These are representative sample records from Science.gov related to your search topic.
For comprehensive and current results, perform a real-time search at Science.gov.
1

Glove-based approach to online signature verification.  

PubMed

Utilizing the multiple degrees of freedom offered by the data glove for each finger and the hand, a novel on-line signature verification system using the Singular Value Decomposition (SVD) numerical tool for signature classification and verification is presented. The proposed technique is based on the Singular Value Decomposition in finding r singular vectors sensing the maximal energy of glove data matrix A, called principal subspace, so the effective dimensionality of A can be reduced. Having modeled the data glove signature through its r-principal subspace, signature authentication is performed by finding the angles between the different subspaces. A demonstration of the data glove is presented as an effective high-bandwidth data entry device for signature verification. This SVD-based signature verification technique is tested and its performance is shown to be able to recognize forgery signatures with a false acceptance rate of less than 1.2%. PMID:18421114

Kamel, Nidal S; Sayeed, Shohel; Ellis, Grant A

2008-06-01

2

An on-line human signature verification system  

E-print Network

OF FEATURES FIGURE Page Sample FRR and FAR Sample Class Distribution. . General Classification System. Mobinetix Signature Capture Device Sample Data Points of a Signature Sample Signature The System Approach. . . Multi Level Classifier. 10 12 26... The identification of a person's identity by use of automatic signature verification has been the center of attention, receiving a steady research effort in the past 20-30 year' s [I]. Classification and verification systems have been documented to accomplish...

Simsek, Burc A

2012-06-07

3

Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification  

Microsoft Academic Search

In this paper, an online signature verification scheme based on spectrum analysis and Mahalanobis decision is proposed. We firstly divided signatures to a number of frames with variable widths according to the characteristics of the time sequences, and then employed the Fast Fourier transformation(FFT) to extract the spectrum of signatures. The distance between the Fourier coefficient within the cor- responding

Zhong-hua Quan; De-shuang Huang; Xiao-lei Xia; Michael R. Lyu; Tat-ming Lok

2006-01-01

4

On-line signature verification method by Laplacian spectral analysis and dynamic time warping  

NASA Astrophysics Data System (ADS)

As smartphones and touch screens are more and more popular, on-line signature verification technology can be used as one of personal identification means for mobile computing. In this paper, a novel Laplacian Spectral Analysis (LSA) based on-line signature verification method is presented and an integration framework of LSA and Dynamic Time Warping (DTW) based methods for practical application is proposed. In LSA based method, a Laplacian matrix is constructed by regarding the on-line signature as a graph. The signature's writing speed information is utilized in the Laplacian matrix of the graph. The eigenvalue spectrum of the Laplacian matrix is analyzed and used for signature verification. The framework to integrate LSA and DTW methods is further proposed. DTW is integrated at two stages. First, it is used to provide stroke matching results for the LSA method to construct the corresponding graph better. Second, the on-line signature verification results by DTW are fused with that of the LSA method. Experimental results on public signature database and practical signature data on mobile phones proved the effectiveness of the proposed method.

Li, Changting; Peng, Liangrui; Liu, Changsong; Ding, Xiaoqing

2013-12-01

5

Camera-Based Online Signature Verification with Sequential Marginal Likelihood Change Detector  

NASA Astrophysics Data System (ADS)

Several online signature verification systems that use cameras have been proposed. These systems obtain online signature data from video images by tracking the pen tip. Such systems are very useful because special devices such as pen-operated digital tablets are not necessary. One drawback, however, is that if the captured images are blurred, pen tip tracking may fail, which causes performance degradation. To solve this problem, here we propose a scheme to detect such images and re-estimate the pen tip position associated with the blurred images. Our pen tracking algorithm is implemented by using the sequential Monte Carlo method, and a sequential marginal likelihood is used for blurred image detection. Preliminary experiments were performed using private data consisting of 390 genuine signatures and 1560 forged signatures. The experimental results show that the proposed algorithm improved performance in terms of verification accuracy.

Muramatsu, Daigo; Yasuda, Kumiko; Shirato, Satoshi; Matsumoto, Takashi

6

Improvement of On-line Signature Verification Based on Gradient Features  

NASA Astrophysics Data System (ADS)

This paper proposes a new on-line signature verification technique which employs gradient features and a pooled within-covariance matrix of training samples not only of the user but also of the others. Gradient features are extracted from a signature image reflecting the velocity of pen movement as the grayscale so that both on-line and off-line features are exploited. All training samples of different signatures collected in design stage are pooled together with the user's samples and used for learning within-individual variation matrix to reduce required sample size of the user to minimum number. The result of evaluation test shows that the proposed technique improves the verification accuracy by 4.9% when user's sample of size three is pooled with samples with others. This result shows that the samples of different signatures are useful for training within-individual variation of a specific user.

Kawazoe, Yumiko; Ohyama, Wataru; Wakabayashi, Tetsushi; Kimura, Fumitaka

7

On-line Signature Verification Using Most Discriminating Features and Fisher Linear Discriminant Analysis (FLD)  

Microsoft Academic Search

In this work, we employ a combination of strategies for partitioning and detecting abnormal fluctuations in the horizontal and vertical trajectories of an on-line generated signature profile. Alternative partitions of these spatial trajectories are generated by splitting each of the related angle, velocity and pressure profiles into two regions representing both high and low activity. The overall process can be

Muhammad Talal Ibrahim; Matthew J. Kyan; Ling Guan

2008-01-01

8

A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification  

Microsoft Academic Search

Authentication of handwritten signatures is becoming increasingly important. With a rapid increase in the number of people who access Tablet PCs and PDAs, online signature verification is one of the most promising techniques for signature verification. This paper proposes a new algorithm that performs a Monte Carlo based Bayesian scheme for online signature verification. The new algorithm consists of a

Daigo Muramatsu; Mitsuru Kondo; Masahiro Sasaki; Satoshi Tachibana; Takashi Matsumoto

2006-01-01

9

`Neutron signatures' [weapons treaty verification  

Microsoft Academic Search

The Radiation Detection Section of the Naval Research Laboratory (NRL) is sponsored by the Defense Nuclear Agency (DNA) to study the feasibility of using passive cosmic-ray induced neutron signatures as a method of treaty verification. The main thrust has been to use the neutron signature as a unique method for verification of the type of missile or other treaty limited

R. A. August; G. W. Phillips; S. E. King; J. H. Cutchin

1992-01-01

10

A BEHAVIORAL BIOMETRIC APPROACH TO SIGNATURE VERIFICATION  

Microsoft Academic Search

Signature verification presents greater advantages over other biometric techniques such as face recognition, iris recognition, retina recognition, speech recognition etc from the point of view of adoption in the market place. It is a socially accepted identification method already in use in bank and credit card transactions. Here handwritten signatures are used for verification. This paper use static image as

Moniruzzaman Sarker; Shah Atiqur Rahman; S. M. Ashik

2004-01-01

11

Machine Learning for Signature Verification Harish Srinivasan  

E-print Network

Machine Learning for Signature Verification Harish Srinivasan , Sargur N. Srihari and Matthew J it can be viewed as one that involves machine learning from a population of signatures. There are two and performance phases is de- scribed. Keywords: machine learning, forensic signature examination, biometrics

12

Signature verification (SV) toolbox: Application of PSO-NN  

Microsoft Academic Search

Analysis of signature is a widely used and developed area of research for personal verification. A typical signature verification (SV) system generally consists of four components: data acquisition, pre-processing, feature extraction and verification. A reliable SV toolbox, based on the verification of off-line signatures is developed with the proposed algorithm. The technique is based on a neural network (NN) approach

M. Taylan Das; L. Canan Dülger

2009-01-01

13

Biometric Cryptosystem Using Online Signatures  

Microsoft Academic Search

Biometric cryptosystems combine cryptography and biomet- rics to benefit from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the need to remember pass- words or to carry tokens etc. In this work we present a biometric cryp- tosystems which uses online signatures, based on the Fuzzy

Alisher Kholmatov; Berrin A. Yanikoglu

2006-01-01

14

Persian signature verification using improved Dynamic Time Warping-based segmentation and Multivariate Autoregressive modeling  

Microsoft Academic Search

In this paper, we present an online signature verification system based on dynamic time warping (DTW)-based segmentation technique combined with multivariate autoregressive (MVAR) modeling. We also use multilayer perceptron neural network architecture as data classifier. The input data that has been used is (xj,yj) coordinates of signatures drawn from a Persian database. We compare two different DTW algorithms in terms

Meysam Zoghi; Vahid Abolghasemi

2009-01-01

15

An individuality model for online signatures using global Fourier descriptors  

NASA Astrophysics Data System (ADS)

The discriminative capability of a biometric is based on its individuality/uniqueness and is an important factor in choosing a biometric for a large-scale deployment. Individuality studies have been carried out rigorously for only certain biometrics, in particular fingerprint and iris, while work on establishing handwriting and signature individuality has been mainly on feature level. In this study, we present a preliminary individuality model for online signatures using the Fourier domain representation of the signature. Using the normalized Fourier coefficients as global features describing the signature, we derive a formula for the probability of coincidentally matching a given signature. Estimating model parameters from a large database and making certain simplifying assumptions, the probability of two arbitrary signatures to match in 13 of the coefficients is calculated as 4.7x10 -4. When compared with the results of a verification algorithm that parallels the theoretical model, the results show that the theoretical model fits the random forgery test results fairly well. While online signatures are sometimes dismissed as not very secure, our results show that the probability of successfully guessing an online signature is very low. Combined with the fact that signature is a behavioral biometric with adjustable complexity, these results support the use of online signatures for biometric authentication.

Kholmatov, Alisher; Yanikoglu, Berrin

2008-03-01

16

Combining Fisher Discriminant Analysis and probabilistic neural network for effective on-line signature recognition  

Microsoft Academic Search

The advent of new technologies enables capturing the dynamic of a signature. This has opened a new perspective for the possible use of signatures as a basis for an authentication system that is accurate and trustworthy enough to be integrated in practical applications. Automatic online signature recognition and verification is one of the biometric techniques being the subject of a

Souham Meshoul; Mohamed Batouche

2010-01-01

17

Signature Verification Using Conic Section Function Neural Network  

Microsoft Academic Search

\\u000a This paper presents a new approach for off-line signature verification based on a hybrid neural network (Conic Section Function\\u000a Neural Network-CSFNN). Artificial Neural Networks (ANNs) have recently become a very important method for classification and\\u000a verification problems. In this work, CSFNN was proposed for the signature verification and compared with two well known neural\\u000a network architectures (Multilayer Perceptron-MLP and Radial

Canan Senol; Tülay Yildirim

2005-01-01

18

Dynamic Signature Verification Using Sensor Based Data Glove  

Microsoft Academic Search

Handwritten signature verification is a well-established and potential area of research with numerous applications such as commercial (e.g., credit card, bank check verification etc.), government (e.g., National ID card, Driver's license, passport control etc.) and forensic (e.g., corpse identification) application. In this paper, we propose a new approach to deal with the problem of handwritten signature verification and forgery detection

S. Sayee; Rosli Besar; Nidal S. Kamel

2006-01-01

19

A stroke based algorithm for dynamic signature verification  

Microsoft Academic Search

Dynamic signature verification (DSV) uses the behavioral biometrics of a hand-written signature to confirm the identity of a computer user. This paper presents a novel stroke-based algorithm for DSV. An algorithm is developed to convert sample signatures to a template by considering their spatial and time domain characteristics, and by extracting features in terms of individual strokes. Individual strokes are

Tong Qu; Abdulmotaleb El Saddik; Andy Adler

2004-01-01

20

A STROKE BASED ALGORITHM FOR DYNAMIC SIGNATURE VERIFICATION  

E-print Network

A STROKE BASED ALGORITHM FOR DYNAMIC SIGNATURE VERIFICATION Tong Qu, Abdulmotaleb El Saddik, Andy a novel stroke-based algorithm for DSV. An algorithm is developed to convert sample signatures of individual strokes. Individual strokes are identified by finding the points where there is a 1) decrease

Adler, Andy

21

On-Line Fingerprint Verification  

Microsoft Academic Search

Abstract: We describe the design and implementation of an onlinefingerprint verification system which operates in twostages: (i) minutia extraction and (ii) minutia matching. Animproved minutia extraction algorithm that is much fasterand more accurate than our earlier algorithm [8] has beenimplemented. For minutia matching, an alignment-basedelastic matching algorithm has been developed. This algorithmis capable of finding the correspondences between inputminutiae and

Anil K. Jain; Lin Hong; Ruud M. Bolle

1997-01-01

22

Dynamic signature verification and the human biometric sensor interaction model  

Microsoft Academic Search

This paper examines the application of the HBSI model to a range of dynamic signature verification capture digitizers. Behavioral biometrics (which considers the process by which a human performs a function) are inherently more complicated to analyze as they may contain a temporal modification as part of a valid capture interaction. In this study, a framework for the development of

Michael Brockly; Richard Guest; Stephen Elliott; James Scott

2011-01-01

23

A Comparative Analysis of Regional Correlation, Dynamic Time Warping, and Skeletal Tree Matching for Signature Verification  

Microsoft Academic Search

A report is presented on a comparative study of three different signal matching algorithms in the context of signature verification: regional correlation, dynamic time warping, and skeletal tree matching. The algorithm performances are compared in a single experimental protocol over the same database. Algorithm performance is analyzed in terms of verification error rates, execution time, and number and sensitivity of

Marc Parizeau; Réjean Plamondon

1990-01-01

24

An Online System of Multispectral Palmprint Verification  

Microsoft Academic Search

Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of highly accurate and robust palmprint authentication system, multispectral imaging has been employed to acquire more discriminative information and increase the antispoof capability of palmprint. This paper presents an online multispectral palmprint system that could meet the requirement of real-time application. A data acquisition device

David Zhang; Zhenhua Guo; Guangming Lu; Lei Zhang; Wangmeng Zuo

2010-01-01

25

Digital video system for on-line portal verification  

NASA Astrophysics Data System (ADS)

A digital system has been developed for on-line acquisition, processing and display of portal images during radiation therapy treatment. A metal/phosphor screen combination is the primary detector, where the conversion from high-energy photons to visible light takes place. A mirror angled at 45 degrees reflects the primary image to a low-light-level camera, which is removed from the direct radiation beam. The image registered by the camera is digitized, processed and displayed on a CRT monitor. Advanced digital techniques for processing of on-line images have been developed and implemented to enhance image contrast and suppress the noise. Some elements of automated radiotherapy treatment verification have been introduced.

Leszczynski, Konrad W.; Shalev, Shlomo; Cosby, N. Scott

1990-07-01

26

Real-Time Feature-Based Automatic Signature Verification M. Shridhar G. Houle R. Bakker F. Kimura  

E-print Network

Real-Time Feature-Based Automatic Signature Verification M. Shridhar G. Houle R. Bakker F. Kimura Europe BV ron.bakker@diaeurope.com Mie University, Japan kimura@hi.info.mie-u.ac.jp Abstract Automated

Paris-Sud XI, Université de

27

EVEREST: an efficient method for verification of digital signatures in real-time teleradiology.  

PubMed

The introduction of digital medical images requires a legally binding digital signature that guarantees authenticity and integrity of the image. In real-time teleradiology services, the system is expected to respond very quickly however to verify the signature a considerable amount of time is spent to compute the hash value of the image since the image size might be huge (tens of megabytes). Motivating by this fact, in this paper we propose EVEREST, an efficient methodology for verification. The key observation we have made is that in the traditional verification the processor of the verifying machine is idle (I/O blocked) while the image is downloaded. In EVEREST, to improve the real-time efficiency the receiver can perform most of the hash computation while he is receiving the image itself. One other important advantage of our scheme is the communication efficiency since getting the entire image file is no longer necessary to detect the tampering. PMID:15361011

Bicakci, Kemal; Baykal, Nazife

2004-01-01

28

Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy  

SciTech Connect

Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

Tai An, E-mail: atai@mcw.ed [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Christensen, James D.; Gore, Elizabeth [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Khamene, Ali [Imaging and Visualization Department, Siemens AG, Princeton, NJ (United States); Boettger, Thomas [Oncology Care Systems, Siemens AG, Heidelberg (Germany); Li, X. Allen [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States)

2010-04-15

29

GRAZING-ANGLE FOURIER TRANSFORM INFRARED SPECTROSCOPY FOR ONLINE SURFACE CLEANLINESS VERIFICATION. YEAR 1  

EPA Science Inventory

As part of the Online Surface Cleanliness Project, the Naval Facilities Engineering Service Center (NFESC) conducted a study of grazing-angle reflectance Fourier Transform Infrared (FTIR) Spectroscopy as a tool for online cleanliness verification at Department of Defense (DoD) cl...

30

The effect of typicality on online category verification of inanimate category exemplars in aphasia  

Microsoft Academic Search

Background: A previous study (Kiran & Thompson, 2003a) investigated the effect of typicality on online category verification of animate categories in patients with fluent or nonfluent aphasia and their normal controls. Results revealed a robust effect of typicality: typical examples were faster and more accurate than atypical examples of animate categories. Patients with fluent aphasia did not demonstrate the expected

Swathi Kiran; Katerina Ntourou; Megan Eubank

2007-01-01

31

Verification of multiple intelligences construct validity in an online instrument  

Microsoft Academic Search

This research aims to verify the construct validity of an online multiple intelligences assessment instrument. It contains 81 perception items and is administered online by random sampling. The Person and Items Distribution Map (PIDM) indicates good reliability attributes. The analysis yields 69 items from which 12 items were dropped. To further ensure the accuracy and consistency of this finding, another

Siti Rahayah Ariffin; Ida Kamalawati Abu Bakar; Mohd Sahardi Che Harun; Anita Isa

2010-01-01

32

An individuality model for online signatures using global Fourier descriptors  

Microsoft Academic Search

The discriminative capability of a biometric is based on its individuality\\/uniqueness and is an important factor in choosing a biometric for a large-scale deployment. Individuality studies have been carried out rigorously for only certain biometrics, in particular fingerprint and iris, while work on establishing handwriting and signature individuality has been mainly on feature level. In this study, we present a

Alisher Kholmatov; Berrin Yanikoglu

2008-01-01

33

Aging in Biometrics: An Experimental Analysis on On-Line Signature  

E-print Network

in Biometrics: An Experimental Analysis on On-Line Signature. PLoS ONE 8(7): e69897. doi:10.1371/ journal 13, 2013; Published July 23, 2013 Copyright: Ã? 2013 Galbally et al. This is an open-access article], up to date most efforts undertaken by the different parties involved in the development

Autonoma de Madrid, Universidad

34

A method for online verification of adapted fields using an independent dose monitor  

SciTech Connect

Purpose: Clinical implementation of online adaptive radiotherapy requires generation of modified fields and a method of dosimetric verification in a short time. We present a method of treatment field modification to account for patient setup error, and an online method of verification using an independent monitoring system.Methods: The fields are modified by translating each multileaf collimator (MLC) defined aperture in the direction of the patient setup error, and magnifying to account for distance variation to the marked isocentre. A modified version of a previously reported online beam monitoring system, the integral quality monitoring (IQM) system, was investigated for validation of adapted fields. The system consists of a large area ion-chamber with a spatial gradient in electrode separation to provide a spatially sensitive signal for each beam segment, mounted below the MLC, and a calculation algorithm to predict the signal. IMRT plans of ten prostate patients have been modified in response to six randomly chosen setup errors in three orthogonal directions.Results: A total of approximately 49 beams for the modified fields were verified by the IQM system, of which 97% of measured IQM signal agree with the predicted value to within 2%.Conclusions: The modified IQM system was found to be suitable for online verification of adapted treatment fields.

Chang Jina; Norrlinger, Bernhard D. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Heaton, Robert K.; Jaffray, David A.; Cho, Young-Bin; Islam, Mohammad K. [Department of Radiation Physics, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada); Department of Radiation Oncology, University of Toronto, Toronto, Ontario M5G 2M9 (Canada); Mahon, Robert [Department of Radiation Therapy, Radiation Medicine Program, Princess Margaret Cancer Centre, Toronto, Ontario M5G 2M9 (Canada)

2013-07-15

35

An Optimized Online Verification Imaging Procedure for External Beam Partial Breast Irradiation  

SciTech Connect

The purpose of this study was to evaluate the capabilities of a kilovoltage (kV) on-board imager (OBI)-equipped linear accelerator in the setting of on-line verification imaging for external-beam partial breast irradiation. Available imaging techniques were optimized and assessed for image quality using a modified anthropomorphic phantom. Imaging dose was also assessed. Imaging techniques were assessed for physical clearance between patient and treatment machine using a volunteer. Nonorthogonal kV image pairs were identified as optimal in terms of image quality, clearance, and dose. After institutional review board approval, this approach was used for 17 patients receiving accelerated partial breast irradiation. Imaging was performed before every fraction verification with online correction of setup deviations >5 mm (total image sessions = 170). Treatment staff rated risk of collision and visibility of tumor bed surgical clips where present. Image session duration and detected setup deviations were recorded. For all cases, both image projections (n = 34) had low collision risk. Surgical clips were rated as well as visualized in all cases where they were present (n = 5). The average imaging session time was 6 min, 16 sec, and a reduction in duration was observed as staff became familiar with the technique. Setup deviations of up to 1.3 cm were detected before treatment and subsequently confirmed offline. Nonorthogonal kV image pairs allowed effective and efficient online verification for partial breast irradiation. It has yet to be tested in a multicenter study to determine whether it is dependent on skilled treatment staff.

Willis, David J., E-mail: David.Willis@petermac.or [Division of Radiation Oncology, Peter MacCallum Cancer Centre, East Melbourne, Victoria (Australia); Royal Melbourne Institute of Technology University, Melbourne, Victoria (Australia) and Melbourne University, Melbourne, Victoria (Australia); Kron, Tomas; Chua, Boon [Division of Radiation Oncology, Peter MacCallum Cancer Centre, East Melbourne, Victoria (Australia); Royal Melbourne Institute of Technology University, Melbourne, Victoria (Australia) and Melbourne University, Melbourne, Victoria (Australia)

2011-07-01

36

Efficient cost-sensitive human-machine collaboration for offline signature verification  

NASA Astrophysics Data System (ADS)

We propose a novel strategy for the optimal combination of human and machine decisions in a cost-sensitive environment. The proposed algorithm should be especially beneficial to financial institutions where off-line signatures, each associated with a specific transaction value, require authentication. When presented with a collection of genuine and fraudulent training signatures, produced by so-called guinea pig writers, the proficiency of a workforce of human employees and a score-generating machine can be estimated and represented in receiver operating characteristic (ROC) space. Using a set of Boolean fusion functions, the majority vote decision of the human workforce is combined with each threshold-specific machine-generated decision. The performance of the candidate ensembles is estimated and represented in ROC space, after which only the optimal ensembles and associated decision trees are retained. When presented with a questioned signature linked to an arbitrary writer, the system first uses the ROC-based cost gradient associated with the transaction value to select the ensemble that minimises the expected cost, and then uses the corresponding decision tree to authenticate the signature in question. We show that, when utilising the entire human workforce, the incorporation of a machine streamlines the authentication process and decreases the expected cost for all operating conditions.

Coetzer, Johannes; Swanepoel, Jacques; Sabourin, Robert

2012-01-01

37

Is Your Avatar Ethical? On-Line Course Tools that Are Methods for Student Identity and Verification  

ERIC Educational Resources Information Center

On-line college courses present a mandate for student identity verification for accreditation and funding sources. Student authentication requires course modification to detect fraud and misrepresentation of authorship in assignment submissions. The reality is that some college students cheat in face-to-face classrooms; however, the potential for…

Semple, Mid; Hatala, Jeffrey; Franks, Patricia; Rossi, Margherita A.

2011-01-01

38

Investigation of the spatial resolution of an online dose verification device  

SciTech Connect

Purpose: The aim of this work is to characterize a new online dose verification device, COMPASS transmission detector array (IBA Dosimetry, Schwarzenbruck, Germany). The array is composed of 1600 cylindrical ionization chambers of 3.8 mm diameter, separated by 6.5 mm center-to-center spacing, in a 40 x 40 arrangement. Methods: The line spread function (LSF) of a single ion chamber in the detector was measured with a narrow slit collimator for a 6 MV photon beam. The 0.25 x 10 mm{sup 2} slit was formed by two machined lead blocks. The LSF was obtained by laterally translating the detector in 0.25 mm steps underneath the slit over a range of 24 mm and taking a measurement at each step. This measurement was validated with Monte Carlo simulation using BEAMnrc and DOSXYZnrc. The presampling modulation transfer function (MTF), the Fourier transform of the line spread function, was determined and compared to calculated (Monte Carlo and analytical) MTFs. Two head-and-neck intensity modulated radiation therapy (IMRT) fields were measured using the device and were used to validate the LSF measurement. These fields were simulated with the BEAMnrc Monte Carlo model, and the Monte Carlo generated incident fluence was convolved with the 2D detector response function (derived from the measured LSF) to obtain calculated dose. The measured and calculated dose distributions were then quantitatively compared using {chi}-comparison criteria of 3% dose difference and 3 mm distance-to-agreement for in-field points (defined as those above the 10% maximum dose threshold). Results: The full width at half-maximum (FWHM) of the measured detector response for a single chamber is 4.3 mm, which is comparable to the chamber diameter of 3.8 mm. The pre-sampling MTF was calculated, and the resolution of one chamber was estimated as 0.25 lp/mm from the first zero crossing. For both examined IMRT fields, the {chi}-comparison between measured and calculated data show good agreement with 95.1% and 96.3% of in-field points below {chi} of 1.0 for fields 1 and 2, respectively (with an average {chi} of 0.29 for IMRT field 1 and 0.24 for IMRT field 2). Conclusions: The LSF for a new novel online detector has been measured at 6 MV using a narrow slit technique, and this measurement has been validated by Monte Carlo simulation. The detector response function derived from line spread function has been applied to recover measured IMRT fields. The results have shown that the device measures IMRT fields accurately within acceptable tolerance.

Asuni, G.; Rickey, D. W.; McCurdy, B. M. C. [Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9 (Canada) and Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada); Division of Medical Physics, CancerCare Manitoba, 675 McDermot Avenue, Winnipeg, Manitoba R3E 0V9 (Canada); Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada) and Department of Radiology, University of Manitoba, Winnipeg, Manitoba R3A 1R9 (Canada)

2012-02-15

39

Aging in Biometrics: An Experimental Analysis on On-Line Signature  

PubMed Central

The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system’s performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given. PMID:23894557

Galbally, Javier; Martinez-Diaz, Marcos; Fierrez, Julian

2013-01-01

40

The use of on-line image verification to estimate the variation in radiation therapy dose delivery  

SciTech Connect

On-line radiotherapy imaging systems provide data that allow us to study the geometric nature of treatment variation. It is more clinically relevant to examine the resultant dosimetric variation. In this work, daily beam position as recorded by the on-line images is used to recalculate the treatment plan to show the effect geometric variation has on dose. On-line Image Verification (OLIV) data can differentiate between systematic and random errors in a course of daily radiation therapy. The data emphasize that the type and magnitude of patient set-up errors are unique for individual patients and different clinical situations. Head and neck sites has the least random variation (average 0-100% block overlap isofrequency distribution width = 7 mm) compared to thoracic (average 0-100% block overlap isofrequency distribution width = 12 mm) or pelvic sites (average 0-100% block overlap isofrequency distribution width = 14 mm). When treatment delivery is analyzed case by case, systematic as well as random errors are represented. When the data are pooled by anatomical site, individuality of variations is lost and variation appears random. Recalculated plans demonstrated dosimetric deviations from the original plans. The differences between the two dosimetric distributions were emphasized using a technique of plan subtraction. This allowed quick identification of relative {open_quotes}hot and cold spots{close_quotes} in the recalculated plans. The magnitude and clinical significance of dosimetric variation was unique for each patient. OLIV data are useful to study geometric uncertainties because of the unique nature for individual patients. Dose recalculation is helpful to illustrate the dosimetric consequences of set-up errors. 18 refs., 9 figs., 2 tabs.

Michalski, J.M.; Wong, J.W.; Gerber, R.L.; Yan, Di; Cheng, A.; Graham, M.V.; Renna, M.A.; Sawyer, P.J.; Perez, C.A. [Washington Univ. School of Medicine, St. Louis, MO (United States)

1993-10-20

41

FUSION STRATEGIES IN MULTIMODAL BIOMETRIC VERIFICATION J. Fierrez-Aguilar, J. Ortega-Garcia and J. Gonzalez-Rodriguez  

E-print Network

biometric characteristics, namely, on-line signature ­which is a behavioral trait-, face and fingerprintFUSION STRATEGIES IN MULTIMODAL BIOMETRIC VERIFICATION J. Fierrez-Aguilar, J. Ortega-Garcia and J. Gonzalez-Rodriguez {jfierrez, jortega, jgonzalez}.diac.upm.es Biometrics Research Lab. ­ Universidad

Autonoma de Madrid, Universidad

42

FITS Checksum Verification in the NOAO Archive  

NASA Astrophysics Data System (ADS)

There is no standard procedure for verifying the integrity of FITS data files. While a FITS file may be subjected to the same checksum or digital signature calculation as any other data file, the resulting sum or signature must normally be carried separately from the FITS file since writing the value into the header will change the checksum. A simple method for embedding an ASCII coded 32 bit 1's complement checksum within a FITS header (or any ASCII text) is described that is quick to compute and has desirable features such as: the checksum of each FITS file or extension is set to zero; the checksum may be accumulated in any order; and the checksum is easily updated with simple arithmetic. On-line verification of tapes for the NOAO/IRAF Save the Bits archive is discussed as an example.

Seaman, R.

43

Measured Performance Signature Method  

E-print Network

performance corrections. This procedure is useful for acceptance testing and continuous performance monitoring of industrial cogeneration plants or any energy system. The plant performance signature, is determined from on-line measurements, and corrected to a...

Ahner, D. J.

44

Wavelet--based Off--line Signature Verification Peter Shaohua Deng , Hong--Yuan Mark Liao , Chin Wen Ho , and Hsiao--Rong Tyan  

E-print Network

on these data, the optimal threshold value which controls the accura­ cy of the feature extraction process techniques, feature extraction methods, comparison processes and per­ formance evaluation. Later, in 1993 signature forgery. Chen[9] studied handwritten signature verifi­ cation from the viewpoint of forensic

Chen, Sheng-Wei

45

Oregon Secretary of State Kate Brown has until August 1 to verify which of the six measures that have submitted signatures for verification  

E-print Network

Sonnen last month dropped out of the race. For an article · Initiative 28: Establishes medical marijuana supply system and assistance and research programs; allows limited selling of marijuana. Since both percent were determined to be valid. The marijuana initiative gathered 130,702 signatures, 66 percent

Escher, Christine

46

Server-side Verification of Client Behavior in Online Games Darrell Bethea Robert A. Cochran Michael K. Reiter  

E-print Network

cheaters and hackers. [32, p. 112] The movement of games to all manners of devices using wireless, volume. Age of Empires and America's Army are examples of online games that suffered substantial player loss from game operators, owing to the increased bandwidth use that results due to sending low-level client

North Carolina at Chapel Hill, University of

47

Server-side Verification of Client Behavior in Online Games Darrell Bethea Robert A. Cochran Michael K. Reiter  

E-print Network

of games to all manners of devices using wireless, volume-priced communication only reinforces. Age of Em- pires and America's Army are examples of online games that suffered substantial player loss by cheaters. This, however, exacts a heavy price from game operators, owing to the increased bandwidth use

Reiter, Michael

48

DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION  

SciTech Connect

International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

2009-10-06

49

Mesh Signatures How to Leak a Secret with Unwitting and Unwilling Participants  

E-print Network

, whose interior nodes are And, Or, and Threshold gates, and whose leaves are regular "atomic" signatures private key and CertAuth's certificate verification key. Even if Bob has published no verification key

50

Signature Crossroads  

E-print Network

Signature Crossroads, an urban form that grows out of an street intersection, combines both the sense of "transit" and the sense of "destination." Such dual character gives Signature Crossroads a superiority over traditional ...

Chong, Puifai Cyril

1997-01-01

51

Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili Narasimha, Gene Tsudik  

E-print Network

problem in the context of privacy is allowing a client to efficiently query its own data hosted by a third- and computation-efficient integrity verification for any possible query reply. However, techniques proposed in [19Signature Bouquets: Immutability for Aggregated/Condensed Signatures Einar Mykletun, Maithili

52

78 FR 43145 - Announcing Approval of Federal Information Processing Standard 186-4, Digital Signature Standard  

Federal Register 2010, 2011, 2012, 2013

This notice announces the Secretary of Commerce's approval of Federal Information Processing Standard (FIPS) 186-4, Digital Signature Standard (DSS). FIPS 186-4 specifies three techniques for the generation and verification of digital signatures that can be used for the protection of data: The Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA) and the......

2013-07-19

53

Group Signatures  

Microsoft Academic Search

Abstract. In this paper we present a new type of signature for a group of persons, called a group signature, which has the following propertjes: (i) only members,of the group can sign messages; (ii) the receiver can verify that it is a valid group signaa~e, but cannot discover which gr~up member made (i) if necessary, the signature can be \\

David Chaum; Eugène Van Heyst

1991-01-01

54

2014-15 Child Support Paid Verification Worksheet  

E-print Network

2014-15 Child Support Paid Verification Worksheet Office of Student Financial Assistance P.O. Box.aid@uaa.alaska.edu G:\\Financial Aid\\Forms\\2014-15\\1415_Child_Support_Paid_Verification_Worksheet.docx RRAAREQ Code of Child Support Paid in 2013 III. SIGNATURES I/We certify that all information reported on this worksheet

Pantaleone, Jim

55

2013-14 Child Support Paid Verification Worksheet  

E-print Network

2013-14 Child Support Paid Verification Worksheet Office of Student Financial Assistance P.O. Box.aid@uaa.alaska.edu G:\\Financial Aid\\Forms\\2013-14\\1314_Child_Support_Paid_Verification_Worksheet.docx RRAAREQ Code of Child Support Paid in 2012 III. SIGNATURES I/We certify that all information reported on this worksheet

Pantaleone, Jim

56

Academic Verification Form Verification Department  

E-print Network

/State/Zip: ______________________________________________ ____ Credit Card (Visa, MasterCard, Discover or American Express) Credit Card Number: Expiration Date:______________________________ Daytime Phone Number: ______-_______-_________ __________________________ _______ Number of Verifications minors, options, certificates and non-credit programs are reported on the student's official academic

Yener, Aylin

57

Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow  

E-print Network

Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature of improved variants of the UOV and Rainbow signature schemes. In this paper we show how we can do even better by a slight variation of their algorithms. Keywords: Multivariate Cryptography, UOV Signature Scheme, Rainbow

58

SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 00:17 (DOI: 10.1002/000)  

E-print Network

of the software system, yet it is hard to perform regression testing because the internals of the thirdSOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2007; 00:1­7 (DOI: 10.1002/000) Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/000 Regression Testing

Singer, Jeremy

59

The Standoff Aerosol Active Signature Testbed (SAAST) at MIT Lincoln Laboratory  

NASA Astrophysics Data System (ADS)

The Standoff Aerosol Active Signature Testbed (SAAST) is the aerosol range within the MIT Lincoln Laboratory's Optical System Test Facility (OSTF). Ladar and Lidar are promising tools for precise target acquisition, identification, and ranging. Solid rocket effluent has a strong Lidar signature. Currently, calculations of the Lidar signature from effluent are in disagreement from measurements. This discrepancy can be addressed through relatively inexpensive laboratory measurements. The SAAST is specifically designed for measuring the polarization-dependent optical scattering cross sections of laboratory-generated particulate samples at multiple wavelengths and angles. Measurements made at oblique angles are highly sensitive to particle morphology, including complex index of refraction and sample shape distribution. With existing hardware it is possible to re-aerosolize previously collected effluent samples and, with online and offline diagnostics, ensure that these samples closely represent those found in situ. Through comparison of calculations and measurements at multiple angles it is possible to create a realistic model of solid rocket effluent that can be used to extrapolate to a variety of conditions. The SAAST has recently undergone a dramatic upgrade, improving sensitivity, flexibility, sample generation, sample verification, and level of automation. Several measurements have been made of terrestrial dust and other samples.

Richardson, Jonathan M.; Aldridge, John C.; Harrison, David C.; Hayes, Alexander G.; Hines, Eric L.; Jiang, Leaf A.; Schultz, Kenneth I.

2006-05-01

60

Biometric Cryptosystem Using Online Alisher Kholmatov and Berrin Yanikoglu  

E-print Network

in a vault. The online signature of a person is a behavioral biometric which is widely accepted as the formal) or behavioral traits (e.g. signature). During authentication, biometric traits of a person are matched againstBiometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci

Yanikoglu, Berrin

61

System Verification through Program Verification  

Microsoft Academic Search

\\u000a We present an automatable approach to verify that a system satisfies its requirements by verification of the program that\\u000a controls the system. The approach can be applied if the interaction of the program with the system hardware can be faithfully\\u000a described by a table relating domain phenomena and program variables. We show the applicability of the approach with a case

Daniel Dietsch; Bernd Westphal; Andreas Podelski

62

Signatures of Reputation  

NASA Astrophysics Data System (ADS)

Reputation systems have become an increasingly important tool for highlighting quality information and filtering spam within online forums. However, the dependence of a user's reputation on their history of activities seems to preclude any possibility of anonymity. We show that useful reputation information can, in fact, coexist with strong privacy guarantees. We introduce and formalize a novel cryptographic primitive we call signatures of reputation which supports monotonic measures of reputation in a completely anonymous setting. In our system, a user can express trust in others by voting for them, collect votes to build up her own reputation, and attach a proof of her reputation to any data she publishes, all while maintaining the unlinkability of her actions.

Bethencourt, John; Shi, Elaine; Song, Dawn

63

ETV - VERIFICATION TESTING (ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM)  

EPA Science Inventory

Verification testing is a major component of the Environmental Technology Verification (ETV) program. The ETV Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantia...

64

A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents.  

PubMed

This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

Tayan, Omar; Kabir, Muhammad N; Alginahi, Yasser M

2014-01-01

65

A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents  

PubMed Central

This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints.

Kabir, Muhammad N.; Alginahi, Yasser M.

2014-01-01

66

Wavelet Features Based Fingerprint Verification  

NASA Astrophysics Data System (ADS)

In this work; we present a automatic fingerprint identification system based on Level 3 features. Systems based only on minutiae features do not perform well for poor quality images. In practice, we often encounter extremely dry, wet fingerprint images with cuts, warts, etc. Due to such fingerprints, minutiae based systems show poor performance for real time authentication applications. To alleviate the problem of poor quality fingerprints, and to improve overall performance of the system, this paper proposes fingerprint verification based on wavelet statistical features & co-occurrence matrix features. The features include mean, standard deviation, energy, entropy, contrast, local homogeneity, cluster shade, cluster prominence, Information measure of correlation. In this method, matching can be done between the input image and the stored template without exhaustive search using the extracted feature. The wavelet transform based approach is better than the existing minutiae based method and it takes less response time and hence suitable for on-line verification, with high accuracy.

Bagadi, Shweta U.; Thalange, Asha V.; Jain, Giridhar P.

2010-11-01

67

Towards a Better Understanding of the Oxygen Isotope Signature of Atmospheric CO2: Determining the 18O-Exchange Between CO2 and H2O in Leaves and Soil On-line with Laser-Based Spectroscopy  

NASA Astrophysics Data System (ADS)

The oxygen isotope signature of carbon dioxide (?18O-CO2) is a powerful tool to disentangle CO2 fluxes in terrestrial ecosystems, as CO2 attains a contrasting 18O signature by the interaction with isotopically different soil and leaf water pools during soil respiration and photosynthesis, respectively. However, using the ?18O-CO2 signal to quantify plant-soil-atmosphere CO2 fluxes is still challenging due to a lack of knowledge concerning the magnitude and effect of individual fractionation processes during CO2 and H2O diffusion and during CO2-H2O isotopic exchange in soils and leaves, especially related to short-term changes in environmental conditions (non-steady state). This study addresses this research gap by combined on-line monitoring of the oxygen isotopic signature of CO2 and water vapor during gas exchange in soil and plant leaves with laser-based spectroscopy, using soil columns and plant chambers. In both experimental setups, the measured ?18O of water vapor was used to infer the ?18O of liquid water, and, together with the ?18O-CO2, the degree of oxygen isotopic equilibrium between the two species (?). Gas exchange experiments with different functional plant types (C3 coniferous, C3 monocotyledonous, C3 dicotyledonous, C4) revealed that ? and the influence of the plant on the ambient ?18O-CO2 (CO18O-isoforcing) not only varied on a diurnal timescale but also when plants were exposed to limited water availability, elevated air temperature, and abrupt changes in light intensity (sunflecks). Maximum ? before treatments ranged between 0.7 and 0.8 for the C3 dicotyledonous (poplar) and C3 monocotyledonous (wheat) plants, and between 0.5 and 0.6 for the conifer (spruce) and C4 plant (maize) while maximum CO18O-isoforcing was highest in wheat (0.03 m s-1 ‰), similar in poplar and maize (0.02 m s-1 ‰), and lowest in spruce (0.01 m s-1 ‰). Multiple regression analysis showed that up to 97 % of temporal dynamics in CO18O-isoforcing could be explained by variations in stomatal conductance, ?, and ?18O of H2O at the evaporation site. The determined maximum in vivo activity of carbonic anhydrase, the enzyme which catalyzes the CO2-H2O oxygen isotope exchange inside leaves, varied between the different plant species and was, as observed for ?, higher in poplar and wheat, and lower in maize and spruce. Preliminary experiments with soil columns filled with sand demonstrated that gas-permeable microporous polypropylene tubing, which was installed at different depths in the soil columns, was appropriate for determining ?18O-H2O and ?18O-CO2 simultaneously without fractionation. Hence, this new methodology is promising for further studies on the oxygen isotopic exchange between CO2 and H2O in soils. Altogether, this study highlights that the ?18O-CO2 exchange in the soil-plant-atmosphere continuum is highly dynamic in response to short-term variations in environmental conditions, and emphasizes the need for an improved parameterization of models simulating ?18O-CO2.

Gangi, L.; Rothfuss, Y.; Vereecken, H.; Brueggemann, N.

2013-12-01

68

REQUIRED SIGNATURES AND RELEASE FORM Student's Name (Please print): _______________________________________________________________________  

E-print Network

completed the online registration. I understand that it may not be possible to change the date of my section. ___________________________________________________________ __________________ Signature of Student Date ASSUMPTION OF RISK: RELEASE, ACKNOWLEDGMENT, AND WAIVER This document is executed. ___________________________________________________________ __________________ Signature of Parent or Guardian Date This certifies that I have read the accompanying material and have

Lotko, William

69

Name Date Signature Name Date Signature  

E-print Network

Name Date Signature Name Date Signature Name Date Signature HARPS-N DRS User Manual Doc. Nr. OG.07.2012 All First Version 1.1 16.08.2012 All Christophe's corrections #12;#12;OG-MAN-HAN-13-0004 5/29 Table

70

Online personal identification agent  

Microsoft Academic Search

The biometric identification of individuals has many safety and security applications in several fields of major interest, ranging from healthcare to banking to defense. Current biometric technologies are hardly suitable for remote (online) massive use and contain no information about the state of the person at the time of identification. Biometric solutions to date rely on static biological features. Signatures,

R. Leca; V. Groza

2005-01-01

71

Request for Online Payment Site ETSU Bursar Office  

E-print Network

Request for Online Payment Site ETSU Bursar Office PO Box 70732 Date*: _____________ (*allow), dates, costs and any other information to develop the online payment site, logos. Signature, Site: ________________________________________________________ (The Online Site Manager is a department designee with responsibility for the Online Marketplace Ustore

Karsai, Istvan

72

Variability study of Ka-band HRR polarimetric signatures on 11 T-72 tanks  

Microsoft Academic Search

In an effort to effectively understand signature verification requirements through the variability of a structure's RCS characteristics, the U.S. Army National Ground Intelligence Center (NGIC), with technical support from STL, originated a signature project plan to obtain MMW signatures from multiple similar tanks. In implementing this plan NGIC\\/STL directed and sponsored turntable measurements performed by the U.S. Army Research Laboratory

W. E. Nixon; H. J. Neilson; G. N. Szatkowski; Robert H. Giles; W. T. Kersey; L. C. Perkins; Jerry Waldman

1998-01-01

73

Columbus pressurized module verification  

NASA Technical Reports Server (NTRS)

The baseline verification approach of the COLUMBUS Pressurized Module was defined during the A and B1 project phases. Peculiarities of the verification program are the testing requirements derived from the permanent manned presence in space. The model philosophy and the test program have been developed in line with the overall verification concept. Such critical areas as meteoroid protections, heat pipe radiators and module seals are identified and tested. Verification problem areas are identified and recommendations for the next development are proposed.

Messidoro, Piero; Comandatore, Emanuele

1986-01-01

74

Verification of VLSI designs  

NASA Technical Reports Server (NTRS)

In this paper we explore the specification and verification of VLSI designs. The paper focuses on abstract specification and verification of functionality using mathematical logic as opposed to low-level boolean equivalence verification such as that done using BDD's and Model Checking. Specification and verification, sometimes called formal methods, is one tool for increasing computer dependability in the face of an exponentially increasing testing effort.

Windley, P. J.

1991-01-01

75

NWIS signatures for confirmatory measurements with B33 trainers  

SciTech Connect

Nuclear weapons identification system (NWIS) signatures have been used successfully to confirm that B33 trainer parts in their M102 containers, shipped from military bases to the Oak Ridge Y-12 Plant, were as declared by the shipper to be nonenriched uranium. The verification was accomplished by comparing signatures for B33 trainer parts with signatures for mock-ups made with depleted uranium packaged at the Oak Ridge Y-12 Plant in M102 containers. These verifications were conducted in a timely, reliable manner and produced no false positives for the 512 verifications. NWIS signatures have been demonstrated to be adequate for shipper-to-shipper confirmatory measurement within the US Department of Energy (DOE) and between the US Department of Defense (DOD) and DOE. A nonintrusive use of NWIS signatures is demonstrated and would allow the use of this method by foreign nations at DOE or DOD facilities. A field-deployable system, based on a laptop personal computer system, is under development. Although the NWIS method was developed for nuclear weapons identification, the development of a small processor now allows it to be also applied in a practical way to subcriticality measurements, nuclear fuel process monitoring and quantitative nondestructive assay of special nuclear material.

Mihalczo, J.T.; Pare, V.K. [Oak Ridge National Lab., TN (United States)

1995-12-31

76

Baghouse filtration products verification  

Microsoft Academic Search

The paper introduces EPA`s Air Pollution Control Technology Verification (APCT) program and then focuses on the immediate objective of the program: laboratory performance verification of cleanable filter media intended for the control of fine particulate emissions. Data collected during the laboratory verification testing, which simulates operation in full-scale fabric filters, will be used to show expected performance for collection of

J. C. Mycock; J. H. Turner; D. W. VanOsdell; J. R. Farmer; T. G. Brna

1998-01-01

77

WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT  

E-print Network

WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT Union Employees coverage Yes No By my signature on this affidavit, I certify and warrant to Washington University that all agree to provide supporting documentation upon the request of Washington University. I understand if I

78

WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT  

E-print Network

WASHINGTON UNIVERSITY HEALTH/DENTAL PLAN DEPENDENT VERIFICATION AFFIDAVIT Clinical Fellows, Postdoc signature on this affidavit, I certify and warrant to Washington University that all information supporting documentation upon the request of Washington University. I understand if I knowingly submit false

79

Verification Tools Secure Online Shopping, Banking  

NASA Technical Reports Server (NTRS)

Just like rover or rocket technology sent into space, the software that controls these technologies must be extensively tested to ensure reliability and effectiveness. Ames Research Center invented the open-source Java Pathfinder (JPF) toolset for the deep testing of Java-based programs. Fujitsu Labs of America Inc., based in Sunnyvale, California, improved the capabilities of the JPF Symbolic Pathfinder tool, establishing the tool as a means of thoroughly testing the functionality and security of Web-based Java applications such as those used for Internet shopping and banking.

2010-01-01

80

Verification of Adaptive Systems  

SciTech Connect

Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

Pullum, Laura L [ORNL] [ORNL; Cui, Xiaohui [New York Institute of Technology (NYIT)] [New York Institute of Technology (NYIT); Vassev, Emil [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Hinchey, Mike [Lero – The Irish Software Engineering Research Centre] [Lero – The Irish Software Engineering Research Centre; Rouff, Christopher [Lockheed Martin Corporation] [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation] [Lockheed Martin Corporation

2012-01-01

81

Online MBA Programs Online Colleges  

E-print Network

Online MBA Programs Online Colleges Culinary Art Schools Fashion Design Schools Online Colleges Graphic Design Schools Interior Design Schools Online College Degrees MBA Degrees Online Medical Career circuit design expert

Ham, Donhee

82

Quality of Signatures.  

National Technical Information Service (NTIS)

Three conclusions are drawn on the usability, inherent variations, and noise aspects of the spectral signatures processed from data collected by the Field Signature Acquisition System (FSAS). Conclusions are based on the spectral data collected from winte...

E. P. F. Kan

1974-01-01

83

Signatures support program  

NASA Astrophysics Data System (ADS)

The Signatures Support Program (SSP) leverages the full spectrum of signature-related activities (collections, processing, development, storage, maintenance, and dissemination) within the Department of Defense (DOD), the intelligence community (IC), other Federal agencies, and civil institutions. The Enterprise encompasses acoustic, seismic, radio frequency, infrared, radar, nuclear radiation, and electro-optical signatures. The SSP serves the war fighter, the IC, and civil institutions by supporting military operations, intelligence operations, homeland defense, disaster relief, acquisitions, and research and development. Data centers host and maintain signature holdings, collectively forming the national signatures pool. The geographically distributed organizations are the authoritative sources and repositories for signature data; the centers are responsible for data content and quality. The SSP proactively engages DOD, IC, other Federal entities, academia, and industry to locate signatures for inclusion in the distributed national signatures pool and provides world-wide 24/7 access via the SSP application.

Hawley, Chadwick T.

2009-05-01

84

Application for admission to exam Please register online! Use this form only if registering online is not possible.  

E-print Network

Application for admission to exam Please register online! Use this form only if registering online is not possible. Matrikelnummer: Name, first name: Study programme: Final degree: Phone: E-mail: Date, Signature: Exam no./exam name: Exam date: Time: Examiner: Signature of examiner: (with oral exams only) yes no

Pfeifer, Holger

85

Simulation verification techniques study  

NASA Technical Reports Server (NTRS)

Results are summarized of the simulation verification techniques study which consisted of two tasks: to develop techniques for simulator hardware checkout and to develop techniques for simulation performance verification (validation). The hardware verification task involved definition of simulation hardware (hardware units and integrated simulator configurations), survey of current hardware self-test techniques, and definition of hardware and software techniques for checkout of simulator subsystems. The performance verification task included definition of simulation performance parameters (and critical performance parameters), definition of methods for establishing standards of performance (sources of reference data or validation), and definition of methods for validating performance. Both major tasks included definition of verification software and assessment of verification data base impact. An annotated bibliography of all documents generated during this study is provided.

Schoonmaker, P. B.; Wenglinski, T. H.

1975-01-01

86

Verification of complex codes.  

SciTech Connect

Over the past several years, verifying and validating complex codes at Sandia National Laboratories has become a major part of code development. These aspects tackle two important parts of simulation modeling: determining if the models have been correctly implemented - verification, and determining if the correct models have been selected - validation. In this talk, we will focus on verification and discuss the basics of code verification and its application to a few codes and problems at Sandia.

Ober, Curtis Curry

2009-03-01

87

Software verification and testing  

NASA Technical Reports Server (NTRS)

General procedures for software verification and validation are provided as a guide for managers, programmers, and analysts involved in software development. The verification and validation procedures described are based primarily on testing techniques. Testing refers to the execution of all or part of a software system for the purpose of detecting errors. Planning, execution, and analysis of tests are outlined in this document. Code reading and static analysis techniques for software verification are also described.

1985-01-01

88

Scientists Using TCGA Data Identify 21 Mutational Signatures in Cancer  

Cancer.gov

Many mutations have been implicated in human cancer, but the biological mechanisms that produce them remain largely unknown. In a study published online in Nature on August 14, 2013, researchers identified 21 signatures of mutational processes underlying 30 types of cancer. Characterizing mutational signatures may provide a greater understanding of the mechanistic basis of cancer and potentially lead to better treatments that target its root causes.

89

Verification Testing Test Driven Development Testing with JUnit Verification  

E-print Network

Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

Peters, Dennis

90

College student Web use, perceptions of information credibility, and verification behavior  

Microsoft Academic Search

Concerns about the potentially dubious nature of online information and users' ability to evaluate it appropriately prompted this research on college students' use of Web-based information, their perceptions of information credibility, and their online verification behaviors. Two studies were conducted to address these issues. Results of the first study show that college students rely very heavily on the Web for

Miriam J. Metzger; Andrew J. Flanagin; Lara Zwarun

91

Signature detection and matching for document image retrieval.  

PubMed

As one of the most pervasive methods of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effective document image processing and retrieval in a broad range of applications. However, detection and segmentation of free-form objects such as signatures from clustered background is currently an open document analysis problem. In this paper, we focus on two fundamental problems in signature-based document image retrieval. First, we propose a novel multiscale approach to jointly detecting and segmenting signatures from document images. Rather than focusing on local features that typically have large variations, our approach captures the structural saliency using a signature production model and computes the dynamic curvature of 2D contour fragments over multiple scales. This detection framework is general and computationally tractable. Second, we treat the problem of signature retrieval in the unconstrained setting of translation, scale, and rotation invariant nonrigid shape matching. We propose two novel measures of shape dissimilarity based on anisotropic scaling and registration residual error and present a supervised learning framework for combining complementary shape information from different dissimilarity metrics using LDA. We quantitatively study state-of-the-art shape representations, shape matching algorithms, measures of dissimilarity, and the use of multiple instances as query in document image retrieval. We further demonstrate our matching techniques in offline signature verification. Extensive experiments using large real-world collections of English and Arabic machine-printed and handwritten documents demonstrate the excellent performance of our approaches. PMID:19762928

Zhu, Guangyu; Zheng, Yefeng; Doermann, David; Jaeger, Stefan

2009-11-01

92

Quantum Signatures of Spacetime Graininess Quantum Signatures of Spacetime  

E-print Network

Quantum Signatures of Spacetime Graininess Quantum Signatures of Spacetime "Graininess" Sachindeo September 2009 #12;Quantum Signatures of Spacetime Graininess Introduction 1 Length scales in physics 2 Spacetime noncommutativity from quantum uncertainties 3 Quantum Mechanics on Noncommutative Spacetime 4

93

Lightweight Email Signatures  

Microsoft Academic Search

We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenti- cating email. LES is an extension of DKIM, the recent IETF effort to standardize domain-based email signatures. LES shares DKIM's ease of deployment: they both use the DNS to distribute a single public key for each domain. Importantly, LES supports common uses of email that DKIM jeopardizes: mul-

Ronald L. Rivest

94

Digital Signature Management.  

ERIC Educational Resources Information Center

Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

Hassler, Vesna; Biely, Helmut

1999-01-01

95

Controlling radar signature  

SciTech Connect

Low observable technologies for military and tactical aircraft are reviewed including signature-reduction techniques and signal detection/jamming. Among the applications considered are low-signature sensors and the reduction of radar cross section in conjunction with radar-absorbing structures and materials. Technologies for reducing radar cross section are shown to present significant technological challenges, although they afford enhanced aircraft survivability.

Foulke, K.W. (U.S. Navy, Naval Air Warfare Center, China Lake, CA (United States))

1992-08-01

96

Controlling radar signature  

Microsoft Academic Search

Low observable technologies for military and tactical aircraft are reviewed including signature-reduction techniques and signal detection\\/jamming. Among the applications considered are low-signature sensors and the reduction of radar cross section in conjunction with radar-absorbing structures and materials. Technologies for reducing radar cross section are shown to present significant technological challenges, although they afford enhanced aircraft survivability.

Foulke

1992-01-01

97

Linux Driver Verification (Position Paper)  

E-print Network

Linux Driver Verification (Position Paper) Dirk Beyer1 and Alexander K. Petrenko2 1 University of Passau, Germany 2 ISPRAS, Moscow, Russia Abstract. Linux driver verification is a large application area for software verification methods, in particular, for functional, safety, and se- curity verification. Linux

Beyer, Dirk

98

Verification validation: model verification and validation  

Microsoft Academic Search

In this paper we outline practical techniques and guidelines for verifying and validating simulation models. The goal of verification and validation is a model that is accurate when used to predict the performance of the real-world system that it represents, or to predict the difference in performance between two scenarios or two model configurations. The process of verifying and validating

John S. Carson II

2002-01-01

99

Digital Imaging Techniques for Radiotherapy Treatment Verification  

NASA Astrophysics Data System (ADS)

The curative effect of ionizing radiation depends strongly upon the precision with which dose is delivered to the prescribed target volume. The requirement for high geometric accuracy in patient positioning is even more stringent where complex treatment techniques are used, such as conformal, dynamic arc or truly 3-D (non-coplanar) beams. It is expected that digital on-line portal imaging devices will play a key role in the monitoring of radiation therapy treatments. Different approaches to on-line portal image acquisition have been compared, and the basic imaging properties of a video portal imager have been evaluated and discussed in this thesis. Analysis of the system performance indicates the most efficient ways to effect improvements in spatial resolution and signal-to-noise ratio. Digital image processing techniques for noise suppression and contrast enhancement have been developed and implemented in order to facilitate visual analysis of on-line portal images. Results obtained with phantom and clinical images indicate that improvement in image quality can be achieved using adaptive filtering and local histogram modification. A novel study of observer performance with on-line portal images showed that enhancement of contrast by selective local histogram modification significantly improves perceptibility of anatomical landmarks and assures higher accuracy in quantitative computer-assisted treatment verification. Fully automated treatment verification is the ultimate goal of on-line digital portal imaging. It should include analysis of size and shape of the radiation field as well as evaluation of placement of the field with respect to the internal anatomy of the patient. A computerized technique, has been developed, for extraction of the treatment field edges and for parametrization of the field, and examples of its application to automated analysis of size and shape of the radiation field are presented.

Leszczynski, Konrad Wojciech

100

HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO).  

E-print Network

HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO). want to view your statement online. statements online at At Your Service Online (AYSO). EMPLOYEE SIGNATURE DATE Davis, CA 95616 Option may take up to two pay periods before in effect. Physical location

Leistikow, Bruce N.

101

A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State  

NASA Astrophysics Data System (ADS)

In this paper a very efficient and secure proxy signature scheme is proposed. It is based on controlled quantum teleportation. Genuine five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. Quantum key distribution and one-time pad are adopted in our scheme, which could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

Cao, Hai-Jing; Huang, Jun; Yu, Yao-Feng; Jiang, Xiu-Li

2014-09-01

102

Traceable Ring Signature  

NASA Astrophysics Data System (ADS)

The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No group manager, no special setup, and the dynamics of group choice. The ring signature is, however, vulnerable to malicious or irresponsible signers in some applications, because of its anonymity. In this paper, we propose a traceable ring signature scheme. A traceable ring scheme is a ring signature except that it can restrict “excessive” anonymity. The traceable ring signature has a tag that consists of a list of ring members and an issue that refers to, for instance, a social affair or an election. A ring member can make any signed but anonymous opinion regarding the issue, but only once (per tag). If the member submits another signed opinion, possibly pretending to be another person who supports the first opinion, the identity of the member is immediately revealed. If the member submits the same opinion, for instance, voting “yes” regarding the same issue twice, everyone can see that these two are linked. The traceable ring signature can suit to many applications, such as an anonymous voting on a BBS. We formalize the security definitions for this primitive and show an efficient and simple construction in the random oracle model.

Fujisaki, Eiichiro; Suzuki, Koutarou

103

An archaeal genomic signature  

NASA Technical Reports Server (NTRS)

Comparisons of complete genome sequences allow the most objective and comprehensive descriptions possible of a lineage's evolution. This communication uses the completed genomes from four major euryarchaeal taxa to define a genomic signature for the Euryarchaeota and, by extension, the Archaea as a whole. The signature is defined in terms of the set of protein-encoding genes found in at least two diverse members of the euryarchaeal taxa that function uniquely within the Archaea; most signature proteins have no recognizable bacterial or eukaryal homologs. By this definition, 351 clusters of signature proteins have been identified. Functions of most proteins in this signature set are currently unknown. At least 70% of the clusters that contain proteins from all the euryarchaeal genomes also have crenarchaeal homologs. This conservative set, which appears refractory to horizontal gene transfer to the Bacteria or the Eukarya, would seem to reflect the significant innovations that were unique and fundamental to the archaeal "design fabric." Genomic protein signature analysis methods may be extended to characterize the evolution of any phylogenetically defined lineage. The complete set of protein clusters for the archaeal genomic signature is presented as supplementary material (see the PNAS web site, www.pnas.org).

Graham, D. E.; Overbeek, R.; Olsen, G. J.; Woese, C. R.

2000-01-01

104

Modular data structure verification  

E-print Network

This dissertation describes an approach for automatically verifying data structures, focusing on techniques for automatically proving formulas that arise in such verification. I have implemented this approach with my ...

Kuncak, Viktor (Viktor Jaroslav), 1977-

2007-01-01

105

Why do members contribute knowledge to online communities?  

Microsoft Academic Search

Purpose – This study aims to better understand individuals' motives for contributing knowledge in an online community. Design\\/methodology\\/approach – An integrated model is developed based on a motivational model and social cognitive theory. To validate the model two online communities: the Electronic Engineering Times in Taiwan and China were surveyed. Findings – It was found that both perceived identity verification

Shih-Wei Chou

2010-01-01

106

Spectroscopic signatures of isomnerization  

E-print Network

This thesis explores spectroscopic signatures of isomerization, especially new patterns that emerge and report on chemically relevant portions of the potential energy surface, such as the transition state. The most important ...

Baraban, Joshua Herschel Goldblum

2013-01-01

107

Lightweight Signatures for Email  

Microsoft Academic Search

We present the design and prototype implementation of a new public key infrastucture for email authentication. Our approach applies recent developments in identity-based cryptography and observations concerning the role of DNS and email servers in the current email architecture to produce end-to-end email signatures with no infrastructure change or new security assump- tion. Like current email signature proposals, this solution

Ronald L. Rivest

108

Meteor signature interpretation  

SciTech Connect

Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

Canavan, G.H.

1997-01-01

109

Signature classification development system  

SciTech Connect

Discontinuities of various types and sizes may be introduced into a material or component during the manufacturing process or during the service life. During a nondestructive evaluation (NDE), the inspector must accept or reject the material/component based on the interpretation of signatures recorded by the inspection equipment. In certain cases, the NDE signature has nuances that cannot be recognized by a trained inspector, thus the ability to accurately determine the presence of a discontinuity or undesirable property in the material is diminished. Advanced advisor systems are desired to assist the inspector in determining the acceptability of a part during inspection. In order to meet this need, the US Army Material Technology Laboratory funded the Applied Physics Laboratory of the Johns Hopkins University and the Carderock Division of the Naval Surface Warfare Center to jointly develop a prototype Signature Classification Development System (SCDS). The objective of the SCDS is to provide computer analysis tools to classify signatures from generic inspection systems. The SCDS organizes the sensor data, performs digital signal processing and generates user defined feature parameters for input to classification algorithms. Features are calculated from the time-domain and the power spectrum of the signature. By applying artificial neural network algorithms, the SCDs will classify the recorded signature. Future enhancements include the addition of classical statistic techniques for feature selection and generation of run-time classifiers for field inspections.

Brown, L.M. [Naval Surface Warfare Center, Annapolis, MD (United States). Carderock Div.; Lin, J.S.; Newman, R.W. [Johns Hopkins Univ., Laurel, MD (United States). Applied Physics Lab.

1993-12-31

110

Lessons Online  

NSDL National Science Digital Library

The instructors of an Earth science course used WebCT, a multipurpose software package, to create an online supplement to their course. It included class e-mail, science hyperlinks, an online calendar, an online discussion board, and online handouts. The

Krockover, Gerald H.; Ridgway, Kenneth D.; Witham, Shelly A.; Zinsmeister, William J.

2002-12-01

111

The Exact Security of Digital Signatures -- How to Sign with RSA and Rabin  

Microsoft Academic Search

We describe an RSA-based signing scheme called PSS which combines essentially optimal efficiency with attractive security properties. Signing takes one RSA decryption plus some hashing, verification takes one RSA encryption plus some hashing, and the size of the signature is the size of the modulus. Assuming the underlying hash functions are ideal, our schemes are not only provably secure, but

Mihir Bellare; Phillip Rogaway

1996-01-01

112

DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining  

E-print Network

.) The central problem in the context of se- crecy[7, 10] is allowing a client to efficiently query its own data which enables bandwidth- and computation-efficient integrity verification of query replies. However, signature aggregation mechanism ensures only correctness of query replies. In this paper, we extend the work

113

"Amortized-Signature" for Flexible MicroPayments Charanjit S. Jutla  

E-print Network

a signature value over many cryptographic values derived by more efficient cryptographic one-way (hash and verification among numerous micropayments in the model where payments are made from a payer to a set guarantees as P (re- lated model of trust and entity relationships, with some crucial changes based on multi

114

Verification and validation: verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2003-01-01

115

Techniques in Hydrologic Forecast Verification  

NSDL National Science Digital Library

This module demonstrates techniques for developing a hydrologic forecast verification effort. Although it can be taken as stand-alone training, the module on Introduction to Verification of Hydrologic Forecasts is intended a useful prerequisite. Through the use of rich illustrations, case study examples, and review questions, this module provides an example of developing a verification effort using NWS verification tools. Two case studies will be highlighted that both look at the primary question of whether QPF input to hydrologic models improves the hydrologic forecasts. Related questions of QPF's impact on hydrologic forecasts are explored that include considerations of basin characteristics, forecast lead time, and event magnitude. One case will look at verification of deterministic stage height forecasts using the Interactive Verification Program (IVP) at the Ohio River Forecast Center (OHRFC). The other case will look at the verification of ensemble flow forecasts using the Ensemble Verification System (EVS) at the Middle Atlantic River Forecast Center (MARFC).

Comet

2010-12-14

116

Quantum Money with Classical Verification  

E-print Network

We construct a quantum money scheme that allows verification through classical communication with bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification.

Gavinsky, Dmitry

2011-01-01

117

Explaining Verification Conditions  

NASA Technical Reports Server (NTRS)

The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs themselves. We describe a systematic extension of the Hoare rules by labels so that the calculus itself can be used to build up explanations of the VCs. The labels are maintained through the different processing steps and rendered as natural language explanations. The explanations can easily be customized and can capture different aspects of the VCs; here, we focus on their structure and purpose. The approach is fully declarative and the generated explanations are based only on an analysis of the labels rather than directly on the logical meaning of the underlying VCs or their proofs. Keywords: program verification, Hoare calculus, traceability.

Deney, Ewen; Fischer, Bernd

2006-01-01

118

Nuclear disarmament verification  

SciTech Connect

Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

DeVolpi, A.

1993-12-31

119

Simulation model verification and validation  

Microsoft Academic Search

Verification and validation of simulation models are discussed. The different approaches to deciding model validity are described; how model verification and validation relate to the model development process is specified; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; ways to document results are given; and a recommended validation procedure is presented

Robert G. Sargent

1991-01-01

120

Simulation model verification and validation  

Microsoft Academic Search

This paper discusses verification and validation of simulation models. The different approaches to deciding model validity are described; how model verification and validation relate to the model development process is specified; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; ways to document results are given; and a recommended validation procedure is

Robert G. Sargent

1991-01-01

121

General Environmental Verification Specification  

NASA Technical Reports Server (NTRS)

The NASA Goddard Space Flight Center s General Environmental Verification Specification (GEVS) for STS and ELV Payloads, Subsystems, and Components is currently being revised based on lessons learned from GSFC engineering and flight assurance. The GEVS has been used by Goddard flight projects for the past 17 years as a baseline from which to tailor their environmental test programs. A summary of the requirements and updates are presented along with the rationale behind the changes. The major test areas covered by the GEVS include mechanical, thermal, and EMC, as well as more general requirements for planning, tracking of the verification programs.

Milne, J. Scott, Jr.; Kaufman, Daniel S.

2003-01-01

122

Manhattan Project Signature Facilities  

NSDL National Science Digital Library

This collection is a list of the Department of Energy's Manhattan Project "Signature Facilities" approved by the Departmental Corporate Board on Historic Preservation in December 1999. Taken together, the eight Signature Facilities provide the core for DOE's ability to successfully interpret, whether in situ or through museum or other interpretive setting, the Manhattan Project mission of developing atomic bombs during World War II. This list does not preclude protection and preservation of other historic facilities in the nuclear-weapons complex. Just as these facilities constitute the core for DOE-wide preservation, access, and interpretation, sites may have site-specific signature facilities that best interpret that site's Manhattan Project mission from a local, state, regional, national or international perspective.

Griffith, Christopher

123

ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

This presentation will be given at the EPA Science Forum 2005 in Washington, DC. The Environmental Technology Verification Program (ETV) was initiated in 1995 to speed implementation of new and innovative commercial-ready environemntal technologies by providing objective, 3rd pa...

124

Automated instrumentation system verification  

Microsoft Academic Search

This report describes the efforts and results of automating systems verification for the instrumentation equipment used in high explosives testing. A complete checkout of instrumentation channels from sensor connection to, and including, data reduction is achieved by measuring linearity, frequency response, and dynamic range simultaneously of as large a group of channels as is practical at one time. Inputs are

J. F. Schneider

1983-01-01

125

Computer Graphics Verification  

NASA Technical Reports Server (NTRS)

Video processing creates technical animation sequences using studio quality equipment to realistically represent fluid flow over space shuttle surfaces, helicopter rotors, and turbine blades.Computer systems Co-op, Tim Weatherford, performing computer graphics verification. Part of Co-op brochure.

1992-01-01

126

Exomars Mission Verification Approach  

NASA Astrophysics Data System (ADS)

According to the long-term cooperation plan established by ESA and NASA in June 2009, the ExoMars project now consists of two missions: A first mission will be launched in 2016 under ESA lead, with the objectives to demonstrate the European capability to safely land a surface package on Mars, to perform Mars Atmosphere investigation, and to provide communi-cation capability for present and future ESA/NASA missions. For this mission ESA provides a spacecraft-composite, made up of an "Entry Descent & Landing Demonstrator Module (EDM)" and a Mars Orbiter Module (OM), NASA provides the Launch Vehicle and the scientific in-struments located on the Orbiter for Mars atmosphere characterisation. A second mission with it launch foreseen in 2018 is lead by NASA, who provides spacecraft and launcher, the EDL system, and a rover. ESA contributes the ExoMars Rover Module (RM) to provide surface mobility. It includes a drill system allowing drilling down to 2 meter, collecting samples and to investigate them for signs of past and present life with exobiological experiments, and to investigate the Mars water/geochemical environment, In this scenario Thales Alenia Space Italia as ESA Prime industrial contractor is in charge of the design, manufacturing, integration and verification of the ESA ExoMars modules, i.e.: the Spacecraft Composite (OM + EDM) for the 2016 mission, the RM for the 2018 mission and the Rover Operations Control Centre, which will be located at Altec-Turin (Italy). The verification process of the above products is quite complex and will include some pecu-liarities with limited or no heritage in Europe. Furthermore the verification approach has to be optimised to allow full verification despite significant schedule and budget constraints. The paper presents the verification philosophy tailored for the ExoMars mission in line with the above considerations, starting from the model philosophy, showing the verification activities flow and the sharing of tests between the different levels (system, modules, subsystems, etc) and giving an overview of the main test defined at Spacecraft level. The paper is mainly focused on the verification aspects of the EDL Demonstrator Module and the Rover Module, for which an intense testing activity without previous heritage in Europe is foreseen. In particular the Descent Module has to survive to the Mars atmospheric entry and landing, its surface platform has to stay operational for 8 sols on Martian surface, transmitting scientific data to the Orbiter. The Rover Module has to perform 180 sols mission in Mars surface environment. These operative conditions cannot be verified only by analysis; consequently a test campaign is defined including mechanical tests to simulate the entry loads, thermal test in Mars environment and the simulation of Rover operations on a 'Mars like' terrain. Finally, the paper present an overview of the documentation flow defined to ensure the correct translation of the mission requirements in verification activities (test, analysis, review of design) until the final verification close-out of the above requirements with the final verification reports.

Cassi, Carlo; Gilardi, Franco; Bethge, Boris

127

QPF Verification: Challenges and Tools  

NSDL National Science Digital Library

This module looks at the common challenges and tools with respect to verification of quantitative precipitation forecasts (QPF). Through the use of rich illustrations, animations, and interactions, this module provides an introduction to a variety of methods and approaches for assessing the quality of QPFs. The module examines the need for, and the challenges of verifying precipitation forecasts. An overview is then presented of three verification programs available to most NWS forecast offices: the Hydrometeorological Prediction Center (HPC) verification, the National Precipitation Verification Unit (NPVU), and the Boise Verify Program (BOI Verify). For each of these programs, an introduction is provided covering the strengths and weaknesses as well as specific products available. Case examples are provided where appropriate to illustrate the application of the products in the field. Additional NWS verification tools under development are introduced: the Interactive Verification Program (IVP) and the Ensemble Verification System (EVS).

Comet

2010-05-25

128

Multibody modeling and verification  

NASA Technical Reports Server (NTRS)

A summary of a ten week project on flexible multibody modeling, verification and control is presented. Emphasis was on the need for experimental verification. A literature survey was conducted for gathering information on the existence of experimental work related to flexible multibody systems. The first portion of the assigned task encompassed the modeling aspects of flexible multibodies that can undergo large angular displacements. Research in the area of modeling aspects were also surveyed, with special attention given to the component mode approach. Resulting from this is a research plan on various modeling aspects to be investigated over the next year. The relationship between the large angular displacements, boundary conditions, mode selection, and system modes is of particular interest. The other portion of the assigned task was the generation of a test plan for experimental verification of analytical and/or computer analysis techniques used for flexible multibody systems. Based on current and expected frequency ranges of flexible multibody systems to be used in space applications, an initial test article was selected and designed. A preliminary TREETOPS computer analysis was run to ensure frequency content in the low frequency range, 0.1 to 50 Hz. The initial specifications of experimental measurement and instrumentation components were also generated. Resulting from this effort is the initial multi-phase plan for a Ground Test Facility of Flexible Multibody Systems for Modeling Verification and Control. The plan focusses on the Multibody Modeling and Verification (MMV) Laboratory. General requirements of the Unobtrusive Sensor and Effector (USE) and the Robot Enhancement (RE) laboratories were considered during the laboratory development.

Wiens, Gloria J.

1989-01-01

129

Signature Student ID# Classification  

E-print Network

that the above________ (#) listed student-athletes are currently enrolled for the above stated credit hoursSignature Student ID# UG/GR Classification Current credits/units (Fall 11) Last First 1 UG/GR 2 UG and have paid the appropriate student fees. (Note: College/University seal of certification must be placed

130

Field Instructors and Online Training: An Exploratory Survey  

ERIC Educational Resources Information Center

Despite field placement being the signature pedagogy of the social work profession, little research exists regarding methods for training field instructors. This study captures their perceptions regarding the use of online training. An online survey of 642 field instructors from 4 universities produced 208 responses. Less than 4% rejected the idea…

Dedman, Denise E.; Palmer, Louann Bierlein

2011-01-01

131

Online Games  

NSDL National Science Digital Library

This is the home of resource collections that support the use of online games and environments for teaching geoscience. There is now a collection of relevant references, examples of online games, and ideas for teaching with online games suggested by participants in the Spring 2008 workshop.

132

Identification of host response signatures of infection.  

SciTech Connect

Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for large-scale, highly-efficient efforts to identify and verify infection-specific host NA signatures in human populations.

Branda, Steven S.; Sinha, Anupama; Bent, Zachary

2013-02-01

133

Stereo signature molecular descriptor.  

PubMed

We present an algorithm to compute molecular graph descriptors considering the stereochemistry of the molecular structure based on our previously introduced signature molecular descriptor. The algorithm can generate two types of descriptors, one which is compliant with the Cahn-Ingold-Prelog priority rules, including complex stereochemistry structures such as fullerenes, and a computationally efficient one based on our previous definition of a directed acyclic graph that is augmented to a chiral molecular graph. The performance of the algorithm in terms of speed as a canonicalizer as well as in modeling and predicting bioactivity is evaluated, showing an overall better performance than other molecular descriptors, which is particularly relevant in modeling stereoselective biochemical reactions. The complete source code of the stereo signature molecular descriptor is available for download under an open-source license at http://molsig.sourceforge.net. PMID:23527586

Carbonell, Pablo; Carlsson, Lars; Faulon, Jean-Loup

2013-04-22

134

On Distributed Verification  

Microsoft Academic Search

This paper describes the invited talk given at the 8th International Conference on Distributed Computing and Networking (ICDCN\\u000a 2006), at the Indian Institute of Technology Guwahati, India. This talk was intended to give a partial survey and to motivate\\u000a further studies of distributed verification. To serve the purpose of motivating, we allow ourselves to speculate freely on\\u000a the potential impact

Amos Korman; Shay Kutten

2006-01-01

135

Writer Identification and Verification  

Microsoft Academic Search

The behavioral biometrics methods of writer identification and verification are currently enjoying renewed interest, with\\u000a very promising results. This chapter presents a general background and basis for handwriting biometrics. A range of current\\u000a methods and applications is given, also addressing the issue of performance evaluation. Results on a number of methods are\\u000a summarized and a more in-depth example of two

Lambert Schomaker

136

Efficient Distributed Signature Analysis  

Microsoft Academic Search

\\u000a Intrusion Detection Systems (IDS) have proven as valuable measure to cope reactively with attacks in the Internet. The growing\\u000a complexity of IT-systems, however, increases rapidly the audit data volumes and the size of the signature bases. This forces\\u000a IDS to drop audit data in high load situations thus offering attackers chances to act undetected. To tackle this issue we\\u000a propose

Michael Vogel; Sebastian Schmerl; Hartmut König

137

TFE Verification Program  

SciTech Connect

The objective of the semiannual progress report is to summarize the technical results obtained during the latest reporting period. The information presented herein will include evaluated test data, design evaluations, the results of analyses and the significance of results. The program objective is to demonstrate the technology readiness of a TFE suitable for use as the basic element in a thermionic reactor with electric power output in the 0.5 to 5.0 MW(e) range, and a full-power life of 7 years. The TF Verification Program builds directly on the technology and data base developed in the 1960s and 1970s in an AEC/NASA program, and in the SP-100 program conducted in 1983, 1984 and 1985. In the SP-100 program, the attractive but concern was expressed over the lack of fast reactor irradiation data. The TFE Verification Program addresses this concern. The general logic and strategy of the program to achieve its objectives is shown on Fig. 1-1. Five prior programs form the basis for the TFE Verification Program: (1) AEC/NASA program of the 1960s and early 1970; (2) SP-100 concept development program;(3) SP-100 thermionic technology program; (4) Thermionic irradiations program in TRIGA in FY-86; (5) and Thermionic Technology Program in 1986 and 1987. 18 refs., 64 figs., 43 tabs.

Not Available

1990-03-01

138

FINANCIAL SUPPORT VERIFICATION Dependent student  

E-print Network

signature(s) in blue or black ink. SECTION A. Student information DIRECTIONS Additional information about annual cost Child or elder care Clothing Entertainment Food Insurance (medical, life, property, auto

Amin, S. Massoud

139

Quantum Money with Classical Verification  

E-print Network

We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

Dmitry Gavinsky

2011-09-02

140

EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________  

E-print Network

Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department__________________________________________________ Employment Position

Bolding, M. Chad

141

SDS/forms/medical verification form Medical Disability Verification Form  

E-print Network

SDS/forms/medical verification form Medical Disability Verification Form Student Disability, for qualified disabled students as covered under Section 504 of the Rehabilitation Act of 1973 and Title II, a student does not qualify for services until they have registered with the disability office and have been

Massachusetts at Lowell, University of

142

Optical Flow for Verification CAREN MARZBAN  

E-print Network

Optical Flow for Verification CAREN MARZBAN Applied Physics Laboratory and Department of Statistics, for nowcasting, verification, waf2222351 Corresponding author address: Caren Marzban, Dept. of Statis- tics

Marzban, Caren

143

VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY  

E-print Network

VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY D. E. STEVENSON Abstract. The National Science Digital Library is the Nation's online library for education and re- search Science Digital Library in a Nutshell "The National Science Foundation's (NSF) National Science

Stevenson, D. E. "Steve"

144

Online Investing  

NSDL National Science Digital Library

Sponsored by the Wall Street Journal, this site provides a collection of articles offering information and advice on several aspects of online investing. Stemming from a newly published book, Online Investing, by the editors and reporters of the online version of the Wall Street Journal, the site is divided into five "chapters" covering types of online investing, including stocks, bonds, mutual funds, futures and options, and tools of the trade. The articles are well written and offer very basic information for novices looking for sound information and advice on this kind of investing.

145

Signature CERN-URSS  

ScienceCinema

Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

None

2011-04-25

146

Verification of LHS distributions.  

SciTech Connect

This document provides verification test results for normal, lognormal, and uniform distributions that are used in Sandia's Latin Hypercube Sampling (LHS) software. The purpose of this testing is to verify that the sample values being generated in LHS are distributed according to the desired distribution types. The testing of distribution correctness is done by examining summary statistics, graphical comparisons using quantile-quantile plots, and format statistical tests such as the Chisquare test, the Kolmogorov-Smirnov test, and the Anderson-Darling test. The overall results from the testing indicate that the generation of normal, lognormal, and uniform distributions in LHS is acceptable.

Swiler, Laura Painton

2006-04-01

147

Software Testing and Verification  

NSDL National Science Digital Library

The current issue of the IBM Systems Journal examines many aspects of software testing and verification. This new material contains ten articles written by workers in the IBM Research Division. Some of the papers, such as Testing z/OS, might be specific to IBM operations; however, most can be useful to individuals or companies implementing similar testing strategies. One article in particular discusses three case studies of Orthogonal Defect Classification and how it can be used "to improve software testing." Although the issue cannot be downloaded as a whole, individual papers can be viewed or downloaded in various formats.

2002-01-01

148

Security and Verification Provable cryptography  

E-print Network

Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

149

Formal verification of PLC programs  

Microsoft Academic Search

This paper presents an approach to the verification of programs for programmable logic controllers (PLCs) using SMV, a software package for formal verification of state transition systems. Binary PLC programs are converted directly into SMV modules that retain the variable names and execution sequences of the original programs. The system being controlled is modeled by a C\\/E system block diagram

M. Rausch; B. H. Krogh

1998-01-01

150

Temporal Logic Verification Using Simulation  

Microsoft Academic Search

In this paper, we consider a novel approach to the temporal logic verification problem of continuous dynamical systems. Our method- ology has the distinctive feature that enables the verification of the tem- poral properties of a continuous system by verifying only a finite number of its (simulated) trajectories. The proposed framework comprises two main ideas. First, we take advantage of

Georgios E. Fainekos; Antoine Girard; George J. Pappas

2006-01-01

151

HDL to verification logic translator  

NASA Technical Reports Server (NTRS)

The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

Gambles, J. W.; Windley, P. J.

1992-01-01

152

Software Verification and Validation Procedure  

SciTech Connect

This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

Olund, Thomas S.

2008-09-15

153

Multimodal signature modeling of humans  

NASA Astrophysics Data System (ADS)

Georgia Tech been investigating method for the detection of covert personnel in traditionally difficult environments (e.g., urban, caves). This program focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification and characterization of potential observables. Both aspects are needed to support the development of personnel detection and tracking algorithms. The difficult nature of these personnel-related problems dictates a multimodal sensing approach. Human signature data of sufficient and accurate quality and quantity do not exist, thus the development of an accurate signature model for a human is needed. This model should also simulate various human activities to allow motion-based observables to be exploited. This paper will describe a multimodal signature modeling approach that incorporates human physiological aspects, thermoregulation, and dynamics into the signature calculation. This approach permits both passive and active signatures to be modeled. The focus of the current effort involved the computation of signatures in urban environments. This paper will discuss the development of a human motion model for use in simulating both electro-optical signatures and radar-based signatures. Video sequences of humans in a simulated urban environment will also be presented; results using these sequences for personnel tracking will be presented.

Cathcart, J. Michael; Kocher, Brian; Prussing, Keith; Lane, Sarah; Thomas, Alan

2010-04-01

154

LOOK FOR THE SIGNATURE 1 Look for the Signature: How the Infusion of Personal Signatures Affects Product Evaluations and  

E-print Network

Product Evaluations and Purchase Behavior Abstract Brand managers often infuse personal signatures posit that personal signatures are multidimensional extrinsic cues that, like brands, are imbuedLOOK FOR THE SIGNATURE 1 Look for the Signature: How the Infusion of Personal Signatures Affects

Shyu, Mei-Ling

155

Empathy online  

Microsoft Academic Search

Members of online support communities help each other by empathising about common problems and exchanging information about symptoms and treatments. Results from two studies indicate that: empathy occurs in most online textual communities; empathetic communication is influenced by the topic being discussed; the presence of women tends to encourage empathy; and the presence of moderators not only reduces hostility but

J. Preece

1999-01-01

156

Online Learning  

ERIC Educational Resources Information Center

Distance education, which began as correspondence courses in the nineteenth century and grew into educational television during the twentieth century, evolved into learning on the Web by the mid-1990s. Accompanying the rise in online learning has been a similar rise in organizations and publications dedicated to serving the needs of online

Perry, Edward H.; Pilati, Michelle L.

2011-01-01

157

Lightweight Email Signatures (Extended Abstract)  

Microsoft Academic Search

We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF eort to standardize domain-based email signatures. LES shares DKIM's ease of deployment: they both use the DNS to distribute a single public key for each domain. Importantly, LES supports common uses of email that DKIM jeopardizes: multiple email

Ben Adida; David Chau; Susan Hohenberger; Ronald L. Rivest

2006-01-01

158

CD volume design and verification  

NASA Technical Reports Server (NTRS)

In this paper, we describe a prototype for CD-ROM volume design and verification. This prototype allows users to create their own model of CD volumes by modifying a prototypical model. Rule-based verification of the test volumes can then be performed later on against the volume definition. This working prototype has proven the concept of model-driven rule-based design and verification for large quantity of data. The model defined for the CD-ROM volumes becomes a data model as well as an executable specification.

Li, Y. P.; Hughes, J. S.

1993-01-01

159

Overview of Code Verification  

NASA Technical Reports Server (NTRS)

The verified code for the SIFT Executive is not the code that executes on the SIFT system as delivered. The running versions of the SIFT Executive contain optimizations and special code relating to the messy interface to the hardware broadcast interface and to packing of data to conserve space in the store of the BDX930 processors. The running code was in fact developed prior to and without consideration of any mechanical verification. This was regarded as necessary experimentation with the SIFT hardware and special purpose Pascal compiler. The Pascal code sections cover: the selection of a schedule from the global executive broadcast, scheduling, dispatching, three way voting, and error reporting actions of the SIFT Executive. Not included in these sections of Pascal code are: the global executive, five way voting, clock synchronization, interactive consistency, low level broadcasting, and program loading, initialization, and schedule construction.

1983-01-01

160

Site Specific Verification Guidelines.  

SciTech Connect

The Bonneville Power Administration (BPA) and the Northwest region have moved from energy surplus to a time when demand for energy is likely to exceed available supplies. The Northwest Power Planning Council is calling for a major push to acquire new resources.'' To meet anticipated loads in the next decade, BPA and the region must more than double that rate at which we acquire conservation resources. BPA hopes to achieve some of this doubling by programs independently designed and implemented by utilities and other parties without intensive BPA involvement. BPA will accept proposals for programs using performance-based payments, in which BPA bases its reimbursement to the sponsor on measured energy savings rather than program costs. To receive payment for conservation projects developed under performance-based programs, utilities and other project developers must propose verification plans to measure the amount of energy savings. BPA has traditionally used analysis of billing histories, before and after measure installation, adjusted by a comparison group on non-participating customers to measure conservation savings. This approach does not work well for all conversation projects. For large or unusual facilities the comparison group approach is not reliable due to the absence of enough comparable non-participants to allow appropriate statistical analysis. For these facilities, which include large commercial and institutional buildings, industrial projects, and complex combinations of building types served by a single utility meter, savings must be verified on a site-specific basis. These guidelines were written to help proposers understand what Bonneville considers the important issues in site specific verification of conservation performance. It also provides a toolbox of methods with guidance on their application and use. 15 refs.

Harding, Steve; Gordon, Frederick M.; Kennedy, Mike

1992-05-01

161

Short Signatures from the Weil Pairing  

Microsoft Academic Search

We introduce a short signature scheme based on the Compu- tational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size of a DSA signature for a similar level of security. Our short signature scheme is designed for sys- tems where signatures are typed in by a human or signatures are sent over a low-bandwidth

Dan Boneh; Ben Lynn; Hovav Shacham

2001-01-01

162

33 CFR 385.20 - Restoration Coordination and Verification (RECOVER).  

...2014-07-01 false Restoration Coordination and Verification (RECOVER...Processes § 385.20 Restoration Coordination and Verification (RECOVER). (a) RECOVER (Restoration Coordination and Verification) is...

2014-07-01

163

Histology Online  

NSDL National Science Digital Library

Histology-online is a web-based, interactive histology textbook and atlas. It includes a computerized microscope to examine tissues and organs and provides a new way to teach histology that is preferred by students.

2011-08-01

164

Syllabus (ONLINE)  

E-print Network

Schedule and other documents that pertain specifically to the online section ... Students should schedule time to work on this course just as they would a traditional .... Your feedback is vital to improving education at Purdue University and you ...

Devlin, Patrick M

2014-08-22

165

Learning Online  

NSDL National Science Digital Library

To improve large lecture courses, the authors designed a hybrid instructional format that couples online homework with in-class, active learning exercises. They assessed student perceptions of a pilot version this hybrid class, and most students felt that

Sibley, Duncan H.; Riffell, Samuel K.

2003-03-01

166

Protocol Online  

NSDL National Science Digital Library

Protocol Online is a database of research protocols in a variety of life science fields. It contains protocols contributed by worldwide researchers as well as links to web protocols hosted by worldwide research labs, biotech companies, personal web sites. The data is stored in a MySql relational database. Protocol Online also hosts discipline specific discussion forums (BioForum), and provides a free PubMed search and alerting service (PubAlert).

Long-Cheng Li (Protocol Online)

2012-01-06

167

Photosynthesis online.  

PubMed

Online access to the Internet and the World Wide Web have become important for public awareness and for educating the world's population, including its political leaders, students, researchers, teachers, and ordinary citizens seeking information. Relevant information on photosynthesis-related Web sites and other online locations is grouped into several categories: (1) group sites, (2) sites by subject, (3) individual researcher's sites, (4) sites for educators and students, and (5) other useful sites. PMID:20577902

Orr, Larry; Govindjee

2010-08-01

168

Runtime verification for stochastic systems  

E-print Network

We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

Wilcox, Cristina M

2010-01-01

169

EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________  

E-print Network

Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: ________________________________________________________ (Family Name) (First) (Middle Initial) TO BE COMPLETED BY EMPLOYER OR HIRING DEPARTMENT: Employment Department_ Clemson University ________________________________ Employment Posn Title

Bolding, M. Chad

170

Generic interpreters and microprocessor verification  

NASA Technical Reports Server (NTRS)

The following topics are covered in viewgraph form: (1) generic interpreters; (2) Viper microprocessors; (3) microprocessor verification; (4) determining correctness; (5) hierarchical decomposition; (6) interpreter theory; (7) AVM-1; (8) phase-level specification; and future work.

Windley, Phillip J.

1990-01-01

171

High stakes in INF verification  

SciTech Connect

The stakes involved in negotiating INF verification arrangements are high. While these proposals deal only with intermediate-range ground-launched cruise and mobile missiles, if properly devised they could help pave the way for comprehensive limits on other cruise missiles and strategic mobile missiles. In contrast, poorly drafted monitoring provisions could compromise national industrial security and generate numerous compliance controversies. Any verification regime will require new openness on both sides, but that means significant risks as well as opportunities. US and Soviet negotiators could spend weeks, months, and even years working out in painstaking detail verification provisions for medium-range missiles. Alternatively, if the two sides wished to conclude an INF agreement quickly, they could defer most of the difficult verification issues to the strategic arms negotiations.

Krepon, M.

1987-06-01

172

ALMA array element astronomical verification  

NASA Astrophysics Data System (ADS)

The Atacama Large Millimeter/submillimeter Array (ALMA) will consist of at least 54 twelve-meter antennas and 12 seven-meter antennas operating as an aperture synthesis array in the (sub)millimeter wavelength range. The ALMA System Integration Science Team (SIST) is a group of scientists and data analysts whose primary task is to verify and characterize the astronomical performance of array elements as single dish and interferometric systems. The full set of tasks is required for the initial construction phase verification of every array element, and these can be divided roughly into fundamental antenna performance tests (verification of antenna surface accuracy, basic tracking, switching, and on-the-fly rastering) and astronomical radio verification tasks (radio pointing, focus, basic interferometry, and end-to-end spectroscopic verification). These activities occur both at the Operations Support Facility (just below 3000 m elevation) and at the Array Operations Site at 5000 m.

Asayama, S.; Knee, L. B. G.; Calisse, P. G.; Cortés, P. C.; Jager, R.; López, B.; López, C.; Nakos, T.; Phillips, N.; Radiszcz, M.; Simon, R.; Toledo, I.; Whyborn, N.; Yatagai, H.; McMullin, J. P.; Planesas, P.

2012-09-01

173

Continuous Verification Using Multimodal Biometrics  

E-print Network

- ratedintoordinarycomputerusagearepassive(thatis,theydo notrequiretheactivecooperationoftheuserandaretherefore not distracting) and they obviate the need to carry extra devices for authentication.1 In a sense, they are always on one's "person. However, a single biometric may be inadequate for passive verification eitherbecauseof noisein

Sim, Terence

174

Identifying, Visualizing, and Fusing Social Media Data to Support Nonproliferation and Arms Control Treaty Verification: Preliminary Results  

SciTech Connect

While international nonproliferation and arms control verification capabilities have their foundations in physical and chemical sensors, state declarations, and on-site inspections, verification experts are beginning to consider the importance of open source data to complement and support traditional means of verification. One of those new, and increasingly expanding, sources of open source information is social media, which can be ingested and understood through social media analytics (SMA). Pacific Northwest National Laboratory (PNNL) is conducting research to further our ability to identify, visualize, and fuse social media data to support nonproliferation and arms control treaty verification efforts. This paper will describe our preliminary research to examine social media signatures of nonproliferation or arms control proxy events. We will describe the development of our preliminary nonproliferation and arms control proxy events, outline our initial findings, and propose ideas for future work.

Gastelum, Zoe N.; Cramer, Nicholas O.; Benz, Jacob M.; Kreyling, Sean J.; Henry, Michael J.; Corley, Courtney D.; Whattam, Kevin M.

2013-07-11

175

On the signature of LINCOS  

NASA Astrophysics Data System (ADS)

Suppose the international SETI effort yields the discovery of some signal of evidently non-natural origin. Could it contain linguistic information formulated in some kind of Lingua Cosmica? One way to get insight into this matter is to consider what specific (bio) linguistic signature( s) could be attached to a cosmic language for interstellar communication—designed by humans or an alien society having reached a level of intelligence (and technology) comparable to or surpassing ours. For this purpose, we consider in the present paper the logico-linguistic system LINCOS for ( A)CETI, developed during a number of years by the author in several papers and a monograph [1]. The system has a two-fold signature, which distinguishes it significantly from natural languages. In fact abstract and concrete signatures can be distinguished. That an abstract kind occurs is due to the manner in which abstractions of reality are represented in LINCOS-texts. They can take compound forms because the system is multi-expressive—partly due to the availability of inductive (recursive) entities. On the other hand, the concrete signature of LINCOS is related to the distribution of delimiters and predefined tokens in texts. Assigning measures to concrete signatures will be discussed elsewhere. The present contribution concentrates on the abstract signature of the language. At the same time, it is realized that an alien Lingua Cosmica might, but not necessarily needs to have this kind of signatures.

Ollongren, Alexander

2010-12-01

176

Oxygen exchange with water alters the oxygen isotopic signature of nitrate in soil ecosystems  

E-print Network

Oxygen exchange with water alters the oxygen isotopic signature of nitrate in soil ecosystems November 2010 Accepted 8 February 2011 Available online 24 February 2011 Keywords: Oxygen exchange Nitrate) and nitrogen (N) stable isotope analyses are commonly used in the source determination of nitrate �NO� 3

van Kessel, Chris

177

Initial Semantics for Strengthened Signatures  

E-print Network

We give a new general definition of arity, yielding the companion notions of signature and associated syntax. This setting is modular in the sense requested by Ghani and Uustalu: merging two extensions of syntax corresponds to building an amalgamated sum. These signatures are too general in the sense that we are not able to prove the existence of an associated syntax in this general context. So we have to select arities and signatures for which there exists the desired initial monad. For this, we follow a track opened by Matthes and Uustalu: we introduce a notion of strengthened arity and prove that the corresponding signatures have initial semantics (i.e. associated syntax). Our strengthened arities admit colimits, which allows the treatment of the \\lambda-calculus with explicit substitution.

Hirschowitz, André; 10.4204/EPTCS.77.5

2012-01-01

178

Ballastic signature identification systems study  

NASA Technical Reports Server (NTRS)

The results are described of an attempt to establish a uniform procedure for documenting (recording) expended bullet signatures as effortlessly as possible and to build a comprehensive library of these signatures in a form that will permit the automated comparison of a new suspect bullet with the prestored library. The ultimate objective is to achieve a standardized format that will permit nationwide interaction between police departments, crime laboratories, and other interested law enforcement agencies.

Reich, A.; Hine, T. L.

1976-01-01

179

Automated instrumentation system verification  

NASA Astrophysics Data System (ADS)

This report describes the efforts and results of automating systems verification for the instrumentation equipment used in high explosives testing. A complete checkout of instrumentation channels from sensor connection to, and including, data reduction is achieved by measuring linearity, frequency response, and dynamic range simultaneously of as large a group of channels as is practical at one time. Inputs are a triangular wave signal and a noise signal. The checkout data are recorded in the same way as test data. A table that is ordered by recorder track and voltage controlled oscillator center frequencies is produced in the course of the computer program to contain percent linearity, 3 dB bandwidth, percent deviation from standard bandwidth, dynamic range in decibels, and noise floor in millivolts for every channel measured. Hardcopy plots of the nonlinearity deviations, the frequency response, and the noise floor spectrum can be produced during processing when requested. The computer program is friendly, the order of channel measurements can be completely arbitrary, repeated measurements replace the respective previous entries.

Schneider, J. F.

1983-04-01

180

The theory of signature testing for VLSI  

Microsoft Academic Search

Several methods for testing VLSI chips can be classified as signature methods. Both conventional and signature testing methods apply a number of test patterns to the inputs of the circuit. The difference is that a conventional method examines each output, while a signature method first accumulates the outputs in some data compression device, then examines the signature - the final

J. Lawrence Carter

1982-01-01

181

Hoover's Online  

NSDL National Science Digital Library

Hoover's Online features an accurate and comprehensive database of company information free on the Web. Called Hoover's MasterList Plus, the database of more than 8,500 of the largest public and private U.S. companies provides company name, key personnel, address, sales, number of employees, ticker symbol and other information for companies meeting the user's designated search criteria. Hoover's Online also includes the week's top business news stories, a directory of more than 1,000 corporate Web sites, a synopsis of the 25 top-selling business books and links to other business information resources on the Web, including stock quotes and SEC filings. The new List of Lists has dozens of rankings indicating which companies are the largest, which CEOs made the most money, which companies are the best employers, and more. Almost all of Hoover's Online is free, including the content mentioned here.

1998-01-01

182

Conservation Online  

NSDL National Science Digital Library

Started as a germ of an idea back in 1987 (on a real, live bulletin board, as opposed to an electronic one), Conservation Online (CoOL) has been providing online resources for conservation professionals since 1993. As its website announces, it is a "full text library of conservation information," covering a wide array of topics ranging from digital imaging to reprographics, and quite a bit of material in between. By clicking on any given topic, visitors will receive a brief overview of the subject, its terminology, and then a list of general online resources for consideration. Another nice feature of the site is the mailing list archive, which contain the archives of various queries submitted to different professional conservation groups, such as the Association of Moving Image Archivists, the Textiles Conservation Discussion List, and the Conservation Framer's Mailing List. The site is rounded out by a timeline that traces the CoOL's history from the summer of 1987 to July 2003.

183

SD Online  

NSDL National Science Digital Library

The European Foundation presents SD Online, a special feature of the Sustainable Development pages. SD Online is a full-text database of the Foundation's resources which "explore specific facets of the sustainability debate and take advantage of the Foundation's research in a variety of areas." Beginning in 1998, the databases have grown to include a Networks database, tools database, as well as databases on SME support initiatives and education and training. Each searchable and browseable database must be accessed separately using the sidebar menu on the right, and each offers a brief explanation of the information within the database, as well as fully cataloged records.

184

Preservation Online  

NSDL National Science Digital Library

The National Trust for Historic Preservation has received a number of awards for its magazine, Preservation, and their online version is well worth a look. The site is quite nice, and it contains brief profiles of current preservation stories written especially for this website. Recent stories have included profiles of neon signs in Los Angeles, brewery renovations in Milwaukee, and a list of the ten most endangered Civil War battlefields. The site is rounded out by an online archive which allows visitors to search back issues from 1992 to 2006.

185

Hard and Soft Safety Verifications  

NASA Technical Reports Server (NTRS)

The purpose of this paper is to examine the differences between and the effects of hard and soft safety verifications. Initially, the terminology should be defined and clarified. A hard safety verification is datum which demonstrates how a safety control is enacted. An example of this is relief valve testing. A soft safety verification is something which is usually described as nice to have but it is not necessary to prove safe operation. An example of a soft verification is the loss of the Solid Rocket Booster (SRB) casings from Shuttle flight, STS-4. When the main parachutes failed, the casings impacted the water and sank. In the nose cap of the SRBs, video cameras recorded the release of the parachutes to determine safe operation and to provide information for potential anomaly resolution. Generally, examination of the casings and nozzles contributed to understanding of the newly developed boosters and their operation. Safety verification of SRB operation was demonstrated by examination for erosion or wear of the casings and nozzle. Loss of the SRBs and associated data did not delay the launch of the next Shuttle flight.

Wetherholt, Jon; Anderson, Brenda

2012-01-01

186

Real-time online unsupervised detection and classification for remotely sensed imagery  

NASA Astrophysics Data System (ADS)

Realtime online processing is important to provide immediate data analysis for resolving critical situations in real applications of hyperspectral imaging. We have developed a Constrained Linear Discriminant Analysis (CLDA) algorithm, an excellent approach to hyperspectral image classification, and investigated its realtime online implementation. Because the required prior object spectral signatures may be unavailable in practice, we propose its unsupervised version in this paper. The new algorithm includes unsupervised signature estimation in realtime followed by realtime CLDA algorithm for classification. The unsupervised signature estimation is based on linear mixture model and least squares error criterion. The preliminary result using an HYDICE scene demonstrates its feasibility and effectiveness.

Du, Qian

2004-08-01

187

Monitoring Surface CO2 Leaks Using Hyperspectral Plant Signatures During the 2008 and 2009 ZERT Shallow Subsurface CO2 Release Experiment in Bozeman, MT  

Microsoft Academic Search

Hyperspectral plant signatures can be a powerful tool in the monitoring, verification, and accounting (MVA) of geologic carbon sequestration fields. They can be used to ensure safe and effective sequestration of carbon on short term, as well as on long term timescales. A compromised sequestration field could release CO2 to the surface, where it can negatively impact overlying vegetation. Plant

E. J. Male; W. Pickles; E. A. Silver; G. D. Hoffmann; J. L. Lewicki; M. E. Apple; K. S. Repasky; L. Dobeck; E. A. Burton

2009-01-01

188

Generation of RTL verification input stimulus  

E-print Network

This thesis presents an approach for generating input stimulus for verification of register-transfer level (RTL) design of VLSI circuits. RTL design is often subjected to a significant verification effort due to errors introduced during manual...

Selvarathinam, Anand Manivannan

2012-06-07

189

Structural verification for GAS experiments  

NASA Technical Reports Server (NTRS)

The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

Peden, Mark Daniel

1992-01-01

190

Measurement and verification in DSM  

SciTech Connect

The purpose of Measurement and Verification (M and V) in Demand-Side Management (DSM) is to determine the savings that have resulted from the implementation of Energy Conservation Measures (ECM) in a facility. This article evaluates the alternate methods of verifying savings that are available today. First the author discusses the principles of DSM. DSM verification protocols specify the types of measurement that are deemed satisfactory. These measurements are made using a variety of devices ranging from the very simple to quite complex, with corresponding costs. Each has benefits and may be applied with success. The paper describes portable data loggers, permanent microprocessor based universal data recorders, and building automation systems. Implementation of a measurement and verification plan is also discussed.

McGeown, D.I. [Measuring and Monitoring Services, Tinton Falls, NJ (United States)

1995-05-01

191

Formal Verification of PLC Programs  

E-print Network

This paper presents an approach to the verification of programs for programmable logic controllers (PLCs) using SMV, a software package for formal verification of state transition systems. Binary PLC programs are converted directly into SMV modules that retain the variable names and execution sequences of the original programs. The system being controlled is modeled by a C/E system block diagram which is also transformed into a set of SMV modules, retaining the structure of the block diagram model. SMV allows the engineer to verify the behavior of the control program over all possible operating conditions. Mechanisms are discussed for representing correctly the concurrent execution of the PLC programs and the plant model using SMV primitives. The SMV approach to PLC program verification is illustrated with an example. 1 Introduction The objective of the work reported in this paper is to create an interface between the programming and modeling tools typically used by control engineers...

M. Rausch; B.H. Krogh

1998-01-01

192

Renew Online  

NSDL National Science Digital Library

RENEW ON-LINE is an edited, text only, version of parts of the News sections of RENEW, the journal of NATTA, the independent national UK Network for Alternative Technology and Technology Assessment. The news sections provided are up to date and include issues from 2004 to 2006.

2007-04-13

193

Online branding  

Microsoft Academic Search

The role of brands and branding in the new economy that is characterised by digitisation and globalisation are attracting considerable attention. Taking the organisational perspective the challenges for branding in online environments relate to: the message capacity of Web pages, the need to integrate branding and marketing communications across different channels, the trend towards organisational value propositions, brands as search

Jennifer Rowley

2004-01-01

194

Anglicans Online!  

NSDL National Science Digital Library

Anglicans Online! has grown to be a comprehensive source of information for the world's Episcopal/Anglican church on the Internet. Topics offered are the Newsroom, Canada, USA, World, and Resources including reference links, biblical study. Ecumenical partners, and a listing of Discussion mailing lists and newsgroups are also provided.

195

EDGAR Online  

NSDL National Science Digital Library

IPO Express is a new database of over 2,500 initial public offer filings from EDGAR Online. Users can search by industry, company, underwriter, or geographic location and retrieve details on the offer, principle shareholders, and competitors in addition to other relevant company information.

196

Logic verification algorithms and their parallel implementation  

Microsoft Academic Search

LOVER incorporates a novel approach to combinational logic verification and obtains good results when compared to existing techniques. In this paper we describe a new verification algorithm, LOVER-PODEM, whose enumeration phase is based on PODEM. A variant of LOVER-PODEM, called PLOVER, is presented. We have developed, for the first time, parallel logic verification schemes. Issues in efficiently parallelizing both general

Hi-Keung Tony Ma; Srinivas Devadas; Alberto L. Sangiovanni-Vincentelli; R. Wei

1987-01-01

197

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described, a graphical paradigm that relates verification and validation to the model development process is presented, and various validation techniques are defined. Conceptual model validity, model verification, operational validity, and data validity are discussed and a way to document results is

Robert G. Sargent

2011-01-01

198

Verification, validation and accreditation of simulation models  

Microsoft Academic Search

The paper discusses verification, validation, and accreditation of simulation models. The different approaches to deciding model validity are presented; how model verification and validation relate to the model development process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways to document results are given; a recommended procedure is presented;

Robert G. Sargent

2000-01-01

199

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2010-01-01

200

Verification and Validation of Simulation Model  

E-print Network

Verification and Validation of Simulation Model 1 Verification and Validation 2 #12;Verification · Examples ­ simulation model: open networks with exponential interarrival time distribution and uniform is consistent with known analytic results 5 Validation · Model should be "good enough" (subjective) · Seek

Shihada, Basem

201

Validation and verification of simulation models  

Microsoft Academic Search

This paper discusses validation and verification of simulation models. The different approaches to deciding model validity are presented; how model validation and verification relate to the model development process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways to document results are given; and a recommended procedure is presented.

Robert G. Sargent

1999-01-01

202

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2005-01-01

203

Validation and Verification of Simulation Models  

Microsoft Academic Search

In this paper we discuss validation and verification of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate validation and verification to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2004-01-01

204

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of si- mulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are de- fined; conceptual model validity, model verification, op- erational validity, and data validity are discussed; a way to document results

Robert G. Sargent

1994-01-01

205

Verification and validation of simulation models  

Microsoft Academic Search

This paper discusses verification and validation of simulation models. The different approaches to deciding model validity are described; how model verification and validation relate to the model development process is specified; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; ways to document results are given; and a recommended procedure is presented.

Robert G. Sargent

1994-01-01

206

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2007-01-01

207

Verification and validation of simulation models  

Microsoft Academic Search

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are discussed; a way to document results is given; a

Robert G. Sargent

2003-01-01

208

Validation and verification of simulation models  

Microsoft Academic Search

This paper discusses validation and verification of simulation models. The different approaches to deciding model validity are presented; how model validation and verification relate to the model development process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways to document results are given; and a recommended procedure is presented

Robert G. Sargent

1999-01-01

209

Functional Verification of a USB Host Controller  

Microsoft Academic Search

With everyday growing demands, complexity of electronic devices has been constantly increasing. Functional verification has become one of the major bottlenecks in the design and verification flow. In order to respond to modern demands, new devices are made of standard pre-verified reusable IP blocks created by using abstract TLM. The paper proposes a three-step design and verification flow based on

Primoz Puhar; Andrej Zemva

2008-01-01

210

VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New Mexico for establishing residency for tuition  

E-print Network

VERIFICATION OF EMPLOYMENT According to the rules and regulations set forth by the State of New: Address: Date of Hire: Employment Status: Permanent Yes No Full-Time Yes No Temporary Yes No Part-Time Yes No Supervisor's Name Supervisor's Title Signature of Supervisor Phone Date NOTE: Employment will be verified

New Mexico, University of

211

Hybrid Enrichment Assay Methods for a UF6 Cylinder Verification Station: FY10 Progress Report  

SciTech Connect

Pacific Northwest National Laboratory (PNNL) is developing the concept of an automated UF6 cylinder verification station that would be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until the arrival of International Atomic Energy Agency (IAEA) inspectors. At the center of this unattended system is a hybrid enrichment assay technique that combines the traditional enrichment-meter method (based on the 186 keV peak from 235U) with non-traditional neutron-induced high-energy gamma-ray signatures (spawned primarily by 234U alpha emissions and 19F(alpha, neutron) reactions). Previous work by PNNL provided proof-of-principle for the non-traditional signatures to support accurate, full-volume interrogation of the cylinder enrichment, thereby reducing the systematic uncertainties in enrichment assay due to UF6 heterogeneity and providing greater sensitivity to material substitution scenarios. The work described here builds on that preliminary evaluation of the non-traditional signatures, but focuses on a prototype field system utilizing NaI(Tl) and LaBr3(Ce) spectrometers, and enrichment analysis algorithms that integrate the traditional and non-traditional signatures. Results for the assay of Type-30B cylinders ranging from 0.2 to 4.95 wt% 235U, at an AREVA fuel fabrication plant in Richland, WA, are described for the following enrichment analysis methods: 1) traditional enrichment meter signature (186 keV peak) as calculated using a square-wave convolute (SWC) algorithm; 2) non-traditional high-energy gamma-ray signature that provides neutron detection without neutron detectors and 3) hybrid algorithm that merges the traditional and non-traditional signatures. Uncertainties for each method, relative to the declared enrichment for each cylinder, are calculated and compared to the uncertainties from an attended HPGe verification station at AREVA, and the IAEA’s uncertainty target values for feed, tail and product cylinders. A summary of the major findings from the field measurements and subsequent analysis follows: • Traditional enrichment-meter assay using specially collimated NaI spectrometers and a Square-Wave-Convolute algorithm can achieve uncertainties comparable to HPGe and LaBr for product, natural and depleted cylinders. • Non-traditional signatures measured using NaI spectrometers enable interrogation of the entire cylinder volume and accurate measurement of absolute 235U mass in product, natural and depleted cylinders. • A hybrid enrichment assay method can achieve lower uncertainties than either the traditional or non-traditional methods acting independently because there is a low degree of correlation in the systematic errors of the two individual methods (wall thickness variation and 234U/235U variation, respectively). This work has indicated that the hybrid NDA method has the potential to serve as the foundation for an unattended cylinder verification station. When compared to today’s handheld cylinder-verification approach, such a station would have the following advantages: 1) improved enrichment assay accuracy for product, tail and feed cylinders; 2) full-volume assay of absolute 235U mass; 3) assay of minor isotopes (234U and 232U) important to verification of feedstock origin; single instrumentation design for both Type 30B and Type 48 cylinders; and 4) substantial reduction in the inspector manpower associated with cylinder verification.

Smith, Leon E.; Jordan, David V.; Orton, Christopher R.; Misner, Alex C.; Mace, Emily K.

2010-08-01

212

CHEMICAL INDUCTION MIXER VERIFICATION - ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM  

EPA Science Inventory

The Wet-Weather Flow Technologies Pilot of the Environmental Technology Verification (ETV) Program, which is supported by the U.S. Environmental Protection Agency and facilitated by NSF International, has recently evaluated the performance of chemical induction mixers used for di...

213

Online and offline interactions in online communities  

Microsoft Academic Search

Online communities, while primarily enacted through technology-mediated environments, can also include offline meetings between members, promoting interactivity and community building. This study explores the offline interactions of online community members and its subsequent impact on online participation. We argue that offline interactions have a counterintuitive impact on online participation. Although these offline interactions strengthen relationships, these relationships undermine the community's

Wyl McCully; Cliff Lampe; Chandan Sarkar; Alcides Velasquez; Akshaya Sreevinasan

2011-01-01

214

Signature Visualization of Software Binaries  

SciTech Connect

In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

Panas, T

2008-07-01

215

Materials with controllable signature properties  

NASA Astrophysics Data System (ADS)

We have in this report considered some types of material with potential for use in signature control of structures. The material types selected for inclusion in this study were electrically conductive polymers, fullerenes, nanostructured materials and Langmuir-Blodgett films. To control the signature of a structure in real time it must be possible to vary the material emissivity, structural transmission, and reflection or absorption of electromagnetic radiation in the relevant wavelength region. This may be achieved by changes in temperature, pressure, electrical or magnetic field or by the concentration of a chemical substance within the material. It is concluded that it is feasible to develop electrically conductive polymeric materials with controllable properties for practical signature control application within 5 to 10 years.

Dickman, O.; Holmberg, B.; Karlsson, T.; Savage, S.

1995-02-01

216

Ballistic Signature Identification System Study  

NASA Technical Reports Server (NTRS)

The first phase of a research project directed toward development of a high speed automatic process to be used to match gun barrel signatures imparted to fired bullets was documented. An optical projection technique has been devised to produce and photograph a planar image of the entire signature, and the phototransparency produced is subjected to analysis using digital Fourier transform techniques. The success of this approach appears to be limited primarily by the accuracy of the photographic step since no significant processing limitations have been encountered.

1976-01-01

217

Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting  

E-print Network

a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones], Bender et al. noted that the usual security setting with respect to anonymity and unforge- ability did unconditional anonymity. The definitions of Bender et al. can be easily translated to the unconditional setting

218

20122013 Verification Worksheet Dependent Student  

E-print Network

2012­2013 Verification Worksheet Dependent Student Your 2012­2013 Free Application for Federal school will compare your FAFSA with the information on this worksheet and with any other required parent must complete and sign this worksheet, attach any required documents, and submit the form

Suzuki, Masatsugu

219

Program Verification and System Dependability  

NASA Astrophysics Data System (ADS)

Formal verification of program correctness is a long-standing ambition, recently given added prominence by a “Grand Challenge” project. Major emphases have been on the improvement of languages for program specification and program development, and on the construction of verification tools. The emphasis on tools commands general assent, but while some researchers focus on narrow verification aimed only at program correctness, others want to pursue wide verification aimed at the larger goal of system dependability. This paper presents an approach to system dependability based on problem frames and suggests how this approach can be supported by formal software tools. Dependability is to be understood and evaluated in the physical and human problem world of a system. The complexity and non-formal nature of the problem world demand the development and evolution of normal designs and normal design practices for specialised classes of systems and subsystems. The problem frames discipline of systems analysis and development that can support normal design practices is explained and illustrated. The role of formal reasoning in achieving dependability is discussed and some conceptual, linguistic and software tools are suggested.

Jackson, Michael

220

SFT monitoring and design verification  

Microsoft Academic Search

The Submerged Floating Tunnel (SFT) is still a prototype structure. To change this, SFTs have to be built and we have to learn from this process. This involves comparing the structure’s real behaviour with its design and transferring this knowledge to the engineering community. Monitoring and design verification is a step in this direction. The paper discusses various aspects that

Ian Markey

2010-01-01

221

Democrats Online  

NSDL National Science Digital Library

Now that the political convention season is over, you may be looking for sites that offer a little more interactivity and are a little less concerned with the party line. Debuting this week is Democrats Online: A Community of American Voices. The emphasis on this site is user involvement; users are offered the opportunity to participate in real-time chat using Ewgie, a Java applet, and to post a personal web page indicating which accomplishments of the Clinton/Gore administration are most important to them. A highlight of the site is the Shockwave-driven "Help Dole Name his Cabinet," which allows users to spin the slot machine and imagine Dole's possible picks for Chief of Staff, Secretary of State, and Secretary of Defense. The results are discomforting or inspiring, depending on your perspective. A "question of the week" poll will come online on Labor Day.

222

Registration online.  

PubMed

The Nursing and Midwifery Council has launched a secure service that allows nurses to register and manage their registration online. Users can view their registration status, update contact details, view and print a statement of entry, submit notification of practice, pay the annual retention or renewal fees, set up a direct debit for annual fee payments, provide equality and diversity information, and give the geographical location of employment. Go to tinyurl.com/mj2ahxk to set up an account. PMID:25428323

2014-11-27

223

Writers Online  

NSDL National Science Digital Library

As part of the National Year of Reading effort in the UK (spearheaded by the National Literacy Trust to promote reading and literacy), Writers Online is aimed at piquing younger readers' interests. The site features interviews with popular children's writers as well as "writer-in-residence" workshops. Visitors to the site can try their hand at creative writing, learn tricks of the trade, and get personal feedback from their favorite authors.

1998-01-01

224

Outside Online  

NSDL National Science Digital Library

Outside Online is one of the premier outdoors oriented sites on the Web, covering fitness, biking, hiking, water sports, snow sports, travel, and mountaineering, among others. The site contains news and views, a travel section, reviews of outdoor products, coverage of outdoor activities such as the Tour DuPont, the World Cup Whitewater Slalom and skiing in South America, and selected full text, as well as special buyer's and family vacation guides from "Outside Magazine."

1996-01-01

225

Einstein Online  

NSDL National Science Digital Library

Einstein Online provides the user with a simple, but meticulous, approach to Einstein's Theory of Relativity. In the section 'Elementary Einstein', the theories of Special and General Relativity are explained in detail, going through concepts like Relativity, Spacetime and Space Geometry. The following section, 'Spotlights on Relativity', contains applications of both theories, from the Relativity of Simultaneity, to Gravity and Gravitational Waves, to Black Holes and Cosmology, to the Quantum realm.

2007-06-18

226

Signatures and Methods for the Automated Nondestructive Assay of UF6 Cylinders at Uranium Enrichment Plants  

SciTech Connect

International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s entire cylinder inventory. These measurements are time-consuming, expensive, and assay only a small fraction of the total cylinder volume. An automated nondestructive assay system capable of providing enrichment measurements over the full volume of the cylinder could improve upon current verification practices in terms of manpower and assay accuracy. Such a station would use sensors that can be operated in an unattended mode at an industrial facility: medium-resolution scintillators for gamma-ray spectroscopy (e.g., NaI(Tl)) and moderated He-3 neutron detectors. This sensor combination allows the exploitation of additional, more-penetrating signatures beyond the traditional 185-keV emission from U-235: neutrons produced from F-19(?,n) reactions (spawned primarily from U 234 alpha emission) and high-energy gamma rays (extending up to 8 MeV) induced by neutrons interacting in the steel cylinder. This paper describes a study of these non-traditional signatures for the purposes of cylinder enrichment verification. The signatures and the radiation sensors designed to collect them are described, as are proof-of-principle cylinder measurements and analyses. Key sources of systematic uncertainty in the non-traditional signatures are discussed, and the potential benefits of utilizing these non-traditional signatures, in concert with an automated form of the traditional 185-keV-based assay, are discussed.

Smith, Leon E.; Mace, Emily K.; Misner, Alex C.; Shaver, Mark W.

2010-08-08

227

Negotiating Femininities Online  

ERIC Educational Resources Information Center

Much has been written about the potential for online learning (Fryer, 1997; www. ngfl.gov.uk/ngfl/index.html). However this literature typically emphasizes not online learning but online education. In this paper I focus on the potential for online learning, specifically learning about issues surrounding femininity in the presence of online peers,…

Davies, Julia

2004-01-01

228

Online scheduling Frederic Vivien  

E-print Network

When the job is released When the job completes Offline (Clairvoyant) Online Non-clairvoyant online #12) Hypotheses Job may be preempted One machine (1 | pmtn | ???) #12;Evaluating the quality of an online schedule An online algorithm has a competitive factor if and only if Whatever the set of jobs T1, ..., Tn Online

Marchal, Loris

229

Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm.  

PubMed

An optical identity authentication scheme based on the elliptic curve digital signature algorithm (ECDSA) and phase retrieval algorithm (PRA) is proposed. In this scheme, a user's certification image and the quick response code of the user identity's keyed-hash message authentication code (HMAC) with added noise, serving as the amplitude and phase restriction, respectively, are digitally encoded into two phase keys using a PRA in the Fresnel domain. During the authentication process, when the two phase keys are presented to the system and illuminated by a plane wave of correct wavelength, an output image is generated in the output plane. By identifying whether there is a match between the amplitude of the output image and all the certification images pre-stored in the database, the system can thus accomplish a first-level verification. After the confirmation of first-level verification, the ECDSA signature is decoded from the phase part of the output image and verified to allege whether the user's identity is legal or not. Moreover, the introduction of HMAC makes it almost impossible to forge the signature and hence the phase keys thanks to the HMAC's irreversible property. Theoretical analysis and numerical simulations both validate the feasibility of our proposed scheme. PMID:23938413

Fan, Desheng; Meng, Xiangfeng; Wang, Yurong; Yang, Xiulun; Peng, Xiang; He, Wenqi; Dong, Guoyan; Chen, Hongyi

2013-08-10

230

Invariant Signatures Peter J. Olver  

E-print Network

Invariant Signatures Peter J. Olver University of Minnesota http://www.math.umn.edu/ olver · Classical Invariant Theory · Symmetries of differential equations, etc. · Diffeomorphisms · Canonical = g · N #12;Tennis, Anyone? #12;Invariants Definition. An invariant is a real-valued function I : M R

Olver, Peter

231

Disaster relief through composite signatures  

NASA Astrophysics Data System (ADS)

A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

2012-06-01

232

Application of computer vision to automatic prescription verification in pharmaceutical mail order  

NASA Astrophysics Data System (ADS)

In large volume pharmaceutical mail order, before shipping out prescriptions, licensed pharmacists ensure that the drug in the bottle matches the information provided in the patient prescription. Typically, the pharmacist has about 2 sec to complete the prescription verification process of one prescription. Performing about 1800 prescription verification per hour is tedious and can generate human errors as a result of visual and brain fatigue. Available automatic drug verification systems are limited to a single pill at a time. This is not suitable for large volume pharmaceutical mail order, where a prescription can have as many as 60 pills and where thousands of prescriptions are filled every day. In an attempt to reduce human fatigue, cost, and limit human error, the automatic prescription verification system (APVS) was invented to meet the need of large scale pharmaceutical mail order. This paper deals with the design and implementation of the first prototype online automatic prescription verification machine to perform the same task currently done by a pharmacist. The emphasis here is on the visual aspects of the machine. The system has been successfully tested on 43,000 prescriptions.

Alouani, Ali T.

2005-05-01

233

Composite Signature Based Watermarking for Fingerprint Authentication  

E-print Network

Composite Signature Based Watermarking for Fingerprint Authentication Farid Ahmed Department authentication, to biometrics to assist in forensic analysis. Using a signature extracted from the Fourier phase of fingerprints. Keywords PhasemarkTM, biometric authentication, fingerprint, watermarking, composite filter

Ahmed, Farid

234

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2010 CFR

...letters or characters comprising a name, executed, adopted or authorized as a signature. Signatures are not required in unofficial PDF copies submitted in accordance with § 232.104. (b) Each signatory to an electronic filing (including,...

2010-04-01

235

Nuclear Resonance Fluorescence for Material Verification in Dismantlement  

SciTech Connect

Nuclear resonance fluorescence (NRF) is a well-established physical process that provides an isotope-specific signature that can be exploited for isotopic detection and characterization of samples. Pacific Northwest National Laboratory has been investigating possible applications of NRF for national security. Of the investigated applications, the verification of material in the dismantlement process is the most promising. Through a combination of benchmarking measurements and radiation transport modeling, we have shown that NRF techniques with existing bremsstrahlung photon sources and a modest detection system can be used to detect highly enriched uranium in the quantities and time limits relevant to the dismantlement process. Issues such as orientation, placement and material geometry do not significantly impact the sensitivity of the technique. We have also investigated how shielding of the uranium would be observed through non-NRF processes to enable the accurate assay of the material. This paper will discuss our findings on how NRF and photon-interrogation techniques may be applied to the material verification in the dismantlement process.

Warren, Glen A.; Detwiler, Rebecca S.

2011-10-01

236

Nebula - generating syntactical network intrusion signatures  

Microsoft Academic Search

Signature-based intrusion detection is a state-of-the-art technology for identifying malicious activity in networks. However, attack trends change very fast nowadays, making it impossible to keep up with manual signature engineering. This paper describes a novel concept for automatic signature generation based on efficient autonomous attack classification. Signatures are constructed for each class from syntactical commonalities and go beyond a single,

Tillmann Werner; Christoph Fuchs; Elmar Gerhards-Padilla; Peter Martini

2009-01-01

237

Online Staff Development.  

ERIC Educational Resources Information Center

Describes the benefits for principals of online staff development for teachers. Sources of online courses and training include local and state departments of education, professional associations, colleges and universities, online universities, and commercial suppliers. (PKP)

Pease, Pamela S.; Magnuson, Peter

2003-01-01

238

Ship signatures in synthetic aperture radar imagery  

Microsoft Academic Search

Ship signatures in synthetic aperture radar (SAR) imagery have been matched to Automatic Identification System (AIS) data to yield a large database of known ships for ship signature analysis. This paper focuses on ship radar cross section and ship length derived from the ship signature length. Cross- polarization is an attractive option for ship detection.

Paris W. Vachon; Ryan A. English; John Wolfe

2007-01-01

239

Collider Signatures of Dark Matter Michael Schmitt  

E-print Network

Collider Signatures of Dark Matter Michael Schmitt Northwestern University SLAC Summer Institute, August 2, 2007 Lecture 1 Dark Matter Paradigm Missing Energy Signatures Tevatron LHC #12;2SSI 1: Collider Signatures for DM Dark Matter at CollidersDark Matter at Colliders There is a remarkable optimism about

Schmitt, Michael

240

Qualified Mobile Server Signature Clemens Orthacker1  

E-print Network

the protection of the signature-creation data with organizational measures. As with tra- ditional qualified level GmbH, Hugo-Wolf-Gasse 8/8a A-8010 Graz Abstract. A legal basis for the use of electronic signatures exists since the introduction of qualified electronic signatures in EU Directive 1999/93/EC

Boyer, Edmond

241

Signature recognition state-of-the-art  

Microsoft Academic Search

A summarization of one of the most successful behavioral biometric recognition methods: signature recognition. Probably this is one of the oldest biometric recognition methods, with high legal acceptance. Technological advances have made possible new perspectives for signature recognition, by means of capturing devices which provide more than the simple signature image: pressure, acceleration, etc., making it even more difficult to

Marcos Faundez-Zanuy

2005-01-01

242

Evaluating GPUs for network packet signature matching  

Microsoft Academic Search

Modern network devices employ deep packet inspection to enable sophisticated services such as intrusion detection, traf- fic shaping, and load balancing. At the heart of such services is a signature matching engine that must match packet pay- loads to multiple signatures at line rates. However, the re- cent transition to complex regular-expression based signatures coupled with ever-increasing network speeds has

Randy Smith; Neelam Goyal; Justin Ormont; Karthikeyan Sankaralingam; Cristian Estan

2009-01-01

243

Verification and transparency in future arms control  

SciTech Connect

Verification`s importance has changed dramatically over time, although it always has been in the forefront of arms control. The goals and measures of verification and the criteria for success have changed with the times as well, reflecting such factors as the centrality of the prospective agreement to East-West relations during the Cold War, the state of relations between the United States and the Soviet Union, and the technologies available for monitoring. Verification`s role may be declining in the post-Cold War period. The prospects for such a development will depend, first and foremost, on the high costs of traditional arms control, especially those associated with requirements for verification. Moreover, the growing interest in informal, or non-negotiated arms control does not allow for verification provisions by the very nature of these arrangements. Multilateral agreements are also becoming more prominent and argue against highly effective verification measures, in part because of fears of promoting proliferation by opening sensitive facilities to inspectors from potential proliferant states. As a result, it is likely that transparency and confidence-building measures will achieve greater prominence, both as supplements to and substitutes for traditional verification. Such measures are not panaceas and do not offer all that we came to expect from verification during the Cold war. But they may be the best possible means to deal with current problems of arms reductions and restraints at acceptable levels of expenditure.

Pilat, J.F.

1996-09-01

244

Software Verification and Testing Lecture Notes: Testing I  

E-print Network

Software Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence mathematical skills 1 #12;Motivation verification vs testing: · verification used often in early stages

Struth, Georg

245

Kiplinger Online  

NSDL National Science Digital Library

The Kiplinger organization developed Kiplinger Online to provide personal finance guidance on the Internet. Users can find selected articles from the current and past three months' issues of Kiplinger's Personal Finance Magazine on topics ranging from investing to retirement planning. The news section highlights consumer, business and financial news. Visitors to the site can compare the rankings of mutual funds (stocks and bonds) by size and return, consult a glossary of 101 financial terms and examine financial planning calculators . Parents might want to refer to sections on educating children, budgeting, and money management. Note that certain parts of the site require subscription.

1998-01-01

246

Kidsource Online  

NSDL National Science Digital Library

Kidsource Online is an extensive collection of information about raising children from newborns to adolescents. A sampling of the publications they've pulled together at the site includes "Children and Bilingualism" from the American Speech-Language-Hearing Association; "Testing Your Child's Hearing" by Carol Knightly, Pediatric Audiologist; and the Asthma and Allergy Foundation of America (AAFA) Provides Tips to Help Parents and Kids Cope with Allergy Season. Resources are organized under top-level categories of Newborns, Toddlers, Preschoolers, K-12, Education, Health, Recreation, Forums, Organizations, and Guide to Best Software, among others.

1997-01-01

247

Biology Online  

NSDL National Science Digital Library

Biology Online is a community-run web site that provides access to resources on many aspects of biological and life sciences. The site includes a discussion board with forums on cell biology, molecular biology, evolution, bioinformatics, and many other topics. The Wiki dictionary features user-editable content and links to articles on a wide variety of topics in biology. There is also a book catalog with information on biology-related books, including author and content descriptions, product details, and customer reviews; and a directory of links to other websites with related content in the life and Earth sciences.

248

Online Conversion  

NSDL National Science Digital Library

Need to convert joules to kilocalories? A rood to a square mile? 100 weight to stones? How about your age in dog years? You can do all of these conversions and over 8,000 more at Online Conversion. Conversions are organized by type (temperature, length, cooking, etc.), and each conversion page includes numerous options. Quick links to other conversions are also provided on each page so users don't have to return to the main page. Simply put, a very handy and easy-to-use site that belongs in the reference section of any user's bookmarks.

249

Climate signatures on decadal to interdecadal time scales as obtained from mollusk shells (Arctica islandica) from Iceland  

E-print Network

. On multidecadal time scales, the record shows a pronounced variability linked to North Atlantic tem- perature and Lohmann, 2004). Part of its signature resembles the North Atlantic Oscillation (NAO) (Hurrell and van Loon 2012 Accepted 12 August 2012 Available online 13 September 2012 Keywords: Climate proxy North Atlantic

Schöne, Bernd R.

250

Validation of an online replanning technique for prostate adaptive radiotherapy  

NASA Astrophysics Data System (ADS)

We have previously developed an online adaptive replanning technique to rapidly adapt the original plan according to daily CT. This paper reports the quality assurance (QA) developments in its clinical implementation for prostate cancer patients. A series of pre-clinical validation tests were carried out to verify the overall accuracy and consistency of the online replanning procedure. These tests include (a) phantom measurements of 22 individual patient adaptive plans to verify their accuracy and deliverability and (b) efficiency and applicability of the online replanning process. A four-step QA procedure was established to ensure the safe and accurate delivery of an adaptive plan, including (1) offline phantom measurement of the original plan, (2) online independent monitor unit (MU) calculation for a redundancy check, (3) online verification of plan-data transfer using an in-house software and (4) offline validation of actually delivered beam parameters. The pre-clinical validations demonstrate that the newly implemented online replanning technique is dosimetrically accurate and practically efficient. The four-step QA procedure is capable of identifying possible errors in the process of online adaptive radiotherapy and to ensure the safe and accurate delivery of the adaptive plans. Based on the success of this work, the online replanning technique has been used in the clinic to correct for interfractional changes during the prostate radiation therapy.

Peng, Cheng; Chen, Guangpei; Ahunbay, Ergun; Wang, Dian; Lawton, Colleen; Li, X. Allen

2011-06-01

251

NEXT Thruster Component Verification Testing  

NASA Technical Reports Server (NTRS)

Component testing is a critical part of thruster life validation activities under NASA s Evolutionary Xenon Thruster (NEXT) project testing. The high voltage propellant isolators were selected for design verification testing. Even though they are based on a heritage design, design changes were made because the isolators will be operated under different environmental conditions including temperature, voltage, and pressure. The life test of two NEXT isolators was therefore initiated and has accumulated more than 10,000 hr of operation. Measurements to date indicate only a negligibly small increase in leakage current. The cathode heaters were also selected for verification testing. The technology to fabricate these heaters, developed for the International Space Station plasma contactor hollow cathode assembly, was transferred to Aerojet for the fabrication of the NEXT prototype model ion thrusters. Testing the contractor-fabricated heaters is necessary to validate fabrication processes for high reliability heaters. This paper documents the status of the propellant isolator and cathode heater tests.

Pinero, Luis R.; Sovey, James S.

2007-01-01

252

Experimental verification of quantum computations  

E-print Network

Quantum computers are expected to offer substantial speedups over their classical counterparts and to solve problems that are intractable for classical computers. Beyond such practical significance, the concept of quantum computation opens up new fundamental questions, among them the issue whether or not quantum computations can be certified by entities that are inherently unable to compute the results themselves. Here we present the first experimental verification of quantum computations. We show, in theory and in experiment, how a verifier with minimal quantum resources can test a significantly more powerful quantum computer. The new verification protocol introduced in this work utilizes the framework of blind quantum computing and is independent of the experimental quantum-computation platform used. In our scheme, the verifier is only required to generate single qubits and transmit them to the quantum computer. We experimentally demonstrate this protocol using four photonic qubits and show how the verifier can test the computer's ability to perform measurement-based quantum computations.

Stefanie Barz; Joseph F. Fitzsimons; Elham Kashefi; Philip Walther

2013-08-30

253

Ontology Matching with Semantic Verification  

PubMed Central

ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies. PMID:20186256

Jean-Mary, Yves R.; Shironoshita, E. Patrick; Kabuka, Mansur R.

2009-01-01

254

Aspects of Online Learning .  

E-print Network

??Online learning algorithms have several key advantages compared to their batch learning algorithm counterparts. This thesis investigates several online learning algorithms and their application. The… (more)

Harrington, Edward

2008-01-01

255

Understanding continuance intention of knowledge creation using extended expectation-confirmation theory: an empirical study of Taiwan and China online communities  

Microsoft Academic Search

Grounded on expectation–confirmation theory (ECT), this study proposes an integrated model aiming to understand how participants' continuance intention of knowledge creation and satisfaction are affected by their perceived identity verification (PIV) and performance expectancy in an online community. To assess the theoretical model, we surveyed two online communities – Baidu (China) and Yahoo knowledge+ (Taiwan), including 213 and 216 useable responses,

Shih-Wei Chou; Hui-Tzu Min; Yu-Chieh Chang; Chun-Tung Lin

2010-01-01

256

An online fraud-resistant technology for credit card E-transactions  

Microsoft Academic Search

This study proposes an online fraud-resistant technology for credit card e-transactions, which provides three characteristics: cardholder-driven identification, merchant-driven verification, and issuer-driven authorization. This paper also presents the resistant capability of credit card frauds against online e-transactions as well as the security analysis and the computational cost of the method proposed. Conclusively, the proposed method can increase the fraud-resistant capability with

Chin-Ming Hsu; Hui-Mei Chao

2007-01-01

257

Request to add a Campus Organization to the Online Directory This form should be used to request additions of an entry for one of the following types of organizations* to the Online  

E-print Network

Request to add a Campus Organization to the Online Directory This form should be used to request additions of an entry for one of the following types of organizations* to the Online Directory (a.k.a. LDAP: ____________________________________________________ Signature: ___________________________________________ Date: ____________________________ Person authorizing

Cui, Yan

258

Verification & Validation in Military Simulations  

Microsoft Academic Search

The verification and validation (V&V) of military simulations has many similarities to the V&V of simulations as often discussed in academe; however, significant differences exist. Military simulations are often large, extremely complex production systems, in which the initial conditions provide the driving force and the transients are the elements of interest. The difficulties of performing the V&V and the lack

Dean S. Hartley III

1997-01-01

259

Nuclear Safeguards Verification Measurement Techniques  

NASA Astrophysics Data System (ADS)

This chapter deals with the “nuclear safeguards” verification system and describes procedures and measurement methods that allow the safeguards inspectorates/authorities to verify that nuclear materials or facilities are not used to further undeclared military activities. These procedures and methods provide the strong technical basis upon which the safeguards inspectorates/authorities issue their conclusions and receive the broadest international acceptance regarding the compliance of participating states with their obligations.

Zendel, M.; Donohue, D. L.; Kuhn, E.; Deron, S.; Bíró, T.

260

Identity verification by keystroke timing  

E-print Network

dynamic setting. Unlike most static identity verification systems in use today, a verifier based on dynamic keystroke characteristics can monitor an individual's identity as he is working, instead of only at login time. This is accomplished by using... an imposter [Brand and Makey 1985; Cole 1978; National Bureau of Standards 1977; Warfel 1984]. The identification of a valid user can be based on any of three things: 1) Something the user knows (eg. passwords) 2) Something the user has (eg. keys) 3...

Usnick, Mark C.

2012-06-07

261

Formal verification of AI software  

NASA Technical Reports Server (NTRS)

The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

Rushby, John; Whitehurst, R. Alan

1989-01-01

262

ENVIRONMENTAL TECHNOLOGY VERIFICATION: GENERIC VERIFICATION PROTOCOL FOR BIOLOGICAL AND AEROSOL TESTING OF GENERAL VENTILATION AIR CLEANERS  

EPA Science Inventory

The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

263

Fingerprint verification using SIFT features  

NASA Astrophysics Data System (ADS)

Fingerprints are being extensively used for person identification in a number of commercial, civil, and forensic applications. Most of the current fingerprint verification systems utilize features that are based on minutiae points and ridge patterns. While minutiae based fingerprint verification systems have shown fairly high accuracies, further improvements in their performance are needed for acceptable performance, especially in applications involving very large scale databases. In an effort to extend the existing technology for fingerprint verification, we propose a new representation and matching scheme for fingerprint using Scale Invariant Feature Transformation (SIFT). We extract characteristic SIFT feature points in scale space and perform matching based on the texture information around the feature points using the SIFT operator. A systematic strategy of applying SIFT to fingerprint images is proposed. Using a public domain fingerprint database (FVC 2002), we demonstrate that the proposed approach complements the minutiae based fingerprint representation. Further, the combination of SIFT and conventional minutiae based system achieves significantly better performance than either of the individual schemes.

Park, Unsang; Pankanti, Sharath; Jain, A. K.

2008-03-01

264

Nuclear Data Verification and Standardization  

SciTech Connect

The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

2011-10-01

265

Signatures of a Shadow Biosphere  

NASA Astrophysics Data System (ADS)

Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere.

Davies, Paul C. W.; Benner, Steven A.; Cleland, Carol E.; Lineweaver, Charles H.; McKay, Christopher P.; Wolfe-Simon, Felisa

2009-03-01

266

Signatures of a shadow biosphere.  

PubMed

Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere. PMID:19292603

Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

2009-03-01

267

Magnetic cleanliness verification approach on tethered satellite  

NASA Technical Reports Server (NTRS)

Magnetic cleanliness testing was performed on the Tethered Satellite as the last step of an articulated verification campaign aimed at demonstrating the capability of the satellite to support its TEMAG (TEthered MAgnetometer) experiment. Tests at unit level and analytical predictions/correlations using a dedicated mathematical model (GANEW program) are also part of the verification activities. Details of the tests are presented, and the results of the verification are described together with recommendations for later programs.

Messidoro, Piero; Braghin, Massimo; Grande, Maurizio

1990-01-01

268

Validation and verification of simulation models  

Microsoft Academic Search

ABSTRACT This paper discusses validation and verification of simulation models. The different approaches to deciding model validity are presented; how,model validation and verification relate to the model,development,process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways,to document,results are given; and a recommended,procedure is presented. 1,INTRODUCTION Simulation models are increasingly

Robert G. Sargent

1992-01-01

269

Efficient Debugging in a Formal Verification Environment  

Microsoft Academic Search

In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we\\u000a have developed in order to augment debugging in Intel’s Formal Verification Environment. We have given the name the “counter-example wizard” to the bundle of capabilities that we have developed to address the needs of the verification engineer in context of counter-example\\u000a diagnosis

Fady Copty; Amitai Irron; Osnat Weissberg; Nathan P. Kropp; Gila Kamhi

2001-01-01

270

Efficient debugging in a formal verification environment  

Microsoft Academic Search

.   In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we\\u000a have developed in order to aid debugging in Intel’s Formal Verification Environment. We have given the name “Counter-Example\\u000a Wizard” to the bundle of capabilities that we have developed to address the needs of the verification engineer in the context\\u000a of counter-example

Fady Copty; Amitai Irron; Osnat Weissberg; Nathan P. Kropp; Gila Kamhi

2003-01-01

271

Introduction to Verification of Hydrologic Forecasts  

NSDL National Science Digital Library

This module offers a comprehensive description of a set of common verification measures for hydrologic forecasts, both deterministic and probabilistic. Through use of rich illustrations, animations, and interactions, this module explains how these verification measures can provide valuable information to users with varying needs. In addition to providing a measure of how well a forecast matches observations, verification measures can be used to help forecasters and users learn about the strengths and weaknesses of a forecast.

Comet

2008-06-30

272

Eiffel as a Framework for Verification  

Microsoft Academic Search

The Eiffel method and language integrate a number of ideas orig- inating from work on program verification. This position paper describes the goals of the Eiffel approach, presents current Eiffel-based verification tech- niques using contracts for run-time checks for testing and debugging, and outlines ongoing work on static verification. 1 Application areas Advances in programming languages, especially object-oriented principles and

Bertrand Meyer; ETH Zurich

2005-01-01

273

Speaker Verification Using Adapted Gaussian Mixture Models  

Microsoft Academic Search

Reynolds, Douglas A., Quatieri, Thomas F., and Dunn, Robert B., Speaker Verification Using Adapted Gaussian Mixture Models, Digital Signal Processing10(2000), 19–41.In this paper we describe the major elements of MIT Lincoln Laboratory's Gaussian mixture model (GMM)-based speaker verification system used successfully in several NIST Speaker Recognition Evaluations (SREs). The system is built around the likelihood ratio test for verification, using

Douglas A. Reynolds; Thomas F. Quatieri; Robert B. Dunn

2000-01-01

274

Microbial Lifestyle and Genome Signatures  

PubMed Central

Microbes are known for their unique ability to adapt to varying lifestyle and environment, even to the extreme or adverse ones. The genomic architecture of a microbe may bear the signatures not only of its phylogenetic position, but also of the kind of lifestyle to which it is adapted. The present review aims to provide an account of the specific genome signatures observed in microbes acclimatized to distinct lifestyles or ecological niches. Niche-specific signatures identified at different levels of microbial genome organization like base composition, GC-skew, purine-pyrimidine ratio, dinucleotide abundance, codon bias, oligonucleotide composition etc. have been discussed. Among the specific cases highlighted in the review are the phenomena of genome shrinkage in obligatory host-restricted microbes, genome expansion in strictly intra-amoebal pathogens, strand-specific codon usage in intracellular species, acquisition of genome islands in pathogenic or symbiotic organisms, discriminatory genomic traits of marine microbes with distinct trophic strategies, and conspicuous sequence features of certain extremophiles like those adapted to high temperature or high salinity. PMID:23024607

Dutta, Chitra; Paul, Sandip

2012-01-01

275

Electron Signatures and Alfven Waves  

NASA Technical Reports Server (NTRS)

The electron signatures which appear together with Alfven waves observed by the Freja satellite in the auroral region are reported. Precipitating electrons are detected both with and just before the wave. The observed Alfven waves must therefore be capable of accelerating electrons to higher energies than the local phase velocity of these waves in order for the electrons to move in advance of the wave. The characteristics of such electrons suggest electrons moving infront of the wave have characteristics of origin from warmer and lower density plasma while the electrons moving with the wave have characteristics of cooler and denser plasma. The pitch angle distribution of the electrons moving with the wave indicates that there is continuous acceleration of new particles by the wave, i.e. a propagating Alfven wave is the source of these electrons . A simple model of a propagating source is made to model the electrons that are moving in advance of the wave. Depending on whether accelerated electrons leave the wave above or below the altitude where the Alfven wave has the highest phase velocity, the detected electron signatures will be different; electron dispersion or potential drop like, respectively. It is shown that the Alfven wave acceleration can create electron signatures similar to inverted-V structures.

Andersson, Laila; Ivchenko, N.; Clemmons, J.; Namgaladze, A. A.; Gustavsson, B.; Wahlund, J.-E.; Eliasson, L.; Yurik, R. Y.

2000-01-01

276

Employment Verifications Requests for verification of title and dates of employment for Harvard staff are  

E-print Network

Employment Verifications Requests for verification of title and dates of employment for Harvard information during the verification process. Need Proof of Employment? Give the person needing proof of your employment the following information: Your Social Security Number Harvard University Employer Code: 14392

Paulsson, Johan

277

Verification, validation, and accreditation: verification, validation, and accreditation of simulation models  

Microsoft Academic Search

This paper discusses verification, validation, and accreditation of simulation models. The different approaches to deciding model validity are presented; how model verification and validation relate to the model development process are discussed; various validation techniques are defined; conceptual model validity, model verification, operational validity, and data validity are described; ways to document results are given; a recommended procedure is presented;

Robert G. Sargent

2000-01-01

278

StatVerif: Verification of Stateful Processes Myrto Arapinis and Eike Ritter and Mark D. Ryan  

E-print Network

persistent information. We provide the operational semantics of StatVerif. We extend the ProVerif compiler to a compiler for StatVerif: it takes processes written in the extended process language, and produces Horn clauses. Our compilation is carefully engineered to avoid many false attacks. We prove the correctness

Ritter, Eike

279

StatVerif: Verification of Stateful Processes Myrto Arapinis Joshua Phillips Eike Ritter Mark D. Ryan  

E-print Network

persistent information. We provide the operational semantics of StatVerif. We extend the ProVerif compiler to a compiler for StatVerif, which takes processes written in the extended process language and produces Horn clauses. Our compilation is carefully engineered to avoid many false at- tacks. We prove the correctness

Ryan, Mark

280

Automated verification of flight software. User's manual  

NASA Technical Reports Server (NTRS)

(Automated Verification of Flight Software), a collection of tools for analyzing source programs written in FORTRAN and AED is documented. The quality and the reliability of flight software are improved by: (1) indented listings of source programs, (2) static analysis to detect inconsistencies in the use of variables and parameters, (3) automated documentation, (4) instrumentation of source code, (5) retesting guidance, (6) analysis of assertions, (7) symbolic execution, (8) generation of verification conditions, and (9) simplification of verification conditions. Use of AVFS in the verification of flight software is described.

Saib, S. H.

1982-01-01

281

Guide to good practices for independent verification  

SciTech Connect

This Guide to Good Practices is written to enhance understanding of, and provide direction for, Independent Verification, Chapter X of Department of Energy (DOE) Order 5480.19, Conduct of Operations Requirements for DOE Facilities. The practices in this guide should be considered when planning or reviewing independent verification activities. Contractors are advised to adopt procedures that meet the intent of DOE Order 5480.19. Independent Verification is an element of an effective Conduct of Operations program. The complexity and array of activities performed in DOE facilities dictate the necessity for coordinated independent verification activities to promote safe and efficient operations.

NONE

1998-12-01

282

Hydrologic data-verification management program plan  

USGS Publications Warehouse

Data verification refers to the performance of quality control on hydrologic data that have been retrieved from the field and are being prepared for dissemination to water-data users. Water-data users now have access to computerized data files containing unpublished, unverified hydrologic data. Therefore, it is necessary to develop techniques and systems whereby the computer can perform some data-verification functions before the data are stored in user-accessible files. Computerized data-verification routines can be developed for this purpose. A single, unified concept describing master data-verification program using multiple special-purpose subroutines, and a screen file containing verification criteria, can probably be adapted to any type and size of computer-processing system. Some traditional manual-verification procedures can be adapted for computerized verification, but new procedures can also be developed that would take advantage of the powerful statistical tools and data-handling procedures available to the computer. Prototype data-verification systems should be developed for all three data-processing environments as soon as possible. The WATSTORE system probably affords the greatest opportunity for long-range research and testing of new verification subroutines. (USGS)

Alexander, C. W.

1982-01-01

283

A description of the Molecular Signatures Database (MSigDB) Web site.  

PubMed

Annotated lists of genes help researchers to prioritize their own lists of candidate genes and to plan follow-up studies. The Molecular Signatures Database (MSigDB) is one of the most widely used knowledge base repositories of annotated sets of genes involved in biochemical pathways, signaling cascades, expression profiles from research publications, and other biological concepts. Here we provide an overview of MSigDB and its online analytical tools. PMID:24743996

Liberzon, Arthur

2014-01-01

284

24 CFR 5.512 - Verification of eligible immigration status.  

Code of Federal Regulations, 2011 CFR

...2011-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

2011-04-01

285

24 CFR 5.512 - Verification of eligible immigration status.  

Code of Federal Regulations, 2010 CFR

...2010-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

2010-04-01

286

24 CFR 5.512 - Verification of eligible immigration status.  

...2014-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

2014-04-01

287

24 CFR 5.512 - Verification of eligible immigration status.  

Code of Federal Regulations, 2012 CFR

...2012-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

2012-04-01

288

24 CFR 5.512 - Verification of eligible immigration status.  

Code of Federal Regulations, 2013 CFR

...2013-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

2013-04-01

289

40 CFR 1065.395 - Inertial PM balance verifications.  

Code of Federal Regulations, 2010 CFR

... 2010-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

2010-07-01

290

Content Extraction Signatures Ron Steinfeld  

E-print Network

@uncc.edu April 28, 2003 Abstract Motivated by emerging needs in online interactions, we define a new type people or organizations, to prove the truth of certain statements (based on the trust of the verifier is not the most important thing to the holder in such cases. The value, rather, lies with the document content, i

Zheng, Yuliang

291

GENERIC VERIFICATION PROTOCOL FOR THE VERIFICATION OF PESTICIDE SPRAY DRIFT REDUCTION TECHNOLOGIES FOR ROW AND FIELD CROPS  

EPA Science Inventory

This ETV program generic verification protocol was prepared and reviewed for the Verification of Pesticide Drift Reduction Technologies project. The protocol provides a detailed methodology for conducting and reporting results from a verification test of pesticide drift reductio...

292

Online Voucher Quick Reference  

E-print Network

Online Voucher Quick Reference NUFinancials Payments OnlineVoucherQuickReference 12/10/2013 - rb > Online Voucher Entry Page · or NUFinancials Accounts Payable Vouchers Add/Update Online Voucher/letters or barcode# on form). 2. Enter the Invoice Date (from invoice, date of service, or today's date). 3. Look up

Shull, Kenneth R.

293

University Student Online Plagiarism  

ERIC Educational Resources Information Center

This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

Wang, Yu-mei

2008-01-01

294

32 CFR 270.7 - Verification of eligibility.  

Code of Federal Regulations, 2010 CFR

...DEFENSE (CONTINUED) MISCELLANEOUS COMPENSATION OF CERTAIN FORMER OPERATIVES INCARCERATED BY THE DEMOCRATIC REPUBLIC OF VIETNAM Standards and Verification of Eligibility § 270.7 Verification of eligibility. (a) All...

2010-07-01

295

Design and implementation of remote online examination system based on integration framework  

Microsoft Academic Search

An online examination system was designed by using B\\/S mode multi-tier architecture based on Struts, Spring and Hibernate integration framework, which combined the education examination system with advanced network technology. The verification shows, this system can achieve the standardization and paperless of exam. Not only can it reflect the fairness of the examination, but save the resource and improve the

Jia qiaojie; Li juanli; Wang yuanyuan; Liao kaihua; Yun liqing

2011-01-01

296

Forensic handwriting examiners' expertise for signature comparison.  

PubMed

This paper reports on the performance of forensic document examiners (FDEs) in a signature comparison task that was designed to address the issue of expertise. The opinions of FDEs regarding 150 genuine and simulated questioned signatures were compared with a control group of non-examiners' opinions. On the question of expertise, results showed that FDEs were statistically better than the control group at accurately determining the genuineness or non-genuineness of questioned signatures. The FDE group made errors (by calling a genuine signature simulated or by calling a simulated signature genuine) in 3.4% of their opinions while 19.3% of the control group's opinions were erroneous. The FDE group gave significantly more inconclusive opinions than the control group. Analysis of FDEs' responses showed that more correct opinions were expressed regarding simulated signatures and more inconclusive opinions were made on genuine signatures. Further, when the complexity of a signature was taken into account, FDEs made more correct opinions on high complexity signatures than on signatures of lower complexity. There was a wide range of skill amongst FDEs and no significant relationship was found between the number of years FDEs had been practicing and their correct, inconclusive and error rates. PMID:12353558

Sita, Jodi; Found, Bryan; Rogers, Douglas K

2002-09-01

297

Attitudes toward buying online.  

PubMed

A survey of 11 positive features and 10 discouraging features of online shopping was carried out on 180 students and identified certain behavioral patterns for online shoppers versus non-shoppers. It was found that online shoppers have consistently stronger positive feelings about online shopping than do non-shoppers. On the other hand, non-shoppers have more negative feelings about online shopping than do shoppers, but not consistently so. Online shoppers are aware of some of the discouraging features of online shopping, but these features do not deter them from shopping online. The implication for marketers is that they should focus on making the experience of online shopping more accommodating and more user-friendly since the positive features of online shopping ("convenience" and "efficiency") appear to be more important than the negative features ("effort/impersonality"). PMID:15006173

Yang, Bijou; Lester, David

2004-02-01

298

Turbulence Modeling Verification and Validation  

NASA Technical Reports Server (NTRS)

Computational fluid dynamics (CFD) software that solves the Reynolds-averaged Navier-Stokes (RANS) equations has been in routine use for more than a quarter of a century. It is currently employed not only for basic research in fluid dynamics, but also for the analysis and design processes in many industries worldwide, including aerospace, automotive, power generation, chemical manufacturing, polymer processing, and petroleum exploration. A key feature of RANS CFD is the turbulence model. Because the RANS equations are unclosed, a model is necessary to describe the effects of the turbulence on the mean flow, through the Reynolds stress terms. The turbulence model is one of the largest sources of uncertainty in RANS CFD, and most models are known to be flawed in one way or another. Alternative methods such as direct numerical simulations (DNS) and large eddy simulations (LES) rely less on modeling and hence include more physics than RANS. In DNS all turbulent scales are resolved, and in LES the large scales are resolved and the effects of the smallest turbulence scales are modeled. However, both DNS and LES are too expensive for most routine industrial usage on today's computers. Hybrid RANS-LES, which blends RANS near walls with LES away from walls, helps to moderate the cost while still retaining some of the scale-resolving capability of LES, but for some applications it can still be too expensive. Even considering its associated uncertainties, RANS turbulence modeling has proved to be very useful for a wide variety of applications. For example, in the aerospace field, many RANS models are considered to be reliable for computing attached flows. However, existing turbulence models are known to be inaccurate for many flows involving separation. Research has been ongoing for decades in an attempt to improve turbulence models for separated and other nonequilibrium flows. When developing or improving turbulence models, both verification and validation are important steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

Rumsey, Christopher L.

2014-01-01

299

Cesium-137 source strength verification.  

PubMed

Over the years, the protocol for Cesium-137 source calibration has undergone a number of revisions based on updated data. The 3M Corporation issued product alerts and a revision of the calibration protocol in the early 1980s. We verified the activity of clinically used cesium tubes and found the difference with the activity stated by 3M in the range of 6-13%, which exceeds the recommended by 3M adjustment of 5% for all sources issued before 1979. Therefore, the verification and adjustment of activity should be recommended for each affected tube individually. PMID:10751717

Yankelevich, R; Wojcicka, J B; Maier, V; Anderko, C

2000-01-01

300

ENVIRONMENTAL TECHNOLOGY VERIFICATION AND INDOOR AIR  

EPA Science Inventory

The paper discusses environmental technology verification and indoor air. RTI has responsibility for a pilot program for indoor air products as part of the U.S. EPA's Environmental Technology Verification (ETV) program. The program objective is to further the development of sel...

301

ENVIRONMENTAL TECHNOLOGY VERIFICATION FOR INDOOR AIR PRODUCTS  

EPA Science Inventory

The paper discusses environmental technology verification (ETV) for indoor air products. RTI is developing the framework for a verification testing program for indoor air products, as part of EPA's ETV program. RTI is establishing test protocols for products that fit into three...

302

Verification of logic programs and imperative programs  

E-print Network

Verification of logic programs and imperative programs Lee Naish Technical Report 90/6 (Revised May@cs.mu.OZ.AU Abstract This paper explores the relationship between verification of logic programs and imperative programs with the aim of uncovering the kinds of reasoning used to construct logic programs. We discuss

Naish, Lee

303

IMPROVING AIR QUALITY THROUGH ENVIRONMENTAL TECHNOLOGY VERIFICATIONS  

EPA Science Inventory

The U.S. Environmental Protection Agency (EPA) began the Environmental Technology Verification (ETV) Program in 1995 as a means of working with the private sector to establish a market-based verification process available to all environmental technologies. Under EPA's Office of R...

304

Model Reduction for VLSI Physical Verification  

Microsoft Academic Search

In this paper, we will first introduce physical verification of Very Large Scale Integration (VLSI) circuits and put the challenges in perspective from a computational electro-magnetics point of view. We argue that any models obtained from electromagnetic (electrostatic) analysis should be as simple as possible for a given accuracy. We will then focus on two aspects of VLSI physical verification,

N. P. van der Meijs

305

Verification techniques for cache coherence protocols  

Microsoft Academic Search

In this article we present a comprehensive survey of various approaches for the verification of cache coherence protocols based on state enumeration, (symbolic model checking, and symbolic state models. Since these techniques search the state space of the protocol exhaustively, the amount of memory required to manipulate that state information and the verification time grow very fast with the number

Fong Pong; Michel Dubois

1997-01-01

306

Pluggable Verification Modules: An Extensible Protection Mechanism  

E-print Network

] has been successfully implemented as a PVM. 1 Introduction As our society becomes increasingly aware protection mechanism is entertained. Link-time bytecode verification becomes a pluggable service that can may no longer hold in the code consumer's verification environment. A malicious code producer may

307

Pluggable Verification Modules: An Extensible Protection Mechanism  

E-print Network

] has been successfully implemented as a PVM. 1 Introduction As our society becomes increasingly aware protection mechanism is entertained. Link­time bytecode verification becomes a pluggable service that can may no longer hold in the code consumer's verification environment. A malicious code producer may

308

On Design Validation Using Verification Technology  

Microsoft Academic Search

Despite great advances in the area of Formal Verification during the last ten years, simulation is currently the primary means for performing design verification. The definition of an accurate and pragmatic measure for the coverage achieved by a suite of simulation vectors and the related problem of coverage directed automatic test generation are of great importance. In this paper we

Dinos Moundanos; Jacob A. Abraham

1999-01-01

309

Modelling and Verification of Layered Security Protocols  

E-print Network

for Security Society and economies rely on computer networks for communication, finance, energy distributionModelling and Verification of Layered Security Protocols: A Bank Application Software & Systems secaron AG Munich #12;Jan Jürjens (TU Munich) et. al.: Verification of Layered Security Protocols 2 A Need

Jurjens, Jan

310

Verification and validation of simulation models  

Microsoft Academic Search

This paper surveys verification and validation of models, especially simulation models in operations research. For verification it discusses 1) general good programming practice (such as modular programming), 2) checking intermediate simulation outputs through tracing and statistical testing per module, 3) statistical testing of final simulation outputs against analytical results, and 4) animation. For validation it discusses 1) obtaining real-worl data,

Jack P. C. Kleijnen

1995-01-01

311

Verification and Validation for Turbulent Mixing Simulations  

E-print Network

Verification and Validation for Turbulent Mixing Simulations H. Lim, J. Iwerks, Y. Yu, J. Glimm to a simple analytic model. The validation is based on simulation agreement with Rayleigh-Taylor unstable.27.th, 47.27-i #12;Verification and Validation for Turbulent Mixing Simulations 2 1. Introduction

Yu, Yan

312

Gender Verification of Female Olympic Athletes.  

ERIC Educational Resources Information Center

Gender verification of female athletes has long been criticized by geneticists, endocrinologists, and others in the medical community. Recently, the International Olympic Committee's Athletic Commission called for discontinuation of mandatory laboratory-based gender verification of female athletes. This article discusses normal sexual…

Dickinson, Barry D.; Genel, Myron; Robinowitz, Carolyn B.; Turner, Patricia L.; Woods, Gary L.

2002-01-01

313

Guidelines for qualifying cleaning and verification materials  

NASA Technical Reports Server (NTRS)

This document is intended to provide guidance in identifying technical issues which must be addressed in a comprehensive qualification plan for materials used in cleaning and cleanliness verification processes. Information presented herein is intended to facilitate development of a definitive checklist that should address all pertinent materials issues when down selecting a cleaning/verification media.

Webb, D.

1995-01-01

314

HTGR analytical methods and design verification  

SciTech Connect

Analytical methods for the high-temperature gas-cooled reactor (HTGR) include development, update, verification, documentation, and maintenance of all computer codes for HTGR design and analysis. This paper presents selected nuclear, structural mechanics, seismic, and systems analytical methods related to the HTGR core. This paper also reviews design verification tests in the reactor core, reactor internals, steam generator, and thermal barrier.

Neylan, A.J.; Northup, T.E.

1982-05-01

315

Quantum Money with Classical Verification Dmitry Gavinsky  

E-print Network

Quantum Money with Classical Verification Dmitry Gavinsky NEC Laboratories America, Inc. Princeton, NJ, U.S.A. Abstract We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme

Gavinsky, Dmitry

316

High School Completion Status Verification Worksheet  

E-print Network

High School Completion Status Verification Worksheet Office of Student Financial Assistance P for a review process called "Verification" or you answered "none of the above" to the high school completion question on the FAFSA. As a result, we must verify your high school completion status and compare

Pantaleone, Jim

317

201314 High School Completion Status Verification Worksheet  

E-print Network

201314 High School Completion Status Verification Worksheet Office of Student Financial selected for a review process called "Verification" or you answered "none of the above" to the high school completion question on the FAFSA. As a result, we must verify your high school completion status and compare

Pantaleone, Jim

318

Observational Signatures of Magnetic Reconnection  

NASA Technical Reports Server (NTRS)

Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

Savage, Sabrina

2014-01-01

319

Spectroscopic signature for ferroelectric ice  

NASA Astrophysics Data System (ADS)

Various forms of ice exist within our galaxy. Particularly intriguing type of ice - ‘ferroelectric ice' was discovered experimentally and is stable in temperatures below 72 K. This form of ice can generate enormous electric fields and can play an important role in planetary formation. In this letter we present Car-Parrinello simulation of infrared spectra of ferroelectric ice and compare them with spectra of hexagonal ice. Librational region of the spectra can be treated as spectroscopic signature of ice XI and can be of help to identify ferroelectric ice in the Universe.

Wójcik, Marek J.; G?ug, Maciej; Boczar, Marek; Boda, ?ukasz

2014-09-01

320

A prospective evaluation of a breast cancer prognosis signature in the observational RASTER study.  

PubMed

The 70-gene signature (MammaPrint™) has been developed on retrospective series of breast cancer patients to predict the risk of breast cancer distant metastases. The microarRAy-prognoSTics-in-breast-cancER (RASTER) study was the first study designed to prospectively evaluate the performance of the 70-gene signature, which result was available for 427 patients (cT1-3N0M0). Adjuvant systemic treatment decisions were based on the Dutch CBO 2004 guidelines, the 70-gene signature and doctors' and patients' preferences. Five-year distant-recurrence-free-interval (DRFI) probabilities were compared between subgroups based on the 70-gene signature and Adjuvant! Online (AOL) (10-year survival probability <90% was defined as high-risk). Median follow-up was 61.6 months. Fifteen percent (33/219) of the 70-gene signature low-risk patients received adjuvant chemotherapy (ACT) versus 81% (169/208) of the 70-gene signature high-risk patients. The 5-year DRFI probabilities for 70-gene signature low-risk (n?=?219) and high-risk (n?=?208) patients were 97.0% and 91.7%. The 5-year DRFI probabilities for AOL low-risk (n?=?132) and high-risk (n?=?295) patients were 96.7% and 93.4%. For 70-gene signature low-risk-AOL high-risk patients (n?=?124), of whom 76% (n?=?94) had not received ACT, 5-year DRFI was 98.4%. In the AOL high-risk group, 32% (94/295) less patients would be eligible to receive ACT if the 70-gene signature was used. In this prospective community-based observational study, the 5-year DRFI probabilities confirmed the additional prognostic value of the 70-gene signature to clinicopathological risk estimations such as AOL. Omission of adjuvant chemotherapy as judged appropriate by doctors and patients and instigated by a low-risk 70-gene signature result, appeared not to compromise outcome. PMID:23371464

Drukker, C A; Bueno-de-Mesquita, J M; Retèl, V P; van Harten, W H; van Tinteren, H; Wesseling, J; Roumen, R M H; Knauer, M; van 't Veer, L J; Sonke, G S; Rutgers, E J T; van de Vijver, M J; Linn, S C

2013-08-15

321

A prospective evaluation of a breast cancer prognosis signature in the observational RASTER study  

PubMed Central

The 70-gene signature (MammaPrint™) has been developed on retrospective series of breast cancer patients to predict the risk of breast cancer distant metastases. The microarRAy-prognoSTics-in-breast-cancER (RASTER) study was the first study designed to prospectively evaluate the performance of the 70-gene signature, which result was available for 427 patients (cT1–3N0M0). Adjuvant systemic treatment decisions were based on the Dutch CBO 2004 guidelines, the 70-gene signature and doctors' and patients' preferences. Five-year distant-recurrence-free-interval (DRFI) probabilities were compared between subgroups based on the 70-gene signature and Adjuvant! Online (AOL) (10-year survival probability <90% was defined as high-risk). Median follow-up was 61.6 months. Fifteen percent (33/219) of the 70-gene signature low-risk patients received adjuvant chemotherapy (ACT) versus 81% (169/208) of the 70-gene signature high-risk patients. The 5-year DRFI probabilities for 70-gene signature low-risk (n = 219) and high-risk (n = 208) patients were 97.0% and 91.7%. The 5-year DRFI probabilities for AOL low-risk (n = 132) and high-risk (n = 295) patients were 96.7% and 93.4%. For 70-gene signature low-risk–AOL high-risk patients (n = 124), of whom 76% (n = 94) had not received ACT, 5-year DRFI was 98.4%. In the AOL high-risk group, 32% (94/295) less patients would be eligible to receive ACT if the 70-gene signature was used. In this prospective community-based observational study, the 5-year DRFI probabilities confirmed the additional prognostic value of the 70-gene signature to clinicopathological risk estimations such as AOL. Omission of adjuvant chemotherapy as judged appropriate by doctors and patients and instigated by a low-risk 70-gene signature result, appeared not to compromise outcome. PMID:23371464

Drukker, CA; Bueno-de-Mesquita, JM; Retel, VP; van Harten, WH; van Tinteren, H; Wesseling, J; Roumen, RMH; Knauer, M; van 't Veer, LJ; Sonke, GS; Rutgers, EJT; van de Vijver, MJ; Linn, SC

2013-01-01

322

Space transportation system payload interface verification  

NASA Technical Reports Server (NTRS)

The paper considers STS payload-interface verification requirements and the capability provided by STS to support verification. The intent is to standardize as many interfaces as possible, not only through the design, development, test and evaluation (DDT and E) phase of the major payload carriers but also into the operational phase. The verification process is discussed in terms of its various elements, such as the Space Shuttle DDT and E (including the orbital flight test program) and the major payload carriers DDT and E (including the first flights). Five tools derived from the Space Shuttle DDT and E are available to support the verification process: mathematical (structural and thermal) models, the Shuttle Avionics Integration Laboratory, the Shuttle Manipulator Development Facility, and interface-verification equipment (cargo-integration test equipment).

Everline, R. T.

1977-01-01

323

Metric Signature Transitions in Optical Metamaterials  

E-print Network

We demonstrate that the extraordinary waves in indefinite metamaterials experience (- - + +) effective metric signature. During a metric signature change transition in such a metamaterial, a Minkowski space-time is "created" together with large number of particles populating this space-time. Such metamaterial models provide a table top realization of metric signature change events suggested to occur in Bose-Einstein condensates and quantum gravity theories.

Igor I. Smolyaninov; Evgenii E. Narimanov

2010-07-07

324

Narrow terahertz attenuation signatures in Bacillus thuringiensis.  

PubMed

Terahertz absorption signatures from culture-cultivated Bacillus thuringiensis were measured with a THz photomixing spectrometer operating from 400 to 1200 GHz. We observe two distinct signatures centered at ?955 and 1015 GHz, and attribute them to the optically coupled particle vibrational resonance (surface phonon-polariton) of Bacillus spores. This demonstrates the potential of the THz attenuation signatures as "fingerprints" for label-free biomolecular detection. (© 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim). PMID:23821459

Zhang, Weidong; Brown, Elliott R; Viveros, Leamon; Burris, Kellie P; Stewart, C Neal

2014-10-01

325

Verification of a Parkinson's Disease Protein Signature by Multiple Reaction Monitoring  

PubMed Central

OBJECTIVE: Integration of different ‘omics data (genomic, transcriptomic, proteomic) reveals novel discoveries into biological systems. Integration of these datasets is challenging however, involving use of multiple disparate software in a sequential manner. However, the use of multiple, disparate software in a sequential manner makes the integration of multi-omic data a serious challenge. We describe the extension of Galaxy for mass spectrometric-based proteomics software, enabling advanced multi-omic applications in proteogenomics and metaproteomics. We will demonstrate the benefits of Galaxy for these analyses, as well as its value for software developers seeking to publish new software. We will also share insights on the benefits of the Galaxy framework as a bioinformatics solution for proteomic/metabolomic core facilities. METHODS: Multiple datasets for proteogenomics research (3D-fractionated salivary dataset and oral pre-malignant lesion (OPML) dataset) and metaproteomics research (OPML dataset and Severe Early Childhood Caries (SECC) dataset). Software required for analytical steps such as peaklist generation, database generation (RNA-Seq derived and others), database search (ProteinPilot and X! tandem) and for quantitative proteomics were deployed, tested and optimized for use in workflows. The software are shared in Galaxy toolshed (http://toolshed.g2.bx.psu.edu/). Results: Usage of analytical workflows resulted in reliable identification of novel proteoforms (proteogenomics) or microorganisms (metaproteomics). Proteogenomics analysis identified novel proteoforms in the salivary dataset (51) and OPML dataset (38). Metaproteomics analysis led to microbial identification in OPML and SECC datasets using MEGAN software. As examples, workflows for proteogenomics analysis (http://z.umn.edu/pg140) and metaproteomic analysis (http://z.umn.edu/mp65) are available at the usegalaxyp.org website. Tutorials for workflow usage within Galaxy-P framework are also available (http://z.umn.edu/ppingp). CONCLUSIONS: We demonstrate the use of Galaxy for integrated analysis of multi-omic data, in an accessible, transparent and reproducible manner. Our results and experiences using this framework demonstrate the potential for Galaxy to be a unifying bioinformatics solution for ‘omics core facilities.

McMahon, Kelly; Cuccurullo, Manuela; Gethings, Lee A.; Lawless, Craig; Zibetti, Maurizio; Lopiano, Leonardo; Vissers, Johannes P.C.; Fasano, Mauro; Alberio, Tiziana

2014-01-01

326

A statistical model for signature verification Ian W. McKeague  

E-print Network

curvature is developed. The prior model makes use of a spatial point process for specifying the knots, shape theory, spatial point processes, time warping. 1 Introduction People are able to recognize is useful, for example, in forensic investigations, biometric identification, and in the dating of ancient

McKeague, Ian

327

[Validation of a scatter correction method for IMRT verification using portal imaging].  

PubMed

Complex dose-delivery techniques, as currently applied in intensity-modulated radiation therapy (IMRT), require a highly efficient treatment-verification process. The present paper deals with the problem of the scatter correction for therapy verification by use of portal images obtained by an electronic portal imaging device (EPID) based on amorphous silicon. It also presents an iterative method for the scatter correction of portal images based on Monte Carlo-generated scatter kernels. First applications of this iterative scatter-correction method for the verification of intensity-modulated treatments are discussed on the basis of MVCT- and dose reconstruction. Several experiments with homogeneous and anthropomorphic phantoms were performed in order to validate the scatter correction method and to investigate the precision and relevance in view of its clinical applicability. It is shown that the devised concept of scatter correction significantly improves the results of MVCT- and dose reconstruction models, which is in turn essential for an exact online IMRT verification. PMID:15323287

Kyas, Ina; Partridge, Mike; Hesse, Bernd-Michael; Oelfke, Uwe; Schlegel, Wolfgang

2004-01-01

328

Description of Bad-Signatures for Network Intrusion Detection  

E-print Network

Today, a computer network is under constant assault from attacks. In Computer Science, NIDS are used in order to protect a computer network against these intrusions. These systems normally use stochastic approaches or a rule-based system to detect intrusions and to describe the known intrusions. These systems have some disadvantages which we solve with a new approach called ANIMA. ANIMA stores bad-signatures of intrusions in directed and weighted graphs as well as returns for each checked-packet a value how malicious the packet is. The primary advantages of ANIMA are the online-system, adaptation, easy administration and storage-saving. In this article, we discuss the approach ANIMA for intrusion detection, the advantages and disadvantages, the implementation as well as the results occurred out of the simulations that ANIMA for intrusion detection works well in bad-packet-identification as well as the implementation substantiates the theoretical advantages.

Michael Hilker; Christoph Schommer

2006-01-01

329

LD Online  

NSDL National Science Digital Library

LD Online is a website focused on providing information on learning disabilities (LD) and attention-deficit hyperactivity disorder (ADHD) which is geared towards parents, teachers, and professionals. The site is an educational service of public television station WETA, and also works with the National Joint Committee on Learning Disabilities. Visitors will find that the site addresses both children and adults with LD and ADHD, and those who are unfamiliar with LD and ADHD will appreciate the site's "Getting Started" link, which has "LD Basics", "ADHD Basics", "Questions + Answers" and a "Glossary". The "Multimedia" link of videos, audio, and transcripts will give visitors the opportunity to listen to or watch experts in the field. They can also listen to the personal stories of families, teachers, and kids with LD or ADHD. Practical tips for parents are also offered in the Multimedia link. Users will be pleasantly surprised by the optimism and determination of some of these kids, when reading their personal stories in the "Your Stories" section.

330

Signature authentication by forensic document examiners.  

PubMed

We report on the first controlled study comparing the abilities of forensic document examiners (FDEs) and laypersons in the area of signature examination. Laypersons and professional FDEs were given the same signature-authentication/simulation-detection task. They compared six known signatures generated by the same person with six unknown signatures. No a priori knowledge of the distribution of genuine and nongenuine signatures in the unknown signature set was available to test-takers. Three different monetary incentive schemes were implemented to motivate the laypersons. We provide two major findings: (i) the data provided by FDEs and by laypersons in our tests were significantly different (namely, the hypothesis that there is no difference between the assessments provided by FDEs and laypersons about genuineness and nongenuineness of signatures was rejected); and (ii) the error rates exhibited by the FDEs were much smaller than those of the laypersons. In addition, we found no statistically significant differences between the data sets obtained from laypersons who received different monetary incentives. The most pronounced differences in error rates appeared when nongenuine signatures were declared authentic (Type I error) and when authentic signatures were declared nongenuine (Type II error). Type I error was made by FDEs in 0.49% of the cases, but laypersons made it in 6.47% of the cases. Type II error was made by FDEs in 7.05% of the cases, but laypersons made it in 26.1% of the cases. PMID:11451071

Kam, M; Gummadidala, K; Fielding, G; Conn, R

2001-07-01

331

Video-Based Fingerprint Verification  

PubMed Central

Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, “inside similarity” and “outside similarity” are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

Qin, Wei; Yin, Yilong; Liu, Lili

2013-01-01

332

RISKIND verification and benchmark comparisons  

SciTech Connect

This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

1997-08-01

333

Video-based fingerprint verification.  

PubMed

Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, "inside similarity" and "outside similarity" are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

Qin, Wei; Yin, Yilong; Liu, Lili

2013-01-01

334

Automated UF6 Cylinder Enrichment Assay: Status of the Hybrid Enrichment Verification Array (HEVA) Project: POTAS Phase II  

SciTech Connect

Pacific Northwest National Laboratory (PNNL) intends to automate the UF6 cylinder nondestructive assay (NDA) verification currently performed by the International Atomic Energy Agency (IAEA) at enrichment plants. PNNL is proposing the installation of a portal monitor at a key measurement point to positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until inspector arrival. This report summarizes the status of the research and development of an enrichment assay methodology supporting the cylinder verification concept. The enrichment assay approach exploits a hybrid of two passively-detected ionizing-radiation signatures: the traditional enrichment meter signature (186-keV photon peak area) and a non-traditional signature, manifested in the high-energy (3 to 8 MeV) gamma-ray continuum, generated by neutron emission from UF6. PNNL has designed, fabricated, and field-tested several prototype assay sensor packages in an effort to demonstrate proof-of-principle for the hybrid assay approach, quantify the expected assay precision for various categories of cylinder contents, and assess the potential for unsupervised deployment of the technology in a portal-monitor form factor. We refer to recent sensor-package prototypes as the Hybrid Enrichment Verification Array (HEVA). The report provides an overview of the assay signatures and summarizes the results of several HEVA field measurement campaigns on populations of Type 30B UF6 cylinders containing low-enriched uranium (LEU), natural uranium (NU), and depleted uranium (DU). Approaches to performance optimization of the assay technique via radiation transport modeling are briefly described, as are spectroscopic and data-analysis algorithms.

Jordan, David V.; Orton, Christopher R.; Mace, Emily K.; McDonald, Benjamin S.; Kulisek, Jonathan A.; Smith, Leon E.

2012-06-01

335

Simulation and Verification of UML-based Railway Interlocking Designs  

E-print Network

. Keywords: Railway Interlocking System, UML, Simulation, Verification, Model Checking, Multi-Object Checking by simulation and animation, the other is verification by model checking. The first method is supported to cover all the possible situations by test cases for verification and validation. Verification by model

Paris-Sud XI, Université de

336

Promising Directions in Hardware Design Verification Shaz Qadeer Serdar Tasiran  

E-print Network

and comprehensiveness of partial verification. 1 Introduction Functional validation of hardware designs is an important and formal verification. Currently, neither approach is able to handle industrial designs. Simulation can verification. The most widely used formal verification method is model checking [1, 2] where properties

Tasiran, Serdar

337

Requirements, Verification, and Compliance (RVC) Database Tool  

NASA Technical Reports Server (NTRS)

This paper describes the development, design, and implementation of the Requirements, Verification, and Compliance (RVC) database used on the International Space Welding Experiment (ISWE) project managed at Marshall Space Flight Center. The RVC is a systems engineer's tool for automating and managing the following information: requirements; requirements traceability; verification requirements; verification planning; verification success criteria; and compliance status. This information normally contained within documents (e.g. specifications, plans) is contained in an electronic database that allows the project team members to access, query, and status the requirements, verification, and compliance information from their individual desktop computers. Using commercial-off-the-shelf (COTS) database software that contains networking capabilities, the RVC was developed not only with cost savings in mind but primarily for the purpose of providing a more efficient and effective automated method of maintaining and distributing the systems engineering information. In addition, the RVC approach provides the systems engineer the capability to develop and tailor various reports containing the requirements, verification, and compliance information that meets the needs of the project team members. The automated approach of the RVC for capturing and distributing the information improves the productivity of the systems engineer by allowing that person to concentrate more on the job of developing good requirements and verification programs and not on the effort of being a "document developer".

Rainwater, Neil E., II; McDuffee, Patrick B.; Thomas, L. Dale

2001-01-01

338

The Internet and clinical trials: background, online resources, examples and issues. | accrualnet.cancer.gov  

Cancer.gov

The Internet is increasingly being used to improve clinical trial knowledge and awareness and facilitate participant recruitment. Online clinical trial registries connect potential clinical trial participants with research teams. Individual clinical trial Web sites provide easy-to-understand information to the public. Potential participants can be screened using online questionnaires, and enrollment and consent forms can be made available for download or digital signature.

339

Methods of Motor Current Signature Analysis  

Microsoft Academic Search

Recently a technique for monitoring and diagnosing mechanical problems, associated with rotating machines driven by electric motors, has been proposed and is now being offered by several commercial suppliers. This technique, known as “Motor Current Signature Analysis” or MCSA, seeks to apply much of the long experience in vibration signature analysis to the analysis of motor current in effect using

G. B. Kliman; J. Stein

1992-01-01

340

Cyclostationary Signatures in Practical Cognitive Radio Applications  

Microsoft Academic Search

We define a cyclostationary signature as a feature which may be intentionally embedded in a digital communications signal, detected through cyclostationary analysis and used as a unique identifier. The purpose of this paper is to demonstrate how cyclostationary signatures can be exploited to overcome a number of the challenges associated with network coordination in emerging cognitive radio applications and spectrum

Paul D. Sutton; Keith E. Nolan; Linda E. Doyle

2008-01-01

341

Synthesis of mixed pixel hyperspectral signatures  

Microsoft Academic Search

The general method of analysing mixed pixel spectral response is to decompose the actual spectra into several pure spectral components representing the signatures of the endmembers. This work suggests a reverse engineering of standardizing the mixed pixel spectrum for a certain spatial distribution of endmembers by synthesizing spectral signatures with varying proportions of standard spectral library data and matching them

Barun Raychaudhuri

2012-01-01

342

Synthesis of mixed pixel hyperspectral signatures  

Microsoft Academic Search

The general method of analysing mixed pixel spectral response is to decompose the actual spectra into several pure spectral components representing the signatures of the endmembers. This work suggests a reverse engineering of standardizing the mixed pixel spectrum for a certain spatial distribution of endmembers by synthesizing spectral signatures with varying proportions of standard spectral library data and matching them

Barun Raychaudhuri

2011-01-01

343

Print Name: Date:Signature: APPLICATION APPROVAL  

E-print Network

Print Name: Date:Signature: APPLICATION APPROVAL OFFICE USE ONLY Semester Summer School Semester 2 Semester 1 Notes: Email Sent Date Signature:Name: Jumbunna File # Administration Unit Use Only Notification Date Date Date Acess Period Start Date: Start Date: Start Date: End Date: End Date: End Date: Date Date

University of Technology, Sydney

344

Polygraph: Automatically Generating Signatures for Polymorphic Worms  

Microsoft Academic Search

It is widely believed that content-signature-based intru- sion detection systems (IDSes) are easily evaded by poly- morphic worms, which vary their payload on every infec- tion attempt. In this paper, we present Polygraph, a sig- nature generation system that successfully produces signa- tures that match polymorphic worms. Polygraph gener- ates signatures that consist of multiple disjoint content sub- strings. In

James Newsome; Brad Karp; Dawn Xiaodong Song

2005-01-01

345

Paragraph: Thwarting Signature Learning by Training Maliciously  

E-print Network

, and Dawn Song1 1 Carnegie Mellon University 2 University College London Abstract. Defending a server's infection attempts contain nearly an identical payload. The first generation of automatic signature techniques to minimize the similarity between infection payloads, and thus evade filtering by worm signatures

Karp, Brad

346

Signatures of Correct Computation Charalampos Papamanthou  

E-print Network

also show that signatures of correct computation imply Publicly Verifiable Computation (PVC), a model client can verify the signature and be convinced of some computation result, whereas in the PVC model to construct PVC schemes with adaptive security, efficient updates and without the random oracle model. 1

347

Does Social Work Have a Signature Pedagogy?  

ERIC Educational Resources Information Center

This article contributes to discourse on signature pedagogy by reconceptualizing how our pedagogies are understood and defined for social work education. We critique the view that field education is social work's signature pedagogy and consider what pedagogies are distinct about the teaching and learning of social work. Using Shulman's…

Earls Larrison, Tara; Korr, Wynne S.

2013-01-01

348

Security of Verifiably Encrypted Signatures Markus Ruckert  

E-print Network

correctly. The security properties are unforgeability and opacity. Unforgeability states that a malicious signer should not be able to forge verifiably encrypted signatures and opacity prevents extraction from elsewhere. Security of verifiably encrypted signatures is defined via unforgeability and opacity [BGLS03

349

Holographic Signatures of Cosmological Singularities  

NASA Astrophysics Data System (ADS)

To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N =4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function.

Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T.

2014-09-01

350

SUSY multilepton signatures at Tevatron  

SciTech Connect

One of the most striking signature of supersymmetric models with electroweak symmetry breaking is the presence of multilepton event topologies in the decay products. In this paper searches are presented for physics beyond the Standard Model (SM) in final states containing charged leptons from proton-antiproton collision data at a center-of-mass energy of 1.96 TeV, collected with Run II CDF and D0 Detectors in 2002-2006, and corresponding to integrated luminosities of up to 1.1 fb{sup -1}. In any of the searches no excess of candidates was observed with respect to the SM predictions and limits on masses and production cross-sections are set at the 95% CL.

Titov, Maxim; /Freiburg U.

2007-02-01

351

Holographic signatures of cosmological singularities.  

PubMed

To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N=4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function. PMID:25279620

Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T

2014-09-19

352

Design for Verification: Enabling Verification of High Dependability Software-Intensive Systems  

NASA Technical Reports Server (NTRS)

Strategies to achieve confidence that high-dependability applications are correctly implemented include testing and automated verification. Testing deals mainly with a limited number of expected execution paths. Verification usually attempts to deal with a larger number of possible execution paths. While the impact of architecture design on testing is well known, its impact on most verification methods is not as well understood. The Design for Verification approach considers verification from the application development perspective, in which system architecture is designed explicitly according to the application's key properties. The D4V-hypothesis is that the same general architecture and design principles that lead to good modularity, extensibility and complexity/functionality ratio can be adapted to overcome some of the constraints on verification tools, such as the production of hand-crafted models and the limits on dynamic and static analysis caused by state space explosion.

Mehlitz, Peter C.; Penix, John; Markosian, Lawrence Z.; Koga, Dennis (Technical Monitor)

2003-01-01

353

Irma multisensor predictive signature model  

NASA Astrophysics Data System (ADS)

The Irma synthetic signature model was one of the first high resolution synthetic infrared (IR) target and background signature models to be developed for tactical air-to-surface weapon scenarios. Originally developed in 1980 by the Armament Directorate of the Air Force Wright Laboratory (WL/MN), the Irma model was used exclusively to generate IR scenes for smart weapons research and development. In 1988, a number of significant upgrades to Irma were initiated including the addition of a laser channel. This two channel version, Irma 3.0, was released to the user community in 1990. In 1992, an improved scene generator was incorporated into the Irma model which supported correlated frame-to-frame imagery. This and other improvements were released in Irma 2.2. Recently, Irma 3.2, a passive IR/millimeter wave (MMW) code, was completed. Currently, upgrades are underway to include an active MMW channel. Designated Irma 4.0, this code will serve as a cornerstone of sensor fusion research in the laboratory from 6.1 concept development to 6.3 technology demonstration programs for precision guided munitions. Several significant milestones have been reached in this development process and are demonstrated. The Irma 4.0 software design has been developed and interim results are available. Irma is being developed to facilitate multi-sensor smart weapons research and development. It is currently in distribution to over 80 agencies within the U.S. Air Force, U.S. Army, U.S. Navy, ARPA, NASA, Department of Transportation, academia, and industry.

Watson, John S.; Flynn, David S.; Wellfare, Michael R.; Richards, Mike; Prestwood, Lee

1995-06-01

354

The Online Underworld.  

ERIC Educational Resources Information Center

Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

Scrogan, Len

1988-01-01

355

Teaching Geoscience Online  

NSDL National Science Digital Library

More and more schools are offering online courses in the sciences, and the geophysical sciences are no exception. Carleton College is deservedly well known for their "Cutting Edge" website of geoscience teaching resources, and here they present some helpful materials for those wishing to teach geoscience online. The resources were developed as part of their 2010 workshop titled "Teaching Geoscience Online". Visitors can scroll through the list of resources, which are divided into sections that include "pedagogy" and "online activities and courses". The materials include titles like "Student Motivation and Engagement in Online Courses", "Using Data to Teach Geology in College-Level Online Classes", and "Course Platforms for Teaching Online". A number of these resources could be used by anyone teaching online courses, not just those in the field of geoscience.

356

TOXLINE (TOXICOLOGY INFORMATION ONLINE)  

EPA Science Inventory

TOXLINE? (TOXicology information onLINE) are the National Library of Medicines extensive collection of online bibliographic information covering the pharmacological, biochemical, physiological, and toxicological effects of drugs and other chemicals. TOXLINE and TOXLINE65 together...

357

Signatures of mutational processes in human cancer.  

PubMed

All cancers are caused by somatic mutations; however, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single cancer class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, 'kataegis', is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer, with potential implications for understanding of cancer aetiology, prevention and therapy. PMID:23945592

Alexandrov, Ludmil B; Nik-Zainal, Serena; Wedge, David C; Aparicio, Samuel A J R; Behjati, Sam; Biankin, Andrew V; Bignell, Graham R; Bolli, Niccolò; Borg, Ake; Børresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P; Caldas, Carlos; Davies, Helen R; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinski, Marcin; Imielinsk, Marcin; Jäger, Natalie; Jones, David T W; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C; Nakamura, Hiromi; Northcott, Paul A; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V; Puente, Xose S; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N; Span, Paul N; Teague, Jon W; Totoki, Yasushi; Tutt, Andrew N J; Valdés-Mas, Rafael; van Buuren, Marit M; van 't Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R; Zucman-Rossi, Jessica; Futreal, P Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M; Campbell, Peter J; Stratton, Michael R

2013-08-22

358

Real time gamma-ray signature identifier  

DOEpatents

A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

Rowland, Mark (Alamo, CA); Gosnell, Tom B. (Moraga, CA); Ham, Cheryl (Livermore, CA); Perkins, Dwight (Livermore, CA); Wong, James (Dublin, CA)

2012-05-15

359

Seismic verification of underground explosions  

SciTech Connect

The first nuclear test agreement, the test moratorium, was made in 1958 and lasted until the Soviet Union unilaterally resumed testing in the atmosphere in 1961. It was followed by the Limited Test Ban Treaty of 1963, which prohibited nuclear tests in the atmosphere, in outer space, and underwater. In 1974 the Threshold Test Ban Treaty (TTBT) was signed, limiting underground tests after March 1976 to a maximum yield of 250 kt. The TTBT was followed by a treaty limiting peaceful nuclear explosions and both the United States and the Soviet Union claim to be abiding by the 150-kt yield limit. A comprehensive test ban treaty (CTBT), prohibiting all testing of nuclear weapons, has also been discussed. However, a verifiable CTBT is a contradiction in terms. No monitoring technology can offer absolute assurance that very-low-yield illicit explosions have not occurred. The verification process, evasion opportunities, and cavity decoupling are discussed in this paper.

Glenn, L.A.

1985-06-01

360

Task-specific style verification  

NASA Astrophysics Data System (ADS)

Programming antipatterns are commonly used patterns that make the code unnecessary complex and unmaintainable. However, beginner programmers such as students, often use them. Usage of antipatterns should be eliminated from source code. Many antipatterns can be detected at compilation-time with an appropriate parser tool. In this paper we argue for a new lint-like tool that does detect typical programming antipatterns, and it is extensible to task-specific verifications. This tool mainly developed to evaluate students' programs, however it can be used in industrial projects as well. Our approach based on pattern matching on abstract syntax tree provided by Clang parser. We present our description language that specifies the antipatterns.

Pataki, Norbert; Cséri, Tamás; Szügyi, Zalán

2012-09-01

361

Verification of FANTASTIC integrated code  

NASA Technical Reports Server (NTRS)

FANTASTIC is an acronym for Failure Analysis Nonlinear Thermal and Structural Integrated Code. This program was developed by Failure Analysis Associates, Palo Alto, Calif., for MSFC to improve the accuracy of solid rocket motor nozzle analysis. FANTASTIC has three modules: FACT - thermochemical analysis; FAHT - heat transfer analysis; and FAST - structural analysis. All modules have keywords for data input. Work is in progress for the verification of the FAHT module, which is done by using data for various problems with known solutions as inputs to the FAHT module. The information obtained is used to identify problem areas of the code and passed on to the developer for debugging purposes. Failure Analysis Associates have revised the first version of the FANTASTIC code and a new improved version has been released to the Thermal Systems Branch.

Chauhan, Rajinder Singh

1987-01-01

362

Verification of NASA Emergent Systems  

NASA Technical Reports Server (NTRS)

NASA is studying advanced technologies for a future robotic exploration mission to the asteroid belt. This mission, the prospective ANTS (Autonomous Nano Technology Swarm) mission, will comprise of 1,000 autonomous robotic agents designed to cooperate in asteroid exploration. The emergent properties of swarm type missions make them powerful, but at the same time are more difficult to design and assure that the proper behaviors will emerge. We are currently investigating formal methods and techniques for verification and validation of future swarm-based missions. The advantage of using formal methods is their ability to mathematically assure the behavior of a swarm, emergent or otherwise. The ANT mission is being used as an example and case study for swarm-based missions for which to experiment and test current formal methods with intelligent swam. Using the ANTS mission, we have evaluated multiple formal methods to determine their effectiveness in modeling and assuring swarm behavior.

Rouff, Christopher; Vanderbilt, Amy K. C. S.; Truszkowski, Walt; Rash, James; Hinchey, Mike

2004-01-01

363

DNA Methylation Signature of Childhood Chronic Physical Aggression in T Cells of Both Men and Women  

PubMed Central

Background High frequency of physical aggression is the central feature of severe conduct disorder and is associated with a wide range of social, mental and physical health problems. We have previously tested the hypothesis that differential DNA methylation signatures in peripheral T cells are associated with a chronic aggression trajectory in males. Despite the fact that sex differences appear to play a pivotal role in determining the development, magnitude and frequency of aggression, most of previous studies focused on males, so little is known about female chronic physical aggression. We therefore tested here whether or not there is a signature of physical aggression in female DNA methylation and, if there is, how it relates to the signature observed in males. Methodology/Principal Findings Methylation profiles were created using the method of methylated DNA immunoprecipitation (MeDIP) followed by microarray hybridization and statistical and bioinformatic analyses on T cell DNA obtained from adult women who were found to be on a chronic physical aggression trajectory (CPA) between 6 and 12 years of age compared to women who followed a normal physical aggression trajectory. We confirmed the existence of a well-defined, genome-wide signature of DNA methylation associated with chronic physical aggression in the peripheral T cells of adult females that includes many of the genes similarly associated with physical aggression in the same cell types of adult males. Conclusions This study in a small number of women presents preliminary evidence for a genome-wide variation in promoter DNA methylation that associates with CPA in women that warrant larger studies for further verification. A significant proportion of these associations were previously observed in men with CPA supporting the hypothesis that the epigenetic signature of early life aggression in females is composed of a component specific to females and another common to both males and females. PMID:24475181

Guillemin, Claire; Provencal, Nadine; Suderman, Matthew; Cote, Sylvana M.; Vitaro, Frank; Hallett, Michael; Tremblay, Richard E.; Szyf, Moshe

2014-01-01

364

Online Monitoring of Plant Assets in the Nuclear Industry  

SciTech Connect

Today’s online monitoring technologies provide opportunities to perform predictive and proactive health management of assets within many different industries, in particular the defense and aerospace industries. The nuclear industry can leverage these technologies to enhance safety, productivity, and reliability of the aging fleet of existing nuclear power plants. The U.S. Department of Energy’s Light Water Reactor Sustainability Program is collaborating with the Electric Power Research Institute’s (EPRI’s) Long-Term Operations program to implement online monitoring in existing nuclear power plants. Proactive online monitoring in the nuclear industry is being explored using EPRI’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software, a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. This paper focuses on development of asset fault signatures used to assess the health status of generator step-up transformers and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. Fault signatures are developed based on the results of detailed technical research and on the knowledge and experience of technical experts. The Diagnostic Advisor of the FW-PHM Suite software matches developed fault signatures with operational data to provide early identification of critical faults and troubleshooting advice that could be used to distinguish between faults with similar symptoms. This research is important as it will support the automation of predictive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

Nancy Lybeck; Vivek Agarwal; Binh Pham; Richard Rusaw; Randy Bickford

2013-10-01

365

EMR Electronic Signature Electronic Signature: Usage in Medical Records and Other Electronic Transactions  

E-print Network

The purpose of this policy is to confirm Washington University’s commitment to conducting business in compliance with all applicable laws, regulations and University Policies. This policy outlines the technical measures required to insure appropriate signatures are assigned to electronic information and related material and to protect from unauthorized use. In addition, the FDA requires that electronic records and signatures be maintained in accordance with the FDA regulations relevant to the safety and integrity of study data under regulation, 21 CRF Part 11. This regulation has an increasing impact on Washington University School of Medicine since the majority of our patient records are maintained electronically. POLICY: 1. The term electronic signature means a signature in electronic format, attached to or logically associated with an electronic record. 2. The University considers electronic signatures to be legally binding and the equivalent to a handwritten signature. University employees will only utilize electronic signatures for appropriate business purposes. In addition, employees are accountable for all actions initiated under their electronic signature. Falsification of records or signatures may be subject to disciplinary action. Employees are required to report any suspected or fraudulent use of signatures immediately. REFERENCES: Several legislative requirements impact the use of electronic signatures. Additional information can be found at

unknown authors

366

Online Education Interim Report  

ERIC Educational Resources Information Center

This interim report produced by the Colorado State Board of Education Online Education Task Force examines key issues related to online education. Task force members agree that: (1) online education has become a viable element of Colorado's public education system; (2) the role of technology in educating our children will continue to grow; and (3)…

Protopsaltis, Spiros, Ed.

2007-01-01

367

Assessing Online Learning  

ERIC Educational Resources Information Center

Students in traditional as well as online classrooms need more than grades from their instructors--they also need meaningful feedback to help bridge their academic knowledge and skills with their daily lives. With the increasing number of online learning classrooms, the question of how to consistently assess online learning has become increasingly…

Comeaux, Patricia, Ed.

2004-01-01

368

Online Higher Education Commodity  

ERIC Educational Resources Information Center

This article analyzes the current trend towards online education. It examines some of the reasons for the trend and the ramifications it may have on students, faculty and institutions of higher learning. The success and profitability of online programs and institutions such as the University of Phoenix has helped to make the move towards online

Chau, Paule

2010-01-01

369

Differentially Private Online Learning  

Microsoft Academic Search

In this paper, we consider the problem of preserving privacy in the online learning setting. We study the problem in the online convex programming (OCP) framework---a popular online learning setting with several interesting theoretical and practical implications---while using differential privacy as the formal privacy measure. For this problem, we distill two critical attributes that a private OCP algorithm should have

Prateek Jain; Pravesh Kothari; Abhradeep Thakurta

2011-01-01

370

Enabling trust online  

Microsoft Academic Search

Trust is one of the mainstays of commerce. However, as more and more individuals and businesses participate in electronic commerce, it is becoming apparent that much of what supports trust in the traditional commerce setting is unavailable online. This paper explores the nature of trust online, identifying the ten principles underpinning the concept of trust and the online mechanisms that

Michelle Daignault; Michael Shepherd; Sunny Marche; Carolyn Watters

2002-01-01

371

Nutrition Online GRADUATE CERTIFICATE  

E-print Network

are online. Important Dates Please visit the program web site for application deadlines and program datesNutrition Online GRADUATE CERTIFICATE PROGRAMS Reach your career goals while you continue to work from anywhere in the world with three unique programs for mid-career professionals. Online Programs in

Tufts University

372

Online Learning. Symposium.  

ERIC Educational Resources Information Center

This document contains three papers from a symposium on online learning that was conducted as part of a conference on human resource development (HRD). "An Instructional Strategy Framework for Online Learning Environments" (Scott D. Johnson, Steven R. Aragon) discusses the pitfalls of modeling online courses after traditional instruction instead…

2002

373

Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model  

NASA Astrophysics Data System (ADS)

How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

374

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2010 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2010-01-01

375

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2011 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2011-01-01

376

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2013 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2013-01-01

377

9 CFR 416.17 - Agency verification.  

Code of Federal Regulations, 2012 CFR

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2012-01-01

378

9 CFR 416.17 - Agency verification.  

...THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification...the adequacy and effectiveness of the Sanitation SOP's and the procedures specified...may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the...

2014-01-01

379

9 CFR 417.8 - Agency verification.  

Code of Federal Regulations, 2010 CFR

... HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part...

2010-01-01

380

40 CFR 1065.307 - Linearity verification.  

Code of Federal Regulations, 2010 CFR

...or as another example you may select values to ascend and then descend which might incorporate the effects of any instrument hysteresis into the linearity verification. (8) Generate reference quantities as described in paragraph (d) of this...

2010-07-01

381

ETV - ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) - RISK MANAGEMENT  

EPA Science Inventory

In October 1995, the Environmental Technology Verification (ETV) Program was established by EPA. The goal of ETV is to provide credible performance data for commercial-ready environmental technologies to speed their implementation for the benefit of vendors, purchasers, permitter...

382

ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS  

EPA Science Inventory

The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

383

Environmental Technology Verification Program (ETV) Policy Compendium  

EPA Science Inventory

The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

384

VERIFICATION OF GLOBAL CLIMATE CHANGE MITIGATION TECHNOLOGIES  

EPA Science Inventory

This is a continuation of independent performance evaluations of environmental technologies under EPA's Environmental Technology Verification Program. Emissions of some greenhouse gases, most notably methane. can be controlled profitably now, even in the absence of regulations. ...

385

ETV PILOTS (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM)  

EPA Science Inventory

The Environmental Technology Verification (ETV) Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantially accelerate the entrance of new environmental technologies ...

386

Microprocessor Design Verification Warren A. Hunt, Jr.  

E-print Network

Microprocessor Design Verification Warren A. Hunt, Jr. Copyright ã 1989 Warren A. Hunt, Jr is quite similar to the 16­bit FM8501 microprocessor [Hunt 85, Hunt 87]; however, the FM8502 has a richer 1

Boyer, Robert Stephen

387

The PASCAL-HDM Verification System  

NASA Technical Reports Server (NTRS)

The PASCAL-HDM verification system is described. This system supports the mechanical generation of verification conditions from PASCAL programs and HDM-SPECIAL specifications using the Floyd-Hoare axiomatic method. Tools are provided to parse programs and specifications, check their static semantics, generate verification conditions from Hoare rules, and translate the verification conditions appropriately for proof using the Shostak Theorem Prover, are explained. The differences between standard PASCAL and the language handled by this system are explained. This consists mostly of restrictions to the standard language definition, the only extensions or modifications being the addition of specifications to the code and the change requiring the references to a function of no arguments to have empty parentheses.

1983-01-01

388

HDM/PASCAL Verification System User's Manual  

NASA Technical Reports Server (NTRS)

The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

Hare, D.

1983-01-01

389

16 CFR 315.5 - Prescriber verification.  

Code of Federal Regulations, 2012 CFR

... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CONTACT LENS RULE § 315.5 Prescriber verification. (a) Prescription...address; (2) The contact lens power, manufacturer, base curve or appropriate designation, and diameter when...

2012-01-01

390

16 CFR 315.5 - Prescriber verification.  

... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CONTACT LENS RULE § 315.5 Prescriber verification. (a) Prescription...address; (2) The contact lens power, manufacturer, base curve or appropriate designation, and diameter when...

2014-01-01

391

16 CFR 315.5 - Prescriber verification.  

Code of Federal Regulations, 2013 CFR

... REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CONTACT LENS RULE § 315.5 Prescriber verification. (a) Prescription...address; (2) The contact lens power, manufacturer, base curve or appropriate designation, and diameter when...

2013-01-01

392

Runtime verification of object lifetime specifications  

E-print Network

This thesis reports on the implementation of a runtime verification system for object lifetime specifications. This system is used to explore and evaluate the expressiveness object lifetime specifications. Object lifetime ...

Benjamin, Zev (Zev A.)

2009-01-01

393

A relational framework for bounded program verification  

E-print Network

All software verification techniques, from theorem proving to testing, share the common goal of establishing a program's correctness with both (1) a high degree of confidence and (2) a low cost to the user, two criteria ...

Dennis, Gregory D. (Gregory David), 1980-

2009-01-01

394

Existence Verification for Singular Zeros of Nonlinear  

E-print Network

Existence Verification for Singular Zeros of Nonlinear Systems by R. Baker Kearfott, rbk@usl.edu Department of Mathematics, University of Southwestern Louisiana and Jianwei Dian, dian@usl.edu Department

Kearfott, R. Baker

395

Shifting Gears in Hippocampus: Temporal Dissociation between Familiarity and Novelty Signatures in a Single Event.  

PubMed

The hippocampus is known to be involved in encoding and retrieval of episodes. However, real-life experiences are expected to involve both encoding and retrieval, and it is unclear how the human hippocampus subserves both functions in the course of a single event. We presented participants with brief movie clips multiple times and examined the effect of familiarity on the hippocampal response at event onset versus event offset. Increased familiarity resulted in a decreased offset response, indicating that the offset response is a novelty-related signature. The magnitude of this offset response was correlated, across hippocampal voxels, with an independent measure of successful encoding, based on nonrepeated clips. This suggests that the attenuated offset response to familiar clips reflects reduced encoding. In addition, the posterior hippocampus exhibited an increased onset response to familiar events, switching from an online familiarity signal to an offline novelty signal during a single event. Moreover, participants with stronger memory exhibited increased reactivation of online activity during familiar events, in line with a retrieval signature. Our results reveal a spatiotemporal dissociation between novelty/encoding and familiarity/retrieval signatures, assumed to reflect different computational modes, in response to the same stimulus. PMID:25253846

Ben-Yakov, Aya; Rubinson, Mica; Dudai, Yadin

2014-09-24

396

The NPARC Alliance Verification and Validation Archive  

NASA Technical Reports Server (NTRS)

The NPARC Alliance (National Project for Applications oriented Research in CFD) maintains a publicly-available, web-based verification and validation archive as part of the development and support of the WIND CFD code. The verification and validation methods used for the cases attempt to follow the policies and guidelines of the ASME and AIAA. The emphasis is on air-breathing propulsion flow fields with Mach numbers ranging from low-subsonic to hypersonic.

Slater, John W.; Dudek, Julianne C.; Tatum, Kenneth E.

2000-01-01

397

Inventory verification measurements using neutron multiplicity counting  

SciTech Connect

This paper describes a series of neutron multiplicity measurements of large plutonium samples at the Los Alamos Plutonium Facility. The measurements were corrected for bias caused by neutron energy spectrum shifts and nonuniform multiplication, and are compared with calorimetry/isotopics. The results show that multiplicity counting can increase measurement throughput and yield good verification results for some inventory categories. The authors provide recommendations on the future application of the technique to inventory verification.

Ensslin, N.; Foster, L.A.; Harker, W.C.; Krick, M.S.; Langner, D.G.

1998-12-31

398

Infrared ship signature analysis and optimisation  

NASA Astrophysics Data System (ADS)

The last decade has seen an increase in the awareness of the infrared signature of naval ships. New ship designs show that infrared signature reduction measures are being incorporated, such as exhaust gas cooling systems, relocation of the exhausts and surface cooling systems. Hull and superstructure are cooled with dedicated spray systems, in addition to special paint systems that are being developed for optimum stealth. This paper presents a method to develop requirements for the emissivity of a ship's coating that reduces the contrast of the ship against its background in the wavelength band or bands of threat sensors. As this contrast strongly depends on the atmospheric environment, these requirements must follow from a detailed analysis of the infrared signature of the ship in its expected areas of operation. Weather statistics for a large number of areas have been collected to produce a series of 'standard environments'. These environments have been used to demonstrate the method of specifying coating emissivity requirements. Results are presented to show that the optimised coatings reduce the temperature contrast. The use of the standard environments yields a complete, yet concise, description of the signature of the ship over its areas of operation. The signature results illustrate the strong dependence of the infrared signature on the atmospheric environment and can be used to identify those conditions where signature reduction is most effective in reducing the ship's susceptibility to detection by IR sensors.

Neele, Filip

2005-05-01

399

Simulation and Experimental Validation of Electromagnetic Signatures for Monitoring of Nuclear Material Storage Containers  

SciTech Connect

Previous research at the Pacific Northwest National Laboratory (PNNL) has demonstrated that the low frequency electromagnetic (EM) response of a sealed metallic container interrogated with an encircling coil is a strong function of its contents and can be used to form a distinct signature which can confirm the presence of specific components without revealing hidden geometry or classified design information. Finite element simulations have recently been performed to further investigate this response for a variety of configurations composed of an encircling coil and a typical nuclear material storage container. Excellent agreement was obtained between simulated and measured impedance signatures of electrically conducting spheres placed inside an AT-400R nuclear container. Simulations were used to determine the effects of excitation frequency and the geometry of the encircling coil, nuclear container, and internal contents. The results show that it is possible to use electromagnetic models to evaluate the application of the EM signature technique to proposed versions of nuclear weapons containers which can accommodate restrictions imposed by international arms control and treaty verification legislation.

Aker, Pamela M.; Bunch, Kyle J.; Jones, Anthony M.

2013-01-01

400

Signature geometry and quantum engineering  

NASA Astrophysics Data System (ADS)

As the operating frequency of electromagnetic based devices increase, physical design geometry is playing an ever more important role. Evidence is considered in support of a relationship between the dimensionality of primitive geometric forms, such as transistors, and corresponding electromagnetic coupling efficiency. The industry of electronics is defined as the construction of devices by the patterning of primitive forms to physical materials. Examples are given to show the evolution of these primitives, down to nano scales, are requiring exacting geometry and three dimensional content. Consideration of microwave monolithic integrated circuits,(MMIC), photonics and metamaterials,(MM), support this trend and also add new requirements of strict geometric periodicity and multiplicity. Signature geometries,(SG), are characterized by distinctive attributes and examples are given. The transcendent form transcode algorithm, (TTA) is introduced as a multi dimensional SG and its use in designing photonic integrated circuits and metamaterials is discussed . A creative commons licensed research database, TRANSFORM, containing TTA geometries in OASIS file formats is described. An experimental methodology for using the database is given. Multidimensional SG and extraction of three dimensional cross sections as primitive forms is discussed as a foundation for quantum engineering and the exploitation of phenomena other than the electromagnetic.

Samociuk, Stefan

2013-09-01

401

Multifractal signatures of infectious diseases  

PubMed Central

Incidence of infection time-series data for the childhood diseases measles, chicken pox, rubella and whooping cough are described in the language of multifractals. We explore the potential of using the wavelet transform maximum modulus (WTMM) method to characterize the multiscale structure of the observed time series and of simulated data generated by the stochastic susceptible-exposed-infectious-recovered (SEIR) epidemic model. The singularity spectra of the observed time series suggest that each disease is characterized by a unique multifractal signature, which distinguishes that particular disease from the others. The wavelet scaling functions confirm that the time series of measles, rubella and whooping cough are clearly multifractal, while chicken pox has a more monofractal structure in time. The stochastic SEIR epidemic model is unable to reproduce the qualitative singularity structure of the reported incidence data: it is too smooth and does not appear to have a multifractal singularity structure. The precise reasons for the failure of the SEIR epidemic model to reproduce the correct multiscale structure of the reported incidence data remain unclear. PMID:22442094

Holdsworth, Amber M.; Kevlahan, Nicholas K.-R.; Earn, David J. D.

2012-01-01

402

Multifractal signatures of infectious diseases.  

PubMed

Incidence of infection time-series data for the childhood diseases measles, chicken pox, rubella and whooping cough are described in the language of multifractals. We explore the potential of using the wavelet transform maximum modulus (WTMM) method to characterize the multiscale structure of the observed time series and of simulated data generated by the stochastic susceptible-exposed-infectious-recovered (SEIR) epidemic model. The singularity spectra of the observed time series suggest that each disease is characterized by a unique multifractal signature, which distinguishes that particular disease from the others. The wavelet scaling functions confirm that the time series of measles, rubella and whooping cough are clearly multifractal, while chicken pox has a more monofractal structure in time. The stochastic SEIR epidemic model is unable to reproduce the qualitative singularity structure of the reported incidence data: it is too smooth and does not appear to have a multifractal singularity structure. The precise reasons for the failure of the SEIR epidemic model to reproduce the correct multiscale structure of the reported incidence data remain unclear. PMID:22442094

Holdsworth, Amber M; Kevlahan, Nicholas K-R; Earn, David J D

2012-09-01

403

SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2008; 18:125148  

E-print Network

SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2008; 18; multi-way testing; software testing Correspondence to: Yu Lei, Department of Computer Science-way testing, consider an elementary software system consisting of three Boolean parameters. Denote the two

Perkins, Richard A.

404

On-Line System for Fault Detection in Induction Machines Based on Wavelet Convolution  

Microsoft Academic Search

Motor current signature analysis has been successfully used in induction machines for fault diagnosis. The method however does not always achieve good results when the load torque is not constant. For proper results temporal analysis on determined frequency harmonics is needed. This paper proposes an automatic system for fault analysis based on wavelet functions, which allows on-line fault detection on

J. Cusido; J. A. Rosero; M. Cusido; A. Garcia; J. A. Ortega; L. Romeral

2007-01-01

405

Learning Assumptions for Compositional Verification  

NASA Technical Reports Server (NTRS)

Compositional verification is a promising approach to addressing the state explosion problem associated with model checking. One compositional technique advocates proving properties of a system by checking properties of its components in an assume-guarantee style. However, the application of this technique is difficult because it involves non-trivial human input. This paper presents a novel framework for performing assume-guarantee reasoning in an incremental and fully automated fashion. To check a component against a property, our approach generates assumptions that the environment needs to satisfy for the property to hold. These assumptions are then discharged on the rest of the system. Assumptions are computed by a learning algorithm. They are initially approximate, but become gradually more precise by means of counterexamples obtained by model checking the component and its environment, alternately. This iterative process may at any stage conclude that the property is either true or false in the system. We have implemented our approach in the LTSA tool and applied it to the analysis of a NASA system.

Cobleigh, Jamieson M.; Giannakopoulou, Dimitra; Pasareanu, Corina; Clancy, Daniel (Technical Monitor)

2002-01-01

406

Visual inspection for CTBT verification  

SciTech Connect

On-site visual inspection will play an essential role in future Comprehensive Test Ban Treaty (CTBT) verification. Although seismic and remote sensing techniques are the best understood and most developed methods for detection of evasive testing of nuclear weapons, visual inspection can greatly augment the certainty and detail of understanding provided by these more traditional methods. Not only can visual inspection offer ``ground truth`` in cases of suspected nuclear testing, but it also can provide accurate source location and testing media properties necessary for detailed analysis of seismic records. For testing in violation of the CTBT, an offending party may attempt to conceal the test, which most likely will be achieved by underground burial. While such concealment may not prevent seismic detection, evidence of test deployment, location, and yield can be disguised. In this light, if a suspicious event is detected by seismic or other remote methods, visual inspection of the event area is necessary to document any evidence that might support a claim of nuclear testing and provide data needed to further interpret seismic records and guide further investigations. However, the methods for visual inspection are not widely known nor appreciated, and experience is presently limited. Visual inspection can be achieved by simple, non-intrusive means, primarily geological in nature, and it is the purpose of this report to describe the considerations, procedures, and equipment required to field such an inspection.

Hawkins, W.; Wohletz, K.

1997-03-01

407

Oxford Scholarship Online Oxford Scholarship Online(OSO)?  

E-print Network

Oxford Scholarship Online #12; · Oxford Scholarship Online(OSO)? · 1. 2. 3. 4. PDF 5. DOI #12;Oxford Scholarship Online 3 Oxford Scholarship Online(OSO) · 9,000+ · 5 (,, , , ) · 20 Online (OSO) 2. Subject Specializations 3. Browse by Subject 5 1 2 3 #12;1. 2. You

Chen, Sheng-Wei

408

Quantum Mechanical Stabilization of Minkowski Signature Wormholes.  

National Technical Information Service (NTIS)

When one attempts to construct classical wormholes in Minkowski signature Lorentzian spacetimes violations of both the weak energy hypothesis and averaged weak energy hypothesis are encountered. Since the weak energy hypothesis is experimentally known to ...

M. Visser

1989-01-01

409

17 CFR 232.302 - Signatures.  

...Signatures. 232.302 Section 232.302 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T-GENERAL RULES AND REGULATIONS FOR ELECTRONIC FILINGS Preparation of Electronic Submissions § 232.302...

2014-04-01

410

15 CFR 908.16 - Signature.  

Code of Federal Regulations, 2013 CFR

...MAINTAINING REC-ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

2013-01-01

411

15 CFR 908.16 - Signature.  

Code of Federal Regulations, 2010 CFR

... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

2010-01-01

412

15 CFR 908.16 - Signature.  

...MAINTAINING REC-ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

2014-01-01

413

15 CFR 908.16 - Signature.  

Code of Federal Regulations, 2011 CFR

... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

2011-01-01

414

15 CFR 908.16 - Signature.  

Code of Federal Regulations, 2012 CFR

...MAINTAINING REC- ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

2012-01-01

415

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2011 CFR

...connection with an electronic filing, the term “signature” means an electronic entry in the form of a magnetic impulse or other form of computer data compilation of any letters or series of letters or characters comprising a name, executed,...

2011-04-01

416

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2013 CFR

...connection with an electronic filing, the term “signature” means an electronic entry in the form of a magnetic impulse or other form of computer data compilation of any letters or series of letters or characters comprising a name, executed,...

2013-04-01

417

17 CFR 232.302 - Signatures.  

Code of Federal Regulations, 2012 CFR

...connection with an electronic filing, the term “signature” means an electronic entry in the form of a magnetic impulse or other form of computer data compilation of any letters or series of letters or characters comprising a name, executed,...

2012-04-01

418

5 CFR 850.106 - Electronic signatures.  

...Identification Number (PIN) or password; (ii) Smart card; (iii) Digitized signature; or (iv) Biometrics, such as fingerprints, retinal patterns, and voice recognition; (2) Cryptographic control methods, including— (i) Shared...

2014-01-01

419

Reactor power history from fission product signatures  

E-print Network

The purpose of this research was to identify fission product signatures that could be used to uniquely identify a specific spent fuel assembly in order to improve international safeguards. This capability would help prevent and deter potential...

Sweeney, David J.

2009-05-15

420

Attack on a certificateless signature and threshold proxy signature with revoking anonymity  

Microsoft Academic Search

Certificateless cryptography is an alternative cryptography, since it eliminates the use of certificates in traditional public key cryptography and the key-escrow problem in identity based cryptography. Proxy signature is an important delegation technique. Certificateless cryptography and proxy signature play an important role in e-commerce. Recently, Xu et.al proposed a certificateless signature for mobile wireless cyber-physical system. In the paper, we

Jianhong Zhang; Xiuna Su

2010-01-01

421

A framework for automated malcode signatures generation  

Microsoft Academic Search

Rapid malicious codes (malcodes) are self-replicating malicious programs that represent a major security threat to the Internet. Fast monitoring and early warning systems are very essential to prevent rapid malcodes spreading. The difficulty in detecting malcodes is that they evolve over time. Although signature-based tools such as network intrusion detection systems are widely used to protect critical systems, traditional signature-based

Hanieh Rajabi; Muhammad Nadzir Marsono; Alireza Monemi

2010-01-01

422

Research Plan for Fire Signatures and Detection  

NASA Technical Reports Server (NTRS)

Viewgraphs on the prevention, suppression, and detection of fires aboard a spacecraft is presented. The topics include: 1) Fire Prevention, Detection, and Suppression Sub-Element Products; 2) FPDS Organizing Questions; 3) FPDS Organizing Questions; 4) Signatures, Sensors, and Simulations; 5) Quantification of Fire and Pre-Fire Signatures; 6) Smoke; 7) DAFT Hardware; 8) Additional Benefits of DAFT; 9) Development and Characterization of Sensors 10) Simulation of the Transport of Smoke and Fire Precursors; and 11) FPDS Organizing Questions.

2004-01-01

423

Signature scheme based on bilinear pairs  

NASA Astrophysics Data System (ADS)

An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

Tong, Rui Y.; Geng, Yong J.

2013-03-01

424

Isotopic signatures by bulk analyses  

SciTech Connect

Los Alamos National Laboratory has developed a series of measurement techniques for identification of nuclear signatures by analyzing bulk samples. Two specific applications for isotopic fingerprinting to identify the origin of anthropogenic radioactivity in bulk samples are presented. The first example is the analyses of environmental samples collected in the US Arctic to determine the impact of dumping of radionuclides in this polar region. Analyses of sediment and biota samples indicate that for the areas sampled the anthropogenic radionuclide content of sediments was predominantly the result of the deposition of global fallout. The anthropogenic radionuclide concentrations in fish, birds and mammals were very low. It can be surmised that marine food chains are presently not significantly affected. The second example is isotopic fingerprinting of water and sediment samples from the Rocky Flats Facility (RFP). The largest source of anthropogenic radioactivity presently affecting surface-waters at RFP is the sediments that are currently residing in the holding ponds. One gram of sediment from a holding pond contains approximately 50 times more plutonium than 1 liter of water from the pond. Essentially 100% of the uranium in Ponds A-1 and A-2 originated as depleted uranium. The largest source of radioactivity in the terminal Ponds A-4, B-5 and C-2 was naturally occurring uranium and its decay product radium. The uranium concentrations in the waters collected from the terminal ponds contained 0.05% or less of the interim standard calculated derived concentration guide for uranium in waters available to the public. All of the radioactivity observed in soil, sediment and water samples collected at RFP was naturally occurring, the result of processes at RFP or the result of global fallout. No extraneous anthropogenic alpha, beta or gamma activities were detected. The plutonium concentrations in Pond C-2 appear to vary seasonally.

Efurd, D.W.; Rokop, D.J.

1997-12-01

425

Network signatures of survival in glioblastoma multiforme.  

PubMed

To determine a molecular basis for prognostic differences in glioblastoma multiforme (GBM), we employed a combinatorial network analysis framework to exhaustively search for molecular patterns in protein-protein interaction (PPI) networks. We identified a dysregulated molecular signature distinguishing short-term (survival<225 days) from long-term (survival>635 days) survivors of GBM using whole genome expression data from The Cancer Genome Atlas (TCGA). A 50-gene subnetwork signature achieved 80% prediction accuracy when tested against an independent gene expression dataset. Functional annotations for the subnetwork signature included "protein kinase cascade," "I?B kinase/NF?B cascade," and "regulation of programmed cell death" - all of which were not significant in signatures of existing subtypes. Finally, we used label-free proteomics to examine how our subnetwork signature predicted protein level expression differences in an independent GBM cohort of 16 patients. We found that the genes discovered using network biology had a higher probability of dysregulated protein expression than either genes exhibiting individual differential expression or genes derived from known GBM subtypes. In particular, the long-term survivor subtype was characterized by increased protein expression of DNM1 and MAPK1 and decreased expression of HSPA9, PSMD3, and CANX. Overall, we demonstrate that the combinatorial analysis of gene expression data constrained by PPIs outlines an approach for the discovery of robust and translatable molecular signatures in GBM. PMID:24068912

Patel, Vishal N; Gokulrangan, Giridharan; Chowdhury, Salim A; Chen, Yanwen; Sloan, Andrew E; Koyutürk, Mehmet; Barnholtz-Sloan, Jill; Chance, Mark R

2013-01-01

426

Kinematics of signature writing in healthy aging.  

PubMed

Forensic document examiners (FDE) called upon to distinguish a genuine from a forged signature of an elderly person are often required to consider the question of age-related deterioration and whether the available exemplars reliably capture the natural effects of aging of the original writer. An understanding of the statistical relationship between advanced age and handwriting movements can reduce the uncertainty that may exist in an examiner's approach to questioned signatures formed by elderly writers. The primary purpose of this study was to systematically examine age-related changes in signature kinematics in healthy writers. Forty-two healthy subjects between the ages of 60-91 years participated in this study. Signatures were recorded using a digitizing tablet, and commercial software was used to examine the temporal and spatial stroke kinematics and pen pressure. Results indicated that vertical stroke duration and dysfluency increased with age, whereas vertical stroke amplitude and velocity decreased with age. Pen pressure decreased with age. We found that a linear model characterized the best-fit relationship between advanced age and handwriting movement parameters for signature formation. Male writers exhibited stronger age effects than female writers, especially for pen pressure and stroke dysfluency. The present study contributes to an understanding of how advanced age alters signature formation in otherwise healthy adults. PMID:24673648

Caligiuri, Michael P; Kim, Chi; Landy, Kelly M

2014-07-01

427

Chemical and Physical Signatures for Microbial Forensics  

SciTech Connect

Chemical and physical signatures for microbial forensics John Cliff and Helen Kreuzer-Martin, eds. Humana Press Chapter 1. Introduction: Review of history and statement of need. Randy Murch, Virginia Tech Chapter 2. The Microbe: Structure, morphology, and physiology of the microbe as they relate to potential signatures of growth conditions. Joany Jackman, Johns Hopkins University Chapter 3. Science for Forensics: Special considerations for the forensic arena - quality control, sample integrity, etc. Mark Wilson (retired FBI): Western Carolina University Chapter 4. Physical signatures: Light and electron microscopy, atomic force microscopy, gravimetry etc. Joseph Michael, Sandia National Laboratory Chapter 5. Lipids: FAME, PLFA, steroids, LPS, etc. James Robertson, Federal Bureau of Investigation Chapter 6. Carbohydrates: Cell wall components, cytoplasm components, methods Alvin Fox, University of South Carolina School of Medicine David Wunschel, Pacific Northwest National Laboratory Chapter 7. Peptides: Peptides, proteins, lipoproteins David Wunschel, Pacific Northwest National Laboratory Chapter 8. Elemental content: CNOHPS (treated in passing), metals, prospective cell types John Cliff, International Atomic Energy Agency Chapter 9. Isotopic signatures: Stable isotopes C,N,H,O,S, 14C dating, potential for heavy elements. Helen Kreuzer-Martin, Pacific Northwest National Laboratory Michaele Kashgarian, Lawrence Livermore National Laboratory Chapter 10. Extracellular signatures: Cellular debris, heme, agar, headspace, spent media, etc Karen Wahl, Pacific Northwest National Laboratory Chapter 11. Data Reduction and Integrated Microbial Forensics: Statistical concepts, parametric and multivariate statistics, integrating signatures Kristin Jarman, Pacific Northwest National Laboratory

Cliff, John B.; Kreuzer, Helen W.; Ehrhardt, Christopher J.; Wunschel, David S.

2012-01-03

428

Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles  

Microsoft Academic Search

Ring signatures, rst introduced by Rivest, Shamir, and Tau- man, enable a user to sign a message so that a ring of possible signers (of which the user is a member) is identied, without revealing exactly which member of that ring actually generated the signature. In contrast to group signatures, ring signatures are completely \\\\ad-hoc\\

Adam Bender; Jonathan Katz; Ruggero Morselli

2006-01-01

429

Going Online the MI Way.  

ERIC Educational Resources Information Center

This booklet describes online searching using Materials Information, a metallurgy and metals science information service of the Institute of Metals in London and ASM International in Cleveland, Ohio, which is available through the major online vendors. Described in detail are online searching, online databases, costs, online hosts or vendors,…

Feldt, Jill

430

Simulation-Based Verification of Livingstone Applications  

NASA Technical Reports Server (NTRS)

AI software is viewed as a means to give greater autonomy to automated systems, capable of coping with harsh and unpredictable environments in deep space missions. Autonomous systems pose a serious challenge to traditional test-based verification approaches, because of the enormous space of possible situations that they aim to address. Before these systems are put in control of critical applications, appropriate new verification approaches need to be developed. This article describes Livingstone PathFinder (LPF), a verification tool for autonomous diagnosis applications based on NASA's Livingstone model-based diagnosis system. LPF applies state space exploration algorithms to an instrumented testbed, consisting of the Livingstone diagnosis system embedded in a simulated operating environment. The article describes different facets of LPF and reports some experimental results from applying LPF to a Livingstone model of the main propulsion feed subsystem of the X-34 space vehicle. This paper describes Livingstone PathFinder (LPF), a verification tool for autonomous diagnosis applications based on NASA's Livingstone model-based diagnosis system. LPF applies state space exploration algorithms to an instrumented testbed, consisting of the Livingstone diagnosis system embedded in a simulated operating environment. Section 2 provides an overview of Livingstone; Section 3 describes the LPF architecture; Section 4 discusses its applicability; Section 5 reviews some experimental results; Section 6 compares LPF to related verification approaches; Section 7 draws conclusions and discusses some perspectives.

Lindsey, Anthony E.; Pecheur, Charles

2003-01-01

431

Expresso Online Pas: Portugal  

E-print Network

.: Diária �mbito: Online Pag.: 2 de 2ID: 42301447 14-06-2012 Seo tools Faça login pelo Facebook e comenteExpresso Online País: Portugal Period.: Diária �mbito: Online Pag.: 1 de 2ID: 42301447 14 portuguesa no palco do mundo Comente Faça login pelo Facebook e comente este artigo! Comentar PROTAGONISTAS

Instituto de Sistemas e Robotica

432

Online higher education commodity  

Microsoft Academic Search

This article analyzes the current trend towards online education. It examines some of the reasons for the trend and the ramifications\\u000a it may have on students, faculty and institutions of higher learning. The success and profitability of online programs and\\u000a institutions such as the University of Phoenix has helped to make the move towards online education more appealing to other

Paule Chau

2010-01-01

433

Efficient Unrestricted Identity-Based Aggregate Signature Scheme  

PubMed Central

An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or require a large amount of pairing operations which grows linearly with the number of signers, while others have some limitations on the aggregated signatures. The main challenge in building efficient aggregate signature scheme is to compress signatures into a compact, constant-length signature without any restriction. To address the above drawbacks, by using the bilinear pairings, we propose an efficient unrestricted identity-based aggregate signature. Our scheme achieves both full aggregation and constant pairing computation. We prove that our scheme has existential unforgeability under the computational Diffie-Hellman assumption. PMID:25329777

Yuan, Yumin; Zhan, Qian; Huang, Hua

2014-01-01

434

Lagrangian verification of precipitation forecasts  

NASA Astrophysics Data System (ADS)

The new generation of limited area models for numerical weather prediction with a grid-spacing in the order of 2 km, like e.g. COSMO-DE from German Meteorological Service (DWD), can resolve - at least partly - deep convection. How realistic are these convective cells of precipitation? It is difficult to address this question in an eulerian framework of e.g. a gridpoint-by-gridpoint comparison of model forecasts with radar observations. As alternative, we will present an object oriented, lagrangian approach: the radar tracking scheme Rad-TRAM, which was originally developed by the German Aerospace Center DLR for nowcasting purposes, is applied to detect cells and their tracks independently both in radar observations and model forecasts. The resulting cell histories are used to derive specific cell characteristics, like e.g. their lifetime, size or location of initiation. Finally it is checked whether the model is able to reproduce the observed statistics of these characteristics. This technique has been applied to the operational COSMO-DE forecasts and four corresponding long-term model experiments with modified parameterization during the COPS period of summer 2007. Observational reference is provided by the German radar network of DWD. Based on this comprehensive example, we will discuss the benefits and deficiencies of the lagrangian technique: It is for example straight forward to relate model changes with cell characteristics. Model experiments with a less active parameterization of boundary layer processes results in a clear improvement of the diurnal cycle of cell initiation. Surprisingly, all model versions can predict the distribution of cell life time quite accurately. However, the verification procedure depends on the subjective choice of certain tracking parameters, in particular on the threshold of precipitation that must be exceeded to detect a cell. Sensitivity studies show that these parameters have a clear impact on the absolute numbers of all cell statistics. But relative differences between statistics from models and observations are hardly affected making the presented approach valuable for model evaluation.

Feiertag, Nicole; Ament, Felix

2010-05-01

435

Automated verification of system configuration  

NASA Astrophysics Data System (ADS)

Errors in field wiring can result in significant correction costs (if the errors are discovered prior to use), in erroneous or unusable data (if the errors are not discovered in time), or in serious accidents (if the errors corrupt critical data). Detailed field wiring checkout rework are tedious and expensive, but they are essential steps in the quality assurance process for large, complex instrumentation and control systems. A recent Oak Ridge National Laboratory (ORNL) development, the CONFiguration IDEnification System (CONFIDES) automates verification of field wiring. In CONFIDES, an identifier module is installed on or integrated into each component (e.g., sensor, actuator, cable, distribution panel) to be verified. Interrogator modules, controlled by a personal computer (PC), are installed at the connections of the field wiring to the inputs of the data acquisition and control system (DACS). Interrogator modules poll the components connected to each channel of the DACS and can determine the path taken by each channel's signal to or from the end device for that channel. The system will provide not only the identification (ID) code for the cables and patch panels in the path to a particular sensor or actuator but for individual cable conductor IDs as well. One version of the system uses existing signal wires for communications between CONFIDES modules. Another, more powerful version requires a single dedicated conductor in each cable. Both version can operate with or without instrument power applied and neither interferes with the normal operation of the DACS. Identifier modules can provide a variety of information including status and calibration data.

Andrews, W. H., Jr.; Baker, S. P.; Blalock, A. V.

1991-05-01

436

Cooperative Autonomous Online Learning  

E-print Network

Online learning is becoming increasingly popular for training on large datasets. However, the sequential nature of online learning requires a centralized learner to store data and update parameters. In this paper, we consider a fully decentralized setting, cooperative autonomous online learning, with a distributed data source. The learners perform learning with local parameters while periodically communicating with a small subset of neighbors to exchange information. We define the regret in terms of an implicit aggregated parameter of the learners for such a setting and prove regret bounds similar to the classical sequential online learning.

Yan, Feng; Qi, Yuan

2010-01-01

437

Online organic chemistry  

NASA Astrophysics Data System (ADS)

This is a comprehensive study of the many facets of an entirely online organic chemistry course. Online homework with structure-drawing capabilities was found to be more effective than written homework. Online lecture was found to be just as effective as in-person lecture, and students prefer an online lecture format with shorter Webcasts. Online office hours were found to be effective, and discussion sessions can be placed online as well. A model was created that explains 36.1% of student performance based on GPA, ACT Math score, grade in previous chemistry course, and attendance at various forms of discussion. Online exams have been created which test problem-solving skills and is instantly gradable. In these exams, students can submit answers until time runs out for different numbers of points. These facets were combined effectively to create an entirely online organic chemistry course which students prefer over the in-person alternative. Lastly, there is a vision for where online organic chemistry is going and what can be done to improve education for all.

Janowicz, Philip A.

438

Online shopping hesitation.  

PubMed

This study was designed to understand which factors influence consumer hesitation or delay in online product purchases. The study examined four groups of variables (i.e., consumer characteristics, contextual factors perceived uncertainty factors, and medium/channel innovation factors) that predict three types of online shopping hesitation (i.e., overall hesitation, shopping cart abandonment, and hesitation at the final payment stage). We found that different sets of delay factors are related to different aspects of online shopping hesitation. The study concludes with suggestion for various delay-reduction devices to help consumers close their online decision hesitation. PMID:16780394

Cho, Chang-Hoan; Kang, Jaewon; Cheon, Hongsik John

2006-06-01

439

Generic Protocol for the Verification of Ballast Water Treatment Technology  

EPA Science Inventory

In anticipation of the need to address performance verification and subsequent approval of new and innovative ballast water treatment technologies for shipboard installation, the U.S Coast Guard and the Environmental Protection Agency?s Environmental Technology Verification Progr...

440

A Tutorial on Text-Independent Speaker Verification  

E-print Network

This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, ...

Bimbot, Frederic

441

40 CFR 1066.250 - Base inertia verification.  

Code of Federal Regulations, 2013 CFR

...2013-07-01 2013-07-01 false Base inertia verification. 1066.250 Section...Dynamometer Specifications § 1066.250 Base inertia verification. (a) Overview. ...how to verify the dynamometer's base inertia. (b) Scope and frequency....

2013-07-01

442

40 CFR 1066.250 - Base inertia verification.  

Code of Federal Regulations, 2012 CFR

...2012-07-01 2012-07-01 false Base inertia verification. 1066.250 Section...Dynamometer Specifications § 1066.250 Base inertia verification. (a) Overview. ...how to verify the dynamometer's base inertia. (b) Scope and frequency....

2012-07-01

443

20 CFR 212.5 - Verification of military service.  

... 2012-04-01 true Verification of military service. 212.5 Section 212.5 ...REGULATIONS UNDER THE RAILROAD RETIREMENT ACT MILITARY SERVICE § 212.5 Verification of military service. Military service may be...

2014-04-01

444

20 CFR 212.5 - Verification of military service.  

Code of Federal Regulations, 2013 CFR

... 2012-04-01 true Verification of military service. 212.5 Section 212.5 ...REGULATIONS UNDER THE RAILROAD RETIREMENT ACT MILITARY SERVICE § 212.5 Verification of military service. Military service may be...

2013-04-01

445

20 CFR 212.5 - Verification of military service.  

Code of Federal Regulations, 2012 CFR

... 2012-04-01 false Verification of military service. 212.5 Section 212.5 ...REGULATIONS UNDER THE RAILROAD RETIREMENT ACT MILITARY SERVICE § 212.5 Verification of military service. Military service may be...

2012-04-01

446

20 CFR 212.5 - Verification of military service.  

Code of Federal Regulations, 2010 CFR

... 2010-04-01 false Verification of military service. 212.5 Section 212.5 ...REGULATIONS UNDER THE RAILROAD RETIREMENT ACT MILITARY SERVICE § 212.5 Verification of military service. Military service may be...

2010-04-01

447

20 CFR 212.5 - Verification of military service.  

Code of Federal Regulations, 2011 CFR

... 2011-04-01 false Verification of military service. 212.5 Section 212.5 ...REGULATIONS UNDER THE RAILROAD RETIREMENT ACT MILITARY SERVICE § 212.5 Verification of military service. Military service may be...

2011-04-01

448

MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP  

E-print Network

MODELING, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS, VERIFICATION AND OPTIMIZATION OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS Thesis Approved by: Dr.................................................................................................................... 16 MODELING OF HYBRID GROUND SOURCE HEAT PUMP SYSTEMS IN ENERGYPLUS

449

Verification of full functional correctness for imperative linked data structures  

E-print Network

We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

Zee, Karen K

2010-01-01

450

Logic verification using recursive learning, ATPG and transformations  

E-print Network

We describe a new approach for formal verification of combinational logic circuits using Recursive learning, ATPG and Transformations. A logic verification tool, VeriLAT, was implemented based on this approach. Experimental results on the ISCAS85...

Paul, Debjyoti

2012-06-07

451

VERIFICATION OF A TOXIC ORGANIC SUBSTANCE TRANSPORT AND BIOACCUMULATION MODEL  

EPA Science Inventory

A field verification of the Toxic Organic Substance Transport and Bioaccumulation Model (TOXIC) was conducted using the insecticide dieldrin and the herbicides alachlor and atrazine as the test compounds. The test sites were two Iowa reservoirs. The verification procedure include...

452

46 CFR 61.40-3 - Design verification testing.  

Code of Federal Regulations, 2012 CFR

...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

2012-10-01

453

46 CFR 61.40-3 - Design verification testing.  

Code of Federal Regulations, 2010 CFR

...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

2010-10-01

454

46 CFR 61.40-3 - Design verification testing.  

Code of Federal Regulations, 2011 CFR

...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

2011-10-01

455

46 CFR 61.40-3 - Design verification testing.  

Code of Federal Regulations, 2013 CFR

...CONTINUED) MARINE ENGINEERING PERIODIC TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are...

2013-10-01

456

Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme  

NASA Astrophysics Data System (ADS)

The security analysis of a batch proxy quantum blind signature scheme is given, which shows it does not satisfy the verifiability of proxy blind signature. Furthermore, a malicious signature receiver can forge valid batch proxy blind signatures. Therefore, this scheme also does not satisfy the unforgeability of proxy blind signature in the sense. A feasible method to deal with these problems is also discussed in the end.

Cai, Xiao-Qiu; Zheng, Yu-Hui; Zhang, Rui-Ling

2014-09-01

457

New Signature Schemes with Coupons and Tight Reduction  

Microsoft Academic Search

Amongst provably secure signature schemes, two distinct classes are of particular interest: the ones with tight reduction (e.g., RSA-PSS), and those which support the use of coupons (e.g., Schnorr signature). This paper introduces a new generic signature scheme based on any zero-knowledge identiflcation protocol Z and signature scheme S veri- fying basic security properties. The so-obtained signature scheme fea- tures

John Ioannidis; Moti Yung

458

Does Twitter Trigger Bursts in Signature Collections?  

PubMed Central

Introduction The quantification of social media impacts on societal and political events is a difficult undertaking. The Japanese Society of Oriental Medicine started a signature-collecting campaign to oppose a medical policy of the Government Revitalization Unit to exclude a traditional Japanese medicine, “Kampo,” from the public insurance system. The signature count showed a series of aberrant bursts from November 26 to 29, 2009. In the same interval, the number of messages on Twitter including the keywords “Signature” and “Kampo,” increased abruptly. Moreover, the number of messages on an Internet forum that discussed the policy and called for signatures showed a train of spikes. Methods and Findings In order to estimate the contributions of social media, we developed a statistical model with state-space modeling framework that distinguishes the contributions of multiple social media in time-series of collected public opinions. We applied the model to the time-series of signature counts of the campaign and quantified contributions of two social media, i.e., Twitter and an Internet forum, by the estimation. We found that a considerable portion (78%) of the signatures was affected from either of the social media throughout the campaign and the Twitter effect (26%) was smaller than the Forum effect (52%) in total, although Twitter probably triggered the initial two bursts of signatures. Comparisons of the estimated profiles of the both effects suggested distinctions between the social media in terms of sustainable impact of messages or tweets. Twitter shows messages on various topics on a time-line; newer messages push out older ones. Twitter may diminish the impact of messages that are tweeted intermittently. Conclusions The quantification of social media impacts is beneficial to better understand people’s tendency and may promote developing strategies to engage public opinions effectively. Our proposed method is a promising tool to explore information hidden in social phenomena. PMID:23484004

Yamaguchi, Rui; Imoto, Seiya; Kami, Masahiro; Watanabe, Kenji; Miyano, Satoru; Yuji, Koichiro

2013-01-01

459

Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation  

NASA Technical Reports Server (NTRS)

This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

2000-01-01

460

Packaged low-level waste verification system  

SciTech Connect

Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy`s National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL).

Tuite, K.T. [Waste Management Group, Peekskill, NY (United States); Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

1996-08-01

461

Gridded Forecast Verification and Bias Correction  

NSDL National Science Digital Library

To become a better forecaster, it is not enough to simply know that a forecast did not verify. One must determine what happened and identify methods for improvement through forecast verification. The forecast verification process helps answer questions like: Is there a particular method that has been more effective in the past in similar circumstances? Is there guidance that is more accurate? Are there persistent biases in our forecasts? Do our forecasts perform better in certain regimes than others? In the era of gridded forecasts, grid-based verification provides more information about the spatial distribution of mismatches between forecasts and analyses. In this module, you will be given an example forecast and verifying analysis. Then you will assess what corrective actions are needed based on the mismatches that occurred.

Comet

2012-02-29

462

Verification and validation for magnetic fusion  

SciTech Connect

Dramatic progress in the scope and power of plasma simulations over the past decade has extended our understanding of these complex phenomena. However, as codes embody imperfect models for physical reality, a necessary step toward developing a predictive capability is demonstrating agreement, without bias, between simulations and experimental results. While comparisons between computer calculations and experimental data are common, there is a compelling need to make these comparisons more systematic and more quantitative. Tests of models are divided into two phases, usually called verification and validation. Verification is an essentially mathematical demonstration that a chosen physical model, rendered as a set of equations, has been accurately solved by a computer code. Validation is a physical process which attempts to ascertain the extent to which the model used by a code correctly represents reality within some domain of applicability, to some specified level of accuracy. This paper will cover principles and practices for verification and validation including lessons learned from related fields.

Greenwald, Martin [Massachusetts Institute of Technology, 175 Albany St., Cambridge, Massachusetts 02139 (United States)

2010-05-15

463

Active alignment/contact verification system  

DOEpatents

A system involving an active (i.e. electrical) technique for the verification of: 1) close tolerance mechanical alignment between two component, and 2) electrical contact between mating through an elastomeric interface. For example, the two components may be an alumina carrier and a printed circuit board, two mating parts that are extremely small, high density parts and require alignment within a fraction of a mil, as well as a specified interface point of engagement between the parts. The system comprises pairs of conductive structures defined in the surfaces layers of the alumina carrier and the printed circuit board, for example. The first pair of conductive structures relate to item (1) above and permit alignment verification between mating parts. The second pair of conductive structures relate to item (2) above and permit verification of electrical contact between mating parts.

Greenbaum, William M. (Modesto, CA)

2000-01-01

464

Fuel Retrieval System (FRS) Design Verification  

SciTech Connect

This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

YANOCHKO, R.M.

2000-01-27

465

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures  

E-print Network

scandal in the history of the United States. The information source, assumed the pseudonym "Deep Throat (regular signature) or the organization (identity- committed signature). In the latter case, the signer in the court, Deep Throat should be able to prove that he is the information source. In fact, although

466

ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PERFORMANCE VERIFICATION OF THE W.L. GORE & ASSOCIATES GORE-SORBER SCREENING SURVEY  

EPA Science Inventory

The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

467

2014-15 Verification Worksheet Addendum: Requesting IRS Tax Transcripts  

E-print Network

2014-15 Verification Worksheet Addendum: Requesting IRS Tax Transcripts Office of Student Financial-6122 financial.aid@uaa.alaska.edu You must submit a 2014-15 Verification Worksheet if you are selected for verification of your 2014-15 FAFSA. In addition to the worksheet, we are required to document the data on your

Pantaleone, Jim

468

2013-14 Verification Worksheet Addendum: Requesting IRS Tax Transcripts  

E-print Network

2013-14 Verification Worksheet Addendum: Requesting IRS Tax Transcripts Office of Student Financial-6122 financial.aid@uaa.alaska.edu You must submit a 2013-14 Verification Worksheet if you are selected for verification of your 2013-14 FAFSA. In addition to the worksheet, we are required to document the data on your

Pantaleone, Jim

469

Strategic directions in verification, validation, and accreditation research  

Microsoft Academic Search

The authors, six simulation professionals, present their views on the directions that they believe that verification, validation, and accreditation research should take. Two of the six are active verification, validation, and accreditation researchers from academia, two develop industry simulation models, and two work in verification, validation, and accreditation of military simulation models. A number of areas and topics for research

Robert G. Sargent; P. A. Glasow; J. P. C. Kleijnen; A. M. Law; I. McGregor; S. Youngblood

2000-01-01

470

Systematic Verification, Validation and Calibration of Traffic Simulation Models  

E-print Network

1 Systematic Verification, Validation and Calibration of Traffic Simulation Models H. Rakha1 , B attempts to provide traffic model developers and users with a framework for the verification, validation and calibration of traffic models. Examples are provided to illustrate the model verification and validation

Hellinga, Bruce

471

Application of Annotated Logic Program to Pipeline Process Safety Verification  

Microsoft Academic Search

We have developed a paraconsistent annotated logic program called Extended Vector Annotated Logic Program with Strong Negation (abbr. EVALPSN), which can deal with defeasible deontic reasoning and contradiction, and we have already applied it to safety verification and control such as railway interlocking safety verification and traffic signal control. In this paper, we introduce process safety verification as an application

Kazumi Nakamatsu

2007-01-01

472

Proton Therapy Verification with PET Imaging  

PubMed Central

Proton therapy is very sensitive to uncertainties introduced during treatment planning and dose delivery. PET imaging of proton induced positron emitter distributions is the only practical approach for in vivo, in situ verification of proton therapy. This article reviews the current status of proton therapy verification with PET imaging. The different data detecting systems (in-beam, in-room and off-line PET), calculation methods for the prediction of proton induced PET activity distributions, and approaches for data evaluation are discussed. PMID:24312147

Zhu, Xuping; Fakhri, Georges El

2013-01-01

473

On Backward-Style Anonymity Verification  

NASA Astrophysics Data System (ADS)

Many Internet services and protocols should guarantee anonymity; for example, an electronic voting system should guarantee to prevent the disclosure of who voted for which candidate. To prove trace anonymity, which is an extension of the formulation of anonymity by Schneider and Sidiropoulos, this paper presents an inductive method based on backward anonymous simulations. We show that the existence of an image-finite backward anonymous simulation implies trace anonymity. We also demonstrate the anonymity verification of an e-voting protocol (the FOO protocol) with our backward anonymous simulation technique. When proving the trace anonymity, this paper employs a computer-assisted verification tool based on a theorem prover.

Kawabe, Yoshinobu; Mano, Ken; Sakurada, Hideki; Tsukada, Yasuyuki

474

Printability verification function of mask inspection system  

NASA Astrophysics Data System (ADS)

In addition to the conventional demands for high sensitivities with which the mask inspection system detects the minute size defects, capability to extract true defects from a wide variety of patterns that should not be counted as pseudo defects has been quite demanding. It is necessary to ascertain suppression of MEEF incurred by the combination of parameters such as LER and defects of SRAF. NFT and Brion are jointly developing a mask-image based printability verification system with functions combining their respective technologies with the results from ASET's research. This report describes such defect detection results and introduces the development of a mask inspection system with printability verification function.

Tsuchiya, Hideo; Yamabe, Masaki; Tokita, Masakazu; Takahara, Kenichi; Usuda, Kinya; Ozaki, Fumio; Kikuiri, Nobutaka

2009-10-01

475

EOS-AM precision pointing verification  

NASA Technical Reports Server (NTRS)

The Earth Observing System (EOS) AM mission requires tight pointing knowledge to meet scientific objectives, in a spacecraft with low frequency flexible appendage modes. As the spacecraft controller reacts to various disturbance sources and as the inherent appendage modes are excited by this control action, verification of precision pointing knowledge becomes particularly challenging for the EOS-AM mission. As presently conceived, this verification includes a complementary set of multi-disciplinary analyses, hardware tests and real-time computer in the loop simulations, followed by collection and analysis of hardware test and flight data and supported by a comprehensive data base repository for validated program values.

Throckmorton, A.; Braknis, E.; Bolek, J.

1993-01-01

476

Electric power system test and verification program  

NASA Technical Reports Server (NTRS)

Space Station Freedom's (SSF's) electric power system (EPS) hardware and software verification is performed at all levels of integration, from components to assembly and system level tests. Careful planning is essential to ensure the EPS is tested properly on the ground prior to launch. The results of the test performed on breadboard model hardware and analyses completed to date have been evaluated and used to plan for design qualification and flight acceptance test phases. These results and plans indicate the verification program for SSF's 75-kW EPS would have been successful and completed in time to support the scheduled first element launch.

Rylicki, Daniel S.; Robinson, Frank, Jr.

1994-01-01

477

Verification Of Tooling For Robotic Welding  

NASA Technical Reports Server (NTRS)

Computer simulations, robotic inspections, and visual inspections performed to detect discrepancies. Method for verification of tooling for robotic welding involves combination of computer simulations and visual inspections. Verification process ensures accuracy of mathematical model representing tooling in off-line programming system that numerically simulates operation of robotic welding system. Process helps prevent damaging collisions between welding equipment and workpiece, ensures tooling positioned and oriented properly with respect to workpiece, and/or determines whether tooling to be modified or adjusted to achieve foregoing objectives.

Osterloh, Mark R.; Sliwinski, Karen E.; Anderson, Ronald R.

1991-01-01

478

The formal verification of generic interpreters  

NASA Technical Reports Server (NTRS)

The task assignment 3 of the design and validation of digital flight control systems suitable for fly-by-wire applications is studied. Task 3 is associated with formal verification of embedded systems. In particular, results are presented that provide a methodological approach to microprocessor verification. A hierarchical decomposition strategy for specifying microprocessors is also presented. A theory of generic interpreters is presented that can be used to model microprocessor behavior. The generic interpreter theory abstracts away the details of instruction functionality, leaving a general model of what an interpreter does.

Windley, P.; Levitt, K.; Cohen, G. C.

1991-01-01

479

Optical Verification Laboratory Demonstration System for High Security Identification Cards  

NASA Technical Reports Server (NTRS)

Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.

Javidi, Bahram

1997-01-01

480

Arabic Online Handwriting Recognition  

E-print Network

Markov Models (see [4]). A recognition system can be either online or offline. The offline HWR is basedArabic Online Handwriting Recognition Cyrus Bakhtiari-Haftlang 2007 #12;Abstract There are more Introduction In the current era of communications, digital handwriting is gaining popularity and is becoming

Lunds Universitet

481

What's Next Online  

NSDL National Science Digital Library

What's Next Online is a free online newsletter which focuses on business marketing tips and discussion. Written and edited by B.L. Ochman, each issue contains several short articles about current issues in marketing as well as a list of annotated, notable links. Past issues are archived, and interested users may subscribe to the email version of the newsletter.

482

Business Traveler Online  

NSDL National Science Digital Library

Covering issues important to business travelers, Business Traveler Online is the online version of the UK and US editions of Business Traveler. This magazine offers germane advice for those who travel extensively for work, with full-text articles dealing with issues including transportation, destinations, and lifestyle.

483

Online First publication  

Microsoft Academic Search

The editors of Biomechanics and Modeling in Mechanobiology and Springer-Verlag are pleased to announce a new service for authors and readers: Online First, the immediate online publication of all accepted papers as soon as the authors have returned the corrected proofs. Whereas the fully electronic versions of Biomechanics and Modeling in Mechanobiology used to appear at the same time as

Gerhard A. Holzapfel; Jay D. Humphrey

2003-01-01

484

Effective Online Privacy Policies  

Microsoft Academic Search

Online privacy policies are important mechanisms for informing web site users about the level of information privacy protection afforded when visiting web sites. To date, societal mechanisms and technologies have been the focus of attempts to improve the quality and effectiveness of online privacy policies. Little attention, however, has been given to the development and use of organisational measures for

Sharman Lichtenstein; Paula M C Swatman; Kanchan Babu

485

CHILDREN AND ONLINE RISK  

Microsoft Academic Search

Research on the risks associated with children's use of the internet often aims to inform policies of risk prevention. Yet paralleling the effort to map the nature and extent of online risk is a growing unease that the goal of risk prevention tends to support an over-protective, risk-averse culture that restricts the freedom of online exploration that society encourages for

Elisabeth Staksrud; Sonia Livingstone

2009-01-01

486

Online personals: an overview  

Microsoft Academic Search

Online personal advertisements have recently become an easy, socially acceptable way to meet partners for dates or relationships. Because popular personals systems not only reflect but also have the potential to reshape how people attract one another, date, and fall in love, the design of these systems merits careful consideration. We present a survey of current styles of online personals,

Andrew T. Fiore; Judith S. Donath

2004-01-01

487

CAIN Online Users Guide.  

ERIC Educational Resources Information Center

This manual, intended for the librarian or information specialist beginning with online systems, introduces the National Agricultural Library's (NAL) Cataloging and Indexing System (CAIN) and presents the search techniques required for retrieving information on agriculture and its many related fields. The manual, which concentrates on the online

Gilreath, Charles L.

488

Children's Online Privacy.  

ERIC Educational Resources Information Center

The first federal Internet privacy law (the Children's Online Privacy Protection Act) provides safeguards for children by regulating collection of their personal information. Unfortunately, teens are not protected. Legislation is pending to protect children from online marketers such as ZapMe! Interactive technologies require constant vigilance.…

Aidman, Amy

2000-01-01

489

Techtalk: Online Developmental Education.  

ERIC Educational Resources Information Center

Examines the current status of online developmental courses. Features descriptions of programs at several colleges, including the names and e-mail addresses of individuals to contact for further information. Describes the hardware requirements for offering online courses as well as how such courses typically operate. (MAB)

Broderick, Bill; Caverly, David C.

1996-01-01

490

COSEE West Online Education  

NSDL National Science Digital Library

This site features online professional development courses offered by the COSEE (Center for Ocean Sciences Education Excellence) West and College of Exploration. The site features workshop information, as well as access to online presentations and the College of Exploration's virtual campus. Registration is required to access the education information, but is free of charge.

491

Online Videoconferencing Products: Update  

ERIC Educational Resources Information Center

Software allowing real-time online video connectivity is rapidly evolving. The ability to connect students, staff, and guest speakers instantaneously carries great benefits for the online distance education classroom. This evaluation report compares four software applications at opposite ends of the cost spectrum: "DimDim", "Elluminate VCS",…

Burton, Douglas; Kitchen, Tim

2011-01-01

492

Citizenship through Online Communication  

ERIC Educational Resources Information Center

The integration of socially responsible online citizenship into the pedagogical practices in the elementary classroom is challenging, but necessary. Online activities, such as writing letters to political leaders or communicating with an expert on a community issue, offer students the opportunity to improve their writing skills while advancing…

Bennett, Linda; Fessenden, Julie

2006-01-01

493

Online Collaboration: Curriculum Unbound!  

ERIC Educational Resources Information Center

Freed from the nuisances of paper-based methods, districts are making creative use of digital tools to move their curricular documents online, where educators can collaborate on course development and lesson planning. Back in 2003, Amarillo Independent School District (Texas) had begun using the Blackboard Content System to provide lessons online.…

Waters, John K.

2007-01-01

494

Adolescent Online Victimization  

ERIC Educational Resources Information Center

Online victimization is a concern among many who work with youth. This article reviews the latest research on online victimization then promotes honest dialogue, personal responsibility of the youth, and proper reporting actions as strategies to reduce this type of victimization. (Contains 1 figure and 1 table.)

Young, Adena; Young, Atrisha; Fullwood, Harry

2007-01-01

495

Accessible Online Learning  

ERIC Educational Resources Information Center

The number of online courses offered at the postsecondary level is increasing at a rate greater than the increase in overall higher education enrollment, with approximately one of every four higher education students taking at least one course online (Allen and Seaman, 2009). In 2008, students with disabilities represented nearly 11% of all…

Case, D. Elizabeth; Davidson, Roseanna C.

2011-01-01

496

The 70-Gene Signature as Prognostic Factor for Elderly Women with Hormone Receptor-Positive, HER2-Negative Breast Cancer.  

PubMed

BACKGROUND: The aim of this article was to evaluate the prognostic value of the MammaPrint(TM) signature in women $$ 60 years with invasive breast cancer. PATIENTS AND METHODS: 60 female patients were included in this prospective study. Eligibility criteria included: pT1c-3, pN0-1a, grade 2/3, hormone receptor-positive and HER2-negative tumor. The clinical risk was determined by Adjuvant! Online (AOL). RESULTS: 38 patients (63%) where considered to be low-risk patients by the 70-gene signature, while 22 (37%) were considered to be high-risk patients. No statistically significant differences between low- and high-risk groups could be detected for conventional prognostic parameters, particularly not for Ki-67. By AOL, 33 patients (55%) were considered to be at high risk, of which 20 had a discordant MammaPrint(TM) result. The discordance rate between the profile and AOL was 48%, which is higher than in previous publications. When the 70-gene signature was used in combination with the clinical risk assessment, the recommendation for adjuvant systemic treatment differed in 11 patients (18%). CONCLUSIONS: In the intermediate-risk subgroup, the 70-gene signature could be useful to decide in elderly patients whether they may benefit from adjuvant chemotherapy or not. Conventional clinicopathological factors were not suitable for a prediction of the 70-gene signature results in these patients. PMID:22553468

Hartmann, Steffi; Gerber, Bernd; Elling, Dirk; Heintze, Kristin; Reimer, Toralf

2012-02-01

497

Labor Verification Policy and Procedures Effort reporting (labor verification) is a process mandated by the federal government to  

E-print Network

1 Labor Verification Policy and Procedures PURPOSE Effort reporting (labor verification) is a process mandated by the federal government to verify that direct labor charges to or cost shared be identified in the Institute's labor verification process. This document describes the Institute's policy

Varela, Carlos

498

Survey: Online Finance  

NSDL National Science Digital Library

This lengthy article from The Economist gives an excellent, far-reaching overview of the industry of online banking. "Online Finance" considers the role of online banking within the finance industry as well as examining the benefits and pitfalls of banks transferring their services to the Internet. The survey is broken into nineteen sections which explore this phenomenon from a variety of angles including banking technology, online brokerage firms, and some of the obstacles of online finance, as well as looking at banking on the Internet in Japan and Scandinavia. The article also includes related titles in The Economist archive, as well as linking to several sections of the SEC Website that were mentioned in the article.

499

Using Macroinvertebrates to Evaluate the Condition of Ponds: On-Line Keys  

NSDL National Science Digital Library

Macroinvertebrates are commonly used to evaluate the status of streams and rivers. The deep zones of lakes have also been used for this purpose. This project includes a protocol for using macroinvertebrates to compare and evaluate ponds and wetlands. Listed below are on-line keys that can help you identify macroinvertebrates. Minnesota Aquatic Insect Interactive Verification Program NYS DEC Key to Aquatic Macroinvertebrates EPA Benthic Macroinvertebrates in Our Waters ...

Engelman, Mr.

2007-11-03

500

Cryptanalysis of the arbitrated quantum signature protocols  

E-print Network

As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics in future study on AQS protocols.

Gao, Fei; Guo, Fen-Zhuo; Wen, Qiao-Yan

2011-01-01