs and e-Signatures

    NASA Astrophysics Data System (ADS)

    Ølnes, Jon; Buene, Leif; Andresen, Anette; Grindheim, Håvard; Apitzsch, Jörg; Rossi, Adriano

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. Interoperability of electronic signatures across borders is identified as a major obstacle to cross-border procurement. PEPPOL suggests specify-ing signature acceptance criteria in the form of signature policies that must be transparent and non-discriminatory. Validation solutions must then not only assess signature correctness but also signature policy adherence. This paper addresses perhaps the most important topic of a signature policy: Quality of eIDs and e-signatures. Discrete levels are suggested for: eID quality, assurance level for this quality, and for cryptographic quality of signatures.

  14. Digital Signature Management.

    ERIC Educational Resources Information Center

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  15. PMAS Science Verification: PMAS Science Verification

    E-print Network

    _b PMAS Spectra Viewer for the inspection of online re­ duced data. Top ! down: image of 256 extracted collimator, F/1.5 camera PMAS : CAD view of the instrument Fibre­Module Spectrograph Electronics Telescope

  16. Online Fingerprint Template Improvement

    Microsoft Academic Search

    Xudong Jiang; Wee Ser

    2002-01-01

    Abstract—This work proposes,a technique,that improves,fingerprint templates,by merging,and averaging,minutiae,of multiple fingerprints. The weighted,averaging scheme,enables,the template to change,gradually with time in line with changes,of the skin and imaging,conditions. The recursive nature of the algorithm greatly reduces the storage and computation requirements of this technique. As a result, the proposed template improvement procedure can be performed,online during the fingerprint verification process. Extensive experimental,studies

  17. HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO).

    E-print Network

    Leistikow, Bruce N.

    HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO). want to view your statement online. statements online at At Your Service Online (AYSO). EMPLOYEE SIGNATURE DATE Davis, CA 95616 Option may take up to two pay periods before in effect. Physical location

  18. Description of a Computerized, On-Line Interlibrary Loan System.

    ERIC Educational Resources Information Center

    Kilgour, Frederick G.

    This paper describes the first two months of operation of the OCLC interlibrary loan system, an online system designed to increase speed and effectiveness in obtaining interlibrary loans. This system provides (1) bibliographic verification of interlibrary loan records and location of materials by using online union catalog records, (2) automatic…

  19. An archaeal genomic signature

    NASA Technical Reports Server (NTRS)

    Graham, D. E.; Overbeek, R.; Olsen, G. J.; Woese, C. R.

    2000-01-01

    Comparisons of complete genome sequences allow the most objective and comprehensive descriptions possible of a lineage's evolution. This communication uses the completed genomes from four major euryarchaeal taxa to define a genomic signature for the Euryarchaeota and, by extension, the Archaea as a whole. The signature is defined in terms of the set of protein-encoding genes found in at least two diverse members of the euryarchaeal taxa that function uniquely within the Archaea; most signature proteins have no recognizable bacterial or eukaryal homologs. By this definition, 351 clusters of signature proteins have been identified. Functions of most proteins in this signature set are currently unknown. At least 70% of the clusters that contain proteins from all the euryarchaeal genomes also have crenarchaeal homologs. This conservative set, which appears refractory to horizontal gene transfer to the Bacteria or the Eukarya, would seem to reflect the significant innovations that were unique and fundamental to the archaeal "design fabric." Genomic protein signature analysis methods may be extended to characterize the evolution of any phylogenetically defined lineage. The complete set of protein clusters for the archaeal genomic signature is presented as supplementary material (see the PNAS web site, www.pnas.org).

  20. Verification in referral-based crowdsourcing.

    PubMed

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through "referral-based crowdsourcing": the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  1. Verification in Referral-Based Crowdsourcing

    PubMed Central

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  2. Signature extension studies

    NASA Technical Reports Server (NTRS)

    Vincent, R. K.; Thomas, G. S.; Nalepka, R. F.

    1974-01-01

    The importance of specific spectral regions to signature extension is explored. In the recent past, the signature extension task was focused on the development of new techniques. Tested techniques are now used to investigate this spectral aspect of the large area survey. Sets of channels were sought which, for a given technique, were the least affected by several sources of variation over four data sets and yet provided good object class separation on each individual data set. Using sets of channels determined as part of this study, signature extension was accomplished between data sets collected over a six-day period and over a range of about 400 kilometers.

  3. Techniques in Hydrologic Forecast Verification

    NSDL National Science Digital Library

    COMET

    2010-12-14

    This module demonstrates techniques for developing a hydrologic forecast verification effort. Although it can be taken as stand-alone training, the module on Introduction to Verification of Hydrologic Forecasts is intended a useful prerequisite. Through the use of rich illustrations, case study examples, and review questions, this module provides an example of developing a verification effort using NWS verification tools. Two case studies will be highlighted that both look at the primary question of whether QPF input to hydrologic models improves the hydrologic forecasts. Related questions of QPF's impact on hydrologic forecasts are explored that include considerations of basin characteristics, forecast lead time, and event magnitude. One case will look at verification of deterministic stage height forecasts using the Interactive Verification Program (IVP) at the Ohio River Forecast Center (OHRFC). The other case will look at the verification of ensemble flow forecasts using the Ensemble Verification System (EVS) at the Middle Atlantic River Forecast Center (MARFC).

  4. Quantum Money with Classical Verification

    E-print Network

    Gavinsky, Dmitry

    2011-01-01

    We construct a quantum money scheme that allows verification through classical communication with bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification.

  5. MULTIVESSEL BATCH DISTILLATION EXPERIMENTAL VERIFICATION

    E-print Network

    Skogestad, Sigurd

    MULTIVESSEL BATCH DISTILLATION ­ EXPERIMENTAL VERIFICATION Bernd Wittgens and Sigurd Skogestad 1 The experimental verification of the operation of a multivessel batch distillation column, operated under total vessels, provides a generalization of previously proposed batch distillation schemes. We propose a simple

  6. Explaining Verification Conditions

    NASA Technical Reports Server (NTRS)

    Deney, Ewen; Fischer, Bernd

    2006-01-01

    The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs themselves. We describe a systematic extension of the Hoare rules by labels so that the calculus itself can be used to build up explanations of the VCs. The labels are maintained through the different processing steps and rendered as natural language explanations. The explanations can easily be customized and can capture different aspects of the VCs; here, we focus on their structure and purpose. The approach is fully declarative and the generated explanations are based only on an analysis of the labels rather than directly on the logical meaning of the underlying VCs or their proofs. Keywords: program verification, Hoare calculus, traceability.

  7. Nuclear disarmament verification

    SciTech Connect

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  8. Spectroscopic signatures of isomnerization

    E-print Network

    Baraban, Joshua Herschel Goldblum

    2013-01-01

    This thesis explores spectroscopic signatures of isomerization, especially new patterns that emerge and report on chemically relevant portions of the potential energy surface, such as the transition state. The most important ...

  9. Continuous Verification Using Multimodal Biometrics

    E-print Network

    Sim, Terence

    , and performance of a multimodal biometrics verification system that continuously verifies the presence of a logged, biometrics, fusion, verification. Ç 1 INTRODUCTION FOR most computer systems, once the identity of the userContinuous Verification Using Multimodal Biometrics Terence Sim, Member, IEEE, Sheng Zhang, Student

  10. Verification and validation benchmarks.

    SciTech Connect

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

  11. Meteor signature interpretation

    SciTech Connect

    Canavan, G.H.

    1997-01-01

    Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

  12. General Environmental Verification Specification

    NASA Technical Reports Server (NTRS)

    Milne, J. Scott, Jr.; Kaufman, Daniel S.

    2003-01-01

    The NASA Goddard Space Flight Center s General Environmental Verification Specification (GEVS) for STS and ELV Payloads, Subsystems, and Components is currently being revised based on lessons learned from GSFC engineering and flight assurance. The GEVS has been used by Goddard flight projects for the past 17 years as a baseline from which to tailor their environmental test programs. A summary of the requirements and updates are presented along with the rationale behind the changes. The major test areas covered by the GEVS include mechanical, thermal, and EMC, as well as more general requirements for planning, tracking of the verification programs.

  13. Estimating the pen trajectories of static signatures using hidden Markov models.

    PubMed

    Nel, Emli-Mari; du Preez, Johan A; Herbst, B M

    2005-11-01

    Static signatures originate as handwritten images on documents and by definition do not contain any dynamic information. This lack of information makes static signature verification systems significantly less reliable than their dynamic counterparts. This study involves extracting dynamic information from static images, specifically the pen trajectory while the signature was created. We assume that a dynamic version of the static image is available (typically obtained during an earlier registration process). We then derive a hidden Markov model from the static image and match it to the dynamic version of the image. This match results in the estimated pen trajectory of the static image. PMID:16285373

  14. The Exact Security of Digital Signatures -- How to Sign with RSA and Rabin

    Microsoft Academic Search

    Mihir Bellare; Phillip Rogaway

    1996-01-01

    We describe an RSA-based signing scheme called PSS which combines essentially optimal efficiency with attractive security properties. Signing takes one RSA decryption plus some hashing, verification takes one RSA encryption plus some hashing, and the size of the signature is the size of the modulus. Assuming the underlying hash functions are ideal, our schemes are not only provably secure, but

  15. A secure proxy signature protocol for agent-based M-commerce applications

    Microsoft Academic Search

    Omaima Bamasak; Ning Zhang

    2004-01-01

    We present a novel agent-based threshold proxy signcryption (ATPS) protocol, which enables an agent owner to securely delegate his signing capabilities to a mobile agent so that the mobile agent can sign documents on behalf of its owner. The protocol incorporates three novel contributions: a proxy key generation method, a threshold proxy signcryption scheme and a proxy signature verification method.

  16. Security Evaluation of i-Vector Based Speaker Verification Systems Against Hill-Climbing Attacks

    E-print Network

    Autonoma de Madrid, Universidad

    - metric systems are vulnerable to external attacks, and it has not been until recently when biometric the vulnerabilities of i-vector based speaker verification systems against indirect attacks. Particularly, we exploit experimental protocol already applied to other biometric systems based on face or signature; and they were

  17. Lessons Online

    NSDL National Science Digital Library

    Gerald H. Krockover

    2002-12-01

    The instructors of an Earth science course used WebCT, a multipurpose software package, to create an online supplement to their course. It included class e-mail, science hyperlinks, an online calendar, an online discussion board, and online handouts. The

  18. Online Pharmacies

    MedlinePLUS

    MENU Return to Web version Online Pharmacies Is it safe to buy medicines online? It can be safe to buy your medicines online, but you need to be very ... new or more serious health problems. Illegal online pharmacies might not be licensed; might send you medicines ...

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    This presentation will be given at the EPA Science Forum 2005 in Washington, DC. The Environmental Technology Verification Program (ETV) was initiated in 1995 to speed implementation of new and innovative commercial-ready environemntal technologies by providing objective, 3rd pa...

  20. QPF Verification: Challenges and Tools

    NSDL National Science Digital Library

    COMET

    2010-05-25

    This module looks at the common challenges and tools with respect to verification of quantitative precipitation forecasts (QPF). Through the use of rich illustrations, animations, and interactions, this module provides an introduction to a variety of methods and approaches for assessing the quality of QPFs. The module examines the need for, and the challenges of verifying precipitation forecasts. An overview is then presented of three verification programs available to most NWS forecast offices: the Hydrometeorological Prediction Center (HPC) verification, the National Precipitation Verification Unit (NPVU), and the Boise Verify Program (BOI Verify). For each of these programs, an introduction is provided covering the strengths and weaknesses as well as specific products available. Case examples are provided where appropriate to illustrate the application of the products in the field. Additional NWS verification tools under development are introduced: the Interactive Verification Program (IVP) and the Ensemble Verification System (EVS).

  1. Improved Verification for Aerospace Systems

    NASA Technical Reports Server (NTRS)

    Powell, Mark A.

    2008-01-01

    Aerospace systems are subject to many stringent performance requirements to be verified with low risk. This report investigates verification planning using conditional approaches vice the standard classical statistical methods, and usage of historical surrogate data for requirement validation and in verification planning. The example used in this report to illustrate the results of these investigations is a proposed mission assurance requirement with the concomitant maximum acceptable verification risk for the NASA Constellation Program Orion Launch Abort System (LAS). This report demonstrates the following improvements: 1) verification planning using conditional approaches vice classical statistical methods results in plans that are more achievable and feasible; 2) historical surrogate data can be used to bound validation of performance requirements; and, 3) incorporation of historical surrogate data in verification planning using conditional approaches produces even less costly and more reasonable verification plans. The procedures presented in this report may produce similar improvements and cost savings in verification for any stringent performance requirement for an aerospace system.

  2. Exomars Mission Verification Approach

    NASA Astrophysics Data System (ADS)

    Cassi, Carlo; Gilardi, Franco; Bethge, Boris

    According to the long-term cooperation plan established by ESA and NASA in June 2009, the ExoMars project now consists of two missions: A first mission will be launched in 2016 under ESA lead, with the objectives to demonstrate the European capability to safely land a surface package on Mars, to perform Mars Atmosphere investigation, and to provide communi-cation capability for present and future ESA/NASA missions. For this mission ESA provides a spacecraft-composite, made up of an "Entry Descent & Landing Demonstrator Module (EDM)" and a Mars Orbiter Module (OM), NASA provides the Launch Vehicle and the scientific in-struments located on the Orbiter for Mars atmosphere characterisation. A second mission with it launch foreseen in 2018 is lead by NASA, who provides spacecraft and launcher, the EDL system, and a rover. ESA contributes the ExoMars Rover Module (RM) to provide surface mobility. It includes a drill system allowing drilling down to 2 meter, collecting samples and to investigate them for signs of past and present life with exobiological experiments, and to investigate the Mars water/geochemical environment, In this scenario Thales Alenia Space Italia as ESA Prime industrial contractor is in charge of the design, manufacturing, integration and verification of the ESA ExoMars modules, i.e.: the Spacecraft Composite (OM + EDM) for the 2016 mission, the RM for the 2018 mission and the Rover Operations Control Centre, which will be located at Altec-Turin (Italy). The verification process of the above products is quite complex and will include some pecu-liarities with limited or no heritage in Europe. Furthermore the verification approach has to be optimised to allow full verification despite significant schedule and budget constraints. The paper presents the verification philosophy tailored for the ExoMars mission in line with the above considerations, starting from the model philosophy, showing the verification activities flow and the sharing of tests between the different levels (system, modules, subsystems, etc) and giving an overview of the main test defined at Spacecraft level. The paper is mainly focused on the verification aspects of the EDL Demonstrator Module and the Rover Module, for which an intense testing activity without previous heritage in Europe is foreseen. In particular the Descent Module has to survive to the Mars atmospheric entry and landing, its surface platform has to stay operational for 8 sols on Martian surface, transmitting scientific data to the Orbiter. The Rover Module has to perform 180 sols mission in Mars surface environment. These operative conditions cannot be verified only by analysis; consequently a test campaign is defined including mechanical tests to simulate the entry loads, thermal test in Mars environment and the simulation of Rover operations on a 'Mars like' terrain. Finally, the paper present an overview of the documentation flow defined to ensure the correct translation of the mission requirements in verification activities (test, analysis, review of design) until the final verification close-out of the above requirements with the final verification reports.

  3. Multibody modeling and verification

    NASA Astrophysics Data System (ADS)

    Wiens, Gloria J.

    1989-12-01

    A summary of a ten week project on flexible multibody modeling, verification and control is presented. Emphasis was on the need for experimental verification. A literature survey was conducted for gathering information on the existence of experimental work related to flexible multibody systems. The first portion of the assigned task encompassed the modeling aspects of flexible multibodies that can undergo large angular displacements. Research in the area of modeling aspects were also surveyed, with special attention given to the component mode approach. Resulting from this is a research plan on various modeling aspects to be investigated over the next year. The relationship between the large angular displacements, boundary conditions, mode selection, and system modes is of particular interest. The other portion of the assigned task was the generation of a test plan for experimental verification of analytical and/or computer analysis techniques used for flexible multibody systems. Based on current and expected frequency ranges of flexible multibody systems to be used in space applications, an initial test article was selected and designed. A preliminary TREETOPS computer analysis was run to ensure frequency content in the low frequency range, 0.1 to 50 Hz. The initial specifications of experimental measurement and instrumentation components were also generated. Resulting from this effort is the initial multi-phase plan for a Ground Test Facility of Flexible Multibody Systems for Modeling Verification and Control. The plan focusses on the Multibody Modeling and Verification (MMV) Laboratory. General requirements of the Unobtrusive Sensor and Effector (USE) and the Robot Enhancement (RE) laboratories were considered during the laboratory development.

  4. Multibody modeling and verification

    NASA Technical Reports Server (NTRS)

    Wiens, Gloria J.

    1989-01-01

    A summary of a ten week project on flexible multibody modeling, verification and control is presented. Emphasis was on the need for experimental verification. A literature survey was conducted for gathering information on the existence of experimental work related to flexible multibody systems. The first portion of the assigned task encompassed the modeling aspects of flexible multibodies that can undergo large angular displacements. Research in the area of modeling aspects were also surveyed, with special attention given to the component mode approach. Resulting from this is a research plan on various modeling aspects to be investigated over the next year. The relationship between the large angular displacements, boundary conditions, mode selection, and system modes is of particular interest. The other portion of the assigned task was the generation of a test plan for experimental verification of analytical and/or computer analysis techniques used for flexible multibody systems. Based on current and expected frequency ranges of flexible multibody systems to be used in space applications, an initial test article was selected and designed. A preliminary TREETOPS computer analysis was run to ensure frequency content in the low frequency range, 0.1 to 50 Hz. The initial specifications of experimental measurement and instrumentation components were also generated. Resulting from this effort is the initial multi-phase plan for a Ground Test Facility of Flexible Multibody Systems for Modeling Verification and Control. The plan focusses on the Multibody Modeling and Verification (MMV) Laboratory. General requirements of the Unobtrusive Sensor and Effector (USE) and the Robot Enhancement (RE) laboratories were considered during the laboratory development.

  5. Secure verification by multifactor optical validation

    NASA Astrophysics Data System (ADS)

    Millán, María S.; Pérez-Cabré, Elisabet; Javidi, Bahram

    2006-08-01

    We propose a novel multifactor encryption-authentication technique that reinforces optical security by allowing the simultaneous AND-verification of more than one primary image. We describe a method to obtain four-factor authentication. The authenticators are: two different primary images containing signatures or biometric information and two different white random sequences that act as key codes. So far, optical security techniques deal with a single primary image (an object, a signature, or a biometric signal), not combined primary images. Our method involves double random-phase encoding, fully phase-based encryption and a combined nonlinear JTC and a classical 4f-correlator for simultaneous recognition and authentication of multiple images. There is no a priori constraint about the type of primary images to encode. Two reference images, double-phase encoded and encrypted in an ID tag (or card) are compared with the actual input images obtained in situ from the person whose authentication is wanted. The two key phase codes are known by the authentication processor. The complex-amplitude encoded image of the ID tag has a dim appearance that does not reveal the content of any primary reference image nor the key codes. The encoded image function fullfils the general requirements of invisible content, extreme difficulty in counterfeiting and real-time automatic verification. The possibility of introducing nonlinearities in the Fourier plane of the optical processor will be exploited to improve the system performance. This optical technique is attractive for high-security purposes that require multifactor reliable authentication.

  6. Manhattan Project Signature Facilities

    NSDL National Science Digital Library

    Christopher Griffith

    This collection is a list of the Department of Energy's Manhattan Project "Signature Facilities" approved by the Departmental Corporate Board on Historic Preservation in December 1999. Taken together, the eight Signature Facilities provide the core for DOE's ability to successfully interpret, whether in situ or through museum or other interpretive setting, the Manhattan Project mission of developing atomic bombs during World War II. This list does not preclude protection and preservation of other historic facilities in the nuclear-weapons complex. Just as these facilities constitute the core for DOE-wide preservation, access, and interpretation, sites may have site-specific signature facilities that best interpret that site's Manhattan Project mission from a local, state, regional, national or international perspective.

  7. Dictionary of LHC Signatures

    E-print Network

    A. Belyaev; I. A. Christidi; A. De Roeck; R. M. Godbole; B. Mellado; A. Nyffeler; C. Petridou; D. P. Roy

    2008-06-17

    We report on a plan to establish a "Dictionary of LHC Signatures", an initiative that started at the WHEPPX workshop in January 2008. This study aims towards the strategy on distinguishing of 3 classes of dark matter motivated scenarios such as R-parity conserved supersymmetry, Little Higgs models with T-parity conservation and Universal Extra Dimensions with KK-parity for generic cases of their realization in wide range of the model space. Discriminating signatures are tabulated and will need a further detailed analysis.

  8. Current Signature Sensor

    NASA Technical Reports Server (NTRS)

    Perotti, Jose M. (Inventor); Lucena, Angel (Inventor); Ihlefeld, Curtis (Inventor); Burns, Bradley (Inventor); Bassignani, Mario (Inventor); Bassignani, Karin E. (Inventor)

    2005-01-01

    A solenoid health monitoring system uses a signal conditioner and controller assembly in one embodiment that includes analog circuitry and a DSP controller. The analog circuitry provides signal conditioning to the low-level raw signal coming from a signal acquisition assembly. Software running in a DSP analyzes the incoming data (recorded current signature) and determines the state of the solenoid whether it is energized, de-energized, or in a transitioning state. In one embodiment, the software identifies key features in the current signature during the transition phase and is able to determine the health of the solenoid.

  9. Current signature sensor

    NASA Technical Reports Server (NTRS)

    Perotti, Jose M. (Inventor); Lucena, Angel (Inventor); Ihlefeld, Curtis (Inventor); Burns, Bradley (Inventor); Bassignani, Karin E. (Inventor)

    2005-01-01

    A solenoid health monitoring system uses a signal conditioner and controller assembly in one embodiment that includes analog circuitry and a DSP controller. The analog circuitry provides signal conditioning to the low-level raw signal coming from a signal acquisition assembly. Software running in a DSP analyzes the incoming data (recorded current signature) and determines the state of the solenoid whether it is energized, de-energized, or in a transitioning state. In one embodiment, the software identifies key features in the current signature during the transition phase and is able to determine the health of the solenoid.

  10. Coverage Metrics for Formal Verification Hana Chockler

    E-print Network

    Kupferman, Orna

    the verification process as ex- haustive as possible is even more crucial in simulation-based verification, where, there has been an extensive research in the simulation-based verification community on coverage metrics. In this paper we adapt the work done on coverage in simulation-based verification to the formal- verification

  11. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOEpatents

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  12. Microprocessor Design Verification

    Microsoft Academic Search

    Warren A. Hunt Jr.

    1989-01-01

    Abstract Abstract. The verification of a microprocessor,design has been accomplished using a mechanical theorem prover. This microprocessor, the FM8502, is a 32-bit generalpurpose, von Neumann processor whose design-level (gate-level) specification has been verified with respect to,its instruction-level specification. Both,specifications were written in the Boyer-Moore logic, and the proof of correctness was carried out with the Boyer-Moore theorem prover. 2 Chapter

  13. Verification of Unloadable Modules

    Microsoft Academic Search

    Bart Jacobs; Jan Smans; Frank Piessens

    \\u000a Programs in unsafe languages, like C and C++, may dynamically load and unload modules. For example, some operating system\\u000a kernels support dynamic loading and unloading of device drivers. This causes specific difficulties in the verification of\\u000a such programs and modules; in particular, it must be verified that no functions or global variables from the module are used\\u000a after the module

  14. Search for Life Signatures

    NASA Astrophysics Data System (ADS)

    Elliott, John R.

    2014-12-01

    Once again, it is a pleasure to bring you a selection of papers from our series on Searching for Life Signatures. In this special issue, a small selection of papers are presented, from two symposia on the search for life beyond of our own biosphere.

  15. A Signature Style

    ERIC Educational Resources Information Center

    Smiles, Robin V.

    2005-01-01

    This article discusses Dr. Amalia Amaki and her approach to art as her signature style by turning everyday items into fine art. Amaki is an assistant professor of art, art history, and Black American studies at the University of Delaware. She loves taking unexpected an object and redefining it in the context of art--like a button, a fan, a faded…

  16. TFE Verification Program

    SciTech Connect

    Not Available

    1990-03-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TF Verification Program builds directly on the technology and data base developed in the 1960s and 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern. The general logic and strategy of the program to achieve its objectives is shown on Fig. 1-1. Five prior programs form the basis for the TFE Verification Program: (1) AEC/NASA program of the 1960s and early 1970; (2) SP-100 concept development program;(3) SP-100 thermionic technology program; (4) Thermionic irradiations program in TRIGA in FY-86; (5) and Thermionic Technology Program in 1986 and 1987. 18 refs., 64 figs., 43 tabs.

  17. Quantum money with classical verification

    NASA Astrophysics Data System (ADS)

    Gavinsky, Dmitry

    2014-12-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  18. Quantum Money with Classical Verification

    E-print Network

    Dmitry Gavinsky

    2012-03-15

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  19. Field Instructors and Online Training: An Exploratory Survey

    ERIC Educational Resources Information Center

    Dedman, Denise E.; Palmer, Louann Bierlein

    2011-01-01

    Despite field placement being the signature pedagogy of the social work profession, little research exists regarding methods for training field instructors. This study captures their perceptions regarding the use of online training. An online survey of 642 field instructors from 4 universities produced 208 responses. Less than 4% rejected the idea…

  20. Identification of host response signatures of infection.

    SciTech Connect

    Branda, Steven S.; Sinha, Anupama; Bent, Zachary

    2013-02-01

    Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for large-scale, highly-efficient efforts to identify and verify infection-specific host NA signatures in human populations.

  1. Lightweight Email Signatures (Extended Abstract)

    E-print Network

    Adida, Ben

    2006-01-01

    We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF effort to standardize domain-based email signatures. LES shares ...

  2. Online Games

    NSDL National Science Digital Library

    This is the home of resource collections that support the use of online games and environments for teaching geoscience. There is now a collection of relevant references, examples of online games, and ideas for teaching with online games suggested by participants in the Spring 2008 workshop.

  3. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-print Network

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department__________________________________________________ Employment Position

  4. Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients

    E-print Network

    Van Oorschot, Paul

    Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over to prevent fraud, comply with media streaming licencing, regulate online gambling/voting, etc. An adversary geographic regions, such as media streaming [1] (e.g. hulu.com); others restrict certain operations

  5. Wake Signature Detection

    NASA Astrophysics Data System (ADS)

    Spedding, Geoffrey R.

    2014-01-01

    An accumulated body of quantitative evidence shows that bluff-body wakes in stably stratified environments have an unusual degree of coherence and organization, so characteristic geometries such as arrays of alternating-signed vortices have very long lifetimes, as measured in units of buoyancy timescales, or in the downstream distance scaled by a body length. The combination of pattern geometry and persistence renders the detection of these wakes possible in principle. It now appears that identifiable signatures can be found from many disparate sources: Islands, fish, and plankton all have been noted to generate features that can be detected by climate modelers, hopeful navigators in open oceans, or hungry predators. The various types of wakes are reviewed with notes on why their signatures are important and to whom. A general theory of wake pattern formation is lacking and would have to span many orders of magnitude in Reynolds number.

  6. A Survey of Two Signature Aggregation Techniques

    Microsoft Academic Search

    Dan Boneh; Ben Lynn; Hovav Shacham

    2003-01-01

    We survey two recent signature constructions that sup- port signature aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into a single signature. This single signature (and all n original messages) will convince any verifier that the n users signed the n orig- inal messages (i.e., for i =

  7. Continuous Verification Using Multimodal Biometrics

    E-print Network

    Sim, Terence

    efficiently is important to reduce this window of vulnerability. By this we mean that biometric verification- fication with a concomitant decrease in vulnerability to impersonation [4]. Use of multiple biometrics hasContinuous Verification Using Multimodal Biometrics Sheng Zhang, Rajkumar Janakiraman, Terence Sim

  8. Verification Challenges Pervasive Information Flow

    E-print Network

    Pierce, Benjamin C.

    Verification Challenges of Pervasive Information Flow Benjamin C. Pierce University of Pennsylvania/SAFE 2. Verification challenges Many challenges! #12;Questions welcome! (any time) #12;Vision #12;·Clean-slate redesign of the HW / OS / PL stack ·Support at all levels for · Memory safety · Strong dynamic typing

  9. Biometric verification with correlation filters

    Microsoft Academic Search

    B. V. K. Vijaya Kumar; Marios Savvides; Chunyan Xie; Krithika Venkataramani; Jason Thornton; Abhijit Mahalanobis

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive

  10. Software Verification and Validation Procedure

    SciTech Connect

    Olund, Thomas S.

    2008-09-15

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  11. Knowledge Signatures for Information Integration

    SciTech Connect

    Thomson, Judi; Cowell, Andrew J.; Paulson, Patrick R.; Butner, R. Scott; Whiting, Mark A.

    2003-10-25

    This paper introduces the notion of a knowledge signature: a concise, ontologically-driven representation of the semantic characteristics of data. Knowledge signatures provide programmatic access to data semantics while allowing comparisons to be made across different types of data such as text, images or video, enabling efficient, automated information integration. Through observation, which determines the degree of association between data and ontological concepts, and refinement, which uses the axioms and structure of the domain ontology to place the signature more accurately within the context of the domain, knowledge signatures can be created. A comparison of such signatures for two different pieces of data results in a measure of their semantic separation. This paper discusses the definition of knowledge signatures along with the design and prototype implementation of a knowledge signature generator.

  12. Verification of LHS distributions.

    SciTech Connect

    Swiler, Laura Painton

    2006-04-01

    This document provides verification test results for normal, lognormal, and uniform distributions that are used in Sandia's Latin Hypercube Sampling (LHS) software. The purpose of this testing is to verify that the sample values being generated in LHS are distributed according to the desired distribution types. The testing of distribution correctness is done by examining summary statistics, graphical comparisons using quantile-quantile plots, and format statistical tests such as the Chisquare test, the Kolmogorov-Smirnov test, and the Anderson-Darling test. The overall results from the testing indicate that the generation of normal, lognormal, and uniform distributions in LHS is acceptable.

  13. Software Testing and Verification

    NSDL National Science Digital Library

    The current issue of the IBM Systems Journal examines many aspects of software testing and verification. This new material contains ten articles written by workers in the IBM Research Division. Some of the papers, such as Testing z/OS, might be specific to IBM operations; however, most can be useful to individuals or companies implementing similar testing strategies. One article in particular discusses three case studies of Orthogonal Defect Classification and how it can be used "to improve software testing." Although the issue cannot be downloaded as a whole, individual papers can be viewed or downloaded in various formats.

  14. Electromagnetic Signature Technique as a Promising Tool to Verify Nuclear Weapons Storage and Dismantlement under a Nuclear Arms Control Regime

    SciTech Connect

    Bunch, Kyle J.; Williams, Laura S.; Jones, Anthony M.; Ramuhalli, Pradeep

    2012-08-01

    The 2010 ratification of the New START Treaty has been widely regarded as a noteworthy national security achievement for both the Obama administration and the Medvedev-Putin regime, but deeper cuts are envisioned under future arms control regimes. Future verification needs will include monitoring the storage of warhead components and fissile materials and verifying dismantlement of warheads, pits, secondaries, and other materials. From both the diplomatic and technical perspectives, verification under future arms control regimes will pose new challenges. Since acceptable verification technology must protect sensitive design information and attributes, non-nuclear non-sensitive signatures may provide a significant verification tool without the use of additional information barriers. The use of electromagnetic signatures to monitor nuclear material storage containers is a promising technology with the potential to fulfill these challenging requirements. Research performed at Pacific Northwest National Laboratory (PNNL) has demonstrated that low frequency electromagnetic signatures of sealed metallic containers can be used to confirm the presence of specific components on a “yes/no” basis without revealing classified information. Arms control inspectors might use this technique to verify the presence or absence of monitored items, including both nuclear and non-nuclear materials. Although additional research is needed to study signature aspects such as uniqueness and investigate container-specific scenarios, the technique potentially offers a rapid and cost-effective tool to verify reduction and dismantlement of U.S. and Russian nuclear weapons.

  15. A signature analysis based method for elliptical shape

    NASA Astrophysics Data System (ADS)

    Guarneri, Ivana; Guarnera, Mirko; Messina, Giuseppe; Tomaselli, Valeria

    2010-01-01

    The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniques involved in these fields need to be supported by more powerful and accurate routines. The aim of the proposed algorithm is to detect elliptical shapes from digital input images. It can be successfully applied in topics as signal detection or red eye removal, where the elliptical shape degree assessment can improve performances. The method has been designed to handle low resolution and partial occlusions. The algorithm is based on the signature contour analysis and exploits some geometrical properties of elliptical points. The proposed method is structured in two parts: firstly, the best ellipse which approximates the object shape is estimated; then, through the analysis and the comparison between the reference ellipse signature and the object signature, the algorithm establishes if the object is elliptical or not. The first part is based on symmetrical properties of the points belonging to the ellipse, while the second part is based on the signature operator which is a functional representation of a contour. A set of real images has been tested and results point out the effectiveness of the algorithm in terms of accuracy and in terms of execution time.

  16. Face Verification Put to Test: A Hill-Climbing Attack Based on the Uphill-Simplex Algorithm

    E-print Network

    Autonoma de Madrid, Universidad

    of the existing works studying the vulnerabilities of biometric systems to attacks against the inner modules used to break a signature-based verification system. 1. Introduction Due to the fact that biometrics]. These vulnerability studies have helped to improve the biometric technology by making public certain flaws

  17. Automata for the verification of monadic second-order graph properties Bruno Courcelle1,, Ir`ene Durand

    E-print Network

    Paris-Sud XI, Université de

    Automata for the verification of monadic second-order graph properties Bruno Courcelle1,, Ir-order sentences. These automata recognize the terms over fixed finite signatures that define graphs satisfying, that are nevertheless interesting for Graph Theory. We give explicit constructions of automata relative to graphs

  18. Alignment verification procedures

    NASA Technical Reports Server (NTRS)

    Edwards, P. R.; Phillips, E. P.; Newman, J. C., Jr.

    1988-01-01

    In alignment verification procedures each laboratory is required to align its test machines and gripping fixtures to produce a nearly uniform tensile stress field on an un-notched sheet specimen. The blank specimens (50 mm w X 305 mm l X 2.3 mm th) supplied by the coordinators were strain gauged. Strain gauge readings were taken at all gauges (n = 1 through 10). The alignment verification procedures are as follows: (1) zero all strain gauges while specimen is in a free-supported condition; (2) put strain-gauged specimen in the test machine so that specimen front face (face 1) is in contact with reference jaw (standard position of specimen), tighten grips, and at zero load measure strains on all gauges. (epsilon sub nS0 is strain at gauge n, standard position, zero load); (3) with specimen in machine and at a tensile load of 10 kN measure strains (specimen in standard position). (Strain = epsilon sub nS10); (4) remove specimen from machine. Put specimen in machine so that specimen back face (face 2) is in contact with reference jaw (reverse position of specimen), tighten grips, and at zero load measure strains on all gauges. (Strain - epsilon sub nR0); and (5) with specimen in machine and at tensile load of 10 kN measure strains (specimen in reverse position). (epsilon sub nR10 is strain at gauge n, reverse position, 10 kN load).

  19. TFE Verification Program

    SciTech Connect

    Not Available

    1993-05-01

    The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE (thermionic fuel element) suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TFE Verification Program builds directly on the technology and data base developed in the 1960s and early 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive features of thermionic power conversion technology were recognized but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern.

  20. Heart Online

    NSDL National Science Digital Library

    Available online the journal Heart (formerly the British Heart Journal), "a leading international clinical journal" reports advances on the treatment and prevention of cardiovascular disease. Produced by the BMJ Publishing Group, online full-text content begins October 1997; online abstracts begin with 1970 issues, and tables of contents go back to 1966. Heart is made available electronically with assistance from Stanford University's HighWire Press.

  1. Functional Verification of USB Mass Storage

    Microsoft Academic Search

    Xiaobin Chu; Tiejun Lun; Yu Zong

    2008-01-01

    This paper presents a functional verification of USB2.0 Card Reader, which includes verification environment, functional coverage model design and course of debug. This system not only finds bugs in the DUT, but also verifies the compliance between hosts and device. The methods of the verification and coverage model design facilitate the verification of USB Mass Storage project which need to

  2. Signature CERN-URSS

    SciTech Connect

    None

    2006-01-24

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  3. Signature CERN-URSS

    ScienceCinema

    None

    2011-04-25

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  4. Advanced spectral signature discrimination algorithm

    NASA Astrophysics Data System (ADS)

    Chakravarty, Sumit; Cao, Wenjie; Samat, Alim

    2013-05-01

    This paper presents a novel approach to the task of hyperspectral signature analysis. Hyperspectral signature analysis has been studied a lot in literature and there has been a lot of different algorithms developed which endeavors to discriminate between hyperspectral signatures. There are many approaches for performing the task of hyperspectral signature analysis. Binary coding approaches like SPAM and SFBC use basic statistical thresholding operations to binarize a signature which are then compared using Hamming distance. This framework has been extended to techniques like SDFC wherein a set of primate structures are used to characterize local variations in a signature together with the overall statistical measures like mean. As we see such structures harness only local variations and do not exploit any covariation of spectrally distinct parts of the signature. The approach of this research is to harvest such information by the use of a technique similar to circular convolution. In the approach we consider the signature as cyclic by appending the two ends of it. We then create two copies of the spectral signature. These three signatures can be placed next to each other like the rotating discs of a combination lock. We then find local structures at different circular shifts between the three cyclic spectral signatures. Texture features like in SDFC can be used to study the local structural variation for each circular shift. We can then create different measure by creating histogram from the shifts and thereafter using different techniques for information extraction from the histograms. Depending on the technique used different variant of the proposed algorithm are obtained. Experiments using the proposed technique show the viability of the proposed methods and their performances as compared to current binary signature coding techniques.

  5. Verification of VENTSAR

    SciTech Connect

    Simpkins, A.A.

    1995-01-01

    The VENTSAR code is an upgraded and improved version of the VENTX code, which estimates concentrations on or near a building from a release at a nearby location. The code calculates the concentrations either for a given meteorological exceedance probability or for a given stability and wind speed combination. A single building can be modeled which lies in the path of the plume, or a penthouse can be added to the top of the building. Plume rise may also be considered. Release types can be either chemical or radioactive. Downwind concentrations are determined at user-specified incremental distances. This verification report was prepared to demonstrate that VENTSAR is properly executing all algorithms and transferring data. Hand calculations were also performed to ensure proper application of methodologies.

  6. Online Pricing.

    ERIC Educational Resources Information Center

    Garman, Nancy; And Others

    1990-01-01

    The first of four articles describes the move by the European Space Agency to eliminate connect time charges on its online retrieval system. The remaining articles describe the pricing structure of DIALOG, compare the two pricing schemes, and discuss online pricing from the user's point of view. (CLB)

  7. Generic interpreters and microprocessor verification

    NASA Technical Reports Server (NTRS)

    Windley, Phillip J.

    1990-01-01

    The following topics are covered in viewgraph form: (1) generic interpreters; (2) Viper microprocessors; (3) microprocessor verification; (4) determining correctness; (5) hierarchical decomposition; (6) interpreter theory; (7) AVM-1; (8) phase-level specification; and future work.

  8. Runtime verification for stochastic systems

    E-print Network

    Wilcox, Cristina M

    2010-01-01

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  9. Biometric verification with correlation filters

    NASA Astrophysics Data System (ADS)

    Vijaya Kumar, B. V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-01

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification.

  10. Biometric verification with correlation filters.

    PubMed

    Vijaya Kumar, B V K; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason; Mahalanobis, Abhijit

    2004-01-10

    Using biometrics for subject verification can significantly improve security over that of approaches based on passwords and personal identification numbers, both of which people tend to lose or forget. In biometric verification the system tries to match an input biometric (such as a fingerprint, face image, or iris image) to a stored biometric template. Thus correlation filter techniques are attractive candidates for the matching precision needed in biometric verification. In particular, advanced correlation filters, such as synthetic discriminant function filters, can offer very good matching performance in the presence of variability in these biometric images (e.g., facial expressions, illumination changes, etc.). We investigate the performance of advanced correlation filters for face, fingerprint, and iris biometric verification. PMID:14735958

  11. PERSONAL IDENTITY VERIFICATION (PIV) OF

    E-print Network

    March 2005 PERSONAL IDENTITY VERIFICATION (PIV) OF FEDERAL EMPLOYEES AND CONTRACTORS: FEDERAL A new Federal Information Processing Standard (FIPS) for a government- wide personal identity enhance security, increase government efficiency, reduce identity fraud, and protect personal privacy

  12. EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________

    E-print Network

    Bolding, M. Chad

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department_ Clemson University ________________________________ Employment Posn Title

  13. High stakes in INF verification

    SciTech Connect

    Krepon, M.

    1987-06-01

    The stakes involved in negotiating INF verification arrangements are high. While these proposals deal only with intermediate-range ground-launched cruise and mobile missiles, if properly devised they could help pave the way for comprehensive limits on other cruise missiles and strategic mobile missiles. In contrast, poorly drafted monitoring provisions could compromise national industrial security and generate numerous compliance controversies. Any verification regime will require new openness on both sides, but that means significant risks as well as opportunities. US and Soviet negotiators could spend weeks, months, and even years working out in painstaking detail verification provisions for medium-range missiles. Alternatively, if the two sides wished to conclude an INF agreement quickly, they could defer most of the difficult verification issues to the strategic arms negotiations.

  14. Verification by Augmented Finitary Abstraction

    Microsoft Academic Search

    Yonit Kesten; Amir Pnueli

    2000-01-01

    The paper deals with the proof method of verification by finitary abstraction (VFA), which presents a feasible approach to the verification of the temporal properties of (potentially infinite-state) reactive systems. The method consists of a two-step process by which, in a first step, the system and its temporal specification are jointly abstracted into a finite-state system and a finite-state specification.

  15. Confidential Signatures and Deterministic Signcryption

    E-print Network

    Manulis, Mark

    Confidential Signatures and Deterministic Signcryption Alexander W. Dent1 , Marc Fischlin2 , Mark encrypts and signs a message in parallel, is usually not recommended for confidential message trans of confidential signature schemes, which hide all information about (high-entropy) input messages. In this work we

  16. Histology Online

    NSDL National Science Digital Library

    2011-08-01

    Histology-online is a web-based, interactive histology textbook and atlas. It includes a computerized microscope to examine tissues and organs and provides a new way to teach histology that is preferred by students.

  17. Protocol Online

    NSDL National Science Digital Library

    Long-Cheng Li (Protocol Online)

    2012-01-06

    Protocol Online is a database of research protocols in a variety of life science fields. It contains protocols contributed by worldwide researchers as well as links to web protocols hosted by worldwide research labs, biotech companies, personal web sites. The data is stored in a MySql relational database. Protocol Online also hosts discipline specific discussion forums (BioForum), and provides a free PubMed search and alerting service (PubAlert).

  18. Photosynthesis online.

    PubMed

    Orr, Larry; Govindjee

    2010-08-01

    Online access to the Internet and the World Wide Web have become important for public awareness and for educating the world's population, including its political leaders, students, researchers, teachers, and ordinary citizens seeking information. Relevant information on photosynthesis-related Web sites and other online locations is grouped into several categories: (1) group sites, (2) sites by subject, (3) individual researcher's sites, (4) sites for educators and students, and (5) other useful sites. PMID:20577902

  19. Halloween Online

    NSDL National Science Digital Library

    The scariest night of the year is almost upon us, and this site will help users get into the proper "spirit." Halloween Online is simply put a massive Halloween resource, with decorating and costume tips; a guide to carving and displaying your pumpkins; a selection of featured articles and interviews; Halloween recipes; downloadable graphics ("Scream Savers") and music files; e-cards; online games; and a large collection of links, among other offerings.

  20. On the signature of LINCOS

    NASA Astrophysics Data System (ADS)

    Ollongren, Alexander

    2010-12-01

    Suppose the international SETI effort yields the discovery of some signal of evidently non-natural origin. Could it contain linguistic information formulated in some kind of Lingua Cosmica? One way to get insight into this matter is to consider what specific (bio) linguistic signature( s) could be attached to a cosmic language for interstellar communication—designed by humans or an alien society having reached a level of intelligence (and technology) comparable to or surpassing ours. For this purpose, we consider in the present paper the logico-linguistic system LINCOS for ( A)CETI, developed during a number of years by the author in several papers and a monograph [1]. The system has a two-fold signature, which distinguishes it significantly from natural languages. In fact abstract and concrete signatures can be distinguished. That an abstract kind occurs is due to the manner in which abstractions of reality are represented in LINCOS-texts. They can take compound forms because the system is multi-expressive—partly due to the availability of inductive (recursive) entities. On the other hand, the concrete signature of LINCOS is related to the distribution of delimiters and predefined tokens in texts. Assigning measures to concrete signatures will be discussed elsewhere. The present contribution concentrates on the abstract signature of the language. At the same time, it is realized that an alien Lingua Cosmica might, but not necessarily needs to have this kind of signatures.

  1. ORIGINAL ARTICLE An expression signature at diagnosis to estimate prostate cancer

    E-print Network

    Cai, Long

    OPEN ORIGINAL ARTICLE An expression signature at diagnosis to estimate prostate cancer patients and prostate cancer (PCa)-specific survival in PCa patients at diagnosis. METHODS: To explore the importance. Prostate Cancer and Prostatic Disease (2014) 17, 81­90; doi:10.1038/pcan.2013.57; published online 7

  2. Discrete logarithm based chameleon hashing and signatures without key exposure q

    E-print Network

    Kim, Kwangjo

    Discrete logarithm based chameleon hashing and signatures without key exposure q Xiaofeng Chen a in revised form 18 March 2011 Accepted 28 March 2011 Available online 6 May 2011 a b s t r a c t Chameleon message. However, the initial constructions of chameleon sig- natures suffer from the key exposure problem

  3. Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest Wisconsin (USA)

    E-print Network

    Wisconsin at Madison, University of

    Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest online 20 November 2010 Keywords: Fire history Charcoal analysis Fire regime Wisconsin Sand plain CHAR Charster We show how sedimentary charcoal records from multiple sites within a single landscape can be used

  4. Online finger-knuckle-print verification for personal authentication

    Microsoft Academic Search

    Lin Zhang; Lei Zhang; David Zhang; Hailong Zhu

    2010-01-01

    Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person's identity. By observing that the texture pattern produced by bending the finger knuckle is highly distinctive, in this paper we present a new biometric authentication system using finger-knuckle-print (FKP) imaging. A specific data acquisition device is constructed to capture the FKP images, and

  5. Infrasound Rocket Signatures

    NASA Astrophysics Data System (ADS)

    Olson, J.

    2012-09-01

    This presentation reviews the work performed by our research group at the Geophysical Institute as we have applied the tools of infrasound research to rocket studies. This report represents one aspect of the effort associated with work done for the National Consortium for MASINT Research (NCMR) program operated by the National MASINT Office (NMO) of the Defense Intelligence Agency (DIA). Infrasound, the study of acoustic signals and their propagation in a frequency band below 15 Hz, enables an investigator to collect and diagnose acoustic signals from distant sources. Absorption of acoustic energy in the atmosphere decreases as the frequency is reduced. In the infrasound band signals can propagate hundreds and thousands of kilometers with little degradation. We will present an overview of signatures from rockets ranging from small sounding rockets such as the Black Brandt and Orion series to larger rockets such as Delta 2,4 and Atlas V. Analysis of the ignition transients provides information that can uniquely identify the motor type. After the rocket ascends infrasound signals can be used to characterize the rocket and identify the various events that take place along a trajectory such as staging and maneuvering. We have also collected information on atmospheric shocks and sonic booms from the passage of supersonic vehicles such as the shuttle. This review is intended to show the richness of the unique signal set that occurs in the low-frequency infrasound band.

  6. Automated Verification of Shape and Size

    E-print Network

    Nguyen, Huu Hai

    Despite their popularity and importance, pointer based programs remain a major challenge for program verification. In this paper, we propose an automated verification system that is concise, precise and expressive for ...

  7. Development of Asset Fault Signatures for Prognostic and Health Management in the Nuclear Industry

    SciTech Connect

    Vivek Agarwal; Nancy J. Lybeck; Randall Bickford; Richard Rusaw

    2014-06-01

    Proactive online monitoring in the nuclear industry is being explored using the Electric Power Research Institute’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. The FW-PHM Suite is a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. The FW-PHM Suite has four main modules: Diagnostic Advisor, Asset Fault Signature (AFS) Database, Remaining Useful Life Advisor, and Remaining Useful Life Database. This paper focuses on development of asset fault signatures to assess the health status of generator step-up generators and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. At the most basic level, fault signatures are comprised of an asset type, a fault type, and a set of one or more fault features (symptoms) that are indicative of the specified fault. The AFS Database is populated with asset fault signatures via a content development exercise that is based on the results of intensive technical research and on the knowledge and experience of technical experts. The developed fault signatures capture this knowledge and implement it in a standardized approach, thereby streamlining the diagnostic and prognostic process. This will support the automation of proactive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  8. Structural verification for GAS experiments

    NASA Technical Reports Server (NTRS)

    Peden, Mark Daniel

    1992-01-01

    The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

  9. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  10. NISTIR 7284 Personal Identity Verification Card

    E-print Network

    NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

  11. Coverage Metrics for Formal Verification Hana Chockler

    E-print Network

    Vardi, Moshe Y.

    in simulation­based verification, where the infeasible task of checking all input sequences is replaced the exhaustiveness of the test suite, and indeed, there has been an extensive research in the simulation­based in simulation­ based verification to the formal­verification setting in order to obtain new coverage metrics

  12. Automated Verification: Graphs, Logic, and Automata

    Microsoft Academic Search

    Moshe Y. Vardi

    2003-01-01

    Automated verification is one of the most success­ ful applications of automated reasoning in com­ puter science. In automated verification one uses algorithmic techniques to establish the correctness of the design with respect to a given property. Au­ tomated verification is based on a small number of key algorithmic ideas, tying together graph theory, automata theory, and logic. In this

  13. Logic verification algorithms and their parallel implementation

    Microsoft Academic Search

    Hi-Keung Tony Ma; Srinivas Devadas; Alberto L. Sangiovanni-Vincentelli; R. Wei

    1987-01-01

    LOVER incorporates a novel approach to combinational logic verification and obtains good results when compared to existing techniques. In this paper we describe a new verification algorithm, LOVER-PODEM, whose enumeration phase is based on PODEM. A variant of LOVER-PODEM, called PLOVER, is presented. We have developed, for the first time, parallel logic verification schemes. Issues in efficiently parallelizing both general

  14. Working Memory Mechanism in Proportional Quantifier Verification

    ERIC Educational Resources Information Center

    Zajenkowski, Marcin; Szymanik, Jakub; Garraffa, Maria

    2014-01-01

    The paper explores the cognitive mechanisms involved in the verification of sentences with proportional quantifiers (e.g. "More than half of the dots are blue"). The first study shows that the verification of proportional sentences is more demanding than the verification of sentences such as: "There are seven blue and eight yellow…

  15. Verification and transparency in future arms control

    Microsoft Academic Search

    Pilat

    1996-01-01

    Verification`s importance has changed dramatically over time, although it always has been in the forefront of arms control. The goals and measures of verification and the criteria for success have changed with the times as well, reflecting such factors as the centrality of the prospective agreement to East-West relations during the Cold War, the state of relations between the United

  16. Online Algorithms 1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Online1

    E-print Network

    Ye, Yinyu

    15 The work function algorithm : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Online 15.2 Definition of the work function algorithm : : : : : : : : : : : : : : : : : : : : Online­46 15.3 Definition of the potential function : : : : : : : : : : : : : : : : : : : : : : : : Online­49 Randomized

  17. Color signatures in Amorsolo paintings

    NASA Astrophysics Data System (ADS)

    Soriano, Maricor N.; Palomero, Cherry May; Cruz, Larry; Yambao, Clod Marlan Krister; Dado, Julie Mae; Salvador-Campaner, Janice May

    2010-02-01

    We present the results of a two-year project aimed at capturing quantifiable color signatures of oil paintings of Fernando Amorsolo, the Philippine's first National Artists. Color signatures are found by comparing CIE xy measurements of skin color in portraits and ground, sky and foliage in landscapes. The results are compared with results of visual examination and art historical data as well as works done by Amorsolo's contemporaries and mentors.

  18. Ballastic signature identification systems study

    NASA Technical Reports Server (NTRS)

    Reich, A.; Hine, T. L.

    1976-01-01

    The results are described of an attempt to establish a uniform procedure for documenting (recording) expended bullet signatures as effortlessly as possible and to build a comprehensive library of these signatures in a form that will permit the automated comparison of a new suspect bullet with the prestored library. The ultimate objective is to achieve a standardized format that will permit nationwide interaction between police departments, crime laboratories, and other interested law enforcement agencies.

  19. Azores Hotspot Deep Signature

    NASA Astrophysics Data System (ADS)

    Silveira, G.; Stutzmann, E.; Davaille, A.; Montagner, J.; Mendes-Victor, L.

    2003-12-01

    The Azores archipelago occupies a lateral branch of the Mid-Atlantic ridge near the triple junction of 3 large tectonic plates, the North American, the Eurasian and the African plates. The tectonic setting is even more complex due to the existence of the Azores hotspot and to the hotspot-ridge interaction. But the hotspot origin at depth as a plume and its lateral extent are controversial subjects. High-resolution tomographic models, through the mapping of low velocity and anisotropy anomalies, can provide an important hint to evaluate the depth and lateral extent of mantle plumes. Therefore, we investigate the Azores deep seismic structure as seen on recent global and regional studies. The mapping of S-wave negative velocity anomalies in the different models reveals that the anomaly right beneath the Azores seems to be confined in the upper 200km. Considering the time evolution of a plume, this low velocity anomaly might be the signature of a present-day dying plume, that created the Azores plateau 20Ma ago. In the model from Silveira and Stutzmann (2002), the negative velocity anomaly beneath the Azores archipelago seems to be connected to a deep anomaly further at the South. This deep anomaly ( ˜28oN/26oW, 200-400km) is in the middle of the bunch of Azores, Great Meteor, Madeira and Canary hotspots, and might be related to a plume originating either in the transition zone or in the lower mantle. This single deep plume is located too far from the Azores archipelago for being responsible of the Azores plateau formation. But, due to the lithosphere geometry, this single plume might feed at present day Azores, Great Meteor, Madeira, Canaries and Cape Verde hotspots and therefore be at the origin of the present day volcanism. The diverging azimuthal anisotropy around this point below lithosphere is confirming a unique origin of these hotspots.

  20. CHEMICAL INDUCTION MIXER VERIFICATION - ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Wet-Weather Flow Technologies Pilot of the Environmental Technology Verification (ETV) Program, which is supported by the U.S. Environmental Protection Agency and facilitated by NSF International, has recently evaluated the performance of chemical induction mixers used for di...

  1. Conservation Online

    NSDL National Science Digital Library

    Started as a germ of an idea back in 1987 (on a real, live bulletin board, as opposed to an electronic one), Conservation Online (CoOL) has been providing online resources for conservation professionals since 1993. As its website announces, it is a "full text library of conservation information," covering a wide array of topics ranging from digital imaging to reprographics, and quite a bit of material in between. By clicking on any given topic, visitors will receive a brief overview of the subject, its terminology, and then a list of general online resources for consideration. Another nice feature of the site is the mailing list archive, which contain the archives of various queries submitted to different professional conservation groups, such as the Association of Moving Image Archivists, the Textiles Conservation Discussion List, and the Conservation Framer's Mailing List. The site is rounded out by a timeline that traces the CoOL's history from the summer of 1987 to July 2003.

  2. Hoover's Online

    NSDL National Science Digital Library

    Hoover's Online features an accurate and comprehensive database of company information free on the Web. Called Hoover's MasterList Plus, the database of more than 8,500 of the largest public and private U.S. companies provides company name, key personnel, address, sales, number of employees, ticker symbol and other information for companies meeting the user's designated search criteria. Hoover's Online also includes the week's top business news stories, a directory of more than 1,000 corporate Web sites, a synopsis of the 25 top-selling business books and links to other business information resources on the Web, including stock quotes and SEC filings. The new List of Lists has dozens of rankings indicating which companies are the largest, which CEOs made the most money, which companies are the best employers, and more. Almost all of Hoover's Online is free, including the content mentioned here.

  3. The theory of signature testing for VLSI

    Microsoft Academic Search

    J. Lawrence Carter

    1982-01-01

    Several methods for testing VLSI chips can be classified as signature methods. Both conventional and signature testing methods apply a number of test patterns to the inputs of the circuit. The difference is that a conventional method examines each output, while a signature method first accumulates the outputs in some data compression device, then examines the signature - the final

  4. VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New Mexico for establishing residency for tuition

    E-print Network

    New Mexico, University of

    VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New: Address: Date of Hire: Employment Status: Permanent Yes No Full-Time Yes No Temporary Yes No Part-Time Yes No Supervisor's Name Supervisor's Title Signature of Supervisor Phone Date NOTE: Employment will be verified

  5. Hybrid Enrichment Assay Methods for a UF6 Cylinder Verification Station: FY10 Progress Report

    SciTech Connect

    Smith, Leon E.; Jordan, David V.; Orton, Christopher R.; Misner, Alex C.; Mace, Emily K.

    2010-08-01

    Pacific Northwest National Laboratory (PNNL) is developing the concept of an automated UF6 cylinder verification station that would be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until the arrival of International Atomic Energy Agency (IAEA) inspectors. At the center of this unattended system is a hybrid enrichment assay technique that combines the traditional enrichment-meter method (based on the 186 keV peak from 235U) with non-traditional neutron-induced high-energy gamma-ray signatures (spawned primarily by 234U alpha emissions and 19F(alpha, neutron) reactions). Previous work by PNNL provided proof-of-principle for the non-traditional signatures to support accurate, full-volume interrogation of the cylinder enrichment, thereby reducing the systematic uncertainties in enrichment assay due to UF6 heterogeneity and providing greater sensitivity to material substitution scenarios. The work described here builds on that preliminary evaluation of the non-traditional signatures, but focuses on a prototype field system utilizing NaI(Tl) and LaBr3(Ce) spectrometers, and enrichment analysis algorithms that integrate the traditional and non-traditional signatures. Results for the assay of Type-30B cylinders ranging from 0.2 to 4.95 wt% 235U, at an AREVA fuel fabrication plant in Richland, WA, are described for the following enrichment analysis methods: 1) traditional enrichment meter signature (186 keV peak) as calculated using a square-wave convolute (SWC) algorithm; 2) non-traditional high-energy gamma-ray signature that provides neutron detection without neutron detectors and 3) hybrid algorithm that merges the traditional and non-traditional signatures. Uncertainties for each method, relative to the declared enrichment for each cylinder, are calculated and compared to the uncertainties from an attended HPGe verification station at AREVA, and the IAEA’s uncertainty target values for feed, tail and product cylinders. A summary of the major findings from the field measurements and subsequent analysis follows: • Traditional enrichment-meter assay using specially collimated NaI spectrometers and a Square-Wave-Convolute algorithm can achieve uncertainties comparable to HPGe and LaBr for product, natural and depleted cylinders. • Non-traditional signatures measured using NaI spectrometers enable interrogation of the entire cylinder volume and accurate measurement of absolute 235U mass in product, natural and depleted cylinders. • A hybrid enrichment assay method can achieve lower uncertainties than either the traditional or non-traditional methods acting independently because there is a low degree of correlation in the systematic errors of the two individual methods (wall thickness variation and 234U/235U variation, respectively). This work has indicated that the hybrid NDA method has the potential to serve as the foundation for an unattended cylinder verification station. When compared to today’s handheld cylinder-verification approach, such a station would have the following advantages: 1) improved enrichment assay accuracy for product, tail and feed cylinders; 2) full-volume assay of absolute 235U mass; 3) assay of minor isotopes (234U and 232U) important to verification of feedstock origin; single instrumentation design for both Type 30B and Type 48 cylinders; and 4) substantial reduction in the inspector manpower associated with cylinder verification.

  6. Religion Online

    NSDL National Science Digital Library

    Religion Online is an extensive digital library of over 250 book chapters, monographs, speeches, and articles on the socio-cultural aspects of Christianity. The texts, written by religious scholars, are arranged into twenty subject sections, such as Church and Society, Church History, Comparative Religion, and Sociology of Religion, among many others. Each section contains an annotated list of titles linking users to the full-text. All texts in the collection reside at the site. An author index provides users with an alternative method for document retrieval. Religion Online is compiled by William F. Fore, a retired professor of theology, communications, and cultural studies.

  7. Preservation Online

    NSDL National Science Digital Library

    The National Trust for Historic Preservation has received a number of awards for its magazine, Preservation, and their online version is well worth a look. The site is quite nice, and it contains brief profiles of current preservation stories written especially for this website. Recent stories have included profiles of neon signs in Los Angeles, brewery renovations in Milwaukee, and a list of the ten most endangered Civil War battlefields. The site is rounded out by an online archive which allows visitors to search back issues from 1992 to 2006.

  8. SD Online

    NSDL National Science Digital Library

    The European Foundation presents SD Online, a special feature of the Sustainable Development pages. SD Online is a full-text database of the Foundation's resources which "explore specific facets of the sustainability debate and take advantage of the Foundation's research in a variety of areas." Beginning in 1998, the databases have grown to include a Networks database, tools database, as well as databases on SME support initiatives and education and training. Each searchable and browseable database must be accessed separately using the sidebar menu on the right, and each offers a brief explanation of the information within the database, as well as fully cataloged records.

  9. Quantum messages with signatures forgeable in arbitrated quantum signature schemes

    NASA Astrophysics Data System (ADS)

    Kim, Taewan; Choi, Jeong Woon; Jho, Nam-Su; Lee, Soojoon

    2015-02-01

    Even though a method to perfectly sign quantum messages has not been known, the arbitrated quantum signature scheme has been considered as one of the good candidates. However, its forgery problem has been an obstacle to the scheme becoming a successful method. In this paper, we consider one situation, which is slightly different from the forgery problem, that we use to check whether at least one quantum message with signature can be forged in a given scheme, although all the messages cannot be forged. If there are only a finite number of forgeable quantum messages in the scheme, then the scheme can be secured against the forgery attack by not sending forgeable quantum messages, and so our situation does not directly imply that we check whether the scheme is secure against the attack. However, if users run a given scheme without any consideration of forgeable quantum messages, then a sender might transmit such forgeable messages to a receiver and in such a case an attacker can forge the messages if the attacker knows them. Thus it is important and necessary to look into forgeable quantum messages. We show here that there always exists such a forgeable quantum message-signature pair for every known scheme with quantum encryption and rotation, and numerically show that there are no forgeable quantum message-signature pairs that exist in an arbitrated quantum signature scheme.

  10. LANL measurements verification acceptance criteria

    SciTech Connect

    Chavez, D. M. (David M.)

    2001-01-01

    The possibility of SNM diversion/theft is a major concern to organizations charged with control of Special Nuclear Material (SNM). Verification measurements are used to aid in the detection of SNM losses. The acceptance/rejection criteria for verification measurements are dependent on the facility-specific processes, the knowledge of the measured item, and the measurement technique applied. This paper will discuss some of the LANL measurement control steps and criteria applied for the acceptance of a verification measurement. The process involves interaction among the facility operations personnel, the subject matter experts of a specific instrument/technique, the process knowledge on the matrix of the measured item, and the measurement-specific precision and accuracy values. By providing an introduction to a site-specific application of measurement verification acceptance criteria, safeguards, material custodians, and SNM measurement professionals are assisted in understanding the acceptance/rejection process for measurements and their contribution of the process to the detection of SNM diversion.

  11. SFT monitoring and design verification

    Microsoft Academic Search

    Ian Markey

    2010-01-01

    The Submerged Floating Tunnel (SFT) is still a prototype structure. To change this, SFTs have to be built and we have to learn from this process. This involves comparing the structure’s real behaviour with its design and transferring this knowledge to the engineering community. Monitoring and design verification is a step in this direction. The paper discusses various aspects that

  12. Automated verification system user's guide

    NASA Technical Reports Server (NTRS)

    Hoffman, R. H.

    1972-01-01

    Descriptions of the operational requirements for all of the programs of the Automated Verification System (AVS) are provided. The AVS programs are: (1) FORTRAN code analysis and instrumentation program (QAMOD); (2) Test Effectiveness Evaluation Program (QAPROC); (3) Transfer Control Variable Tracking Program (QATRAK); (4) Program Anatomy Table Generator (TABGEN); and (5) Network Path Analysis Program (RAMBLE).

  13. Verification of Fair Transition Systems

    Microsoft Academic Search

    Orna Kupferman; Moshe Y. Vardi

    1998-01-01

    In program verification , we check that an implementation meets its specification . Both the specification and the implementation describe the possible behaviors of the program, though at different levels of abstraction. We distinguish between tw o approaches to implementation of spec- ifications. The first approach istrace-based implementation, where we require every computation of the implementation to correlate to some

  14. Significance Analysis of Prognostic Signatures

    PubMed Central

    Beck, Andrew H.; Knoblauch, Nicholas W.; Hefti, Marco M.; Kaplan, Jennifer; Schnitt, Stuart J.; Culhane, Aedin C.; Schroeder, Markus S.; Risch, Thomas; Quackenbush, John; Haibe-Kains, Benjamin

    2013-01-01

    A major goal in translational cancer research is to identify biological signatures driving cancer progression and metastasis. A common technique applied in genomics research is to cluster patients using gene expression data from a candidate prognostic gene set, and if the resulting clusters show statistically significant outcome stratification, to associate the gene set with prognosis, suggesting its biological and clinical importance. Recent work has questioned the validity of this approach by showing in several breast cancer data sets that “random” gene sets tend to cluster patients into prognostically variable subgroups. This work suggests that new rigorous statistical methods are needed to identify biologically informative prognostic gene sets. To address this problem, we developed Significance Analysis of Prognostic Signatures (SAPS) which integrates standard prognostic tests with a new prognostic significance test based on stratifying patients into prognostic subtypes with random gene sets. SAPS ensures that a significant gene set is not only able to stratify patients into prognostically variable groups, but is also enriched for genes showing strong univariate associations with patient prognosis, and performs significantly better than random gene sets. We use SAPS to perform a large meta-analysis (the largest completed to date) of prognostic pathways in breast and ovarian cancer and their molecular subtypes. Our analyses show that only a small subset of the gene sets found statistically significant using standard measures achieve significance by SAPS. We identify new prognostic signatures in breast and ovarian cancer and their corresponding molecular subtypes, and we show that prognostic signatures in ER negative breast cancer are more similar to prognostic signatures in ovarian cancer than to prognostic signatures in ER positive breast cancer. SAPS is a powerful new method for deriving robust prognostic biological signatures from clinically annotated genomic datasets. PMID:23365551

  15. Regression Verification Using Impact Summaries

    NASA Technical Reports Server (NTRS)

    Backes, John; Person, Suzette J.; Rungta, Neha; Thachuk, Oksana

    2013-01-01

    Regression verification techniques are used to prove equivalence of syntactically similar programs. Checking equivalence of large programs, however, can be computationally expensive. Existing regression verification techniques rely on abstraction and decomposition techniques to reduce the computational effort of checking equivalence of the entire program. These techniques are sound but not complete. In this work, we propose a novel approach to improve scalability of regression verification by classifying the program behaviors generated during symbolic execution as either impacted or unimpacted. Our technique uses a combination of static analysis and symbolic execution to generate summaries of impacted program behaviors. The impact summaries are then checked for equivalence using an o-the-shelf decision procedure. We prove that our approach is both sound and complete for sequential programs, with respect to the depth bound of symbolic execution. Our evaluation on a set of sequential C artifacts shows that reducing the size of the summaries can help reduce the cost of software equivalence checking. Various reduction, abstraction, and compositional techniques have been developed to help scale software verification techniques to industrial-sized systems. Although such techniques have greatly increased the size and complexity of systems that can be checked, analysis of large software systems remains costly. Regression analysis techniques, e.g., regression testing [16], regression model checking [22], and regression verification [19], restrict the scope of the analysis by leveraging the differences between program versions. These techniques are based on the idea that if code is checked early in development, then subsequent versions can be checked against a prior (checked) version, leveraging the results of the previous analysis to reduce analysis cost of the current version. Regression verification addresses the problem of proving equivalence of closely related program versions [19]. These techniques compare two programs with a large degree of syntactic similarity to prove that portions of one program version are equivalent to the other. Regression verification can be used for guaranteeing backward compatibility, and for showing behavioral equivalence in programs with syntactic differences, e.g., when a program is refactored to improve its performance, maintainability, or readability. Existing regression verification techniques leverage similarities between program versions by using abstraction and decomposition techniques to improve scalability of the analysis [10, 12, 19]. The abstractions and decomposition in the these techniques, e.g., summaries of unchanged code [12] or semantically equivalent methods [19], compute an over-approximation of the program behaviors. The equivalence checking results of these techniques are sound but not complete-they may characterize programs as not functionally equivalent when, in fact, they are equivalent. In this work we describe a novel approach that leverages the impact of the differences between two programs for scaling regression verification. We partition program behaviors of each version into (a) behaviors impacted by the changes and (b) behaviors not impacted (unimpacted) by the changes. Only the impacted program behaviors are used during equivalence checking. We then prove that checking equivalence of the impacted program behaviors is equivalent to checking equivalence of all program behaviors for a given depth bound. In this work we use symbolic execution to generate the program behaviors and leverage control- and data-dependence information to facilitate the partitioning of program behaviors. The impacted program behaviors are termed as impact summaries. The dependence analyses that facilitate the generation of the impact summaries, we believe, could be used in conjunction with other abstraction and decomposition based approaches, [10, 12], as a complementary reduction technique. An evaluation of our regression verification technique shows that our approach is capable of leveragin

  16. Ticketmaster Online

    NSDL National Science Digital Library

    Ticketmaster Online offers a browsable index of all events on sale throughout the U.S. including concerts, sports, arts, and family-oriented entertainment. Browse the entire alphabetical index or individual state, venue, or event indexes. Venue information includes phone numbers, directions, and parking. Backstage and Spotlight columns offer information about artists and events.

  17. Online 1990.

    ERIC Educational Resources Information Center

    Goldstein, Morris

    This paper examines the co-existence of online and CD-ROM technologies in terms of their existing pricing structures, marketing strategies, functionality, and future roles. "Fixed Price Unlimited Usage" (FPUU) pricing and flat-rate pricing are discussed as viable alternatives to current pricing practices. In addition, it is argued that the…

  18. Optical pattern recognition for validation and security verification

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Horner, Joseph L.

    1994-03-01

    We propose an idea for security verification of credit cards, passports, and other ID so that they cannot easily be reproduced. A new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity sensitive detector such as a CCD camera is used. The basic idea is to permanently and irretrievably bond a phase mask to a primary identification amplitude pattern such as a fingerprint, a picture of a face, or a signature. Computer simulation results and tests of the proposed system will be provided to verify that both the phase mask and the primary pattern are separately readable and identifiable in an optical processor or correlator.

  19. Optical pattern recognition for validation and security verification

    NASA Astrophysics Data System (ADS)

    Javidi, Bahram; Horner, Joseph L.

    1994-06-01

    We propose an idea for security verification of credit cards, passports, and other forms of identification so that they cannot easily be reproduced. A new scheme of complex phase/amplitude patterns that cannot be seen and cannot be coped by an intensity-sensitive detector such as a CCD camera is used. The basic idea is to permanently and irretrievably bond a phase mask to a primary identification amplitude pattern such as fingerprint, a picture of a face, or a signature. Computer simulation results and tests of the proposed system are provided to verify that both the phase mask and the primary pattern are separately readable and identifiable in an optical processor or correlator.

  20. Signature Visualization of Software Binaries

    SciTech Connect

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  1. Graph Analytics for Signature Discovery

    SciTech Connect

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh; Lo, Chaomei

    2013-06-01

    Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform unstructured data into a graph representation. By doing this we expose underlying structure in the data and can take advantage of existing graph analytics capabilities, as well as develop new capabilities. Currently we focus on applications in cybersecurity and communication domains. Within cybersecurity we aim to find signatures for perpetrators using the pass-the-hash attack, and in communications we look for emails or phone calls going up or down a chain of command. In both of these areas, and in many others, the signature we look for is a path with certain temporal properties. In this paper we discuss our methodology for finding these temporal paths within large graphs.

  2. Review of chemical signature databases.

    PubMed

    Borland, Laura; Brickhouse, Mark; Thomas, Tracey; Fountain, Augustus W

    2010-06-01

    This review assesses the current state of chemical signature databases, the primary characteristics that determine their applicability, characterization of their capability to support spectral identifications, and the target audience to which they are directed. Database file formats, spectrometer operating conditions, and spectral matching tools are found to be primary characteristics that determine the applicability of databases and their ability to support spectral identifications. Chemical signature databases have evolved in two very different directions. One movement offers a single portal for chemical signature determinations by multiple analytical techniques. The other movement is toward highly specialized databases that address narrow scientific disciplines. Both movements are necessary, and serve distinctly different needs in the analytical community. PMID:20229004

  3. Verification and transparency in future arms control

    SciTech Connect

    Pilat, J.F.

    1996-09-01

    Verification`s importance has changed dramatically over time, although it always has been in the forefront of arms control. The goals and measures of verification and the criteria for success have changed with the times as well, reflecting such factors as the centrality of the prospective agreement to East-West relations during the Cold War, the state of relations between the United States and the Soviet Union, and the technologies available for monitoring. Verification`s role may be declining in the post-Cold War period. The prospects for such a development will depend, first and foremost, on the high costs of traditional arms control, especially those associated with requirements for verification. Moreover, the growing interest in informal, or non-negotiated arms control does not allow for verification provisions by the very nature of these arrangements. Multilateral agreements are also becoming more prominent and argue against highly effective verification measures, in part because of fears of promoting proliferation by opening sensitive facilities to inspectors from potential proliferant states. As a result, it is likely that transparency and confidence-building measures will achieve greater prominence, both as supplements to and substitutes for traditional verification. Such measures are not panaceas and do not offer all that we came to expect from verification during the Cold war. But they may be the best possible means to deal with current problems of arms reductions and restraints at acceptable levels of expenditure.

  4. Ballistic Signature Identification System Study

    NASA Technical Reports Server (NTRS)

    1976-01-01

    The first phase of a research project directed toward development of a high speed automatic process to be used to match gun barrel signatures imparted to fired bullets was documented. An optical projection technique has been devised to produce and photograph a planar image of the entire signature, and the phototransparency produced is subjected to analysis using digital Fourier transform techniques. The success of this approach appears to be limited primarily by the accuracy of the photographic step since no significant processing limitations have been encountered.

  5. Signatures and Methods for the Automated Nondestructive Assay of UF6 Cylinders at Uranium Enrichment Plants

    SciTech Connect

    Smith, Leon E.; Mace, Emily K.; Misner, Alex C.; Shaver, Mark W.

    2010-08-08

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s entire cylinder inventory. These measurements are time-consuming, expensive, and assay only a small fraction of the total cylinder volume. An automated nondestructive assay system capable of providing enrichment measurements over the full volume of the cylinder could improve upon current verification practices in terms of manpower and assay accuracy. Such a station would use sensors that can be operated in an unattended mode at an industrial facility: medium-resolution scintillators for gamma-ray spectroscopy (e.g., NaI(Tl)) and moderated He-3 neutron detectors. This sensor combination allows the exploitation of additional, more-penetrating signatures beyond the traditional 185-keV emission from U-235: neutrons produced from F-19(?,n) reactions (spawned primarily from U 234 alpha emission) and high-energy gamma rays (extending up to 8 MeV) induced by neutrons interacting in the steel cylinder. This paper describes a study of these non-traditional signatures for the purposes of cylinder enrichment verification. The signatures and the radiation sensors designed to collect them are described, as are proof-of-principle cylinder measurements and analyses. Key sources of systematic uncertainty in the non-traditional signatures are discussed, and the potential benefits of utilizing these non-traditional signatures, in concert with an automated form of the traditional 185-keV-based assay, are discussed.

  6. Democrats Online

    NSDL National Science Digital Library

    Now that the political convention season is over, you may be looking for sites that offer a little more interactivity and are a little less concerned with the party line. Debuting this week is Democrats Online: A Community of American Voices. The emphasis on this site is user involvement; users are offered the opportunity to participate in real-time chat using Ewgie, a Java applet, and to post a personal web page indicating which accomplishments of the Clinton/Gore administration are most important to them. A highlight of the site is the Shockwave-driven "Help Dole Name his Cabinet," which allows users to spin the slot machine and imagine Dole's possible picks for Chief of Staff, Secretary of State, and Secretary of Defense. The results are discomforting or inspiring, depending on your perspective. A "question of the week" poll will come online on Labor Day.

  7. Dust devil signatures in infrasound records of the International Monitoring System

    NASA Astrophysics Data System (ADS)

    Lorenz, Ralph D.; Christie, Douglas

    2015-03-01

    We explore whether dust devils have a recognizable signature in infrasound array records, since several Comprehensive Nuclear-Test-Ban Treaty verification stations conducting continuous measurements with microbarometers are in desert areas which see dust devils. The passage of dust devils (and other boundary layer vortices, whether dust laden or not) causes a local temporary drop in pressure: the high-pass time domain filtering in microbarometers results in a "heartbeat" signature, which we observe at the Warramunga station in Australia. We also observe a ~50 min pseudoperiodicity in the occurrence of these signatures and some higher-frequency infrasound. Dust devils do not significantly degrade the treaty verification capability. The pipe arrays for spatial averaging used in infrasound monitoring degrade the detection efficiency of small devils, but the long observation time may allow a useful census of large vortices, and thus, the high-sensitivity infrasonic array data from the monitoring network can be useful in studying columnar vortices in the lower atmosphere.

  8. Physiology Online

    NSDL National Science Digital Library

    Physiology Online, the electronic information service of the Physiological Society, provides information about its three journals: Journal of Physiology, Proceedings of the Physiological Society, and Experimental Physiology. Also included are selected abstracts, as well as information about recent monographs, job listings (mostly in the U.K.), information about Society grants, a physiology file and software archive for both PC and Mac platforms, pointers to other physiology resources on the Internet, and a listing of upcoming meetings and conferences within the field.

  9. Negotiating Femininities Online

    ERIC Educational Resources Information Center

    Davies, Julia

    2004-01-01

    Much has been written about the potential for online learning (Fryer, 1997; www. ngfl.gov.uk/ngfl/index.html). However this literature typically emphasizes not online learning but online education. In this paper I focus on the potential for online learning, specifically learning about issues surrounding femininity in the presence of online peers,…

  10. NEXT Thruster Component Verification Testing

    NASA Technical Reports Server (NTRS)

    Pinero, Luis R.; Sovey, James S.

    2007-01-01

    Component testing is a critical part of thruster life validation activities under NASA s Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life test of two NEXT isolators was therefore initiated and has accumulated more than 10,000 hr of operation. Measurements to date indicate only a negligibly small increase in leakage current. The cathode heaters were also selected for verification testing. The technology to fabricate these heaters, developed for the International Space Station plasma contactor hollow cathode assembly, was transferred to Aerojet for the fabrication of the NEXT prototype model ion thrusters. Testing the contractor-fabricated heaters is necessary to validate fabrication processes for high reliability heaters. This paper documents the status of the propellant isolator and cathode heater tests.

  11. Ontology Matching with Semantic Verification

    PubMed Central

    Jean-Mary, Yves R.; Shironoshita, E. Patrick; Kabuka, Mansur R.

    2009-01-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies. PMID:20186256

  12. PERFORMANCE VERIFICATION OF STORMWATER TREATMENT DEVICES UNDER EPA¿S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program was created to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The program¿s goal is to further environmental protection by a...

  13. PERFORMANCE VERIFICATION OF ANIMAL WATER TREATMENT TECHNOLOGIES THROUGH EPA'S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The U.S. Environmental Protection Agency created the Environmental Technology Verification Program (ETV) to further environmental protection by accelerating the commercialization of new and innovative technology through independent performance verification and dissemination of in...

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION COATINGS AND COATING EQUIPMENT PROGRAM (ETV CCEP): LIQUID COATINGS--GENERIC VERIFICATION PROTOCOL

    EPA Science Inventory

    This report is a generic verification protocol or GVP which provides standards for testing liquid coatings for their enviornmental impacts under the Environmental Technology Verification program. It provides generic guidelines for product specific testing and quality assurance p...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION: GENERIC VERIFICATION PROTOCOL FOR BIOLOGICAL AND AEROSOL TESTING OF GENERAL VENTILATION AIR CLEANERS

    EPA Science Inventory

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  16. Verification Policy Effective January 1, 2009, MD Degree graduates requesting a verification regarding their time in

    E-print Network

    Mohaghegh, Shahab

    records. Reviewed: April 2014 #12;Verification Policy Effective January 1, 2009, MD Degree graduates requesting a verification regarding their time in the MD degree curriculum for agencies including but not limited to graduate training

  17. Verification of Fair Transisiton Systems

    Microsoft Academic Search

    Orna Kupferman; Moshe Y. Vardi

    1996-01-01

    Abstract. In program verification , we check that an implementation meets its specification . Both the specification and the implementation describe the possible behaviors of the program, though at different levels of abstraction. We distinguish between,tw o approaches to implementation,of specifications. The first approach istrace-based implementation, where we require every computation of the implementation,to correlate to some computation,of the specification.

  18. Formal verification of AI software

    NASA Technical Reports Server (NTRS)

    Rushby, John; Whitehurst, R. Alan

    1989-01-01

    The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

  19. Disaster relief through composite signatures

    NASA Astrophysics Data System (ADS)

    Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

    2012-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

  20. Molecular Signatures of Natural Selection

    E-print Network

    Nielsen, Rasmus

    Molecular Signatures of Natural Selection Rasmus Nielsen Center for Bioinformatics and Department There is an increasing interest in detecting genes, or genomic re- gions, that have been targeted by natural selection contribution of natural selection in shaping the genetic variation observed among living organisms. In one

  1. Nuclear Data Verification and Standardization

    SciTech Connect

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  2. Verification Challenges at Low Numbers

    SciTech Connect

    Benz, Jacob M.; Booker, Paul M.; McDonald, Benjamin S.

    2013-06-01

    Many papers have dealt with the political difficulties and ramifications of deep nuclear arms reductions, and the issues of “Going to Zero”. Political issues include extended deterrence, conventional weapons, ballistic missile defense, and regional and geo-political security issues. At each step on the road to low numbers, the verification required to ensure compliance of all parties will increase significantly. Looking post New START, the next step will likely include warhead limits in the neighborhood of 1000 . Further reductions will include stepping stones at1000 warheads, 100’s of warheads, and then 10’s of warheads before final elimination could be considered of the last few remaining warheads and weapons. This paper will focus on these three threshold reduction levels, 1000, 100’s, 10’s. For each, the issues and challenges will be discussed, potential solutions will be identified, and the verification technologies and chain of custody measures that address these solutions will be surveyed. It is important to note that many of the issues that need to be addressed have no current solution. In these cases, the paper will explore new or novel technologies that could be applied. These technologies will draw from the research and development that is ongoing throughout the national laboratory complex, and will look at technologies utilized in other areas of industry for their application to arms control verification.

  3. Magnetic cleanliness verification approach on tethered satellite

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Braghin, Massimo; Grande, Maurizio

    1990-01-01

    Magnetic cleanliness testing was performed on the Tethered Satellite as the last step of an articulated verification campaign aimed at demonstrating the capability of the satellite to support its TEMAG (TEthered MAgnetometer) experiment. Tests at unit level and analytical predictions/correlations using a dedicated mathematical model (GANEW program) are also part of the verification activities. Details of the tests are presented, and the results of the verification are described together with recommendations for later programs.

  4. Introduction to Verification of Hydrologic Forecasts

    NSDL National Science Digital Library

    COMET

    2008-06-30

    This module offers a comprehensive description of a set of common verification measures for hydrologic forecasts, both deterministic and probabilistic. Through use of rich illustrations, animations, and interactions, this module explains how these verification measures can provide valuable information to users with varying needs. In addition to providing a measure of how well a forecast matches observations, verification measures can be used to help forecasters and users learn about the strengths and weaknesses of a forecast.

  5. Automated Verification = Graphs, Automata, and Logic

    Microsoft Academic Search

    Moshe Y. Vardi

    2000-01-01

    In automated verification one uses algorithmic techniques to establish the correctness of the design with respect to a given\\u000a property. Automated verification is based on a small number of key algorithmic ideas, tying together graph theory, automata\\u000a theory, and logic. In this self-contained talk I will describe how this “holy trinity” gave rise to automated-verification\\u000a tools.

  6. Speaker Verification Using Adapted Gaussian Mixture Models

    Microsoft Academic Search

    Douglas A. Reynolds; Thomas F. Quatieri; Robert B. Dunn

    2000-01-01

    Reynolds, Douglas A., Quatieri, Thomas F., and Dunn, Robert B., Speaker Verification Using Adapted Gaussian Mixture Models, Digital Signal Processing10(2000), 19–41.In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using

  7. A new method for the synthesis of signature data with natural variability.

    PubMed

    Rabasse, Cedric; Guest, Richard M; Fairhurst, Michael C

    2008-06-01

    The collection of human biometric test data for system development and evaluation within any chosen modality generally requires significant time and effort if data are to be obtained in workable quantities. To overcome this problem, techniques to generate synthetic data have been developed. This paper describes a novel technique for the automatic synthesis of human handwritten-signature images, which introduces modeled variability within the generated output based on positional variation that is naturally found within genuine source data. The synthesized data were found to generate similar verification rates to those obtained using genuine data with the use of a commercial verification engine, thereby indicating the suitability of the data synthesized by using this method for a wide range of application scenarios. PMID:18558534

  8. 17 CFR 232.302 - Signatures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...letters or characters comprising a name, executed, adopted or authorized as a signature. Signatures are not required in unofficial PDF copies submitted in accordance with § 232.104. (b) Each signatory to an electronic filing (including,...

  9. Employment Verifications Requests for verification of title and dates of employment for Harvard staff are

    E-print Network

    Paulsson, Johan

    Employment Verifications Requests for verification of title and dates of employment for Harvard information during the verification process. Need Proof of Employment? Give the person needing proof of your employment the following information: Your Social Security Number Harvard University Employer Code: 14392

  10. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 2014-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  11. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 2012-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  12. 48 CFR 552.204-9 - Personal Identity Verification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 2013-10-01 false Personal Identity Verification requirements. 552.204-9...and Clauses 552.204-9 Personal Identity Verification requirements. As prescribed...insert the following clause: Personal Identity Verification Requirements (OCT...

  13. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... false Random verification audits. 983.67 Section 983.67...983.67 Random verification audits. (a) All handlers' pistachio...subject to random verification audits by the committee to ensure compliance with...

  14. Embedded Software Verification Challenges and Solutions

    E-print Network

    Wang, Chao

    Embedded Software Verification Challenges and Solutions Shuvendu Lahiri, Microsoft, Redmond Existential abstraction: 106 ) Preserves safety properties #12;Predicate Abstraction Abstract Transitions: 107

  15. Hydrologic data-verification management program plan

    USGS Publications Warehouse

    Alexander, C.W.

    1982-01-01

    Data verification refers to the performance of quality control on hydrologic data that have been retrieved from the field and are being prepared for dissemination to water-data users. Water-data users now have access to computerized data files containing unpublished, unverified hydrologic data. Therefore, it is necessary to develop techniques and systems whereby the computer can perform some data-verification functions before the data are stored in user-accessible files. Computerized data-verification routines can be developed for this purpose. A single, unified concept describing master data-verification program using multiple special-purpose subroutines, and a screen file containing verification criteria, can probably be adapted to any type and size of computer-processing system. Some traditional manual-verification procedures can be adapted for computerized verification, but new procedures can also be developed that would take advantage of the powerful statistical tools and data-handling procedures available to the computer. Prototype data-verification systems should be developed for all three data-processing environments as soon as possible. The WATSTORE system probably affords the greatest opportunity for long-range research and testing of new verification subroutines. (USGS)

  16. Automatic verification methods for finite state systems

    SciTech Connect

    Sifakis, J. (LGI-IMAG, Grenoble (FR))

    1990-01-01

    This volume contains the proceedings of a workshop devoted to the verification of finite state systems. The workshop focused on the development and use of methods, tools and theories for automatic verification of finite state systems. The goal at the workshop was to compare verification methods and tools to assist the applications designer. The papers review verification techniques for finite state systems and evaluate their relative advantages. The techniques considered cover various specification formalisms such as process algebras, automata and logics. Most of the papers focus on exploitation of existing results in three application areas: hardware design, communication protocols and real-time systems.

  17. Online Staff Development.

    ERIC Educational Resources Information Center

    Pease, Pamela S.; Magnuson, Peter

    2003-01-01

    Describes the benefits for principals of online staff development for teachers. Sources of online courses and training include local and state departments of education, professional associations, colleges and universities, online universities, and commercial suppliers. (PKP)

  18. Nebula - generating syntactical network intrusion signatures

    Microsoft Academic Search

    Tillmann Werner; Christoph Fuchs; Elmar Gerhards-Padilla; Peter Martini

    2009-01-01

    Signature-based intrusion detection is a state-of-the-art technology for identifying malicious activity in networks. However, attack trends change very fast nowadays, making it impossible to keep up with manual signature engineering. This paper describes a novel concept for automatic signature generation based on efficient autonomous attack classification. Signatures are constructed for each class from syntactical commonalities and go beyond a single,

  19. Kiplinger Online

    NSDL National Science Digital Library

    1998-01-01

    The Kiplinger organization developed Kiplinger Online to provide personal finance guidance on the Internet. Users can find selected articles from the current and past three months' issues of Kiplinger's Personal Finance Magazine on topics ranging from investing to retirement planning. The news section highlights consumer, business and financial news. Visitors to the site can compare the rankings of mutual funds (stocks and bonds) by size and return, consult a glossary of 101 financial terms and examine financial planning calculators . Parents might want to refer to sections on educating children, budgeting, and money management. Note that certain parts of the site require subscription.

  20. Kidsource Online

    NSDL National Science Digital Library

    1997-01-01

    Kidsource Online is an extensive collection of information about raising children from newborns to adolescents. A sampling of the publications they've pulled together at the site includes "Children and Bilingualism" from the American Speech-Language-Hearing Association; "Testing Your Child's Hearing" by Carol Knightly, Pediatric Audiologist; and the Asthma and Allergy Foundation of America (AAFA) Provides Tips to Help Parents and Kids Cope with Allergy Season. Resources are organized under top-level categories of Newborns, Toddlers, Preschoolers, K-12, Education, Health, Recreation, Forums, Organizations, and Guide to Best Software, among others.

  1. Bloomberg Online

    NSDL National Science Digital Library

    Bloomberg Online provides the latest financial news and data. The site features three sections: Bloomberg News, World Markets and Bloomberg Energy. In the Bloomberg News section, visitors can read the latest financial news from the United States and around the world. They can also read articles written by Bloomberg columnists on various business and financial issues. The World Markets section provides stock market indices and currency rates from all over the world. The section also contains a yield curve on US and foreign bonds. Bloomberg Energy provides the latest information and news on energy prices. Some information at this site is available only to Boomberg Personal Finance Magazine subscribers.

  2. Online Writery

    NSDL National Science Digital Library

    The Online Writery at the University of Missouri, Columbia, is a student-oriented writing and learning environment that includes both communication and information resources: e-mail, access to two MOOs , writing resources, teaching resources, and paperless papers. It is a place to write and read and talk, a place to learn stuff. It is a resource you can use whether you are writing for a class or not. These pages are made of the stuff writers (of any kind) need: information about writing, and opportunities to talk with other writers.

  3. Online Conversion

    NSDL National Science Digital Library

    Need to convert joules to kilocalories? A rood to a square mile? 100 weight to stones? How about your age in dog years? You can do all of these conversions and over 8,000 more at Online Conversion. Conversions are organized by type (temperature, length, cooking, etc.), and each conversion page includes numerous options. Quick links to other conversions are also provided on each page so users don't have to return to the main page. Simply put, a very handy and easy-to-use site that belongs in the reference section of any user's bookmarks.

  4. Biology Online

    NSDL National Science Digital Library

    Biology Online is a community-run web site that provides access to resources on many aspects of biological and life sciences. The site includes a discussion board with forums on cell biology, molecular biology, evolution, bioinformatics, and many other topics. The Wiki dictionary features user-editable content and links to articles on a wide variety of topics in biology. There is also a book catalog with information on biology-related books, including author and content descriptions, product details, and customer reviews; and a directory of links to other websites with related content in the life and Earth sciences.

  5. ADA Online

    NSDL National Science Digital Library

    1998-01-01

    ADA Online, from the American Dental Association (ADA), includes resources for professionals, patients, and students. The site contains membership information, ADA publications and position papers, research and recommendations on clinical issues, a catalog of handouts and posters for patient education, information for new dentists, factsheets on dental careers, licensing information, directories of accredited education programs, listings of continuing education courses, and more. The section for patients and consumers includes answers to frequently asked questions; information on oral health, disease prevention, and how to deal with dental emergencies; and special sections for parents, children, and teens. A small portion of the site is for ADA members only.

  6. Waste Online

    NSDL National Science Digital Library

    2004-01-01

    Sure enough, there is a good deal of "waste" online, so it's nice to learn about the Waste Online website which serves as a great repository for information about an entirely different set of waste-related matters. This British-based website has been funded by the New Opportunities Fund Digitise project. The project is overseen by Waste Watch, which is "the leading environmental charity dedicated to the reduction, reuse and recycling of household waste." First-time visitors can get started by clicking on "Wacky waste facts", which contains some basic facts about the nature of waste in the United Kingdom. In the same vicinity, visitors can dig deeper by looking into sections titled "The problem with waste", "Waste in the workplace", and "Waste at home". Moving on, the "Search our library" area allows guests to the site to look for specific items of interest related to dozens of topics, such as household recycling, office recycling, and metal recycling. Moving along, the "Information Sheets" area features almost two dozen fact sheets that can be used as guides to composting, battery recycling, and the history of waste.

  7. Estimating Attributes of Nuclear Weapon and Other Fissile Material Configuration Using Features Of Nuclear Materials Identification Signatures

    SciTech Connect

    mattingly, j.k.; mihalczo, j.t.; mullens, j.a.; perez, r.b.; valentine, t.e.

    1999-08-24

    This brief describes a strategy that, when implemented, will allow the attributes, i.e., the physical properties, of nuclear weapon and other configurations of fissile material to be estimated from Nuclear Material Identification System (NMIS) signatures for arms control, treaty verification, and transparency purposes. Attributes are estimated by condensing measured NMIS signatures into ''features'' that approximately represent physical characteristics of the measurement such as gamma-ray transmission, induced fission, etc. The features are obtained from NMIS signatures to estimate quantities related to gamma and neutron transmission through the inspected item and gamma and neutron scattering and production via induced fission within the inspected item. Multivariate, i.e., multiple-feature, linear models have been successfully employed to estimate attributes, and multivariate nonlinear models are currently under investigation. Attributes estimated employing this strategy can then be examined to test the supposition that the inspected item is in fact a nuclear weapon.

  8. Polarization signatures of airborne particulates

    NASA Astrophysics Data System (ADS)

    Raman, Prashant; Fuller, Kirk A.; Gregory, Don A.

    2013-07-01

    Exploratory research has been conducted with the aim of completely determining the polarization signatures of selected particulates as a function of wavelength. This may lead to a better understanding of the interaction between electromagnetic radiation and such materials, perhaps leading to the point detection of bio-aerosols present in the atmosphere. To this end, a polarimeter capable of measuring the complete Mueller matrix of highly scattering samples in transmission and reflection (with good spectral resolution from 300 to 1100 nm) has been developed. The polarization properties of Bacillus subtilis (surrogate for anthrax spore) are compared to ambient particulate matter species such as pollen, dust, and soot. Differentiating features in the polarization signatures of these samples have been identified, thus demonstrating the potential applicability of this technique for the detection of bio-aerosol in the ambient atmosphere.

  9. Signatures of a shadow biosphere.

    PubMed

    Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere. PMID:19292603

  10. Turbulence Modeling Verification and Validation

    NASA Technical Reports Server (NTRS)

    Rumsey, Christopher L.

    2014-01-01

    Computational fluid dynamics (CFD) software that solves the Reynolds-averaged Navier-Stokes (RANS) equations has been in routine use for more than a quarter of a century. It is currently employed not only for basic research in fluid dynamics, but also for the analysis and design processes in many industries worldwide, including aerospace, automotive, power generation, chemical manufacturing, polymer processing, and petroleum exploration. A key feature of RANS CFD is the turbulence model. Because the RANS equations are unclosed, a model is necessary to describe the effects of the turbulence on the mean flow, through the Reynolds stress terms. The turbulence model is one of the largest sources of uncertainty in RANS CFD, and most models are known to be flawed in one way or another. Alternative methods such as direct numerical simulations (DNS) and large eddy simulations (LES) rely less on modeling and hence include more physics than RANS. In DNS all turbulent scales are resolved, and in LES the large scales are resolved and the effects of the smallest turbulence scales are modeled. However, both DNS and LES are too expensive for most routine industrial usage on today's computers. Hybrid RANS-LES, which blends RANS near walls with LES away from walls, helps to moderate the cost while still retaining some of the scale-resolving capability of LES, but for some applications it can still be too expensive. Even considering its associated uncertainties, RANS turbulence modeling has proved to be very useful for a wide variety of applications. For example, in the aerospace field, many RANS models are considered to be reliable for computing attached flows. However, existing turbulence models are known to be inaccurate for many flows involving separation. Research has been ongoing for decades in an attempt to improve turbulence models for separated and other nonequilibrium flows. When developing or improving turbulence models, both verification and validation are important steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

  11. Online Instructors Must Be Online Students First.

    ERIC Educational Resources Information Center

    Beam, Terri; Zamora, Victor

    This document describes an online/hybrid course at Mt. San Antonio College (MSAC) (California) that gives faculty the experience of being a student in an online class. The course is 6 weeks long and the participating faculty members meet on campus only 3 times; the rest of the course work is conducted in an online mode. Each week's learning module…

  12. Secret signatures inside genomic DNA.

    PubMed

    Arita, Masanori; Ohashi, Yoshiaki

    2004-01-01

    A simple, practical method to watermark short trademarks or signatures into genomic DNA is introduced. Since the marking method is biologically innocuous, it can be applied to all commercialized bacteria to help establish brand names for the engineered strains and to resolve legal disputes regarding gene-related patents. The first such strain of Bacillus subtilis is engineered and is ready to be distributed. PMID:15458352

  13. Developments in Signature Process Control

    NASA Astrophysics Data System (ADS)

    Keller, L. B.; Dominski, Marty

    1993-01-01

    Developments in the adaptive process control technique known as Signature Process Control for Advanced Composites (SPCC) are described. This computer control method for autoclave processing of composites was used to develop an optimum cure cycle for AFR 700B polyamide and for an experimental poly-isoimide. An improved process cycle was developed for Avimid N polyamide. The potential for extending the SPCC technique to pre-preg quality control, press modeling, pultrusion and RTM is briefly discussed.

  14. Automatic Writer Identification Framework for Online Handwritten Documents Using Character Prototypes

    E-print Network

    Paris-Sud XI, Université de

    system, which is used to perform an automatic segmentation of an online handwritten document of the entire research field, spanning from psychology and behavioral sciences to pattern recognition and data mining. Writer identification systems must be clearly distinguished from writer verification systems

  15. Importing MDG Verification Results into HOL

    Microsoft Academic Search

    Haiyan Xiong; Paul Curzon; Sofiène Tahar

    1999-01-01

    . Formal hardware verification systems can be split into twocategories: theorem proving systems and automatic finite state machinebased systems. Each approach has its own complementary advantagesand disadvantages. In this paper, we consider the combination of twosuch systems: HOL (a theorem proving system) and MDG (an automaticsystem). As HOL hardware verification proofs are based on thehierarchical structure of the design, submodules

  16. Gender Verification of Female Olympic Athletes.

    ERIC Educational Resources Information Center

    Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

    2002-01-01

    Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

  17. INTERACTING DISCRETE EVENT SYSTEMS: MODELLING, VERIFICATION, AND

    E-print Network

    Abdelwahed, Sherif

    represented - as interaction specification - in the modelling structure. A multilevel extension to the model information can be used to solve the external verification problem modularly by converting the problemINTERACTING DISCRETE EVENT SYSTEMS: MODELLING, VERIFICATION, AND SUPERVISORY CONTROL by Sherif

  18. Quantum Money with Classical Verification Dmitry Gavinsky

    E-print Network

    Gavinsky, Dmitry

    Quantum Money with Classical Verification Dmitry Gavinsky NEC Laboratories America, Inc. Princeton, NJ, U.S.A. Abstract We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme

  19. The monitoring and verification of nuclear weapons

    SciTech Connect

    Garwin, Richard L., E-mail: RLG2@us.ibm.com [IBM Fellow Emeritus, IBM Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, NY 10598 (United States)

    2014-05-09

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  20. Automatic Symbolic Verification of Embedded Systems

    Microsoft Academic Search

    Rajeev Alurt; Thomas A. Henzinger; Pei-hsin Ho

    1993-01-01

    We present a model checking procedure and its implementation for the automatic verification of embedded systems. Systems are represented by hybrid automata - machines with finite control and real-valued variables modeling continuous environment parameters such as time, pressure, and temperature. System properties are specified in a real-time temporal logic and verified by symbolic computation. The verification procedure, implemented in Mathematica,

  1. ENVIRONMENTAL TECHNOLOGY VERIFICATION FOR INDOOR AIR PRODUCTS

    EPA Science Inventory

    The paper discusses environmental technology verification (ETV) for indoor air products. RTI is developing the framework for a verification testing program for indoor air products, as part of EPA's ETV program. RTI is establishing test protocols for products that fit into three...

  2. NEAREST NEIGHBOR VECTOR BASED PALMPRINT VERIFICATION

    Microsoft Academic Search

    Mayur D. Jain; S Nalin Pradeep; R Balasubramanian

    We introduce palmprint verification, one of the most reliable personal identification methods in the biometric technology. In this paper, a new approach to the palmprint verification based on nearest neighbor vector (NNV) is presented. Initially we find the datum point of palmprint, which have a remarkable advantage about their spatial location. We find all possible line pairs using NNV, followed

  3. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps

    Microsoft Academic Search

    Dan Boneh; Craig Gentry; Ben Lynn; Hovav Shacham

    2003-01-01

    An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into a single short signature. This single signature (and the n original messages) will convince the verier that the n users did indeed sign the n original messages (i.e., user

  4. Microbial lifestyle and genome signatures.

    PubMed

    Dutta, Chitra; Paul, Sandip

    2012-04-01

    Microbes are known for their unique ability to adapt to varying lifestyle and environment, even to the extreme or adverse ones. The genomic architecture of a microbe may bear the signatures not only of its phylogenetic position, but also of the kind of lifestyle to which it is adapted. The present review aims to provide an account of the specific genome signatures observed in microbes acclimatized to distinct lifestyles or ecological niches. Niche-specific signatures identified at different levels of microbial genome organization like base composition, GC-skew, purine-pyrimidine ratio, dinucleotide abundance, codon bias, oligonucleotide composition etc. have been discussed. Among the specific cases highlighted in the review are the phenomena of genome shrinkage in obligatory host-restricted microbes, genome expansion in strictly intra-amoebal pathogens, strand-specific codon usage in intracellular species, acquisition of genome islands in pathogenic or symbiotic organisms, discriminatory genomic traits of marine microbes with distinct trophic strategies, and conspicuous sequence features of certain extremophiles like those adapted to high temperature or high salinity. PMID:23024607

  5. Structural dynamics verification facility study

    NASA Technical Reports Server (NTRS)

    Kiraly, L. J.; Hirchbein, M. S.; Mcaleese, J. M.; Fleming, D. P.

    1981-01-01

    The need for a structural dynamics verification facility to support structures programs was studied. Most of the industry operated facilities are used for highly focused research, component development, and problem solving, and are not used for the generic understanding of the coupled dynamic response of major engine subsystems. Capabilities for the proposed facility include: the ability to both excite and measure coupled structural dynamic response of elastic blades on elastic shafting, the mechanical simulation of various dynamical loadings representative of those seen in operating engines, and the measurement of engine dynamic deflections and interface forces caused by alternative engine mounting configurations and compliances.

  6. Conformance Verification of Privacy Policies

    NASA Astrophysics Data System (ADS)

    Fu, Xiang

    Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computation tree logic is used to specify a policy. A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied.

  7. Space transportation system payload interface verification

    NASA Technical Reports Server (NTRS)

    Everline, R. T.

    1977-01-01

    The paper considers STS payload-interface verification requirements and the capability provided by STS to support verification. The intent is to standardize as many interfaces as possible, not only through the design, development, test and evaluation (DDT and E) phase of the major payload carriers but also into the operational phase. The verification process is discussed in terms of its various elements, such as the Space Shuttle DDT and E (including the orbital flight test program) and the major payload carriers DDT and E (including the first flights). Five tools derived from the Space Shuttle DDT and E are available to support the verification process: mathematical (structural and thermal) models, the Shuttle Avionics Integration Laboratory, the Shuttle Manipulator Development Facility, and interface-verification equipment (cargo-integration test equipment).

  8. New method of verificating optical flat flatness

    NASA Astrophysics Data System (ADS)

    Sun, Hao; Li, Xueyuan; Han, Sen; Zhu, Jianrong; Guo, Zhenglai; Fu, Yuegang

    2014-11-01

    Optical flat is commonly used in optical testing instruments, flatness is the most important parameter of forming errors. As measurement criteria, optical flat flatness (OFF) index needs to have good precision. Current measurement in China is heavily dependent on the artificial visual interpretation, through discrete points to characterize the flatness. The efficiency and accuracy of this method can not meet the demand of industrial development. In order to improve the testing efficiency and accuracy of measurement, it is necessary to develop an optical flat verification system, which can obtain all surface information rapidly and efficiently, at the same time, in accordance with current national metrological verification procedures. This paper reviews current optical flat verification method and solves the problems existing in previous test, by using new method and its supporting software. Final results show that the new system can improve verification efficiency and accuracy, by comparing with JJG 28-2000 metrological verification procedures method.

  9. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  10. Library Online Systems.

    ERIC Educational Resources Information Center

    Folda, Linda; And Others

    1989-01-01

    Issues related to library online systems are discussed in six articles. Topics covered include staff education through vendor demonstrations, evaluation of online public access catalogs, the impact of integrated online systems on cataloging operations, the merits of smart and dumb barcodes, and points to consider in planning for the next online…

  11. Agronomy Journal Online

    NSDL National Science Digital Library

    The American Society of Agronomy has announced online availability of this journal, in conjunction with Stanford University's HighWire Press. Online full-text content for the Agronomy Journal begins with the July-August 1999 issue, with online abstracts from January-February 1998. Note that the free trial period for the online journal ends May 1, 2001.

  12. Online Voucher Quick Reference

    E-print Network

    Shull, Kenneth R.

    Online Voucher Quick Reference NUFinancials Payments OnlineVoucherQuickReference 12/10/2013 - rb > Online Voucher Entry Page · or NUFinancials Accounts Payable Vouchers Add/Update Online Voucher/letters or barcode# on form). 2. Enter the Invoice Date (from invoice, date of service, or today's date). 3. Look up

  13. Cognitive Bias in Systems Verification

    NASA Technical Reports Server (NTRS)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  14. A Verification Method for MASOES.

    PubMed

    Perozo, N; Aguilar, J; Terán, O; Molina, H

    2012-06-01

    MASOES is a 3agent architecture for designing and modeling self-organizing and emergent systems. This architecture describes the elements, relationships, and mechanisms, both at the individual and the collective levels, that favor the analysis of the self-organizing and emergent phenomenon without mathematically modeling the system. In this paper, a method is proposed for verifying MASOES from the point of view of design in order to study the self-organizing and emergent behaviors of the modeled systems. The verification criteria are set according to what is proposed in MASOES for modeling self-organizing and emerging systems and the principles of the wisdom of crowd paradigm and the fuzzy cognitive map (FCM) theory. The verification method for MASOES has been implemented in a tool called FCM Designer and has been tested to model a community of free software developers that works under the bazaar style as well as a Wikipedia community in order to study their behavior and determine their self-organizing and emergent capacities. PMID:22692924

  15. RISKIND verification and benchmark comparisons

    SciTech Connect

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  16. Video-based fingerprint verification.

    PubMed

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-01-01

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

  17. Runtime Verification with State Estimation

    NASA Technical Reports Server (NTRS)

    Stoller, Scott D.; Bartocci, Ezio; Seyster, Justin; Grosu, Radu; Havelund, Klaus; Smolka, Scott A.; Zadok, Erez

    2011-01-01

    We introduce the concept of Runtime Verification with State Estimation and show how this concept can be applied to estimate theprobability that a temporal property is satisfied by a run of a program when monitoring overhead is reduced by sampling. In such situations, there may be gaps in the observed program executions, thus making accurate estimation challenging. To deal with the effects of sampling on runtime verification, we view event sequences as observation sequences of a Hidden Markov Model (HMM), use an HMM model of the monitored program to "fill in" sampling-induced gaps in observation sequences, and extend the classic forward algorithm for HMM state estimation (which determines the probability of a state sequence, given an observation sequence) to compute the probability that the property is satisfied by an execution of the program. To validate our approach, we present a case study based on the mission software for a Mars rover. The results of our case study demonstrate high prediction accuracy for the probabilities computed by our algorithm. They also show that our technique is much more accurate than simply evaluating the temporal property on the given observation sequences, ignoring the gaps.

  18. Hierarchical Verification Using an MDG-HOL Hybrid Tool

    Microsoft Academic Search

    Iskander Kort; Sofiène Tahar; Paul Curzon

    2001-01-01

    We describe a hybrid formal hardware verification tool thatlinks the HOL interactive proof system and the MDG automated hardwareverification tool. It supports a hierarchical verification approachthat mirrors the hierarchical structure of designs. We obtain advantagesof both verification paradigms. We illustrate its use by considering acomponent of a communications chip. Verification with the hybrid toolis significantly faster and more tractable than

  19. Term-Level Verification of a Pipelined CISC Microprocessor

    E-print Network

    Term-Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12;Abstract By abstracting the details of the data representations and operations in a microprocessor, term-level verification can formally prove that a pipelined

  20. TermLevel Verification of a Pipelined CISC Microprocessor

    E-print Network

    Term­Level Verification of a Pipelined CISC Microprocessor Randal E. Bryant December, 2005 CMU verification, Microprocessor verification, UCLID #12; Abstract By abstracting the details of the data representations and operations in a microprocessor, term­level verification can formally prove that a pipelined

  1. Reuse issues on the verification of embedded MCU cores

    Microsoft Academic Search

    A. M. Brochi; T. I. Nunes

    2002-01-01

    The main issues related to the verification of cores embedded in a microcontroller unit (MCU) are addressed in this paper. Issues such as verification environment design, simulation pattern strategies and reuse, as well as standalone and chip level verification are discussed. An analysis of the verification environment is performed from the perspective of the reuse across the design cycle, focussing

  2. Competition on Software Verification University of Passau, Germany

    E-print Network

    Beyer, Dirk

    Competition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract Competition on Software Verification. The verification community has performed competitions in various areas in the past, and SV-COMP'12 is the first competition of verification tools that take software programs

  3. OBJECT CODE VERIFICATION FOR SAFETY-CRITICAL RAILWAY CONTROL SYSTEMS

    E-print Network

    Peleska, Jan - Fachbereich 3

    OBJECT CODE VERIFICATION FOR SAFETY-CRITICAL RAILWAY CONTROL SYSTEMS Jan Peleska1 and Anne E automated object code verification, applicable to railway control systems developed within a framework equivalence between M and A. Keywords: Verification tools, object code verification, railway control systems 1

  4. threshold signature, multisignature and blind signature schemes based on the Gap-Die-Hellman- group signature scheme

    Microsoft Academic Search

    Alexandra Boldyreva

    We propose a robust proactive threshold signature scheme, a multisignature scheme and a blind signature scheme which work in any Gap Die-Hellman (GDH) group (where the Compu- tational Die-Hellman problem is hard but the Decisional Die-Hellman problem is easy). Our constructions are based on the recently proposed GDH signature scheme of Boneh et al. (BLS). Due to the instrumental structure

  5. Bayesian Hill-Climbing Attack and Its Application to Signature Verification

    E-print Network

    Autonoma de Madrid, Universidad

    , it is of utmost impor- tance to analyze the vulnerabilities of biometric systems, in order to find analysis of the vulnerable points of biometric systems, identifying 8 types of possible attacks. The first for over 95% of the attacks. 1 Introduction Due to the advantages that biometric security systems present

  6. Evaluation of Brute-Force Attack to Dynamic Signature Verification Using Synthetic Samples

    E-print Network

    Autonoma de Madrid, Universidad

    to analyze the vulnerabilities of biometric systems [6, 8, 14], in order to find their limitations Introduction Due to the advantages that biometric security systems present over traditional security approaches that biometric systems might present, one of them, which arises from their inherent probabilistic nature

  7. Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes

    E-print Network

    by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL) under contract FA8750 not necessarily represent the official views of the HHS. Supported in part by the Defense Advanced Research

  8. OFFICE VERIFICATION/DENTIST'S SIGNATURE FOR DENTIST'S USE ONLY --FOR ADDITIONAL INFORMATION, DIAGNOSIS, PROCEDURES, OR SPECIAL

    E-print Network

    Northern British Columbia, University of

    . CONTROL NO./PLAN NO. BRANCH NO. ADDRESS OF MEMBER EMPLOYER MEMBER'S DATE OF BIRTH: YEAR MONTH DAY 2. NAME: SPOUSE'S NAME: SPOUSE'S DATE OF BIRTH: YEAR MONTH DAY 4. IS ANY OF THE ABOVE WORK FOR ORTHODONTIC OF MEMBER MEMBER'S SOCIAL INSURANCE NUMBER/IDENTITY NUMBER 1. PATIENT: RELATIONSHIP TO MEMBER DATE OF BIRTH

  9. An Off-line Signature Verification System Based on Fusion of Local and Global Information

    E-print Network

    Autonoma de Madrid, Universidad

    . Fierrez-Aguilar, N. Alonso-Hermira, G. Moreno-Marquez, and J. Ortega-Garcia Biometrics Research Lab., ATVS for random and skilled forgeries. It is shown experimentally that the ma- chine expert based on local of pattern recognition, biometrics, where the goal is to infer identity of people from biomet- ric data [1, 2

  10. Automated UF6 Cylinder Enrichment Assay: Status of the Hybrid Enrichment Verification Array (HEVA) Project: POTAS Phase II

    SciTech Connect

    Jordan, David V.; Orton, Christopher R.; Mace, Emily K.; McDonald, Benjamin S.; Kulisek, Jonathan A.; Smith, Leon E.

    2012-06-01

    Pacific Northwest National Laboratory (PNNL) intends to automate the UF6 cylinder nondestructive assay (NDA) verification currently performed by the International Atomic Energy Agency (IAEA) at enrichment plants. PNNL is proposing the installation of a portal monitor at a key measurement point to positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until inspector arrival. This report summarizes the status of the research and development of an enrichment assay methodology supporting the cylinder verification concept. The enrichment assay approach exploits a hybrid of two passively-detected ionizing-radiation signatures: the traditional enrichment meter signature (186-keV photon peak area) and a non-traditional signature, manifested in the high-energy (3 to 8 MeV) gamma-ray continuum, generated by neutron emission from UF6. PNNL has designed, fabricated, and field-tested several prototype assay sensor packages in an effort to demonstrate proof-of-principle for the hybrid assay approach, quantify the expected assay precision for various categories of cylinder contents, and assess the potential for unsupervised deployment of the technology in a portal-monitor form factor. We refer to recent sensor-package prototypes as the Hybrid Enrichment Verification Array (HEVA). The report provides an overview of the assay signatures and summarizes the results of several HEVA field measurement campaigns on populations of Type 30B UF6 cylinders containing low-enriched uranium (LEU), natural uranium (NU), and depleted uranium (DU). Approaches to performance optimization of the assay technique via radiation transport modeling are briefly described, as are spectroscopic and data-analysis algorithms.

  11. Spectroscopic signature for ferroelectric ice

    NASA Astrophysics Data System (ADS)

    Wójcik, Marek J.; G?ug, Maciej; Boczar, Marek; Boda, ?ukasz

    2014-09-01

    Various forms of ice exist within our galaxy. Particularly intriguing type of ice - ‘ferroelectric ice' was discovered experimentally and is stable in temperatures below 72 K. This form of ice can generate enormous electric fields and can play an important role in planetary formation. In this letter we present Car-Parrinello simulation of infrared spectra of ferroelectric ice and compare them with spectra of hexagonal ice. Librational region of the spectra can be treated as spectroscopic signature of ice XI and can be of help to identify ferroelectric ice in the Universe.

  12. Signatures of Spacetime Geometry Fluctuations

    NASA Astrophysics Data System (ADS)

    Ford, L. H.; Thompson, R. T.

    The operational meaning of quantum fluctuations of spacetime geometry will be discussed. Three potential signatures of these fluctuations will be considered: luminosity fluctuations of a distant source, angular blurring of images, and broadening of spectral lines. To leading order, luminosity fluctuations arise only from passive geometry fluctuations, those driven by quantum fluctuations of the stress tensor. This effect can be described by a Langevin version of the Raychaudhuri equation. Angular blurring and line broadening can arise both from passive fluctuations and from the active fluctuations of the quantized gravitational field, and can be given a unified geometrical description using the Riemann tensor correlation function.

  13. Observational Signatures of Magnetic Reconnection

    NASA Technical Reports Server (NTRS)

    Savage, Sabrina

    2014-01-01

    Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

  14. Liquefied Natural Gas (LNG) dispenser verification device

    NASA Astrophysics Data System (ADS)

    Xiong, Maotao; Yang, Jie-bin; Zhao, Pu-jun; Yu, Bo; Deng, Wan-quan

    2013-01-01

    The composition of working principle and calibration status of LNG (Liquefied Natural Gas) dispenser in China are introduced. According to the defect of weighing method in the calibration of LNG dispenser, LNG dispenser verification device has been researched. The verification device bases on the master meter method to verify LNG dispenser in the field. The experimental results of the device indicate it has steady performance, high accuracy level and flexible construction, and it reaches the international advanced level. Then LNG dispenser verification device will promote the development of LNG dispenser industry in China and to improve the technical level of LNG dispenser manufacture.

  15. Using composite correlation filters for biometric verification

    NASA Astrophysics Data System (ADS)

    Vijaya Kumar, Bhagavatula V. K.; Savvides, Marios; Xie, Chunyan; Venkataramani, Krithika; Thornton, Jason

    2003-08-01

    Biometric verification refers to the process of matching an input biometric to stored biometric information. In particular, biometric verification refers to matching the live biometric input from an individual to the stored biometric template of that individual. Examples of biometrics include face images, fingerprint images, iris images, retinal scans, etc. Thus, image processing techniques prove useful in biometric recognition. In particular, composite correlation filters have proven to be effective. In this paper, we will discuss the application of composite correlation filters to biometric verification.

  16. Formal specification and verification of Ada software

    NASA Technical Reports Server (NTRS)

    Hird, Geoffrey R.

    1991-01-01

    The use of formal methods in software development achieves levels of quality assurance unobtainable by other means. The Larch approach to specification is described, and the specification of avionics software designed to implement the logic of a flight control system is given as an example. Penelope is described which is an Ada-verification environment. The Penelope user inputs mathematical definitions, Larch-style specifications and Ada code and performs machine-assisted proofs that the code obeys its specifications. As an example, the verification of a binary search function is considered. Emphasis is given to techniques assisting the reuse of a verification effort on modified code.

  17. Signature Tree Generation for Polymorphic Worms

    Microsoft Academic Search

    Yong Tang; Bin Xiao; Xicheng Lu

    2011-01-01

    Network-based signature generation (NSG) has been proposed as a way to automatically and quickly generate accurate signatures for worms, especially polymorphic worms. In this paper, we propose a new NSG system—PolyTree, to defend against polymorphic worms. We observe that signatures from worms and their variants are relevant and a tree structure can properly reflect their familial resemblance. Hence, in contrast

  18. Optimistic fair exchange of digital signatures

    Microsoft Academic Search

    N. Asokan; Victor Shoup; Michael Waidner

    2000-01-01

    We present a new protocol that allows two players to exchange digital signatures over the Internet in a fair way, so that\\u000a either each player gets the other's signature, or neither player does. The obvious application is where the signatures represent\\u000a items of value, for example, an electronic check or airline ticket. The protocol can also be adapted to exchange

  19. Research towards a systematic signature discovery process

    SciTech Connect

    Baker, Nathan A.; Barr, Jonathan L.; Bonheyo, George T.; Joslyn, Cliff A.; Krishnaswami, Kannan; Oxley, Mark; Quadrel, Richard W.; Sego, Landon H.; Tardiff, Mark F.; Wynne, Adam S.

    2013-06-04

    In its most general form, a signature is a unique or distinguishing measurement, pattern, or collection of data that identifies a phenomenon (object, action, or behavior) of interest. The discovery of signatures is an important aspect of a wide range of disciplines from basic science to national security for the rapid and efficient detection and/or prediction of phenomena. Current practice in signature discovery is typically accomplished by asking domain experts to characterize and/or model individual phenomena to identify what might compose a useful signature. What is lacking is an approach that can be applied across a broad spectrum of domains and information sources to efficiently and robustly construct candidate signatures, validate their reliability, measure their quality, and overcome the challenge of detection -- all in the face of dynamic conditions, measurement obfuscation and noisy data environments. Our research has focused on the identification of common elements of signature discovery across application domains and the synthesis of those elements into a systematic process for more robust and efficient signature development. In this way, a systematic signature discovery process lays the groundwork for leveraging knowledge obtained from signatures to a particular domain or problem area, and, more generally, to problems outside that domain. This paper presents the initial results of this research by discussing a mathematical framework for representing signatures and placing that framework in the context of a systematic signature discovery process. Additionally, the basic steps of this process are described with details about the methods available to support the different stages of signature discovery, development, and deployment.

  20. Metric Signature Transitions in Optical Metamaterials

    E-print Network

    Igor I. Smolyaninov; Evgenii E. Narimanov

    2010-07-07

    We demonstrate that the extraordinary waves in indefinite metamaterials experience (- - + +) effective metric signature. During a metric signature change transition in such a metamaterial, a Minkowski space-time is "created" together with large number of particles populating this space-time. Such metamaterial models provide a table top realization of metric signature change events suggested to occur in Bose-Einstein condensates and quantum gravity theories.

  1. LD Online

    NSDL National Science Digital Library

    LD Online is a website focused on providing information on learning disabilities (LD) and attention-deficit hyperactivity disorder (ADHD) which is geared towards parents, teachers, and professionals. The site is an educational service of public television station WETA, and also works with the National Joint Committee on Learning Disabilities. Visitors will find that the site addresses both children and adults with LD and ADHD, and those who are unfamiliar with LD and ADHD will appreciate the site's "Getting Started" link, which has "LD Basics", "ADHD Basics", "Questions + Answers" and a "Glossary". The "Multimedia" link of videos, audio, and transcripts will give visitors the opportunity to listen to or watch experts in the field. They can also listen to the personal stories of families, teachers, and kids with LD or ADHD. Practical tips for parents are also offered in the Multimedia link. Users will be pleasantly surprised by the optimism and determination of some of these kids, when reading their personal stories in the "Your Stories" section.

  2. Online Nucleosynthesis

    NASA Astrophysics Data System (ADS)

    Meyer Jordan, Bradley, IV; The, Lih-Sin; Robbins, Stuart

    2004-05-01

    Nuclear-reaction network codes are important to astronomers seeking to explore nucleosynthetic implications of astrophysical models and to nuclear physicists seeking to understand the role of nuclear properties or reaction rates in element formation. However, many users do not have the time or inclination to download and compile the codes, to manage the requisite input files, or to explore the often complex output with their own graphics programs. To help make nucleosynthesis calculations more readily available, we have placed the Clemson Nucleosynthesis code on the world-wide web at http://www.ces.clemson.edu/physics/nucleo/nuclearNetwork At this web site, any Internet user may set his or her own reaction network, nuclear properties and reaction rates, and thermodynamic trajectories. The user then submits the nucleosynthesis calculation, which runs on a dedicated server professionally maintained at Clemson University. Once the calculation is completed, the user may explore the results through dynamically produced and downloadable tables and graphs. Online help guides the user through the necessary steps. We hope this web site will prove a user-friendly and helpful tool for professional scientists as well as for students seeking to explore element formation.

  3. Poynter Online

    NSDL National Science Digital Library

    Founded in 1975, the Poynter Institute was created by Nelson Poynter, who served as chairman of the St. Petersburg Times and the Congressional Quarterly. Over the past three decades, the organization has worked to train new cadres of journalists through a variety of intensive seminars and educational formats. Poynter Online provides interested parties access to a wide range of articles and columns created by well-regarded members of their organization and other working journalists from around the United States. Visitors can view job postings in the field, look over career columns, and even submit questions to columnists. Along with this vocationally oriented material, there are sections such as â??diversityâ?, â??photojournalismâ?, and â??ethicsâ?, which contain insightful pieces on these subjects. As might be expected given the general trends in media, there are a number of helpful blogs here that address writing for general audiences, ethical considerations for journalists, and so on. For aspiring journalists and those currently working in the profession, this site is tremendously useful.

  4. Command system output bit verification

    NASA Technical Reports Server (NTRS)

    Odd, C. W.; Abbate, S. F.

    1981-01-01

    An automatic test was developed to test the ability of the deep space station (DSS) command subsystem and exciter to generate and radiate, from the exciter, the correct idle bit sequence for a given flight project or to store and radiate received command data elements and files without alteration. This test, called the command system output bit verification test, is an extension of the command system performance test (SPT) and can be selected as an SPT option. The test compares the bit stream radiated from the DSS exciter with reference sequences generated by the SPT software program. The command subsystem and exciter are verified when the bit stream and reference sequences are identical. It is a key element of the acceptance testing conducted on the command processor assembly (CPA) operational program (DMC-0584-OP-G) prior to its transfer from development to operations.

  5. Verification of NASA Emergent Systems

    NASA Technical Reports Server (NTRS)

    Rouff, Christopher; Vanderbilt, Amy K. C. S.; Truszkowski, Walt; Rash, James; Hinchey, Mike

    2004-01-01

    NASA is studying advanced technologies for a future robotic exploration mission to the asteroid belt. This mission, the prospective ANTS (Autonomous Nano Technology Swarm) mission, will comprise of 1,000 autonomous robotic agents designed to cooperate in asteroid exploration. The emergent properties of swarm type missions make them powerful, but at the same time are more difficult to design and assure that the proper behaviors will emerge. We are currently investigating formal methods and techniques for verification and validation of future swarm-based missions. The advantage of using formal methods is their ability to mathematically assure the behavior of a swarm, emergent or otherwise. The ANT mission is being used as an example and case study for swarm-based missions for which to experiment and test current formal methods with intelligent swam. Using the ANTS mission, we have evaluated multiple formal methods to determine their effectiveness in modeling and assuring swarm behavior.

  6. Verification of FANTASTIC integrated code

    NASA Technical Reports Server (NTRS)

    Chauhan, Rajinder Singh

    1987-01-01

    FANTASTIC is an acronym for Failure Analysis Nonlinear Thermal and Structural Integrated Code. This program was developed by Failure Analysis Associates, Palo Alto, Calif., for MSFC to improve the accuracy of solid rocket motor nozzle analysis. FANTASTIC has three modules: FACT - thermochemical analysis; FAHT - heat transfer analysis; and FAST - structural analysis. All modules have keywords for data input. Work is in progress for the verification of the FAHT module, which is done by using data for various problems with known solutions as inputs to the FAHT module. The information obtained is used to identify problem areas of the code and passed on to the developer for debugging purposes. Failure Analysis Associates have revised the first version of the FANTASTIC code and a new improved version has been released to the Thermal Systems Branch.

  7. Novel Quantum Proxy Signature without Entanglement

    NASA Astrophysics Data System (ADS)

    Xu, Guang-bao

    2015-01-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  8. Imaging radar polarization signatures - Theory and observation

    NASA Technical Reports Server (NTRS)

    Van Zyl, Jakob J.; Zebker, Howard A.; Elachi, Charles

    1987-01-01

    Radar polarimetry theory is reviewed, and comparison between theory and experimental results obtained with an imaging radar polarimeter employing two orthogonally polarized antennas is made. Knowledge of the scattering matrix permits calculation of the scattering cross section of a scatterer for any transmit and receive polarization combination, and a new way of displaying the resulting scattering cross section as a function of polarization is introduced. Examples of polarization signatures are presented for several theoretical models of surface scattering, and these signatures are compared with experimentally measured polarization signatures. The coefficient of variation, derived from the polarization signature, may provide information regarding the amount of variation in scattering properties for a given area.

  9. Thermal AGN Signatures in Blazars

    E-print Network

    Eric S. Perlman; Brett Addison; Markos Georganopoulos; Brian Wingert; Philip Graff

    2008-07-15

    Long ignored in blazars because of the dominance of the beamed radiation from the jet, the topic of thermal emissions in these objects is just beginning to be explored. While this emission is weak in most blazars compared to the dominant nonthermal jet components, there is a growing body of evidence that suggests that thermal emission is observable even in the most highly beamed objects. The emitting regions, which can include the accretion disk as well as the torus, are key parts of the central engine which also powers the jets. They also may be of critical importance in helping us decide between unified scheme models. We will review the observational evidence for thermal emissions in blazars, with an emphasis on recent work, and the spectral and variability characteristics that have been observed. The majority of the evidence for thermal emission in blazars (now observed in several objects) has come as a result of multiwavelength campaigns, where the object showed a clear bump in the optical-UV in a faint state. However, evidence exists from other avenues as well, including both purely spectral and variability based arguments as well as statistical analyses of large samples of objects. We will also discuss the impact of thermal emission on an object's overall SED, including its Comptonized signatures. Finally, we will assess the current standing of unified scheme models as respects thermal signatures and the prospects for detecting thermal emission with new telescopes and missions, and further utilizing it as a probe of the central engine of blazars.

  10. RSA signatures and RabinWilliams signatures: the state of the art

    E-print Network

    Bernstein, Daniel

    ): Square roots s are replaced by tweaked square roots (e, f, s). This speeds up signing. · Section 7RSA signatures and Rabin­Williams signatures: the state of the art Daniel J. Bernstein Department

  11. Marcus Hutter -1 -Online Prediction Bayes versus Experts Online Prediction

    E-print Network

    Hutter, Marcus

    Marcus Hutter - 1 - Online Prediction ­ Bayes versus Experts Online Prediction: Bayes versus;Marcus Hutter - 2 - Online Prediction ­ Bayes versus Experts Table of Contents · Sequential/online prediction: Setup · Bayesian Sequence Prediction (Bayes) · Prediction with Expert Advice (PEA) · PEA Bounds

  12. Rhythmic TMS Causes Local Entrainment of Natural Oscillatory Signatures

    PubMed Central

    Thut, Gregor; Veniero, Domenica; Romei, Vincenzo; Miniussi, Carlo; Schyns, Philippe; Gross, Joachim

    2011-01-01

    Summary Background Neuronal elements underlying perception, cognition, and action exhibit distinct oscillatory phenomena, measured in humans by electro- or magnetoencephalography (EEG/MEG). So far, the correlative or causal nature of the link between brain oscillations and functions has remained elusive. A compelling demonstration of causality would primarily generate oscillatory signatures that are known to correlate with particular cognitive functions and then assess the behavioral consequences. Here, we provide the first direct evidence for causal entrainment of brain oscillations by transcranial magnetic stimulation (TMS) using concurrent EEG. Results We used rhythmic TMS bursts to directly interact with an MEG-identified parietal ?-oscillator, activated by attention and linked to perception. With TMS bursts tuned to its preferred ?-frequency (?-TMS), we confirmed the three main predictions of entrainment of a natural oscillator: (1) that ?-oscillations are induced during ?-TMS (reproducing an oscillatory signature of the stimulated parietal cortex), (2) that there is progressive enhancement of this ?-activity (synchronizing the targeted, ?-generator to the ?-TMS train), and (3) that this depends on the pre-TMS phase of the background ?-rhythm (entrainment of natural, ongoing ?-oscillations). Control conditions testing different TMS burst profiles and TMS-EEG in a phantom head confirmed specificity of ?-boosting to the case of synchronization between TMS train and neural oscillator. Conclusions The periodic electromagnetic force that is generated during rhythmic TMS can cause local entrainment of natural brain oscillations, emulating oscillatory signatures activated by cognitive tasks. This reveals a new mechanism of online TMS action on brain activity and can account for frequency-specific behavioral TMS effects at the level of biologically relevant rhythms. PMID:21723129

  13. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    NASA Astrophysics Data System (ADS)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  14. Environmental Technology Verification Program (ETV) Policy Compendium

    EPA Science Inventory

    The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

  15. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM: QUALITY MANAGEMENT PLAN

    EPA Science Inventory

    This Quality Management Plan details specific policies and procedures for managing quality-related activities for the Environmental Technology Verification (ETV) Program of the U.S. Environmental Protection Agency....

  16. 9 CFR 416.17 - Agency verification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

  17. Polarimetric and Interferometric SAR Calibration Verification Methods

    NASA Technical Reports Server (NTRS)

    Kim, Y.; Zyl, J van

    2001-01-01

    It is necessary to calibrate SAR data in order to use the data for science applications. When both polarimetric and interferometric data are collected simultaneously, these SAR data can be used for cross-calibration and verification.

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  19. Verification and Validation for Industrial Control Systems

    E-print Network

    Clarke, Edmund M.

    Verification and Validation for Industrial Control Systems Xiaoqing Jin Toyota Technical Center methods · Our perspective ­ Focus is on techniques for application-level real-time controller development-basics-of-4-stroke-internal-combustion-engines/ #12;

  20. 16 CFR 315.5 - Prescriber verification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...verification request. (d) Invalid prescription . If a prescriber...inaccurate, expired, or otherwise invalid, the seller shall not...A seller shall maintain a record of all direct communications...a) of this section. Such record shall consist of the...

  1. ETV - ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) - RISK MANAGEMENT

    EPA Science Inventory

    In October 1995, the Environmental Technology Verification (ETV) Program was established by EPA. The goal of ETV is to provide credible performance data for commercial-ready environmental technologies to speed their implementation for the benefit of vendors, purchasers, permitter...

  2. CPS: Verification and Certification John Rushby

    E-print Network

    Rajkumar, Ragunathan "Raj"

    , not what they fear · Traditional certification standards are a brake on innovation · We want certification lines So what is an architecture? John Rushby, SR I Verification and Certification: 2 #12;But That

  3. VERIFICATION OF GLOBAL CLIMATE CHANGE MITIGATION TECHNOLOGIES

    EPA Science Inventory

    This is a continuation of independent performance evaluations of environmental technologies under EPA's Environmental Technology Verification Program. Emissions of some greenhouse gases, most notably methane. can be controlled profitably now, even in the absence of regulations. ...

  4. Commissioning and Science Verification of ALMA

    Microsoft Academic Search

    R. Mauersberger; E. Villard; A. B. Peck; S. Asayama; D. Barkats; P. Calisse; S. Corder; J. Cortes; P. Cortes; I. de Gregorio; W. R. F. Dent; E. Fomalont; D. Fulla; D. Garcia-Appadoo; D. Gunawan; A. Hales; R. E. Hills; T. Kamazaki; L. Knee; R. Kneissl; S. Komugi; S. Leon; R. Lucas; A. Lundgren; G. Marconi; S. Matsushita; P. Planesas; M. Rawlings; A. Richards; T. Sawada; R. Simon; K. Tachihara; T. van Kempen; T. Wiklind

    2011-01-01

    We explain the current construction state of ALMA and give the timeline toward Early Science. The procedures to test the antennas and to commission the system are described. Results from the Science Verification are presented.

  5. Verification Methods for Tropical Cyclone Forecasts

    E-print Network

    Ebert, Beth

    ORGANIZATION WORLD WEATHER RESEARCH PROGRAMME WWRP 2013 - 7 WWRP/WGNE Joint Working Group on Forecast, provided that the complete source is clearly indicated. Editorial correspondence and requests to publish ............................................................................................................................................................. 12 4. CURRENT VERIFICATION PRACTICE ­ DETERMINISTIC FORECASTS

  6. A verification library for multibody simulation software

    NASA Technical Reports Server (NTRS)

    Kim, Sung-Soo; Haug, Edward J.; Frisch, Harold P.

    1989-01-01

    A multibody dynamics verification library, that maintains and manages test and validation data is proposed, based on RRC Robot arm and CASE backhoe validation and a comparitive study of DADS, DISCOS, and CONTOPS that are existing public domain and commercial multibody dynamic simulation programs. Using simple representative problems, simulation results from each program are cross checked, and the validation results are presented. Functionalities of the verification library are defined, in order to automate validation procedure.

  7. Planning for software verification and validation

    Microsoft Academic Search

    D R Wallace; R U Fujii

    1987-01-01

    Software verification and validation (V&V) is a systems engineering process that supports the evaluation of software quality. Software V&V requires careful planning for effective application of a rigorous methodology for evaluating the correctness and quality of the software product throughout the software life cycle. A recent standard, the IEEE Std. 1012--1986, Standard for Software Verification and Validation Plans (SVVP), provides

  8. Dynamic verification of very large space structures

    NASA Technical Reports Server (NTRS)

    Hanks, B. R.

    1985-01-01

    A research program in spacecraft structures, structural dynamics, and controls verification using a relatively large, flexible beam as a focus is introduced. This research effort addresses fundamental problems applicable to the verification of large, flexible space structures and combines ground tests, flight behavior prediction, and instrumented orbital tests. The program is expected to produce quantitative results for use in improving the validity of ground tests for verifying flight performance analyses.

  9. The NPARC Alliance Verification and Validation Archive

    NASA Technical Reports Server (NTRS)

    Slater, John W.; Dudek, Julianne C.; Tatum, Kenneth E.

    2000-01-01

    The NPARC Alliance (National Project for Applications oriented Research in CFD) maintains a publicly-available, web-based verification and validation archive as part of the development and support of the WIND CFD code. The verification and validation methods used for the cases attempt to follow the policies and guidelines of the ASME and AIAA. The emphasis is on air-breathing propulsion flow fields with Mach numbers ranging from low-subsonic to hypersonic.

  10. The Internet and clinical trials: background, online resources, examples and issues. | accrualnet.cancer.gov

    Cancer.gov

    The Internet is increasingly being used to improve clinical trial knowledge and awareness and facilitate participant recruitment. Online clinical trial registries connect potential clinical trial participants with research teams. Individual clinical trial Web sites provide easy-to-understand information to the public. Potential participants can be screened using online questionnaires, and enrollment and consent forms can be made available for download or digital signature.

  11. DNA Methylation Signature of Childhood Chronic Physical Aggression in T Cells of Both Men and Women

    PubMed Central

    Guillemin, Claire; Provençal, Nadine; Suderman, Matthew; Côté, Sylvana M.; Vitaro, Frank; Hallett, Michael; Tremblay, Richard E.; Szyf, Moshe

    2014-01-01

    Background High frequency of physical aggression is the central feature of severe conduct disorder and is associated with a wide range of social, mental and physical health problems. We have previously tested the hypothesis that differential DNA methylation signatures in peripheral T cells are associated with a chronic aggression trajectory in males. Despite the fact that sex differences appear to play a pivotal role in determining the development, magnitude and frequency of aggression, most of previous studies focused on males, so little is known about female chronic physical aggression. We therefore tested here whether or not there is a signature of physical aggression in female DNA methylation and, if there is, how it relates to the signature observed in males. Methodology/Principal Findings Methylation profiles were created using the method of methylated DNA immunoprecipitation (MeDIP) followed by microarray hybridization and statistical and bioinformatic analyses on T cell DNA obtained from adult women who were found to be on a chronic physical aggression trajectory (CPA) between 6 and 12 years of age compared to women who followed a normal physical aggression trajectory. We confirmed the existence of a well-defined, genome-wide signature of DNA methylation associated with chronic physical aggression in the peripheral T cells of adult females that includes many of the genes similarly associated with physical aggression in the same cell types of adult males. Conclusions This study in a small number of women presents preliminary evidence for a genome-wide variation in promoter DNA methylation that associates with CPA in women that warrant larger studies for further verification. A significant proportion of these associations were previously observed in men with CPA supporting the hypothesis that the epigenetic signature of early life aggression in females is composed of a component specific to females and another common to both males and females. PMID:24475181

  12. TOXLINE (TOXICOLOGY INFORMATION ONLINE)

    EPA Science Inventory

    TOXLINE? (TOXicology information onLINE) are the National Library of Medicines extensive collection of online bibliographic information covering the pharmacological, biochemical, physiological, and toxicological effects of drugs and other chemicals. TOXLINE and TOXLINE65 together...

  13. Online Data Collection.

    ERIC Educational Resources Information Center

    Topp, Neal W.; Pawloski, Bob

    2002-01-01

    Describes the eventful history of online data collection and presents a review of current literature following by a list of pros and cons to be considered when stepping into online surveying. (Contains 14 references.) (Author/YDS)

  14. Online Assessment Techniques.

    ERIC Educational Resources Information Center

    Robles, Marcel; Braathen, Sandy

    2002-01-01

    Online assessment must measure both learning objectives and application of knowledge. Many current assessment techniques can be modified for online use. Multiple methods, including assessment of interaction and student self-assessment, should be used. (SK)

  15. Teaching Geoscience Online

    NSDL National Science Digital Library

    More and more schools are offering online courses in the sciences, and the geophysical sciences are no exception. Carleton College is deservedly well known for their "Cutting Edge" website of geoscience teaching resources, and here they present some helpful materials for those wishing to teach geoscience online. The resources were developed as part of their 2010 workshop titled "Teaching Geoscience Online". Visitors can scroll through the list of resources, which are divided into sections that include "pedagogy" and "online activities and courses". The materials include titles like "Student Motivation and Engagement in Online Courses", "Using Data to Teach Geology in College-Level Online Classes", and "Course Platforms for Teaching Online". A number of these resources could be used by anyone teaching online courses, not just those in the field of geoscience.

  16. The Online Underworld.

    ERIC Educational Resources Information Center

    Scrogan, Len

    1988-01-01

    Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

  17. Earth Science Online Resources

    NSDL National Science Digital Library

    These resources are designed to accompany the textbook 'Earth Science' by Pearson Prentice Hall. Materials include quizzes, online field trips, Powerpoint presentations, study guides, animations, and links to online resources.

  18. A Forward-Secure Digital Signature Scheme

    Microsoft Academic Search

    Mihir Bellare; Sara K. Miner

    1999-01-01

    We describe a digital signature scheme in which the public key is fixed but the secret signing key is updated at regular intervals so as to provide a forward security property: compromise of the current secret key does not enable an adversary to forge signatures pertaining to the past. This can be useful to mitigate the damage caused by key

  19. Short Transitive Signatures for Directed Trees

    E-print Network

    Rapaport, Iván

    ;Trivial solutions Let = ||, security parameter When adding a new node... · Sign each edge ­ Time to sign signature: (( )1/) · Size of path signature: ( ) bits #12;Security [MR02] (, ) (, ) BC (, ) (, ) E;Trivial Order Data Structure A Toy Example 0 1000 a 500 750 bd 250 c 875 For insertions we need to handle

  20. Does Social Work Have a Signature Pedagogy?

    ERIC Educational Resources Information Center

    Earls Larrison, Tara; Korr, Wynne S.

    2013-01-01

    This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

  1. Dynamic Multithreshold Signature without the Trusted Dealer

    Microsoft Academic Search

    Tomasz Warcho?

    In the article a new threshold signature for dynamic groups without the trusted dealer is presented. The scheme is based on the Boneh, Lynn and Shacham short signature from the Weil pairing. The scheme provides an efficient solution especially for the family of dynamic groups. We prove the security of the scheme in the random oracle model assuming the chosen

  2. Signatures of Correct Computation Charalampos Papamanthou

    E-print Network

    also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model client can verify the signature and be convinced of some computation result, whereas in the PVC model to construct PVC schemes with adaptive security, efficient updates and without the random oracle model. 1

  3. MMW, IR, and SAM signature collection

    Microsoft Academic Search

    Fred Reichstetter; Mary E. Ward

    2002-01-01

    During the development of smart weapon's seeker\\/sensors, it is imperative to collect high quality signatures of the targets the system is intended to engage. These signatures are used to support algorithm development so the system can find and engage the targets of interest in the specific kill area on the target. Englin AFB FL is the AF development center for

  4. Polygraph: Automatically Generating Signatures for Polymorphic Worms

    Microsoft Academic Search

    James Newsome; Brad Karp; Dawn Xiaodong Song

    2005-01-01

    It is widely believed that content-signature-based intru- sion detection systems (IDSes) are easily evaded by poly- morphic worms, which vary their payload on every infec- tion attempt. In this paper, we present Polygraph, a sig- nature generation system that successfully produces signa- tures that match polymorphic worms. Polygraph gener- ates signatures that consist of multiple disjoint content sub- strings. In

  5. Cyclostationary Signatures in Practical Cognitive Radio Applications

    Microsoft Academic Search

    Paul D. Sutton; Keith E. Nolan; Linda E. Doyle

    2008-01-01

    We define a cyclostationary signature as a feature which may be intentionally embedded in a digital communications signal, detected through cyclostationary analysis and used as a unique identifier. The purpose of this paper is to demonstrate how cyclostationary signatures can be exploited to overcome a number of the challenges associated with network coordination in emerging cognitive radio applications and spectrum

  6. Ensemble classifiers for dynamic signature authentication

    Microsoft Academic Search

    Nora Al-Muhanna; Souham Meshoul

    2011-01-01

    Rapid advances in technology, that made almost everything goes digital have entailed a persistent need for a stronger means of information security. Furthermore, new advanced devices are now available to capture the dynamic of a person's signature. Therefore, the reliance on the dynamic signature for authenticating entities in secure system became crucial. In this paper, we investigate the problem of

  7. Irma multisensor predictive signature model

    NASA Astrophysics Data System (ADS)

    Watson, John S.; Wellfare, Michael R.; Foster, Joseph; Owens, Monte A.; Vechinski, Douglas A.; Richards, Mike; Resnick, Andrew; Underwood, Vincent

    1998-07-01

    The Irma synthetic signature model was one of the first high resolution infrared (IR) target and background signature models to be developed for tactical weapons application. Originally developed in 1980 by the Munitions Directorate of the Air Force Research Laboratory, the Irma model was used exclusively to generate IR scenes for smart weapons research and development. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser channel. This two channel version, Irma 3.0, was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model which supported correlated frame-to-frame imagery. This and other improvements were released in Irma 2.2. Irma 3.2, a passive IR/millimeter wave (MMW) code, was completed in 1994. This served as the cornerstone for the development of the co- registered active/passive IR/MMW model, Irma 4.0. Currently, upgrades are underway to include a near IR (NIR)/visible channel; a facet editor; utilities to support image viewing and scaling; and additional target/data files. The Irma 4.1 software development effort is nearly completion. The purpose of this paper is to illustrate the results of the development. Planned upgrades for Irma 5.0 will be provided as well. Irma is being developed to facilitate multi-sensor research and development. It is currently being used to support a number of civilian and military applications. The current Irma user base includes over 100 agencies within the Air Force, Army, Navy, DARPA, NASA, Department of Transportation, academia, and industry.

  8. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    NASA Astrophysics Data System (ADS)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.

  9. CV Surgery Online

    NSDL National Science Digital Library

    Stanford University's HighWire Press has announced the online publication of several journals. CV Surgery Online offers "a fully searchable online compilation of articles pertinent to the cardiothoracic and vascular surgeon from the 5 American Heart Association Journals: Circulation, Circulation Research, Hypertension, Stroke, and Arteriosclerosis, Thrombosis, and Vascular Surgery." Published by the American Heart Association in conjunction with HighWire Press, the free trial period for CV Surgery Online ended December 31, 2000.

  10. Online Monitoring of Plant Assets in the Nuclear Industry

    SciTech Connect

    Nancy Lybeck; Vivek Agarwal; Binh Pham; Richard Rusaw; Randy Bickford

    2013-10-01

    Today’s online monitoring technologies provide opportunities to perform predictive and proactive health management of assets within many different industries, in particular the defense and aerospace industries. The nuclear industry can leverage these technologies to enhance safety, productivity, and reliability of the aging fleet of existing nuclear power plants. The U.S. Department of Energy’s Light Water Reactor Sustainability Program is collaborating with the Electric Power Research Institute’s (EPRI’s) Long-Term Operations program to implement online monitoring in existing nuclear power plants. Proactive online monitoring in the nuclear industry is being explored using EPRI’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software, a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. This paper focuses on development of asset fault signatures used to assess the health status of generator step-up transformers and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. Fault signatures are developed based on the results of detailed technical research and on the knowledge and experience of technical experts. The Diagnostic Advisor of the FW-PHM Suite software matches developed fault signatures with operational data to provide early identification of critical faults and troubleshooting advice that could be used to distinguish between faults with similar symptoms. This research is important as it will support the automation of predictive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  11. Recent advances at the European Microwave Signature Laboratory

    NASA Astrophysics Data System (ADS)

    Nesti, Giuseppe; Sieber, Alois J.; de Grandi, Gianfranco D.; Fortuny-Guasch, Joaquim; Ohlmer, E.

    1994-12-01

    The European Microwave Signature Laboratory (EMSL), recently built at the Joint Research Center of the Commission of European Communities (CEC) at Ispra, is a state-of-the-art experimental facility which provides unique opportunities in terms of measurement capabilities and data processing. The laboratory is mainly devoted to polarimetric radar measurements aimed to complement air- and spaceborne remote sensing experiments by providing stable and reproducible environmental conditions and flexible operational modes for well-controlled experiments. As one of the European Large Facilities, the EMSL is open to collaboration with all interested research groups both within the European Union and outside. The EMSL anechoic chamber has an hemispherical shape with a diameter of 20 m and hosts two independently movable TX/RX modules plus a set of fixed receiving antennae. A positioner with linear and rotary movements is used to transport and accurately move the target under test inside the chamber. The selection of different geometrical configurations (mono-, bi-, multi-static) and measurement modes (scatterometric, 2D and 3D imaging) is made possible by this special architecture of the facility. In this paper, first a description of the main components of the laboratory is given, then the performances of the measurement system are discussed on the basis of the results of verification tests (Stability, Sensitivity, Antenna pattern characterization) and finally a selection is presented of the most significant outcomes of the experiments undertaken until now.

  12. Health care professionals protocol for secure online transmission of patient data.

    PubMed

    Goetz, C F

    1999-01-01

    One of the results of the 49th Bavarian Physician's Conference was that in 1996 the Bavarian Statutory Health Care Administration (Kassenärztliche Vereinigung Bayerns, KVB) and the Bavarian Medical Association (Bayerische Landesärztekammer, BLAK) jointly suggested a project for the development and verification of a security infrastructure for the online transmission of medical patient data. This Project, the so-called "Health Care Professionals Protocol" (HCP-Protokoll), was designed to establish the first consensus standard for a secure and probably open system to be used in the health care system operating under the constraints of the diverse and heterogeneous IT-infrastructure in Bavaria, with a view towards utilization in all of Germany. In January 1997, the HCP-Protocol was accepted as the strategic mainline project for telematics applications in medicine by the State of Bavaria and endowed with more than 1.3 million DM in the framework of "Bavaria Online II". In the meantime, various national organizations of the German medical community as well as important industrial partners have expressed support for this initiative. Mention in the Roland-Berger study "Telematics in Health Care, Perspectives of Telemedicine in Germany", designation as an "exemplary scenario" in the final report of the Working Group 7 of the Forum Info 2000 "Telematics Applications in Health Care", as well as integration of the new German health professional card, make the HCP-Protocol the most promising candidate for a de facto standard in the security infrastructure for all participants in health care telecommunication in Germany. Since the middle of 1998, an expert group under the guidance of the joint "Projektbüro Telemedizin" of the KVB and BLAK has been working on the definition of this protocol, taking into consideration the current legal framework of the German medical profession (Berufsordnung), the German signature law (SigG), and the national data security laws (BDSG), as well as today's technical possibilities and existing components. The results of this definition will be published at the first opportunity (sometime during the first half of 1999) and then placed into public domain, so that any solution provider can reference this source to create secure and mutually interoperable application programs for health care professionals in Germany. PMID:10747556

  13. Signatures of mutational processes in human cancer

    PubMed Central

    Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Aparicio, Samuel A.J.R.; Behjati, Sam; Biankin, Andrew V.; Bignell, Graham R.; Bolli, Niccolo; Borg, Ake; Børresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P.; Caldas, Carlos; Davies, Helen R.; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A.; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinsk, Marcin; Jäger, Natalie; Jones, David T.W.; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R.; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C.; Nakamura, Hiromi; Northcott, Paul A.; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V.; Puente, Xose S.; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L.; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N.; Span, Paul N.; Teague, Jon W.; Totoki, Yasushi; Tutt, Andrew N.J.; Valdés-Mas, Rafael; van Buuren, Marit M.; van ’t Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R.; Zucman-Rossi, Jessica; Futreal, P. Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M.; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M.; Campbell, Peter J.; Stratton, Michael R.

    2013-01-01

    All cancers are caused by somatic mutations. However, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here, we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, kataegis, is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer with potential implications for understanding of cancer etiology, prevention and therapy. PMID:23945592

  14. Online Vouchers Caf Training

    E-print Network

    Shull, Kenneth R.

    FMS832 Online Vouchers Café Training #12;What is a Voucher? "Online Voucher" Payment Direct Payment Prospective faculty or staff Non-employee students #12;7 Visitor's Expense Report · Reimbursements for non-employees individuals · Submit Online Voucher plus paper Contracted Services Form · Send original signed Contracted

  15. Assessing Online Learning

    ERIC Educational Resources Information Center

    Comeaux, Patricia, Ed.

    2004-01-01

    Students in traditional as well as online classrooms need more than grades from their instructors--they also need meaningful feedback to help bridge their academic knowledge and skills with their daily lives. With the increasing number of online learning classrooms, the question of how to consistently assess online learning has become increasingly…

  16. Online Learning. Symposium.

    ERIC Educational Resources Information Center

    2002

    This document contains three papers from a symposium on online learning that was conducted as part of a conference on human resource development (HRD). "An Instructional Strategy Framework for Online Learning Environments" (Scott D. Johnson, Steven R. Aragon) discusses the pitfalls of modeling online courses after traditional instruction instead…

  17. Vegetarian Nutrition online

    Microsoft Academic Search

    E. Larson; B. Scott; B. Pasternak; D. Wasserman

    1995-01-01

    Many consumers have questions about vegetarian nutrition. In order to meet their needs, it is important to know which topics are of particular interest. Subscribers to commercial online computer services represent one group of consumers. Interest in various topics related to vegetarian nutrition among users of two commercial online services (America Online and CompuServe) was examined retrospectively by collecting information

  18. Implementing Online Physical Education

    ERIC Educational Resources Information Center

    Mohnsen, Bonnie

    2012-01-01

    Online physical education, although seemingly an oxymoron, appears to be the wave of the future at least for some students. The purpose of this article is to explore research and options for online learning in physical education and to examine a curriculum, assessment, and instructional model for online learning. The article examines how physical…

  19. Online Advertisement Campaign Optimization

    Microsoft Academic Search

    Weiguo Liu; Shi Zhong; Mayank Chaudhary; Shyam Kapur

    2007-01-01

    Like any marketing campaigns, online advertisement campaigns need to be monitored, analyzed and optimized. It is more so for online campaigns because online advertisements are usually sold in auction style. Prices can change very dynamically; the creatives, the landing pages and the targeting profiles can all be changed frequently to improve the effectiveness of a campaign. Also, the effectiveness can

  20. Online Higher Education Commodity

    ERIC Educational Resources Information Center

    Chau, Paule

    2010-01-01

    This article analyzes the current trend towards online education. It examines some of the reasons for the trend and the ramifications it may have on students, faculty and institutions of higher learning. The success and profitability of online programs and institutions such as the University of Phoenix has helped to make the move towards online…

  1. Dynamic characteristics of signatures: effects of writer style on genuine and simulated signatures.

    PubMed

    Mohammed, Linton; Found, Bryan; Caligiuri, Michael; Rogers, Doug

    2015-01-01

    The aims of this study were to determine if computer-measured dynamic features (duration, size, velocity, jerk, and pen pressure) differ between genuine and simulated signatures. Sixty subjects (3 equal groups of 3 signature styles) each provided 10 naturally written (genuine) signatures. Each of these subjects then provided 15 simulations of each of three model signatures. The genuine (N = 600) and simulated (N = 2700) signatures were collected using a digitizing tablet. MovAlyzeR(®) software was used to estimate kinematic parameters for each pen stroke. Stroke duration, velocity, and pen pressure were found to discriminate between genuine and simulated signatures regardless of the simulator's own style of signature or the style of signature being simulated. However, there was a significant interaction between style and condition for size and jerk (a measure of smoothness). The results of this study, based on quantitative analysis and dynamic handwriting features, indicate that the style of the simulator's own signature and the style of signature being simulated can impact the characteristics of handwriting movements for simulations. Writer style characteristics might therefore need to be taken into consideration as potentially significant when evaluating signature features with a view to forming opinions regarding authenticity. PMID:25420668

  2. GHG MITIGATION TECHNOLOGY PERFORMANCE EVALUATIONS UNDERWAY AT THE GHG TECHNOLOGY VERIFICATION CENTER

    EPA Science Inventory

    The paper outlines the verification approach and activities of the Greenhouse Gas (GHG) Technology Verification Center, one of 12 independent verification entities operating under the U.S. EPA-sponsored Environmental Technology Verification (ETV) program. (NOTE: The ETV program...

  3. Direct verification of warped hierarchy-and-flavor models

    SciTech Connect

    Davoudiasl, Hooman; Soni, Amarjit [Department of Physics, Brookhaven National Laboratory, Upton, New York 11973-5000 (United States); Rizzo, Thomas G. [Stanford Linear Accelerator Center, 2575 Sand Hill Road, Menlo Park, California 94025 (United States)

    2008-02-01

    We consider direct experimental verification of warped models, based on the Randall-Sundrum (RS) scenario, that explain gauge and flavor hierarchies, assuming that the gauge fields and fermions of the standard model (SM) propagate in the 5D bulk. Most studies have focused on the bosonic Kaluza-Klein (KK) signatures and indicate that discovering gauge KK modes is likely possible, yet challenging, while graviton KK modes are unlikely to be accessible at the CERN LHC, even with a luminosity upgrade. We show that direct evidence for bulk SM fermions, i.e. their KK modes, is likely also beyond the reach of a luminosity-upgraded LHC. Thus, neither the spin-2 KK graviton, the most distinct RS signal, nor the KK SM fermions, direct evidence for bulk flavor, seem to be within the reach of the LHC. We then consider hadron colliders with {radical}(s)=21, 28, and 60 TeV. We find that discovering the first KK modes of SM fermions and the graviton typically requires the Next Hadron Collider (NHC) with {radical}(s){approx_equal}60 TeV and O(1) ab{sup -1} of integrated luminosity. If the LHC yields hints of these warped models, establishing that nature is described by them, or their 4D conformal field theory duals, requires an NHC-class machine in the post-LHC experimental program.

  4. On Direct Verification of Warped Hierarchy-and-FlavorModels

    SciTech Connect

    Davoudiasl, Hooman; /Brookhaven; Rizzo, Thomas G.; /SLAC; Soni, Amarjit; /Brookhaven

    2007-10-15

    We consider direct experimental verification of warped models, based on the Randall-Sundrum (RS) scenario, that explain gauge and flavor hierarchies, assuming that the gauge fields and fermions of the Standard Model (SM) propagate in the 5D bulk. Most studies have focused on the bosonic Kaluza Klein (KK) signatures and indicate that discovering gauge KK modes is likely possible, yet challenging, while graviton KK modes are unlikely to be accessible at the LHC, even with a luminosity upgrade. We show that direct evidence for bulk SM fermions, i.e. their KK modes, is likely also beyond the reach of a luminosity-upgraded LHC. Thus, neither the spin-2 KK graviton, the most distinct RS signal, nor the KK SM fermions, direct evidence for bulk flavor, seem to be within the reach of the LHC. We then consider hadron colliders with vs. = 21, 28, and 60 TeV. We find that discovering the first KK modes of SM fermions and the graviton typically requires the Next Hadron Collider (NHC) with {radical}s {approx} 60 TeV and O(1) ab-1 of integrated luminosity. If the LHC yields hints of these warped models, establishing that Nature is described by them, or their 4D CFT duals, requires an NHC-class machine in the post-LHC experimental program.

  5. Verification of Functional Fault Models and the Use of Resource Efficient Verification Tools

    NASA Technical Reports Server (NTRS)

    Bis, Rachael; Maul, William A.

    2015-01-01

    Functional fault models (FFMs) are a directed graph representation of the failure effect propagation paths within a system's physical architecture and are used to support development and real-time diagnostics of complex systems. Verification of these models is required to confirm that the FFMs are correctly built and accurately represent the underlying physical system. However, a manual, comprehensive verification process applied to the FFMs was found to be error prone due to the intensive and customized process necessary to verify each individual component model and to require a burdensome level of resources. To address this problem, automated verification tools have been developed and utilized to mitigate these key pitfalls. This paper discusses the verification of the FFMs and presents the tools that were developed to make the verification process more efficient and effective.

  6. Visual inspection for CTBT verification

    SciTech Connect

    Hawkins, W.; Wohletz, K.

    1997-03-01

    On-site visual inspection will play an essential role in future Comprehensive Test Ban Treaty (CTBT) verification. Although seismic and remote sensing techniques are the best understood and most developed methods for detection of evasive testing of nuclear weapons, visual inspection can greatly augment the certainty and detail of understanding provided by these more traditional methods. Not only can visual inspection offer ``ground truth`` in cases of suspected nuclear testing, but it also can provide accurate source location and testing media properties necessary for detailed analysis of seismic records. For testing in violation of the CTBT, an offending party may attempt to conceal the test, which most likely will be achieved by underground burial. While such concealment may not prevent seismic detection, evidence of test deployment, location, and yield can be disguised. In this light, if a suspicious event is detected by seismic or other remote methods, visual inspection of the event area is necessary to document any evidence that might support a claim of nuclear testing and provide data needed to further interpret seismic records and guide further investigations. However, the methods for visual inspection are not widely known nor appreciated, and experience is presently limited. Visual inspection can be achieved by simple, non-intrusive means, primarily geological in nature, and it is the purpose of this report to describe the considerations, procedures, and equipment required to field such an inspection.

  7. Learning Assumptions for Compositional Verification

    NASA Technical Reports Server (NTRS)

    Cobleigh, Jamieson M.; Giannakopoulou, Dimitra; Pasareanu, Corina; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Compositional verification is a promising approach to addressing the state explosion problem associated with model checking. One compositional technique advocates proving properties of a system by checking properties of its components in an assume-guarantee style. However, the application of this technique is difficult because it involves non-trivial human input. This paper presents a novel framework for performing assume-guarantee reasoning in an incremental and fully automated fashion. To check a component against a property, our approach generates assumptions that the environment needs to satisfy for the property to hold. These assumptions are then discharged on the rest of the system. Assumptions are computed by a learning algorithm. They are initially approximate, but become gradually more precise by means of counterexamples obtained by model checking the component and its environment, alternately. This iterative process may at any stage conclude that the property is either true or false in the system. We have implemented our approach in the LTSA tool and applied it to the analysis of a NASA system.

  8. Cold Flow Verification Test Facility

    SciTech Connect

    Shamsi, A.; Shadle, L.J.

    1996-12-31

    The cold flow verification test facility consists of a 15-foot high, 3-foot diameter, domed vessel made of clear acrylic in two flanged sections. The unit can operate up to pressures of 14 psig. The internals include a 10-foot high jetting fluidized bed, a cylindrical baffle that hangs from the dome, and a rotating grate for control of continuous solids removal. The fluid bed is continuously fed solids (20 to 150 lb/hr) through a central nozzle made up of concentric pipes. It can either be configured as a half or full cylinder of various dimensions. The fluid bed has flow loops for separate air flow control for conveying solids (inner jet, 500 to 100000 scfh) , make-up into the jet (outer jet, 500 to 8000 scfh), spargers in the solids removal annulus (100 to 2000 scfh), and 6 air jets (20 to 200 scfh) on the sloping conical grid. Additional air (500 to 10000 scfh) can be added to the top of the dome and under the rotating grate. The outer vessel, the hanging cylindrical baffles or skirt, and the rotating grate can be used to study issues concerning moving bed reactors. There is ample allowance for access and instrumentation in the outer shell. Furthermore, this facility is available for future Cooperative Research and Development Program Manager Agreements (CRADA) to study issues and problems associated with fluid- and fixed-bed reactors. The design allows testing of different dimensions and geometries.

  9. Monitoring and verification R&D

    SciTech Connect

    Pilat, Joseph F [Los Alamos National Laboratory; Budlong - Sylvester, Kory W [Los Alamos National Laboratory; Fearey, Bryan L [Los Alamos National Laboratory

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  10. Online Cake Cutting

    E-print Network

    Walsh, Toby

    2010-01-01

    We propose an online form of the cake cutting problem. This models situations where players arrive and depart during the process of dividing a resource. We show that well known fair division procedures like cut-and-choose and the Dubins-Spanier moving knife procedure can be adapted to apply to such online problems. We propose some desirable properties that online cake cutting procedures might possess like online forms of proportionality and envy-freeness, and identify which properties are in fact possessed by the different online cake procedures.

  11. Complementary technologies for verification of excess plutonium

    SciTech Connect

    Langner, , D.G.; Nicholas, N.J.; Ensslin, N.; Fearey, B.L. [Los Alamos National Lab., NM (United States); Mitchell, D.J.; Marlow, K.W. [Sandia National Lab., Albuquerque, NM (United States); Luke, S.J.; Gosnell, T.B. [Lawrence Livermore National Lab., CA (United States)

    1998-12-31

    Three complementary measurement technologies have been identified as candidates for use in the verification of excess plutonium of weapons origin. These technologies: high-resolution gamma-ray spectroscopy, neutron multiplicity counting, and low-resolution gamma-ray spectroscopy, are mature, robust technologies. The high-resolution gamma-ray system, Pu-600, uses the 630--670 keV region of the emitted gamma-ray spectrum to determine the ratio of {sup 240}Pu to {sup 239}Pu. It is useful in verifying the presence of plutonium and the presence of weapons-grade plutonium. Neutron multiplicity counting is well suited for verifying that the plutonium is of a safeguardable quantity and is weapons-quality material, as opposed to residue or waste. In addition, multiplicity counting can independently verify the presence of plutonium by virtue of a measured neutron self-multiplication and can detect the presence of non-plutonium neutron sources. The low-resolution gamma-ray spectroscopic technique is a template method that can provide continuity of knowledge that an item that enters the a verification regime remains under the regime. In the initial verification of an item, multiple regions of the measured low-resolution spectrum form a unique, gamma-radiation-based template for the item that can be used for comparison in subsequent verifications. In this paper the authors discuss these technologies as they relate to the different attributes that could be used in a verification regime.

  12. LOOK FOR THE SIGNATURE 1 Look for the Signature: How the Infusion of Personal Signatures Affects Product Evaluations and

    E-print Network

    Shyu, Mei-Ling

    ), product creators (e.g., brewers Jim Koch and Bob Connor for Samuel Adams beer), or celebrity endorsers (e.g., Arnold Palmer for Jiffy Lube). Personal signatures continue to appear widely on labels and packaging (e

  13. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

  14. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  15. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  16. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  17. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  18. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  19. Generic Protocol for the Verification of Ballast Water Treatment Technology

    EPA Science Inventory

    In anticipation of the need to address performance verification and subsequent approval of new and innovative ballast water treatment technologies for shipboard installation, the U.S Coast Guard and the Environmental Protection Agency?s Environmental Technology Verification Progr...

  20. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  1. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  2. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  3. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  4. 21 CFR 21.44 - Verification of identity.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Verification of identity. 21.44 Section 21.44 Food...Systems § 21.44 Verification of identity. (a) An individual seeking access...and Drug Administration to determine his identity. The identification required...

  5. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

  6. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

  7. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

  8. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

  9. ETV INTERNATIONAL OUTREACH ACTIVITIES (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program's international outrearch activities have extended as far as Canada, Germany, Taiwan and the Philippines. Vendors from Canada and Germany were hosted at verification tests of turbidimeters. In May 1999, EPA's ETV Coordinator...

  10. 29 CFR 403.8 - Dissemination and verification of reports.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...false Dissemination and verification of reports. 403.8 Section 403.8 Labor...STANDARDS LABOR ORGANIZATION ANNUAL FINANCIAL REPORTS § 403.8 Dissemination and verification of reports. (a) Every labor organization...

  11. 29 CFR 403.8 - Dissemination and verification of reports.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...false Dissemination and verification of reports. 403.8 Section 403.8 Labor...STANDARDS LABOR ORGANIZATION ANNUAL FINANCIAL REPORTS § 403.8 Dissemination and verification of reports. (a) Every labor organization...

  12. (abstract) Topographic Signatures in Geology

    NASA Technical Reports Server (NTRS)

    Farr, Tom G.; Evans, Diane L.

    1996-01-01

    Topographic information is required for many Earth Science investigations. For example, topography is an important element in regional and global geomorphic studies because it reflects the interplay between the climate-driven processes of erosion and the tectonic processes of uplift. A number of techniques have been developed to analyze digital topographic data, including Fourier texture analysis. A Fourier transform of the topography of an area allows the spatial frequency content of the topography to be analyzed. Band-pass filtering of the transform produces images representing the amplitude of different spatial wavelengths. These are then used in a multi-band classification to map units based on their spatial frequency content. The results using a radar image instead of digital topography showed good correspondence to a geologic map, however brightness variations in the image unrelated to topography caused errors. An additional benefit to the use of Fourier band-pass images for the classification is that the textural signatures of the units are quantative measures of the spatial characteristics of the units that may be used to map similar units in similar environments.

  13. Seismoacoustic signatures of fracture connectivity

    NASA Astrophysics Data System (ADS)

    Rubino, J. Germán.; Müller, Tobias M.; Guarracino, Luis; Milani, Marco; Holliger, Klaus

    2014-03-01

    Wave-induced fluid flow (WIFF) between fractures and the embedding matrix as well as within connected fractures tends to produce significant seismic attenuation and velocity dispersion. While WIFF between fractures and matrix is well understood, the corresponding effects related to fracture connectivity and the characteristics of the energy dissipation due to flow within fractures are largely unexplored. In this work, we use oscillatory relaxation simulations based on the quasi-static poroelastic equations to study these phenomena. We first consider synthetic rock samples containing connected and unconnected fractures and compute the corresponding attenuation and phase velocity. We also determine the relative fluid displacement and pressure fields in order to gain insight into the physical processes involved in the two manifestations of WIFF in fractured media. To quantify the contributions of the two WIFF mechanisms to the total seismic attenuation, we compute the spatial distribution of the local energy dissipation. Finally, we perform an exhaustive sensitivity analysis to study the role played by different characteristics of fracture networks on the seismic signatures. We show that in the presence of connected fractures both P wave attenuation and phase velocity are sensitive to some key characteristics of the probed medium, notably to the lengths, permeabilities, and intersection angles of the fractures as well as to the overall degree of connectivity of the fracture network. This, in turn, indicates that a deeper understanding of these two manifestations of WIFF in fractured media may eventually allow for the extraction of some of these properties from seismic data.

  14. UTEX modeling of xenon signature sensitivity to geology and explosion cavity characteristics following an underground nuclear explosion

    NASA Astrophysics Data System (ADS)

    Lowrey, J. D.; Haas, D.

    2013-12-01

    Underground nuclear explosions (UNEs) produce anthropogenic isotopes that can potentially be used in the verification component of the Comprehensive Nuclear-Test-Ban Treaty. Several isotopes of radioactive xenon gas have been identified as radionuclides of interest within the International Monitoring System (IMS) and in an On-Site Inspection (OSI). Substantial research has been previously undertaken to characterize the geologic and atmospheric mechanisms that can drive the movement of radionuclide gas from a well-contained UNE, considering both sensitivities on gas arrival time and signature variability of xenon due to the nature of subsurface transport. This work further considers sensitivities of radioxenon gas arrival time and signatures to large variability in geologic stratification and generalized explosion cavity characteristics, as well as compares this influence to variability in the shallow surface.

  15. Fuel Retrieval System (FRS) Design Verification

    SciTech Connect

    YANOCHKO, R.M.

    2000-01-27

    This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

  16. Critical Surface Cleaning and Verification Alternatives

    NASA Technical Reports Server (NTRS)

    Melton, Donald M.; McCool, A. (Technical Monitor)

    2000-01-01

    As a result of federal and state requirements, historical critical cleaning and verification solvents such as Freon 113, Freon TMC, and Trichloroethylene (TCE) are either highly regulated or no longer 0 C available. Interim replacements such as HCFC 225 have been qualified, however toxicity and future phase-out regulations necessitate long term solutions. The scope of this project was to qualify a safe and environmentally compliant LOX surface verification alternative to Freon 113, TCE and HCFC 225. The main effort was focused on initiating the evaluation and qualification of HCFC 225G as an alternate LOX verification solvent. The project was scoped in FY 99/00 to perform LOX compatibility, cleaning efficiency and qualification on flight hardware.

  17. Gridded Forecast Verification and Bias Correction

    NSDL National Science Digital Library

    2014-09-14

    To become a better forecaster, it is not enough to simply know that a forecast did not verify. One must determine what happened and identify methods for improvement through forecast verification. The forecast verification process helps answer questions like: Is there a particular method that has been more effective in the past in similar circumstances? Is there guidance that is more accurate? Are there persistent biases in our forecasts? Do our forecasts perform better in certain regimes than others? In the era of gridded forecasts, grid-based verification provides more information about the spatial distribution of mismatches between forecasts and analyses. In this module, you will be given an example forecast and verifying analysis. Then you will assess what corrective actions are needed based on the mismatches that occurred.

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PERFORMANCE VERIFICATION OF THE W.L. GORE & ASSOCIATES GORE-SORBER SCREENING SURVEY

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  19. Methodology and System for Practical Formal Verification of Reactive Hardware

    Microsoft Academic Search

    Ilan Beer; Shoham Ben-david; Daniel Geist; Raanan Gewirtzman; Michael Yoeli

    1994-01-01

    Making formal verification a practicality in industrial environments is still difficult. The capacity of most verification tools is too small, their integration in a design process is difficult and the methodology that should guide their usage is unclear. This paper describes a step-by-step methodology which was developed for the practical application of formal verification. The methodology was successfully realized in

  20. Verification of the MDG Components Library in HOL

    Microsoft Academic Search

    Paul Curzon; Sofiène Tahar; Otmane Aït Mohamed

    1998-01-01

    The MDG system is a decision diagram based verification tool, primarily designed for hardware verification. It is based on Multiway decision diagrams---an extension of the traditional ROBDD approach. In this paper we describe the formal verification of the component library of the MDG system, using HOL. The hardware component library, whilst relatively simple, has been a source of errors in

  1. Three Approaches to Hardware Verification: HOL, MDG and VIS Compared

    Microsoft Academic Search

    Sofiène Tahar; Paul Curzon; Jianping Lu

    1998-01-01

    There exist a wide range of hardware verification tools, some based on interactive theorem proving and other more automated tools based on decision diagrams. In this paper, we compare three different verification systems covering the spectrum of today's verification technology. In particular, we consider HOL, MDG and VIS. HOL is an interactive theorem proving system based on higher-order logic. VIS

  2. Floating point verification in HOL Light: the exponential function

    E-print Network

    Haddadi, Hamed

    Floating point verification in HOL Light: the exponential function John Harrison \\Lambda University in floating point arithmetic seem good targets for formal verification using a me­ chanical theorem prover. We­checked verification of an algorithm for computing the exponential function in IEEE­754 standard binary floating point

  3. Review Forecast verification: current status and future directions

    Microsoft Academic Search

    B. Casati; L. J. Wilson; D. B. Stephenson; P. Nurmi; A. Ghelli; M. Pocernich; U. Damrath; E. E. Ebert; B. G. Browne; S. Masonh

    Research and development of new verification strategies and reassessment of traditional forecast verification methods has received a great deal of attention from the scientific community in the last decade. This scientific effort has arisen from the need to respond to changes encompassing several aspects of the verification process, such as the evolution of forecasting systems, or the desire for more

  4. Formal Development and Verification of a Distributed Railway Control System

    Microsoft Academic Search

    Anne Elisabeth Haxthausen; Jan Peleska

    2000-01-01

    The authors introduce the concept for a distributed railway control system and present the specification and verification of the main algorithm used for safe distributed control. Our design and verification approach is based on the RAISE method, starting with highly abstract algebraic specifications which are transformed into directly implementable distributed control processes by applying a series of refinement and verification

  5. Protocol Verification And Analysis Using Colored Petri Nets

    E-print Network

    Schaefer, Marcus

    Colored Petri Nets . . . . . . . . . . . . . . . 5 1.6 MAS Flow Chart and ImplementationProtocol Verification And Analysis Using Colored Petri Nets Technical Report Submitted By Salah Aly, 2003 #12;Contents 1 Protocol Verification And Analysis 2 1.1 Verification Tools and Models

  6. Is methodology the highway out of verification hell?

    Microsoft Academic Search

    Francine Bacchini; Gabe Moretti; Harry Foster; Janick Bergeron; Masayuki Nakamura; Shrenik Mehta; Laurent Ducousso

    2005-01-01

    Few would disagree that verification takes the lion's share of today's project resources. If we examine the available research, we quickly discover that verification is a significant pain point that consumes massive amounts of time and resources across a multitude of market segments. Per Gary Smith at Gartner Dataquest, verification consumes 30% to 70% of total schedule, depending on design

  7. ULTRASONIC VERIFICATION OF COMPOSITE STRUCTURES Maurice Pelt1

    E-print Network

    Boyer, Edmond

    Ultrasonic Verification (USV). USV is a new non-destructive testing method that allows the monitoringULTRASONIC VERIFICATION OF COMPOSITE STRUCTURES Maurice Pelt1 , Robert Jan de Boer1 , Christiaan, The Netherlands m.m.j.m.pelt@hva.nl ABSTRACT Ultrasonic Verification is a new method for the monitoring large

  8. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  9. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...MAINTAINING REC-ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  10. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...MAINTAINING REC- ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  11. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  12. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...MAINTAINING REC-ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  13. Composite Signature Based Watermarking for Fingerprint Authentication

    E-print Network

    Ahmed, Farid

    Composite Signature Based Watermarking for Fingerprint Authentication Farid Ahmed Department of fingerprints. Keywords PhasemarkTM, biometric authentication, fingerprint, watermarking, composite filter their physiological and behavioral characteristics such as fingerprint, face, iris, hand geometry, keystroke, voice

  14. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  15. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  16. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  17. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  18. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  19. Attribute Based Group Signature with Dalia Khader

    E-print Network

    . For example, Alice might want a signature from an employee in Bobs company who is a member in the IT staff to imply that the parent node is satisfied. Satisfaction of a leaf is achieved by owning an attribute

  20. Reactor power history from fission product signatures

    E-print Network

    Sweeney, David J.

    2009-05-15

    The purpose of this research was to identify fission product signatures that could be used to uniquely identify a specific spent fuel assembly in order to improve international safeguards. This capability would help prevent and deter potential...

  1. Graph Matching Based on Node Signatures

    Microsoft Academic Search

    Salim Jouili; Salvatore Tabbone

    2009-01-01

    We present an algorithm for graph matching in a pattern recognition context. This algorithm deals with weighted graphs, based\\u000a on new structural and topological node signatures. Using these signatures, we compute an optimum solution for node-to-node\\u000a assignment with the Hungarian method and propose a distance formula to compute the distance between weighted graphs. The experiments\\u000a demonstrate that the newly presented

  2. Possible exotic stringy signatures at the LHC

    E-print Network

    David Berenstein

    2008-03-31

    In this paper I discuss some string inspired exotic colored matter particles that could be produced at the LHC, as well as the experimental signature for the observation of such states. Their most easily identifiable signature of this scenario is that many of these exotic particles would decay into standard model particles only via higher dimension operators in the effective field theory at a TeV scale. Some of these particles would only have three body decays into standard model particles.

  3. Extended Proxy Signatures for Smart Cards

    Microsoft Academic Search

    Takeshi Okamoto; Mitsuru Tada; Eiji Okamoto

    1999-01-01

    Proxy signatures, which was proposed by Mambo, Usuda, and Okamoto in 1996, allow a designated person to sign on behalf of\\u000a an original signer. In this paper, we present a new concept of proxy signature scheme, which can diminish the computational\\u000a cost and the amount of the memory. This concept is suitable for the application of smart cards, whose processors

  4. Research Plan for Fire Signatures and Detection

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Viewgraphs on the prevention, suppression, and detection of fires aboard a spacecraft is presented. The topics include: 1) Fire Prevention, Detection, and Suppression Sub-Element Products; 2) FPDS Organizing Questions; 3) FPDS Organizing Questions; 4) Signatures, Sensors, and Simulations; 5) Quantification of Fire and Pre-Fire Signatures; 6) Smoke; 7) DAFT Hardware; 8) Additional Benefits of DAFT; 9) Development and Characterization of Sensors 10) Simulation of the Transport of Smoke and Fire Precursors; and 11) FPDS Organizing Questions.

  5. A framework for automated malcode signatures generation

    Microsoft Academic Search

    Hanieh Rajabi; Muhammad Nadzir Marsono; Alireza Monemi

    2010-01-01

    Rapid malicious codes (malcodes) are self-replicating malicious programs that represent a major security threat to the Internet. Fast monitoring and early warning systems are very essential to prevent rapid malcodes spreading. The difficulty in detecting malcodes is that they evolve over time. Although signature-based tools such as network intrusion detection systems are widely used to protect critical systems, traditional signature-based

  6. Summarizing Musical Preferences as Audio Signatures

    Microsoft Academic Search

    Jason Freeman

    iTunes Signature Maker (iTSM) uses a feature-driven audio editing algorithm to rapidly generate a short sonic signature of an iTunes music library. iTSM stitches together small segments of songs, driving a concatenative algorithm with spectral features intrinsic to the audio files themselves and with environmental features which describe how those files have been used. This paper describes the software's implementation

  7. Forecasting Seismic Signatures of Stellar Magnetic Activity

    E-print Network

    W. A. Dziembowski

    2007-09-17

    For the Sun, a tight correlation between various activity measures and oscillation frequencies is well documented. For other stars, we have abundant data on magnetic activity and its changes but not yet on its seismic signature. A prediction of the activity induced frequency changes in stars based on scaling the solar relations is presented. This seismic signature of the activity should be measurable in the data expected within few years.

  8. Signature scheme based on bilinear pairs

    NASA Astrophysics Data System (ADS)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  9. A smart card to create electronic signatures

    Microsoft Academic Search

    J. K. Omura

    1989-01-01

    The purpose of smart cards is to create personal electronic signatures. The author presents the design of a smart card chip of less than 25-mm2 area which consists of a CPU, 4 kBytes of ROM, 128 Bytes of RAM, 8 kBytes of EPROM, electrically programmable ROM, and a 512-bytes modulo math processor cell for creating electronic signatures. Such a smart

  10. Radar echo signatures versus relative precipitation

    E-print Network

    Huber, Terry Alvin

    1987-01-01

    Subject: Meteorology RADAR ECHO SIGNATURES VERSUS RELATIVE PRECIPITATION A Thesis by TERRY ALVIN HUBER Approved as to style and content by: ames . cog s (Chairman of Committee) eo e . ue ner Member) frey . art (Member) ames , cogg (Head... of Department) December 1987 ABSTRACT Radar Echo Signatures Versus Relative Precipitation (December 1987) Terry Alvin Huber, B. S. , Angelo State University Chairman of Advisory Committee: Dr. James R. Scoggins The objective of this study is to show...

  11. Timed Fair Exchange of Standard Signatures

    Microsoft Academic Search

    Juan A. Garay; Carl Pomerance

    \\u000a In this paper we show how to achieve timed fair exchange of digital signatures of standard type. Timed fair exchange (in particular,\\u000a contract signing) has been considered before, but only for Rabin and RSA signatures of a special kind. Our construction follows\\u000a the gradual release paradigm, and works on a new “time” structure that we call a mirrored time-line. Using

  12. Verification of Plan Models Using UPPAAL

    NASA Technical Reports Server (NTRS)

    Khatib, Lina; Muscettola, Nicola; Haveland, Klaus; Lau, Sonic (Technical Monitor)

    2001-01-01

    This paper describes work on the verification of HSTS, the planner and scheduler of the Remote Agent autonomous control system deployed in Deep Space 1 (DS1). The verification is done using UPPAAL, a real time model checking tool. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify. Finally, we conclude with a summary.

  13. The formal verification of generic interpreters

    NASA Technical Reports Server (NTRS)

    Windley, P.; Levitt, K.; Cohen, G. C.

    1991-01-01

    The task assignment 3 of the design and validation of digital flight control systems suitable for fly-by-wire applications is studied. Task 3 is associated with formal verification of embedded systems. In particular, results are presented that provide a methodological approach to microprocessor verification. A hierarchical decomposition strategy for specifying microprocessors is also presented. A theory of generic interpreters is presented that can be used to model microprocessor behavior. The generic interpreter theory abstracts away the details of instruction functionality, leaving a general model of what an interpreter does.

  14. Fuel Retrieval System Design Verification Report

    SciTech Connect

    GROTH, B.D.

    2000-04-11

    The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

  15. Electric power system test and verification program

    NASA Technical Reports Server (NTRS)

    Rylicki, Daniel S.; Robinson, Frank, Jr.

    1994-01-01

    Space Station Freedom's (SSF's) electric power system (EPS) hardware and software verification is performed at all levels of integration, from components to assembly and system level tests. Careful planning is essential to ensure the EPS is tested properly on the ground prior to launch. The results of the test performed on breadboard model hardware and analyses completed to date have been evaluated and used to plan for design qualification and flight acceptance test phases. These results and plans indicate the verification program for SSF's 75-kW EPS would have been successful and completed in time to support the scheduled first element launch.

  16. Proton Therapy Verification with PET Imaging

    PubMed Central

    Zhu, Xuping; Fakhri, Georges El

    2013-01-01

    Proton therapy is very sensitive to uncertainties introduced during treatment planning and dose delivery. PET imaging of proton induced positron emitter distributions is the only practical approach for in vivo, in situ verification of proton therapy. This article reviews the current status of proton therapy verification with PET imaging. The different data detecting systems (in-beam, in-room and off-line PET), calculation methods for the prediction of proton induced PET activity distributions, and approaches for data evaluation are discussed. PMID:24312147

  17. On Backward-Style Anonymity Verification

    NASA Astrophysics Data System (ADS)

    Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

    Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

  18. Isotopic signatures by bulk analyses

    SciTech Connect

    Efurd, D.W.; Rokop, D.J.

    1997-12-01

    Los Alamos National Laboratory has developed a series of measurement techniques for identification of nuclear signatures by analyzing bulk samples. Two specific applications for isotopic fingerprinting to identify the origin of anthropogenic radioactivity in bulk samples are presented. The first example is the analyses of environmental samples collected in the US Arctic to determine the impact of dumping of radionuclides in this polar region. Analyses of sediment and biota samples indicate that for the areas sampled the anthropogenic radionuclide content of sediments was predominantly the result of the deposition of global fallout. The anthropogenic radionuclide concentrations in fish, birds and mammals were very low. It can be surmised that marine food chains are presently not significantly affected. The second example is isotopic fingerprinting of water and sediment samples from the Rocky Flats Facility (RFP). The largest source of anthropogenic radioactivity presently affecting surface-waters at RFP is the sediments that are currently residing in the holding ponds. One gram of sediment from a holding pond contains approximately 50 times more plutonium than 1 liter of water from the pond. Essentially 100% of the uranium in Ponds A-1 and A-2 originated as depleted uranium. The largest source of radioactivity in the terminal Ponds A-4, B-5 and C-2 was naturally occurring uranium and its decay product radium. The uranium concentrations in the waters collected from the terminal ponds contained 0.05% or less of the interim standard calculated derived concentration guide for uranium in waters available to the public. All of the radioactivity observed in soil, sediment and water samples collected at RFP was naturally occurring, the result of processes at RFP or the result of global fallout. No extraneous anthropogenic alpha, beta or gamma activities were detected. The plutonium concentrations in Pond C-2 appear to vary seasonally.

  19. Kinematics of signature writing in healthy aging.

    PubMed

    Caligiuri, Michael P; Kim, Chi; Landy, Kelly M

    2014-07-01

    Forensic document examiners (FDE) called upon to distinguish a genuine from a forged signature of an elderly person are often required to consider the question of age-related deterioration and whether the available exemplars reliably capture the natural effects of aging of the original writer. An understanding of the statistical relationship between advanced age and handwriting movements can reduce the uncertainty that may exist in an examiner's approach to questioned signatures formed by elderly writers. The primary purpose of this study was to systematically examine age-related changes in signature kinematics in healthy writers. Forty-two healthy subjects between the ages of 60-91 years participated in this study. Signatures were recorded using a digitizing tablet, and commercial software was used to examine the temporal and spatial stroke kinematics and pen pressure. Results indicated that vertical stroke duration and dysfluency increased with age, whereas vertical stroke amplitude and velocity decreased with age. Pen pressure decreased with age. We found that a linear model characterized the best-fit relationship between advanced age and handwriting movement parameters for signature formation. Male writers exhibited stronger age effects than female writers, especially for pen pressure and stroke dysfluency. The present study contributes to an understanding of how advanced age alters signature formation in otherwise healthy adults. PMID:24673648

  20. Network signatures of survival in glioblastoma multiforme.

    PubMed

    Patel, Vishal N; Gokulrangan, Giridharan; Chowdhury, Salim A; Chen, Yanwen; Sloan, Andrew E; Koyutürk, Mehmet; Barnholtz-Sloan, Jill; Chance, Mark R

    2013-01-01

    To determine a molecular basis for prognostic differences in glioblastoma multiforme (GBM), we employed a combinatorial network analysis framework to exhaustively search for molecular patterns in protein-protein interaction (PPI) networks. We identified a dysregulated molecular signature distinguishing short-term (survival<225 days) from long-term (survival>635 days) survivors of GBM using whole genome expression data from The Cancer Genome Atlas (TCGA). A 50-gene subnetwork signature achieved 80% prediction accuracy when tested against an independent gene expression dataset. Functional annotations for the subnetwork signature included "protein kinase cascade," "I?B kinase/NF?B cascade," and "regulation of programmed cell death" - all of which were not significant in signatures of existing subtypes. Finally, we used label-free proteomics to examine how our subnetwork signature predicted protein level expression differences in an independent GBM cohort of 16 patients. We found that the genes discovered using network biology had a higher probability of dysregulated protein expression than either genes exhibiting individual differential expression or genes derived from known GBM subtypes. In particular, the long-term survivor subtype was characterized by increased protein expression of DNM1 and MAPK1 and decreased expression of HSPA9, PSMD3, and CANX. Overall, we demonstrate that the combinatorial analysis of gene expression data constrained by PPIs outlines an approach for the discovery of robust and translatable molecular signatures in GBM. PMID:24068912

  1. Assessing the Quality of Bioforensic Signatures

    SciTech Connect

    Sego, Landon H.; Holmes, Aimee E.; Gosink, Luke J.; Webb-Robertson, Bobbie-Jo M.; Kreuzer, Helen W.; Anderson, Richard M.; Brothers, Alan J.; Corley, Courtney D.; Tardiff, Mark F.

    2013-06-04

    We present a mathematical framework for assessing the quality of signature systems in terms of fidelity, cost, risk, and utility—a method we refer to as Signature Quality Metrics (SQM). We demonstrate the SQM approach by assessing the quality of a signature system designed to predict the culture medium used to grow a microorganism. The system consists of four chemical assays designed to identify various ingredients that could be used to produce the culture medium. The analytical measurements resulting from any combination of these four assays can be used in a Bayesian network to predict the probabilities that the microorganism was grown using one of eleven culture media. We evaluated fifteen combinations of the signature system by removing one or more of the assays from the Bayes network. We demonstrated that SQM can be used to distinguish between the various combinations in terms of attributes of interest. The approach assisted in clearly identifying assays that were least informative, largely in part because they only could discriminate between very few culture media, and in particular, culture media that are rarely used. There are limitations associated with the data that were used to train and test the signature system. Consequently, our intent is not to draw formal conclusions regarding this particular bioforensic system, but rather to illustrate an analytical approach that could be useful in comparing one signature system to another.

  2. Chemical and Physical Signatures for Microbial Forensics

    SciTech Connect

    Cliff, John B.; Kreuzer, Helen W.; Ehrhardt, Christopher J.; Wunschel, David S.

    2012-01-03

    Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special considerations for the forensic arena - quality control, sample integrity, etc. Mark Wilson (retired FBI): Western Carolina University Chapter 4. Physical signatures: Light and electron microscopy, atomic force microscopy, gravimetry etc. Joseph Michael, Sandia National Laboratory Chapter 5. Lipids: FAME, PLFA, steroids, LPS, etc. James Robertson, Federal Bureau of Investigation Chapter 6. Carbohydrates: Cell wall components, cytoplasm components, methods Alvin Fox, University of South Carolina School of Medicine David Wunschel, Pacific Northwest National Laboratory Chapter 7. Peptides: Peptides, proteins, lipoproteins David Wunschel, Pacific Northwest National Laboratory Chapter 8. Elemental content: CNOHPS (treated in passing), metals, prospective cell types John Cliff, International Atomic Energy Agency Chapter 9. Isotopic signatures: Stable isotopes C,N,H,O,S, 14C dating, potential for heavy elements. Helen Kreuzer-Martin, Pacific Northwest National Laboratory Michaele Kashgarian, Lawrence Livermore National Laboratory Chapter 10. Extracellular signatures: Cellular debris, heme, agar, headspace, spent media, etc Karen Wahl, Pacific Northwest National Laboratory Chapter 11. Data Reduction and Integrated Microbial Forensics: Statistical concepts, parametric and multivariate statistics, integrating signatures Kristin Jarman, Pacific Northwest National Laboratory

  3. Verification of National Weather Service spot forecasts using surface observations

    NASA Astrophysics Data System (ADS)

    Lammers, Matthew Robert

    Software has been developed to evaluate National Weather Service spot forecasts issued to support prescribed burns and early-stage wildfires. Fire management officials request spot forecasts from National Weather Service Weather Forecast Offices to provide detailed guidance as to atmospheric conditions in the vicinity of planned prescribed burns as well as wildfires that do not have incident meteorologists on site. This open source software with online display capabilities is used to examine an extensive set of spot forecasts of maximum temperature, minimum relative humidity, and maximum wind speed from April 2009 through November 2013 nationwide. The forecast values are compared to the closest available surface observations at stations installed primarily for fire weather and aviation applications. The accuracy of the spot forecasts is compared to those available from the National Digital Forecast Database (NDFD). Spot forecasts for selected prescribed burns and wildfires are used to illustrate issues associated with the verification procedures. Cumulative statistics for National Weather Service County Warning Areas and for the nation are presented. Basic error and accuracy metrics for all available spot forecasts and the entire nation indicate that the skill of the spot forecasts is higher than that available from the NDFD, with the greatest improvement for maximum temperature and the least improvement for maximum wind speed.

  4. Online! Citation Styles

    NSDL National Science Digital Library

    This Internet version of Online!: A Reference Guide to Using Internet Resources from Bedford/ St. Martin's Press is for any student, professional, or scholar who has ever been frustrated by the inadequate and/or out-of-date information provided in most standard handbooks and style guides regarding citing online materials. With chapters five through eight of the printed text posted and updated regularly, Online! is one of the most recent and comprehensive guides to online documentation available on the Web. The Website shows how to document ten different categories of online sources in APA, MLA, CBE, and Chicago styles, including Websites; email, discussion, electronic mailing list, and news group postings; Telnet sites; and linkage data. The site provides general principles and specific examples for each type of citation. Additional links for other styles and guides are also provided. Finally, unlike some online guides to documentation, the site is attractive and easily navigable.

  5. Verification jig for implant-supported prostheses: A comparison of standard impressions with verification jigs made of different materials

    Microsoft Academic Search

    Jorge E. De La Cruz; Paul D. Funkenbusch; Carlo Ercoli; Mark E. Moss; Gerald N. Graser; Ross H. Tallents

    2002-01-01

    Statement of Problem. Implant verification jigs are routinely used during the fabrication of implant-supported prostheses. The dimensional accuracy of these jigs is unknown. Purpose. The purposes of this study were to (1) compare the dimensional accuracy of verification jigs with that of conventional impression procedures and (2) measure the dimensional accuracy of 3 resin materials used to fabricate verification jigs.

  6. An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography

    Microsoft Academic Search

    Xue Sun; Mingping Xia

    2009-01-01

    The proxy signer has the capability to sign on behalf of the original signer in the proxy signature scheme. The elliptic curve digital signature algorithm (ECDSA) is the elliptic curve analogue of the digital signature algorithm (DSA). In this paper, we propose a new proxy signature based on elliptic curve cryptography (ECC) In order to overcome the security threats and

  7. Group Blind Digital Signatures: A Scalable Solution to Electronic Cash

    E-print Network

    Lysyanskaya, Anna

    Group Blind Digital Signatures: A Scalable Solution to Electronic Cash Anna Lysyanskaya 1 signatures. It is an extension of Camenisch and Stadler's Group Signature Scheme [5] that adds the blindness property. We show how to use our group blind signatures to construct an electronic cash system in which

  8. Verification, Seismology, and Negative Evidence

    NASA Astrophysics Data System (ADS)

    Wallace, T. C.; Koper, K. D.; Paquette, A. M.

    2001-05-01

    During the senatorial debate on the merits of ratifying the CTBT it was often stated that the treaty was "unverifiable". This is inherently a political statement since verification always has some level of uncertainty. However, opponents and advocates of the treaty alike, cast this as a technical problem: either the IMS monitoring system has the ability to detect small clandestine nuclear weapons tests or it does not. In the year and a half since the vote on ratification studies have been commissioned to determine the capability of various monitoring systems (IMS, IMS plus other networks) in an attempt to determine the "largest" test that could avoid detection. Unfortunately, the standard for this evaluation is a hypothetical test, an event that has not occurred. In other words, the metric for success is proving an event did not happen, or negative evidence. There are no known examples of full nuclear weapons tests that were undetected, although some were not recognized until after the fact. One example of an explosion that was only recognized later is a small PNE used to suppress a dangerous buildup of methane in a Ukrainian coal mine in Sept. 1979. The experiment, which was 0.3 kt, was on the lists of PNEs that were released in the late 1980s; in fact, the event was recorded on NORSAR and had a magnitude of 3.3. Today this event would be routinely located and flagged as suspicious. A true example of the null hypothesis test arose on Feb. 25 of this year when the London Sunday Times reported a detailed account of a clandestine Iraqi test of a simple nuclear weapon in 1989. This test was alleged to be a 10 kt device detonated in a decoupling cavity. The reports also state that the explosion produced a seismic signal of magnitude 2.7, and went unreported by any catalog outside Iraq. We examined seismic catalogs from Israeli, Jordan and Iran and could find no evidence of this event. Examination of continuous seismic data provides a baseline for the detection capability for the suspect test site. In 1989 the detection threshold was approximately 3.1 from regional stations. Using a conservative estimate of a decoupling factor of 50, and the lack of a seismic signal, gives a yield of 0.8 kt. The number of seismic stations in operation in the middle east has increased significantly since 1989, and the detection capability decreased by .25 magnitude units. The usefulness of negative evidence is providing a baseline for measuring monitoring capability.

  9. Irma 5.1 multisensor signature prediction model

    NASA Astrophysics Data System (ADS)

    Savage, James; Coker, Charles; Edwards, Dave; Thai, Bea; Aboutalib, Omar; Chow, Anthony; Yamaoka, Neil; Kim, Charles

    2006-05-01

    The Irma synthetic signature prediction code is being developed to facilitate the research and development of multi-sensor systems. Irma was one of the first high resolution, physics-based Infrared (IR) target and background signature models to be developed for tactical weapon applications. Originally developed in 1980 by the Munitions Directorate of the Air Force Research Laboratory (AFRL/MN), the Irma model was used exclusively to generate IR scenes. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser (or active) channel. This two-channel version was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model, which supported correlated frame-to-frame imagery. A passive IR/millimeter wave (MMW) code was completed in 1994. This served as the cornerstone for the development of the co-registered active/passive IR/MMW model, Irma 4.0. In 2000, Irma version 5.0 was released which encompassed several upgrades to both the physical models and software. Circular polarization was added to the passive channel, and a Doppler capability was added to the active MMW channel. In 2002, the multibounce technique was added to the Irma passive channel. In the ladar channel, a user-friendly Ladar Sensor Assistant (LSA) was incorporated which provides capability and flexibility for sensor modeling. Irma 5.0 runs on several platforms including Windows, Linux, Solaris, and SGI Irix. Irma is currently used to support a number of civilian and military applications. The Irma user base includes over 130 agencies within the Air Force, Army, Navy, DARPA, NASA, Department of Transportation, academia, and industry. In 2005, Irma version 5.1 was released to the community. In addition to upgrading the Ladar channel code to an object oriented language (C++) and providing a new graphical user interface to construct scenes, this new release significantly improves the modeling of the ladar channel and includes polarization effects, time jittering, speckle effect, and atmospheric turbulence. More importantly, the Munitions Directorate has funded three field tests to verify and validate the re-engineered ladar channel. Each of the field tests was comprehensive and included one month of sensor characterization and a week of data collection. After each field test, the analysis included comparisons of Irma predicted signatures with measured signatures, and if necessary, refining the model to produce realistic imagery. This paper will focus on two areas of the Irma 5.1 development effort: report on the analysis results of the validation and verification of the Irma 5.1 ladar channel, and the software development plan and validation efforts of the Irma passive channel. As scheduled, the Irma passive code is being re-engineered using object oriented language (C++), and field data collection is being conducted to validate the re-engineered passive code. This software upgrade will remove many constraints and limitations of the legacy code including limits on image size and facet counts. The field test to validate the passive channel is expected to be complete in the second quarter of 2006.

  10. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.

  11. Online organic chemistry

    NASA Astrophysics Data System (ADS)

    Janowicz, Philip A.

    This is a comprehensive study of the many facets of an entirely online organic chemistry course. Online homework with structure-drawing capabilities was found to be more effective than written homework. Online lecture was found to be just as effective as in-person lecture, and students prefer an online lecture format with shorter Webcasts. Online office hours were found to be effective, and discussion sessions can be placed online as well. A model was created that explains 36.1% of student performance based on GPA, ACT Math score, grade in previous chemistry course, and attendance at various forms of discussion. Online exams have been created which test problem-solving skills and is instantly gradable. In these exams, students can submit answers until time runs out for different numbers of points. These facets were combined effectively to create an entirely online organic chemistry course which students prefer over the in-person alternative. Lastly, there is a vision for where online organic chemistry is going and what can be done to improve education for all.

  12. Asia Times Online

    NSDL National Science Digital Library

    As the world's news flows increasingly from Asian nations, those people looking for a credible online source that concentrates on this region will find it in Asia Times Online. The site's front page features top stories from Asia Times journalists as well as from other online dailies and reports, including the South China Morning Post, Business Times Online, and the Australian Financial Review. The site offers separate sections for China, Southeast Asia, Japan, the Koreas, India/ Pakistan, Central Asia, and Oceania as well as departments devoted to Business Briefs, Global Economy, and Media and Industrial Technology. The entire site, including archives, is searchable.

  13. The Exploratorium: Online Exhibits

    NSDL National Science Digital Library

    Visitors can see online versions of some exhibits from the Exploratorium. These exhibits involve optical illusions of color, space and perception. Spanish, French, and Italian translations are available.

  14. MMW, IR, and SAM signature collection

    NASA Astrophysics Data System (ADS)

    Reichstetter, Fred; Ward, Mary E.

    2002-08-01

    During the development of smart weapon's seeker/sensors, it is imperative to collect high quality signatures of the targets the system is intended to engage. These signatures are used to support algorithm development so the system can find and engage the targets of interest in the specific kill area on the target. Englin AFB FL is the AF development center for munitions; and in support of the development effort, the 46th Test Wing (46 TW) has initiated significant improvements in collection capabilities for signatures in the MMW, Infrared and Seismic, Acoustic and Magnetic (SAM) spectrum. Additionally, the Joint Munitions Test and Evaluation program office maintains a fleet of foreign ground vehicle targets used for such signature collection including items such as tanks, SCUD missile launchers, air defense units such as SA-06, SA-8, SA-13, and associated ground support trucks and general purpose vehicles. The major test facility includes a 300 ft tower used for mounting the instrumentation suite that currently includes, 10, 35 and 94 GHz MMW and 2-5(mu) and 8-12(mu) IR instrumentation systems. This facility has undergone major improvements in terms of background signature reduction, construction of a high bay building to house the turntable on which the targets are mounted, and an additional in- ground stationary turntable primarily for IR signature collection. Our experience using this facility to collect signatures for the smart weapons development community has confirmed a significant improvement in quality and efficiency. The need for the stationary turntable signature collection capability was driven by the requirements of the IR community who are interested in collecting signatures in clutter. This tends to be contrary to the MMW community that desires minimum background clutter. The resulting location, adjacent to the MMW tower, allows variations in the type and amount of clutter background that could be incorporated and also provides maximum utilization of the existing tower to mount the instrumentation suite or seeker and the in-place electronic support facilities. Additionally, major equipment improvements in SAM instrumentation and a SAM van have been acquired to provide a mobile SAM signature collection capability.

  15. Efficient Unrestricted Identity-Based Aggregate Signature Scheme

    PubMed Central

    Yuan, Yumin; Zhan, Qian; Huang, Hua

    2014-01-01

    An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption. PMID:25329777

  16. The AdaptiV Approach to Verification of Adaptive Systems

    SciTech Connect

    Rouff, Christopher [Lockheed Martin Corporation] [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation] [Lockheed Martin Corporation; Pullum, Laura L [ORNL] [ORNL; Cui, Xiaohui [ORNL] [ORNL; Hinchey, Mike [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  17. Online Advertising in Social Networks

    NASA Astrophysics Data System (ADS)

    Bagherjeiran, Abraham; Bhatt, Rushi P.; Parekh, Rajesh; Chaoji, Vineet

    Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. This chapter focuses on the role of social network information in online display advertising.

  18. Transcriptomic signatures in cartilage ageing

    PubMed Central

    2013-01-01

    Introduction Age is an important factor in the development of osteoarthritis. Microarray studies provide insight into cartilage aging but do not reveal the full transcriptomic phenotype of chondrocytes such as small noncoding RNAs, pseudogenes, and microRNAs. RNA-Seq is a powerful technique for the interrogation of large numbers of transcripts including nonprotein coding RNAs. The aim of the study was to characterise molecular mechanisms associated with age-related changes in gene signatures. Methods RNA for gene expression analysis using RNA-Seq and real-time PCR analysis was isolated from macroscopically normal cartilage of the metacarpophalangeal joints of eight horses; four young donors (4 years old) and four old donors (>15 years old). RNA sequence libraries were prepared following ribosomal RNA depletion and sequencing was undertaken using the Illumina HiSeq 2000 platform. Differentially expressed genes were defined using Benjamini-Hochberg false discovery rate correction with a generalised linear model likelihood ratio test (P < 0.05, expression ratios ± 1.4 log2 fold-change). Ingenuity pathway analysis enabled networks, functional analyses and canonical pathways from differentially expressed genes to be determined. Results In total, the expression of 396 transcribed elements including mRNAs, small noncoding RNAs, pseudogenes, and a single microRNA was significantly different in old compared with young cartilage (± 1.4 log2 fold-change, P < 0.05). Of these, 93 were at higher levels in the older cartilage and 303 were at lower levels in the older cartilage. There was an over-representation of genes with reduced expression relating to extracellular matrix, degradative proteases, matrix synthetic enzymes, cytokines and growth factors in cartilage derived from older donors compared with young donors. In addition, there was a reduction in Wnt signalling in ageing cartilage. Conclusion There was an age-related dysregulation of matrix, anabolic and catabolic cartilage factors. This study has increased our knowledge of transcriptional networks in cartilage ageing by providing a global view of the transcriptome. PMID:23971731

  19. A Black Hole Spectral Signature

    NASA Astrophysics Data System (ADS)

    Titarchuk, Lev; Laurent, Philippe

    2000-03-01

    An accreting black hole is, by definition, characterized by the drain. Namely, the matter falls into a black hole much the same way as water disappears down a drain matter goes in and nothing comes out. As this can only happen in a black hole, it provides a way to see ``a black hole'', an unique observational signature. The accretion proceeds almost in a free-fall manner close to the black hole horizon, where the strong gravitational field dominates the pressure forces. In this paper we present analytical calculations and Monte-Carlo simulations of the specific features of X-ray spectra formed as a result of upscattering of the soft (disk) photons in the converging inflow (CI) into the black hole. The full relativistic treatment has been implemented to reproduce these spectra. We show that spectra in the soft state of black hole systems (BHS) can be described as the sum of a thermal (disk) component and the convolution of some fraction of this component with the CI upscattering spread (Greens) function. The latter boosted photon component is seen as an extended power-law at energies much higher than the characteristic energy of the soft photons. We demonstrate the stability of the power spectral index over a wide range of the plasma temperature 0 - 10 keV and mass accretion rates (higher than 2 in Eddington units). We also demonstrate that the sharp high energy cutoff occurs at energies of 200-400 keV which are related to the average energy of electrons mec2 impinging upon the event horizon. The spectrum is practically identical to the standard thermal Comptonization spectrum when the CI plasma temperature is getting of order of 50 keV (the typical ones for the hard state of BHS). In this case one can see the effect of the bulk motion only at high energies where there is an excess in the CI spectrum with respect to the pure thermal one. Furthermore we demonstrate that the change of spectral shapes from the soft X-ray state to the hard X-ray state is clearly to be related with the temperature of the bulk flow. In other words the effect of the bulk Comptonization compared to the thermal one is getting stronger when the plasma temperature drops below 10 keV. We clearly demonstrate that these spectra emerging from the converging inflow are a inevitable stamp of the BHS where the strong gravitational field dominates the pressure forces

  20. Subduction signature in backarc mantle?

    NASA Astrophysics Data System (ADS)

    Nelson, W. R.; Snow, J. E.; Brandon, A. D.; Ohara, Y.

    2013-12-01

    Abyssal peridotites exposed during seafloor extension provide a rare glimpse into the processes occurring within the oceanic mantle. Whole rock and mineral-scale major element data from abyssal peridotites record processes intimately associated with melt-depletion and melt-rock interaction occurring just prior to exposure of the mantle at the surface. Isotopic data, however, can provide insight into the long-term evolution of the oceanic mantle. A number of studies of mantle material exposed along mid-ocean ridges have demonstrated that abyssal peridotites from Mid-Atlantic Ridge, Gakkel Ridge, and Southwest Indian Ridge commonly display a range of whole rock Os isotopic ratios (187Os/188Os = 0.118- 0.130; Brandon et al., 2000; Standish et al., 2002; Alard et al., 2005; Harvey et al., 2006; Liu et al., 2008). The range of isotopic values in each region demonstrates that the oceanic mantle does not melt uniformly over time. Instead, anciently depleted regions (187Os/188Os ? 0.118) are juxtaposed against relatively fertile regions (187Os/188Os ? 0.130) that are isotopically similar to established primitive mantle values (187Os/188Os = 0.1296; Meisel et al. 2001). Abyssal peridotites from the Godzilla Megamullion and Chaotic Terrain in the backarc Parece Vela Basin (Philippine Sea) display a range of Os isotopic values extending to similar unradiogenic values. However, some of the backarc basin abyssal peridotites record more radiogenic 187Os/188Os values (0.135-0.170) than mid-ocean ridge peridotites. Comparable radiogenic signatures are reported only in highly weathered abyssal peridotites (187Os/188Os ? 0.17, Standish et al., 2002) and subduction-related volcanic arc peridotites (187Os/188Os ? 0.16, Brandon et al., 1996; Widom et al., 2003). In both the weathered peridotites and arc peridotites, the 187Os/188Os value is negatively correlated with Os abundance: the most radiogenic value has the lowest Os abundance (< 1 ppb) making them highly susceptible to overprinting by radiogenic fluids. In contrast, abyssal peridotites from the Parece Vela Basin show no correlation between 187Os/188Os and Os abundance; abyssal peridotites with radiogenic 187Os/188Os contain 2-3 ppb Os. Additionally, there is no correlation between 187Os/188Os and major element indicators of melt-rock interaction or Re abundance. Similar to the conclusions of Brandon et al. (1996), we suggest that radiogenic Os can be partitioned into slab-derived fluids and subsequently introduced into the overlying mantle. As a result, the radiogenic Os isotopic ratios found in backarc abyssal peridotites may be a consequence of subduction processes.

  1. Monodic Abstract State Machines and temporal verification

    Microsoft Academic Search

    Michael Fisher; Alexei Lisitsa

    Since its introduction by Yuri Gurevich, the Abstract State Machine (ASM) approach has proved particularly successful in specifying abstract algo- rithms, realistic programming languages, distributed com putations, and a variety of different types of hardware. In this paper, we pursue the g oal of automatic de- ductive verification for certain classes of ASM. In particul ar, we base our work

  2. Providing Automated Verification in HOL Using MDGs

    Microsoft Academic Search

    Tarek Mhamdi; Sofiène Tahar

    2004-01-01

    While model checking suffers from the state space explosion problem, theorem proving is quite tedious and impractical for verifying complex designs. In this work, we present a verification framework in which we attempt to strike the balance between the expressiveness of theorem proving and the efficiency and automation of state exploration techniques. To this end, we propose to integrate a

  3. Formal Verification of a Pipelined Microprocessor

    Microsoft Academic Search

    Mandayam K. Srivas; Mark Bickford

    1990-01-01

    The application of modern functional languages and supporting verification technology to a scaled-down but realistic microprocessor is described. The model is of an infinite stream of machine instructions consuming an infinite stream of interrupt signals and is specified at two levels: instruction and hardware design. A correctness criterion is stated for an appropriate sense of equivalent behavior of these levels

  4. Automatic verification of Pipelined Microprocessor Control

    Microsoft Academic Search

    Jerry R. Burch

    1994-01-01

    We describe a technique for verifying the control logic ofpipelined microprocessors. It handles more complicated designs, and requiresless human intervention, than existing methods. The techniqueautomaticMly compares a pipelined implementation to an architecturaldescription. The CPU time needed for verification is independent of thedata path width, the register file size, and the number of ALU operations.

  5. Polarimetric and interferometric SAR calibration verification methods

    Microsoft Academic Search

    Yunjin Kim; J. van Zyi

    2001-01-01

    It is necessary to calibrate SAR data in order to use the data for science applications. When both polarimetric and interferometric data are collected simultaneously, these SAR data can be used for cross-calibration and verification. The frequency of polarimetric and interferometric data does not have to be the same for this purpose. For example, the NASA\\/JPL AIRSAR system can acquire

  6. Timing Diagrams: Formalization and Algorithmic Verification

    E-print Network

    Fisler, Kathryn

    generated by B¨uchi automata in timing diagram languages is decidable. The result relies on a correlation foundation for both reasoning and theoretical analyses. This paper presents a timing dia­ gram logicTiming Diagrams: Formalization and Algorithmic Verification Kathi Fisler \\Lambda Department

  7. An Extension to Pointer Logic for Verification

    Microsoft Academic Search

    Zhifang Wang; Yiyun Chen; Zhenming Wang; Wei Wang; Bo Tian

    2008-01-01

    The safety of pointer programs is an important issue in high-assurance software design, and their verification re- mains a major challenge. Pointer Logic has been proposed to verify basic safety properties of pointer programs in our previous work, but still lacks support for a wide range of pointer programs. In this work, we present an extension to Pointer Logic by:

  8. The Verification Grand Challenge and Abstract Interpretation

    E-print Network

    Cousot, Patrick

    The Verification Grand Challenge and Abstract Interpretation Patrick Cousot1 ´Ecole normale sup of real-time, safety critical, embedded systems. For example, Astr´ee [1,2,3,17,18,25] can analyze mechanically and verify formally the absence of runtime errors in industrial safety-critical embedded

  9. The Verification Grand Challenge and Abstract Interpretation

    E-print Network

    Cousot, Patrick

    The Verification Grand Challenge and Abstract Interpretation Patrick Cousot École normale to automatically verify complex properties of real­ time, safety critical, embedded systems. For example, ASTRÉE [1 safety­critical embedded control/command codes of several hundred thousand lines of C. We summarize

  10. The Verification Grand Challenge and Abstract Interpretation

    E-print Network

    Cousot, Patrick

    The Verification Grand Challenge and Abstract Interpretation Patrick Cousot École normale to automatically verify complex properties of real- time, safety critical, embedded systems. For example, ASTRÉE [1 safety-critical embedded control/command codes of several hundred thousand lines of C. We summarize

  11. Comparison of particulate verification techniques study

    Microsoft Academic Search

    Rachel Rivera

    2006-01-01

    The efficacy of five particulate verification techniques on four types of materials was studied. Statistical Analysis Software\\/JMP 6.0 was used to create a statistically valid design of experiments. In doing so, 35 witness coupons consisting of the four types of materials being studied, were intentionally contaminated with particulate fallout. Image Analysis was used to characterize the extent of particulate fallout

  12. Fluorescence Imaging for Nuclear Arms Control Verification

    E-print Network

    Feener, Jessica S

    2014-08-14

    ’s Next Generation Safeguards Initiative (NGSI). vi NOMENCLATURE BG Background CCD Charged Coupled Device CSV Comma Separated Variable FMCT Fissile Material Cutoff Treaty GEANT4 GEometry ANd Tracking H.D.Poly High Density Polyethylene HE....A. Motivation ............................................................................................................... 1 I.B. Overview of Nuclear Weapons, Dismantlement, and Verification ......................... 2 I.C. Fluorescence Background...

  13. Formal hardware verification of digital circuits

    NASA Technical Reports Server (NTRS)

    Joyce, J.; Seger, C.-J.

    1991-01-01

    The use of formal methods to verify the correctness of digital circuits is less constrained by the growing complexity of digital circuits than conventional methods based on exhaustive simulation. This paper briefly outlines three main approaches to formal hardware verification: symbolic simulation, state machine analysis, and theorem-proving.

  14. Field verification program for small wind turbines

    Microsoft Academic Search

    2003-01-01

    In 1999 Windward Engineering (Windward) was awarded a Cooperative Agreement under the Field Verification Program with the Department of Energy (DOE) to install two Whisper H40 wind turbines, one at the NREL National Wind Technology Center (NWTC) and one at a test site near Spanish Fork, Utah. After installation, the turbine at the NWTC was to be operated, maintained, and

  15. Providing VANET Security through Position Verification

    E-print Network

    Weigle, Michele

    Providing VANET Security through Position Verification Master's Project Final Report Author of information in vehicular ad-hoc networks (VANETs), and the use of radar will substantially augment the amount is received from other vehicles in the system. This technique will improve security in VANETs by preventing

  16. Design and verification of controllers for airships

    Microsoft Academic Search

    Jongwoo Kim; Jim Keller; Vijay Kumar

    2003-01-01

    Robotic airships have several beneficial properties such as low operation cost, low noise, and low speed flight capability. We present in this paper the design and verification of a feedback control algorithm for waypoint to waypoint navigation of an outdoor blimp. A rapidly exploring random tree (RRT) is used for the validation of the blimp system control law. We describe

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION OF URBAN RUNOFF MODELS

    EPA Science Inventory

    This paper will present the verification process and available results of the XP-SWMM modeling system produced by XP-Software conducted unde the USEPA's ETV Program. Wet weather flow (WWF) models are used throughout the US for the evaluation of storm and combined sewer systems. M...

  18. Genomics and parentage identification/verification

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Microsatellite markers (MS) have traditionally been used for parental verification and are still the international standard in spite of their higher cost, error rate, and turnaround time compared with Single Nucleotide Polymorphisms (SNP)-based assays. Despite domestic and international demands fro...

  19. Environmental Technology Verification (ETV) Quality Program (Poster)

    EPA Science Inventory

    This is a poster created for the ETV Quality Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The...

  20. DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION

    E-print Network

    DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION ATISH DAS SARMA, STEPHAN HOLZER on the hardness of distributed approximation for many classical optimization problems including minimum spanning the previous hardness of approximation bound of Elkin [STOC 2004] as well as the lower bound for (exact) MST