Science.gov

Sample records for online signature verification

  1. An on-line human signature verification system 

    E-print Network

    Simsek, Burc A

    2000-01-01

    A study on human signature verification is presented. A literature survey of current and past methodologies for on-line signature verification is followed by a new approach to the problem of on-line signature verification. Several novel approaches...

  2. Enhanced Cancelable Biometrics for Online Signature Verification

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo; Inuma, Manabu; Shikata, Junji; Otsuka, Akira

    Cancelable approaches for biometric person authentication have been studied to protect enrolled biometric data, and several algorithms have been proposed. One drawback of cancelable approaches is that the performance is inferior to that of non-cancelable approaches. In this paper, we propose a scheme to improve the performance of a cancelable approach for online signature verification. Our scheme generates two cancelable dataset from one raw dataset and uses them for verification. Preliminary experiments were performed using a distance-based online signature verification algorithm. The experimental results show that our proposed scheme is promising.

  3. Online Signature Verification Based on DCT and Sparse Representation.

    PubMed

    Liu, Yishu; Yang, Zhihua; Yang, Lihua

    2015-11-01

    In this paper, a novel online signature verification technique based on discrete cosine transform (DCT) and sparse representation is proposed. We find a new property of DCT, which can be used to obtain a compact representation of an online signature using a fixed number of coefficients, leading to simple matching procedures and providing an effective alternative to deal with time series of different lengths. The property is also used to extract energy features. Furthermore, a new attempt to apply sparse representation to online signature verification is made, and a novel task-specific method for building overcomplete dictionaries is proposed, then sparsity features are extracted. Finally, energy features and sparsity features are concatenated to form a feature vector. Experiments are conducted on the Sabanc? University's Signature Database (SUSIG)-Visual and SVC2004 databases, and the results show that our proposed method authenticates persons very reliably with a verification performance which is better than those of state-of-the-art methods on the same databases. PMID:25532144

  4. Fusion strategies for boosting cancelable online signature verification

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo; Inuma, Manabu; Shikata, Junji; Otsuka, Akira

    2010-04-01

    Cancelable approaches for biometric person authentication have been studied to protect enrolled biometric data, and several algorithms have been proposed. One drawback of cancelable approaches is that the performance is inferior to that of non-cancelable approaches. As one solution, we proposed a scheme to enhance the performance of a cancelable approach for online signature verification by combining scores calculated from two transformed datasets generated using two keys. Generally, the same verification algorithm is used for transformed data as for raw (non-transformed) data in cancelable approaches, and, in our previous work, a verification system developed for a non-transformed dataset was used to calculate the scores from transformed data. In this paper, we modify the verification system by using transformed data for training. Several experiments were performed by using public databases, and the experimental results show that the modification of the verification system improved the performances. Our cancelable system combines two scores to make a decision. Several fusion strategies are also considered, and the experimental results are reported here.

  5. On-line signature verification method by Laplacian spectral analysis and dynamic time warping

    NASA Astrophysics Data System (ADS)

    Li, Changting; Peng, Liangrui; Liu, Changsong; Ding, Xiaoqing

    2013-12-01

    As smartphones and touch screens are more and more popular, on-line signature verification technology can be used as one of personal identification means for mobile computing. In this paper, a novel Laplacian Spectral Analysis (LSA) based on-line signature verification method is presented and an integration framework of LSA and Dynamic Time Warping (DTW) based methods for practical application is proposed. In LSA based method, a Laplacian matrix is constructed by regarding the on-line signature as a graph. The signature's writing speed information is utilized in the Laplacian matrix of the graph. The eigenvalue spectrum of the Laplacian matrix is analyzed and used for signature verification. The framework to integrate LSA and DTW methods is further proposed. DTW is integrated at two stages. First, it is used to provide stroke matching results for the LSA method to construct the corresponding graph better. Second, the on-line signature verification results by DTW are fused with that of the LSA method. Experimental results on public signature database and practical signature data on mobile phones proved the effectiveness of the proposed method.

  6. Online handwritten signature verification using neural network classifier based on principal component analysis.

    PubMed

    Iranmanesh, Vahab; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Yussof, Salman; Arigbabu, Olasimbo Ayodeji; Malallah, Fahad Layth

    2014-01-01

    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%. PMID:25133227

  7. Online Handwritten Signature Verification Using Neural Network Classifier Based on Principal Component Analysis

    PubMed Central

    Iranmanesh, Vahab; Ahmad, Sharifah Mumtazah Syed; Adnan, Wan Azizun Wan; Arigbabu, Olasimbo Ayodeji; Malallah, Fahad Layth

    2014-01-01

    One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%. PMID:25133227

  8. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  9. Online signature verification with support vector machines based on LCSS kernel functions.

    PubMed

    Gruber, Christian; Gruber, Thiemo; Krinninger, Sebastian; Sick, Bernhard

    2010-08-01

    In this paper, a new technique for online signature verification or identification is proposed. The technique integrates a longest common subsequences (LCSS) detection algorithm which measures the similarity of signature time series into a kernel function for support vector machines (SVM). LCSS offers the possibility to consider the local variability of signals such as the time series of pen-tip coordinates on a graphic tablet, forces on a pen, or inclination angles of a pen measured during a signing process. Consequently, the similarity of two signature time series can be determined in a more reliable way than with other measures. A proprietary database with signatures of 153 test persons and the SVC 2004 benchmark database are used to show the properties of the new SVM-LCSS. We investigate its parameterization and compare it to SVM with other kernel functions such as dynamic time warping (DTW). Our experiments show that SVM with the LCSS kernel authenticate persons very reliably and with a performance which is significantly better than that of the best comparing technique, SVM with DTW kernel. PMID:19906588

  10. Retail applications of signature verification

    NASA Astrophysics Data System (ADS)

    Zimmerman, Thomas G.; Russell, Gregory F.; Heilper, Andre; Smith, Barton A.; Hu, Jianying; Markman, Dmitry; Graham, Jon E.; Drews, Clemens

    2004-08-01

    The dramatic rise in identity theft, the ever pressing need to provide convenience in checkout services to attract and retain loyal customers, and the growing use of multi-function signature captures devices in the retail sector provides favorable conditions for the deployment of dynamic signature verification (DSV) in retail settings. We report on the development of a DSV system to meet the needs of the retail sector. We currently have a database of approximately 10,000 signatures collected from 600 subjects and forgers. Previous work at IBM on DSV has been merged and extended to achieve robust performance on pen position data available from commercial point of sale hardware, achieving equal error rates on skilled forgeries and authentic signatures of 1.5% to 4%.

  11. Generic Verification Protocol for Verification of Online Turbidimeters

    EPA Science Inventory

    This protocol provides generic procedures for implementing a verification test for the performance of online turbidimeters. The verification tests described in this document will be conducted under the Environmental Technology Verification (ETV) Program. Verification tests will...

  12. Machine Learning for Signature Verification Harish Srinivasan

    E-print Network

    Machine Learning for Signature Verification Harish Srinivasan , Sargur N. Srihari and Matthew J it can be viewed as one that involves machine learning from a population of signatures. There are two and performance phases is de- scribed. Keywords: machine learning, forensic signature examination, biometrics

  13. Online fingerprint verification.

    PubMed

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications. PMID:17365425

  14. New online signature acquisition system

    NASA Astrophysics Data System (ADS)

    Oulefki, Adel; Mostefai, Messaoud; Abbadi, Belkacem; Djebrani, Samira; Bouziane, Abderraouf; Chahir, Youssef

    2013-01-01

    We present a nonconstraining and low-cost online signature acquisition system that has been developed to enhance the performances of an existing multimodal biometric authentication system (based initially on both voice and image modalities). A laboratory prototype has been developed and validated for an online signature acquisition.

  15. Offline signature verification using local binary pattern and octave pattern

    NASA Astrophysics Data System (ADS)

    Ahlawat, Sahil; Goel, Anubhav; Prasad, Surabhi; Singh, Preety

    2014-01-01

    Signature verification holds a significant place in today's world as most of the bank transactions, stock trading etc. are validated via signatures. Signatures are considered as one of the most effective biometric identity but unfortunately signature forgery attempts are quite rampant. To prevent this, a robust signature verification mechanism is essential. In this paper, a new method has been proposed which uses Local Binary Pattern and geometrical features. A new geometric property has been devised i.e. Octave Pattern. Performance is analyzed by comparing random, semi-skilled and skilled forgeries with the genuine signature.

  16. 17 CFR 1.4 - Electronic signatures, acknowledgments and verifications.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...futures commission merchant or introducing broker, a retail forex customer of a retail foreign exchange dealer or futures commission...participant, an electronic signature executed by the customer, retail forex customer, participant, client, counterparty, swap...

  17. 17 CFR 1.4 - Electronic signatures, acknowledgments and verifications.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...futures commission merchant or introducing broker, a retail forex customer of a retail foreign exchange dealer or futures commission...participant, an electronic signature executed by the customer, retail forex customer, participant, client, counterparty, swap...

  18. Online adaptation and verification of VMAT

    SciTech Connect

    Crijns, Wouter; Defraene, Gilles; Depuydt, Tom; Haustermans, Karin; Van Herck, Hans; Maes, Frederik; Van den Heuvel, Frank

    2015-07-15

    Purpose: This work presents a method for fast volumetric modulated arc therapy (VMAT) adaptation in response to interfraction anatomical variations. Additionally, plan parameters extracted from the adapted plans are used to verify the quality of these plans. The methods were tested as a prostate class solution and compared to replanning and to their current clinical practice. Methods: The proposed VMAT adaptation is an extension of their previous intensity modulated radiotherapy (IMRT) adaptation. It follows a direct (forward) planning approach: the multileaf collimator (MLC) apertures are corrected in the beam’s eye view (BEV) and the monitor units (MUs) are corrected using point dose calculations. All MLC and MU corrections are driven by the positions of four fiducial points only, without need for a full contour set. Quality assurance (QA) of the adapted plans is performed using plan parameters that can be calculated online and that have a relation to the delivered dose or the plan quality. Five potential parameters are studied for this purpose: the number of MU, the equivalent field size (EqFS), the modulation complexity score (MCS), and the components of the MCS: the aperture area variability (AAV) and the leaf sequence variability (LSV). The full adaptation and its separate steps were evaluated in simulation experiments involving a prostate phantom subjected to various interfraction transformations. The efficacy of the current VMAT adaptation was scored by target mean dose (CTV{sub mean}), conformity (CI{sub 95%}), tumor control probability (TCP), and normal tissue complication probability (NTCP). The impact of the adaptation on the plan parameters (QA) was assessed by comparison with prediction intervals (PI) derived from a statistical model of the typical variation of these parameters in a population of VMAT prostate plans (n = 63). These prediction intervals are the adaptation equivalent of the tolerance tables for couch shifts in the current clinical practice. Results: The proposed adaptation of a two-arc VMAT plan resulted in the intended CTV{sub mean} (? ? 3%) and TCP (?TCP ? 0.001). Moreover, the method assures the intended CI{sub 95%} (? ? 11%) resulting in lowered rectal NTCP for all cases. Compared to replanning, their adaptation is faster (13 s vs 10 min) and more intuitive. Compared to the current clinical practice, it has a better protection of the healthy tissue. Compared to IMRT, VMAT is more robust to anatomical variations, but it is also less sensitive to the different correction steps. The observed variations of the plan parameters in their database included a linear dependence on the date of treatment planning and on the target radius. The MCS is not retained as QA metric due to a contrasting behavior of its components (LSV and AAV). If three out of four plan parameters (MU, EqFS, AAV, and LSV) need to lie inside a 50% prediction interval (3/4—50%PI), all adapted plans will be accepted. In contrast, all replanned plans do not meet this loose criterion, mainly because they have no connection to the initially optimized and verified plan. Conclusions: A direct (forward) VMAT adaptation performs equally well as (inverse) replanning but is faster and can be extended to real-time adaptation. The prediction intervals for the machine parameters are equivalent to the tolerance tables for couch shifts in the current clinical practice. A 3/4—50%PI QA criterion accepts all the adapted plans but rejects all the replanned plans.

  19. Offline signature verification and skilled forgery detection using HMM and sum graph features with ANN and knowledge based classifier

    NASA Astrophysics Data System (ADS)

    Mehta, Mohit; Choudhary, Vijay; Das, Rupam; Khan, Ilyas

    2010-02-01

    Signature verification is one of the most widely researched areas in document analysis and signature biometric. Various methodologies have been proposed in this area for accurate signature verification and forgery detection. In this paper we propose a unique two stage model of detecting skilled forgery in the signature by combining two feature types namely Sum graph and HMM model for signature generation and classify them with knowledge based classifier and probability neural network. We proposed a unique technique of using HMM as feature rather than a classifier as being widely proposed by most of the authors in signature recognition. Results show a higher false rejection than false acceptance rate. The system detects forgeries with an accuracy of 80% and can detect the signatures with 91% accuracy. The two stage model can be used in realistic signature biometric applications like the banking applications where there is a need to detect the authenticity of the signature before processing documents like checks.

  20. Age and gender-invariant features of handwritten signatures for verification systems

    NASA Astrophysics Data System (ADS)

    AbdAli, Sura; Putz-Leszczynska, Joanna

    2014-11-01

    Handwritten signature is one of the most natural biometrics, the study of human physiological and behavioral patterns. Behavioral biometrics includes signatures that may be different due to its owner gender or age because of intrinsic or extrinsic factors. This paper presents the results of the author's research on age and gender influence on verification factors. The experiments in this research were conducted using a database that contains signatures and their associated metadata. The used algorithm is based on the universal forgery feature idea, where the global classifier is able to classify a signature as a genuine one or, as a forgery, without the actual knowledge of the signature template and its owner. Additionally, the reduction of the dimensionality with the MRMR method is discussed.

  1. Off-line Signature Verification based on the Modified Direction Feature Stephane Armand, Michael Blumenstein and Vallipuram Muthukkumarasamy

    E-print Network

    Blumenstein, Michael

    University, Queensland, Australia Stephane.Armand@student.griffith.edu.au, {M.Blumenstein, V MDF with signature images. The verification process implies the usage of forged signatures, discriminating the genuine from the forged. In this paper, we present experimental results for signature

  2. Gated Treatment Delivery Verification With On-Line Megavoltage Fluoroscopy

    SciTech Connect

    Tai An; Christensen, James D.; Gore, Elizabeth; Khamene, Ali; Boettger, Thomas; Li, X. Allen

    2010-04-15

    Purpose: To develop and clinically demonstrate the use of on-line real-time megavoltage (MV) fluoroscopy for gated treatment delivery verification. Methods and Materials: Megavoltage fluoroscopy (MVF) image sequences were acquired using a flat panel equipped for MV cone-beam CT in synchrony with the respiratory signal obtained from the Anzai gating device. The MVF images can be obtained immediately before or during gated treatment delivery. A prototype software tool (named RTReg4D) was developed to register MVF images with phase-sequenced digitally reconstructed radiograph images generated from the treatment planning system based on four-dimensional CT. The image registration can be used to reposition the patient before or during treatment delivery. To demonstrate the reliability and clinical usefulness, the system was first tested using a thoracic phantom and then prospectively in actual patient treatments under an institutional review board-approved protocol. Results: The quality of the MVF images for lung tumors is adequate for image registration with phase-sequenced digitally reconstructed radiographs. The MVF was found to be useful for monitoring inter- and intrafractional variations of tumor positions. With the planning target volume contour displayed on the MVF images, the system can verify whether the moving target stays within the planning target volume margin during gated delivery. Conclusions: The use of MVF images was found to be clinically effective in detecting discrepancies in tumor location before and during respiration-gated treatment delivery. The tools and process developed can be useful for gated treatment delivery verification.

  3. On the pinned field image binarization for signature generation in image ownership verification method

    NASA Astrophysics Data System (ADS)

    Lee, Mn-Ta; Chang, Hsuan Ting

    2011-12-01

    The issue of pinned field image binarization for signature generation in the ownership verification of the protected image is investigated. The pinned field explores the texture information of the protected image and can be employed to enhance the watermark robustness. In the proposed method, four optimization schemes are utilized to determine the threshold values for transforming the pinned field into a binary feature image, which is then utilized to generate an effective signature image. Experimental results show that the utilization of optimization schemes can significantly improve the signature robustness from the previous method (Lee and Chang, Opt. Eng. 49(9), 097005, 2010). While considering both the watermark retrieval rate and the computation speed, the genetic algorithm is strongly recommended. In addition, compared with Chang and Lin's scheme (J. Syst. Softw. 81(7), 1118-1129, 2008), the proposed scheme also has better performance.

  4. GRAZING-ANGLE FOURIER TRANSFORM INFRARED SPECTROSCOPY FOR ONLINE SURFACE CLEANLINESS VERIFICATION. YEAR 1

    EPA Science Inventory

    As part of the Online Surface Cleanliness Project, the Naval Facilities Engineering Service Center (NFESC) conducted a study of grazing-angle reflectance Fourier Transform Infrared (FTIR) Spectroscopy as a tool for online cleanliness verification at Department of Defense (DoD) cl...

  5. Toward Online Verification of Client Behavior in Distributed Applications Robert A. Cochran

    E-print Network

    Reiter, Michael

    Toward Online Verification of Client Behavior in Distributed Applications Robert A. Cochran@cs.unc.edu Abstract Existing techniques for a server to verify the correctness of client behavior in a distributed. We present a novel method for a server to efficiently search for a code path through the client

  6. Optical security verification by synthesizing thin films with unique polarimetric signatures.

    PubMed

    Carnicer, Artur; Arteaga, Oriol; Pascual, Esther; Canillas, Adolf; Vallmitjana, Santiago; Javidi, Bahram; Bertran, Enric

    2015-11-15

    This Letter reports the production and optical polarimetric verification of codes based on thin-film technology for security applications. Because thin-film structures display distinctive polarization signatures, this data is used to authenticate the message encoded. Samples are analyzed using an imaging ellipsometer able to measure the 16 components of the Mueller matrix. As a result, the behavior of the thin film under polarized light becomes completely characterized. This information is utilized to distinguish among true and false codes by means of correlation. Without the imaging optics the components of the Mueller matrix become noise-like distributions and, consequently, the message encoded is no longer available. Then, a set of Stokes vectors are generated numerically for any polarization state of the illuminating beam and thus, machine learning techniques can be used to perform classification. We show that successful authentication is possible using the k-nearest neighbors algorithm in thin-films codes that have been anisotropically phase-encoded with pseudorandom phase code. PMID:26565884

  7. Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures

    E-print Network

    Autonoma de Madrid, Universidad

    Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures Manuel R. Freire, Julian Fierrez, Javier Galbally, and Javier Ortega-Garcia Biometric Recognition Group - ATVS a general biometric hash generation scheme based on vector quantization of multiple feature subsets selected

  8. An Optimized Online Verification Imaging Procedure for External Beam Partial Breast Irradiation

    SciTech Connect

    Willis, David J.; Kron, Tomas; Chua, Boon

    2011-07-01

    The purpose of this study was to evaluate the capabilities of a kilovoltage (kV) on-board imager (OBI)-equipped linear accelerator in the setting of on-line verification imaging for external-beam partial breast irradiation. Available imaging techniques were optimized and assessed for image quality using a modified anthropomorphic phantom. Imaging dose was also assessed. Imaging techniques were assessed for physical clearance between patient and treatment machine using a volunteer. Nonorthogonal kV image pairs were identified as optimal in terms of image quality, clearance, and dose. After institutional review board approval, this approach was used for 17 patients receiving accelerated partial breast irradiation. Imaging was performed before every fraction verification with online correction of setup deviations >5 mm (total image sessions = 170). Treatment staff rated risk of collision and visibility of tumor bed surgical clips where present. Image session duration and detected setup deviations were recorded. For all cases, both image projections (n = 34) had low collision risk. Surgical clips were rated as well as visualized in all cases where they were present (n = 5). The average imaging session time was 6 min, 16 sec, and a reduction in duration was observed as staff became familiar with the technique. Setup deviations of up to 1.3 cm were detected before treatment and subsequently confirmed offline. Nonorthogonal kV image pairs allowed effective and efficient online verification for partial breast irradiation. It has yet to be tested in a multicenter study to determine whether it is dependent on skilled treatment staff.

  9. PART II: Application to Graduate (major/minor Verification) DATE: __-__-20_ _ Advisor Signature: _____________________

    E-print Network

    Angenent, Lars T.

    ) DATE: __-__-20_ _ Advisor Signature Requirements * Advisors: Refrain from using generalizations and use specific course numbers of Advisor: ____________________________ (please print) YES all requirements

  10. Designated Confirmer Signatures With Unified Verification Guilin Wang 1, Fubiao Xia 2, and Yunlei Zhao 3

    E-print Network

    International Association for Cryptologic Research (IACR)

    Zhao 3 1 University of Wollongong, Australia (guilin@uow.edu.au) 2 University of Birmingham, UK (F and Stadler [22] pointed out that the confirmer can forge valid signatures on behalf of the signer in Okamoto

  11. Laboratory verification of on-line lithium analysis using ultraviolet absorption spectrometry

    SciTech Connect

    Beemster, B.J.; Schlager, K.J.; Schloegel, K.M.; Kahle, S.J.; Fredrichs, T.L.

    1992-12-31

    Several laboratory experiments were performed to evaluate the capability of absorption spectrometry in the ultraviolet-visible wavelength range with the objective of developing methods for on-line analysis of lithium directly in the primary coolant of Pressurized Water Reactors using optical probes. Although initial laboratory tests seemed to indicate that lithium could be detected using primary absorption (detection of natural spectra unassisted by reagents), subsequent field tests demonstrated that no primary absorption spectra existed for lithium in the ultraviolet-visible wavelength range. A second series of tests that were recently conducted did, however, confirm results reported in the literature to the effect that reagents were available that will react with lithium to form chelates that possess detectable absorption and fluorescent signatures. These results point to the possible use of secondary techniques for on-line analysis of lithium.

  12. 75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-22

    ...This final rule amends Department of Homeland Security regulations to provide that employers and recruiters or referrers for a fee who are required to complete and retain the Form I-9, Employment Eligibility Verification, may sign this form electronically and retain this form in an electronic format. This final rule makes minor changes to an interim final rule promulgated in...

  13. Low-Latency ECDSA Signature Verification A Road Towards Safer Traffic

    E-print Network

    International Association for Cryptologic Research (IACR)

    -to-Infrastructure (C2I) communication to transmit all this data coming from cars and infrastructure in a reliable way´c, Ventzislav Nikov, and Peter Rombouts NXP Semiconductors Abstract. Car-to-car and Car verification, NIST P-256, Car2Car, Car2X, ITS. 1 Introduction Everyone nowadays is familiar with the problems

  14. Is Your Avatar Ethical? On-Line Course Tools that Are Methods for Student Identity and Verification

    ERIC Educational Resources Information Center

    Semple, Mid; Hatala, Jeffrey; Franks, Patricia; Rossi, Margherita A.

    2011-01-01

    On-line college courses present a mandate for student identity verification for accreditation and funding sources. Student authentication requires course modification to detect fraud and misrepresentation of authorship in assignment submissions. The reality is that some college students cheat in face-to-face classrooms; however, the potential for…

  15. Enrollment Services Enrollment Verification Request Form

    E-print Network

    Chen, Shu-Ching

    Enrollment Services Enrollment Verification Request Form Enrollment Verifications are official documents issued by the University Registrar. An Enrollment Verification may be obtained online through identification to fiuverify@fiu.edu. Enrollment Verifications that are obtained online or in person typically

  16. Efficient cost-sensitive human-machine collaboration for offline signature verification

    NASA Astrophysics Data System (ADS)

    Coetzer, Johannes; Swanepoel, Jacques; Sabourin, Robert

    2012-01-01

    We propose a novel strategy for the optimal combination of human and machine decisions in a cost-sensitive environment. The proposed algorithm should be especially beneficial to financial institutions where off-line signatures, each associated with a specific transaction value, require authentication. When presented with a collection of genuine and fraudulent training signatures, produced by so-called guinea pig writers, the proficiency of a workforce of human employees and a score-generating machine can be estimated and represented in receiver operating characteristic (ROC) space. Using a set of Boolean fusion functions, the majority vote decision of the human workforce is combined with each threshold-specific machine-generated decision. The performance of the candidate ensembles is estimated and represented in ROC space, after which only the optimal ensembles and associated decision trees are retained. When presented with a questioned signature linked to an arbitrary writer, the system first uses the ROC-based cost gradient associated with the transaction value to select the ensemble that minimises the expected cost, and then uses the corresponding decision tree to authenticate the signature in question. We show that, when utilising the entire human workforce, the incorporation of a machine streamlines the authentication process and decreases the expected cost for all operating conditions.

  17. PUBLISHED ONLINE: 29 SEPTEMBER 2013 | DOI: 10.1038/NPHYS2763 Experimental verification of quantum computation

    E-print Network

    Loss, Daniel

    with predictions computed on a piece of paper or on a computer assumes that all such predictions are solvable present the first experimental verification of quantum computation. We show, in theory and experiment, how

  18. Aging in Biometrics: An Experimental Analysis on On-Line Signature

    PubMed Central

    Galbally, Javier; Martinez-Diaz, Marcos; Fierrez, Julian

    2013-01-01

    The first consistent and reproducible evaluation of the effect of aging on dynamic signature is reported. Experiments are carried out on a database generated from two previous datasets which were acquired, under very similar conditions, in 6 sessions distributed in a 15-month time span. Three different systems, representing the current most popular approaches in signature recognition, are used in the experiments, proving the degradation suffered by this trait with the passing of time. Several template update strategies are also studied as possible measures to reduce the impact of aging on the system’s performance. Different results regarding the way in which signatures tend to change with time, and their most and least stable features, are also given. PMID:23894557

  19. Authentication Based on Pole-zero Models of Signature Velocity.

    PubMed

    Rashidi, Saeid; Fallah, Ali; Towhidkhah, Farzad

    2013-10-01

    With the increase of communication and financial transaction through internet, on-line signature verification is an accepted biometric technology for access control and plays a significant role in authenticity and authorization in modernized society. Therefore, fast and precise algorithms for the signature verification are very attractive. The goal of this paper is modeling of velocity signal that pattern and properties is stable for persons. With using pole-zero models based on discrete cosine transform, precise method is proposed for modeling and then features is founded from strokes. With using linear, parzen window and support vector machine classifiers, the signature verification technique was tested with a large number of authentic and forgery signatures and has demonstrated the good potential of this technique. The signatures are collected from three different database include a proprietary database, the SVC2004 and the Sabanci University signature database benchmark databases. Experimental results based on Persian, SVC2004 and SUSIG databases show that our method achieves an equal error rate of 5.91%, 5.62% and 3.91% in the skilled forgeries, respectively. PMID:24696797

  20. Please complete form in ink, or complete online, print, sign in ink and obtain required signatures Signature needed if adding after the 10th semester day or

    E-print Network

    Maxwell, Bruce D.

    dropddaadd Please complete form in ink, or complete online, print, sign in ink and obtain required in Montana Hall. Spring, Summer, or Fall ~Add/Drop Request Form~ 1. Enter your information - use ink or fill the form online 2. Enter the course information - use ink or fill the form online. 3. The course instructor

  1. Online Kidney Position Verification Using Non-Contrast Radiographs on a Linear Accelerator with on Board KV X-Ray Imaging Capability

    SciTech Connect

    Willis, David J. Kron, Tomas; Hubbard, Patricia; Haworth, Annette; Wheeler, Greg; Duchesne, Gillian M.

    2009-01-01

    The kidneys are dose-limiting organs in abdominal radiotherapy. Kilovoltage (kV) radiographs can be acquired using on-board imager (OBI)-equipped linear accelerators with better soft tissue contrast and lower radiation doses than conventional portal imaging. A feasibility study was conducted to test the suitability of anterior-posterior (AP) non-contrast kV radiographs acquired at treatment time for online kidney position verification. Anthropomorphic phantoms were used to evaluate image quality and radiation dose. Institutional Review Board approval was given for a pilot study that enrolled 5 adults and 5 children. Customized digitally reconstructed radiographs (DRRs) were generated to provide a priori information on kidney shape and position. Radiotherapy treatment staff performed online evaluation of kidney visibility on OBI radiographs. Kidney dose measured in a pediatric anthropomorphic phantom was 0.1 cGy for kV imaging and 1.7 cGy for MV imaging. Kidneys were rated as well visualized in 60% of patients (90% confidence interval, 34-81%). The likelihood of visualization appears to be influenced by the relative AP separation of the abdomen and kidneys, the axial profile of the kidneys, and their relative contrast with surrounding structures. Online verification of kidney position using AP non-contrast kV radiographs on an OBI-equipped linear accelerator appears feasible for patients with suitable abdominal anatomy. Kidney position information provided is limited to 2-dimensional 'snapshots,' but this is adequate in some clinical situations and potentially advantageous in respiratory-correlated treatments. Successful clinical implementation requires customized partial DRRs, appropriate imaging parameters, and credentialing of treatment staff.

  2. EMPLOYMENT VERIFICATION LETTER Student's Name:_

    E-print Network

    Stuart, Steven J.

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name:_ (Family Name) (First) (Middle Initial- _______ Employer Identification Number_57-6000254______ Name of Student's Immediate Supervisor (Print)____________________________ Employer Name (Print)____________________Employer Title________________ Employer Signature

  3. A New ID-based Signature with Batch Verification Jung Hee Cheon1, Yongdae Kim2 and Hyo Jin Yoon1

    E-print Network

    International Association for Cryptologic Research (IACR)

    , to simplify key management procedures of certificate-based public key infrastructures (PKIs) [Sha84]. Since factorization problem [DG86,Tan87,TI89,MY91]. While ID-based signature has advantages for key management and key commerce or banking service in which one server has to verify many signatures simultaneously. In order

  4. VERIFICATION OF THEORY BASED DESIGN FEATURES FOR DESIGNING ONLINE INSTRUCTION FOR STUDENTS WITH LEARNING DISABILITIES AND OTHER STRUGGLING LEARNERS

    E-print Network

    CHIU, CHI-HSUN

    2013-05-31

    This study involved a comprehensive review of the literature on multimedia design to identify theory based design principles applicable to online instruction. Seven theories were reviewed. They included Cultural Historical Activity Theory (CHAT...

  5. PUBLISHED ONLINE: 7 AUGUST 2011 | DOI: 10.1038/NGEO1214 Diapirs as the source of the sediment signature in

    E-print Network

    Hacker, Bradley R.

    of the sediment signature in arc lavas Mark D. Behn1 *, Peter B. Kelemen2 , Greg Hirth3 , Bradley R. Hacker4 experienced temperatures exceeding 1,050 C. According to thermal models, these temperatures are much higher detach from the downgoing slab at temperatures of 500­850 C to form buoyant diapirs. The diapirs rise

  6. SU-E-J-46: Development of a Compton Camera Prototype for Online Range Verification of Laser-Accelerated Proton Beams

    SciTech Connect

    Thirolf, PG; Bortfeldt, J; Lang, C; Parodi, K; Aldawood, S; Boehmer, M; Gernhaeuser, R; Maier, L; Castelhano, I; Kolff, H van der; Schaart, DR

    2014-06-01

    Purpose: Development of a photon detection system designed for online range verification of laser-accelerated proton beams via prompt-gamma imaging of nuclear reactions. Methods: We develop a Compton camera for the position-sensitive detection of prompt photons emitted from nuclear reactions between the proton beam and biological samples. The detector is designed to be capable to reconstruct the photon source origin not only from the Compton scattering kinematics of the primary photon, but also to allow for tracking of the Compton-scattered electrons. Results: Simulation studies resulted in the design of the Compton camera based on a LaBr{sub 3}(Ce) scintillation crystal acting as absorber, preceded by a stacked array of 6 double-sided silicon strip detectors as scatterers. From the design simulations, an angular resolution of ? 2° and an image reconstruction efficiency of 10{sup ?3} ?10{sup ?5} (at 2–6 MeV) can be expected. The LaBr{sub 3} crystal has been characterized with calibration sources, resulting in a time resolution of 273 ps (FWHM) and an energy resolution of about 3.8% (FWHM). Using a collimated (1 mm diameter) {sup 137}Cs calibration source, the light distribution was measured for each of 64 pixels (6×6 mm{sup 2}). Data were also taken with 0.5 mm collimation and 0.5 mm step size to generate a reference library of light distributions that allows for reconstructing the interaction position of the initial photon using a k-nearest neighbor (k-NN) algorithm developed by the Delft group. Conclusion: The Compton-camera approach for prompt-gamma detection offers promising perspectives for ion beam range verification. A Compton camera prototype is presently being developed and characterized in Garching. Furthermore, an arrangement of, e.g., 4 camera modules could even be used in a ‘gamma-PET’ mode to detect delayed annihilation radiation from positron emitters in the irradiation interrupts (with improved performance in the presence of an additional third (prompt) photon (as in 10C and 14O). This work was supported by the DFG Cluster of Excellence MAP (Munich-Centre for Advanced Photonics)

  7. DEVELOPMENT OF A PORTAL MONITOR FOR UF6 CYLINDER VERIFICATION

    SciTech Connect

    Smith, Leon E.; Curtis, Michael M.; Shaver, Mark W.; Benz, Jacob M.; Misner, Alex C.; Mace, Emily K.; Jordan, David V.; Noss, Daniel; Ford, Herbert

    2009-10-06

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s operations. As additional enrichment plans come online to support the expansion of nuclear power, reducing person-days of inspection will take on greater importance. Pacific Northwest National Laboratory (PNNL) is developing a concept to automate the verification of enrichment plant cylinders to enable 100% product-cylinder verification and potentially, mass-balance calculations on the facility as a whole (by also measuring feed and tails cylinders). The Automated Cylinder Enrichment Verification System (ACEVS) would be located at key measurement points and will positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. Given the potential for reduced inspector presence, the operational and manpower-reduction benefits of the portal concept are clear. However, it is necessary to assess whether the cylinder portal concept can meet, or potentially improve upon, today’s U-235 enrichment assay performance. PNNL’s ACEVS concept utilizes sensors that could be operated in an unattended mode: moderated He-3 neutron detectors and large NaI(Tl) scintillators for gamma-ray spectroscopy. The medium-resolution NaI(Tl) scintillators are a sacrifice in energy resolution but do provide high collection efficiency for signatures above 1 MeV. The He-3/NaI sensor combination allows the exploitation of additional, more-penetrating signatures than those currently utilized: Neutrons produced from F-19(?,n) reactions (spawned primarily from U-234 alpha emission) and high-energy gamma rays (extending up to 10 MeV) induced by neutrons interacting in the steel cylinder. These signatures are indirect measures of U-235 that require a relatively stable U-234/U-235 ratio in the product material in order to be useful. The hypothesis of this work is that the U-234/U-235 ratio is sufficiently constant, for the specific facility where the automated system is installed, to rely on neutron and high-energy gamma-ray signatures for indirect measurement of U-235. Further, these highly penetrating signatures can be combined with a modified form of NaI-based 185-keV enrichment measurements to meet target uncertainties for the verification of product cylinders, with the additional benefits of full-volume assay of the cylinder and 100% product-cylinder verification (as opposed to today’s sampling-based approach). This paper focuses on the enrichment measurement aspects of the ACEVS concept: neutron and high-energy gamma-ray signatures, the radiation sensors designed to collect those signatures, and proof-of-principle cylinder measurements and analysis. Preliminary analysis indicates that an automated cylinder verification approach has the potential to meet target uncertainty values for 30B products cylinders (5%), assuming ore-based enrichment feed and a facility-specific calibration. Also described is the additional work needed to more definitively assess the concept’s viability, particularly through a better understanding of the U-234/U-235 ratio variability in modern enrichment plants.

  8. Signature Crossroads

    E-print Network

    Chong, Puifai Cyril

    1997-01-01

    Signature Crossroads, an urban form that grows out of an street intersection, combines both the sense of "transit" and the sense of "destination." Such dual character gives Signature Crossroads a superiority over traditional ...

  9. Digital Signatures from Challenge-Divided -Protocols Andrew C. Yao

    E-print Network

    International Association for Cryptologic Research (IACR)

    Digital Signatures from Challenge-Divided -Protocols Andrew C. Yao Yunlei Zhao Abstract Digital (RO). The Digital Signature Standard (DSS) and Schnorr's signature schemes are two salient examples. This new paradigm yields a new family of (online/offline efficient) digital signatures from challenge

  10. 18 CFR 385.2005 - Subscription and verification (Rule 2005).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... verification (Rule 2005). 385.2005 Section 385.2005 Conservation of Power and Water Resources FEDERAL ENERGY... Requirements for Filings in Proceedings Before the Commission § 385.2005 Subscription and verification (Rule 2005). (a) Subscription. (1) Any filing with the Commission must be signed. (2) The signature on...

  11. A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State

    NASA Astrophysics Data System (ADS)

    Tian, Juan-Hong; Zhang, Jian-Zhong; Li, Yan-Ping

    2015-06-01

    In this paper, we propose a multi-proxy blind signature scheme based on controlled teleportation. Genuine four-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security analysis shows the scheme satisfies the security features of multi-proxy signature, unforgeability, undeniability, blindness and unconditional security.

  12. Author's personal copy Hand-based verification and identification using palmfinger

    E-print Network

    Nicolescu, Mircea

    Author's personal copy Hand-based verification and identification using palm­finger segmentation 2008 Accepted 28 November 2008 Available online 24 December 2008 Keywords: Biometrics Hand-based verification Hand-based recognition Fusion PCA Majority voting SVMs a b s t r a c t Hand-based verification

  13. Strengths-based positive psychology interventions: a randomized placebo-controlled online trial on long-term effects for a signature strengths- vs. a lesser strengths-intervention.

    PubMed

    Proyer, René T; Gander, Fabian; Wellenzohn, Sara; Ruch, Willibald

    2015-01-01

    Recent years have seen an increasing interest in research in positive psychology interventions. There is broad evidence for their effectiveness in increasing well-being and ameliorating depression. Intentional activities that focus on those character strengths, which are most typical for a person (i.e., signature strengths, SS) and encourage their usage in a new way have been identified as highly effective. The current study aims at comparing an intervention aimed at using SS with one on using individual low scoring (or lesser) strengths in a randomized placebo-controlled trial. A total of 375 adults were randomly assigned to one of the two intervention conditions [i.e., using five signature vs. five lesser strengths (LS) in a new way] or a placebo control condition (i.e., early memories). We measured happiness and depressive symptoms at five time points (i.e., pre- and post-test, 1-, 3-, and 6-months follow-ups) and character strengths at pre-test. The main findings are that (1) there were increases in happiness for up to 3 months and decreases in depressive symptoms in the short term in both intervention conditions; (2) participants found working with strengths equally rewarding (enjoyment and benefit) in both conditions; (3) those participants that reported generally higher levels of strengths benefitted more from working on LS rather than SS and those with comparatively lower levels of strengths tended to benefit more from working on SS; and (4) deviations from an average profile derived from a large sample of German-speakers completing the Values-in-Action Inventory of Strengths were associated with greater benefit from the interventions in the SS-condition. We conclude that working on character strengths is effective for increasing happiness and discuss how these interventions could be tailored to the individual for promoting their effectiveness. PMID:25954221

  14. Strengths-based positive psychology interventions: a randomized placebo-controlled online trial on long-term effects for a signature strengths- vs. a lesser strengths-intervention

    PubMed Central

    Proyer, René T.; Gander, Fabian; Wellenzohn, Sara; Ruch, Willibald

    2015-01-01

    Recent years have seen an increasing interest in research in positive psychology interventions. There is broad evidence for their effectiveness in increasing well-being and ameliorating depression. Intentional activities that focus on those character strengths, which are most typical for a person (i.e., signature strengths, SS) and encourage their usage in a new way have been identified as highly effective. The current study aims at comparing an intervention aimed at using SS with one on using individual low scoring (or lesser) strengths in a randomized placebo-controlled trial. A total of 375 adults were randomly assigned to one of the two intervention conditions [i.e., using five signature vs. five lesser strengths (LS) in a new way] or a placebo control condition (i.e., early memories). We measured happiness and depressive symptoms at five time points (i.e., pre- and post-test, 1-, 3-, and 6-months follow-ups) and character strengths at pre-test. The main findings are that (1) there were increases in happiness for up to 3 months and decreases in depressive symptoms in the short term in both intervention conditions; (2) participants found working with strengths equally rewarding (enjoyment and benefit) in both conditions; (3) those participants that reported generally higher levels of strengths benefitted more from working on LS rather than SS and those with comparatively lower levels of strengths tended to benefit more from working on SS; and (4) deviations from an average profile derived from a large sample of German-speakers completing the Values-in-Action Inventory of Strengths were associated with greater benefit from the interventions in the SS-condition. We conclude that working on character strengths is effective for increasing happiness and discuss how these interventions could be tailored to the individual for promoting their effectiveness. PMID:25954221

  15. Signature quantization

    PubMed Central

    Guillemin, Victor; Sternberg, Shlomo; Weitsman, Jonathan

    2003-01-01

    We associate to the action of a compact Lie group G on a line bundle over a compact oriented even-dimensional manifold a virtual representation of G using a twisted version of the signature operator. We obtain analogues of various theorems in the more standard theory of geometric quantization. PMID:14569022

  16. ETV - VERIFICATION TESTING (ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM)

    EPA Science Inventory

    Verification testing is a major component of the Environmental Technology Verification (ETV) program. The ETV Program was instituted to verify the performance of innovative technical solutions to problems that threaten human health or the environment and was created to substantia...

  17. Verification of Vortex Workflows Tevfik Bultan1

    E-print Network

    Su, Jianwen

    to verification of Vortex programs. As a case study we used a Vortex program MIHU for online customer support Introduction A workflow management system provides a mechanism for organizing the execu- tion of multiple tasks, typically in support of a business or scientific process. A variety of workflow models and implementation

  18. Online Marketplace for Residential Measures 

    E-print Network

    Ashe,J.; MBA; BEP

    2014-01-01

    energy™ Online Marketplace for Residential Measures 2014 Program Year ESL-KT-14-11-09 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Delivery Channels/Options ? Online Marketplace/ Drop Ship Method 2© Copyright 2014... CLEAResult. All rights reserved. ESL-KT-14-11-09 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Advantages of Online Marketplace ? Target a different/convenience shopper to complement existing offers ? Customer verification...

  19. Modeling the Lexical Morphology of Western Handwritten Signatures

    PubMed Central

    Diaz-Cabrera, Moises; Ferrer, Miguel A.; Morales, Aythami

    2015-01-01

    A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures. PMID:25860942

  20. Modeling the lexical morphology of Western handwritten signatures.

    PubMed

    Diaz-Cabrera, Moises; Ferrer, Miguel A; Morales, Aythami

    2015-01-01

    A handwritten signature is the final response to a complex cognitive and neuromuscular process which is the result of the learning process. Because of the many factors involved in signing, it is possible to study the signature from many points of view: graphologists, forensic experts, neurologists and computer vision experts have all examined them. Researchers study written signatures for psychiatric, penal, health and automatic verification purposes. As a potentially useful, multi-purpose study, this paper is focused on the lexical morphology of handwritten signatures. This we understand to mean the identification, analysis, and description of the signature structures of a given signer. In this work we analyze different public datasets involving 1533 signers from different Western geographical areas. Some relevant characteristics of signature lexical morphology have been selected, examined in terms of their probability distribution functions and modeled through a General Extreme Value distribution. This study suggests some useful models for multi-disciplinary sciences which depend on handwriting signatures. PMID:25860942

  1. Characterization of a fiber-coupled Al{sub 2}O{sub 3}:C luminescence dosimetry system for online in vivo dose verification during {sup 192}Ir brachytherapy

    SciTech Connect

    Andersen, Claus E.; Nielsen, Soeren Kynde; Greilich, Steffen; Helt-Hansen, Jakob; Lindegaard, Jacob Christian; Tanderup, Kari

    2009-03-15

    A prototype of a new dose-verification system has been developed to facilitate prevention and identification of dose delivery errors in remotely afterloaded brachytherapy. The system allows for automatic online in vivo dosimetry directly in the tumor region using small passive detector probes that fit into applicators such as standard needles or catheters. The system measures the absorbed dose rate (0.1 s time resolution) and total absorbed dose on the basis of radioluminescence (RL) and optically stimulated luminescence (OSL) from aluminum oxide crystals attached to optical fiber cables (1 mm outer diameter). The system was tested in the range from 0 to 4 Gy using a solid-water phantom, a Varian GammaMed Plus {sup 192}Ir PDR afterloader, and dosimetry probes inserted into stainless-steel brachytherapy needles. The calibrated system was found to be linear in the tested dose range. The reproducibility (one standard deviation) for RL and OSL measurements was 1.3%. The measured depth-dose profiles agreed well with the theoretical expectations computed with the EGSNRC Monte Carlo code, suggesting that the energy dependence for the dosimeter probes (relative to water) is less than 6% for source-to-probe distances in the range of 2-50 mm. Under certain conditions, the RL signal could be greatly disturbed by the so-called stem signal (i.e., unwanted light generated in the fiber cable upon irradiation). The OSL signal is not subject to this source of error. The tested system appears to be adequate for in vivo brachytherapy dosimetry.

  2. A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents.

    PubMed

    Tayan, Omar; Kabir, Muhammad N; Alginahi, Yasser M

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  3. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents

    PubMed Central

    Kabir, Muhammad N.; Alginahi, Yasser M.

    2014-01-01

    This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. Such issues were largely addressed in the literature for images, audio, and video, with only a few papers addressing the challenge of sensitive plain-text media under known constraints. Specifically, with text as the predominant online communication medium, it becomes crucial that techniques are deployed to protect such information. A number of digital-signature, hashing, and watermarking schemes have been proposed that essentially bind source data or embed invisible data in a cover media to achieve its goal. While many such complex schemes with resource redundancies are sufficient in offline and less-sensitive texts, this paper proposes a hybrid approach based on zero-watermarking and digital-signature-like manipulations for sensitive text documents in order to achieve content originality and integrity verification without physically modifying the cover text in anyway. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof of originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally, enhancements in resource utilisation and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Finally, analysis and remarks are made about the current state of the art, and future research issues are discussed under the given constraints. PMID:25254247

  4. Abstract--Signatures continue to be an important biometric for authenticating the identity of human beings. This paper

    E-print Network

    Blumenstein, Michael

    9726, Australia. (phone: +61 7 5552 8271; fax: +61 7 5552 8066; e-mail: stephane of the signatures being investigated. The verification process implies the usage of forged signatures, discriminating the genuine from the forged. In this paper, we present experimental results for signature

  5. Verification Testing Test Driven Development Testing with JUnit Verification

    E-print Network

    Peters, Dennis

    Verification Testing Test Driven Development Testing with JUnit Verification Any activity should be verified. #12;Verification Testing Test Driven Development Testing with JUnit Approaches to verification 1 Testing 2 Static Analysis · Peer review · Insepction/Walk-through/Structured review · Formal

  6. Towards a Better Understanding of the Oxygen Isotope Signature of Atmospheric CO2: Determining the 18O-Exchange Between CO2 and H2O in Leaves and Soil On-line with Laser-Based Spectroscopy

    NASA Astrophysics Data System (ADS)

    Gangi, L.; Rothfuss, Y.; Vereecken, H.; Brueggemann, N.

    2013-12-01

    The oxygen isotope signature of carbon dioxide (?18O-CO2) is a powerful tool to disentangle CO2 fluxes in terrestrial ecosystems, as CO2 attains a contrasting 18O signature by the interaction with isotopically different soil and leaf water pools during soil respiration and photosynthesis, respectively. However, using the ?18O-CO2 signal to quantify plant-soil-atmosphere CO2 fluxes is still challenging due to a lack of knowledge concerning the magnitude and effect of individual fractionation processes during CO2 and H2O diffusion and during CO2-H2O isotopic exchange in soils and leaves, especially related to short-term changes in environmental conditions (non-steady state). This study addresses this research gap by combined on-line monitoring of the oxygen isotopic signature of CO2 and water vapor during gas exchange in soil and plant leaves with laser-based spectroscopy, using soil columns and plant chambers. In both experimental setups, the measured ?18O of water vapor was used to infer the ?18O of liquid water, and, together with the ?18O-CO2, the degree of oxygen isotopic equilibrium between the two species (?). Gas exchange experiments with different functional plant types (C3 coniferous, C3 monocotyledonous, C3 dicotyledonous, C4) revealed that ? and the influence of the plant on the ambient ?18O-CO2 (CO18O-isoforcing) not only varied on a diurnal timescale but also when plants were exposed to limited water availability, elevated air temperature, and abrupt changes in light intensity (sunflecks). Maximum ? before treatments ranged between 0.7 and 0.8 for the C3 dicotyledonous (poplar) and C3 monocotyledonous (wheat) plants, and between 0.5 and 0.6 for the conifer (spruce) and C4 plant (maize) while maximum CO18O-isoforcing was highest in wheat (0.03 m s-1 ‰), similar in poplar and maize (0.02 m s-1 ‰), and lowest in spruce (0.01 m s-1 ‰). Multiple regression analysis showed that up to 97 % of temporal dynamics in CO18O-isoforcing could be explained by variations in stomatal conductance, ?, and ?18O of H2O at the evaporation site. The determined maximum in vivo activity of carbonic anhydrase, the enzyme which catalyzes the CO2-H2O oxygen isotope exchange inside leaves, varied between the different plant species and was, as observed for ?, higher in poplar and wheat, and lower in maize and spruce. Preliminary experiments with soil columns filled with sand demonstrated that gas-permeable microporous polypropylene tubing, which was installed at different depths in the soil columns, was appropriate for determining ?18O-H2O and ?18O-CO2 simultaneously without fractionation. Hence, this new methodology is promising for further studies on the oxygen isotopic exchange between CO2 and H2O in soils. Altogether, this study highlights that the ?18O-CO2 exchange in the soil-plant-atmosphere continuum is highly dynamic in response to short-term variations in environmental conditions, and emphasizes the need for an improved parameterization of models simulating ?18O-CO2.

  7. Columbus pressurized module verification

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Comandatore, Emanuele

    1986-01-01

    The baseline verification approach of the COLUMBUS Pressurized Module was defined during the A and B1 project phases. Peculiarities of the verification program are the testing requirements derived from the permanent manned presence in space. The model philosophy and the test program have been developed in line with the overall verification concept. Such critical areas as meteoroid protections, heat pipe radiators and module seals are identified and tested. Verification problem areas are identified and recommendations for the next development are proposed.

  8. Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures

    E-print Network

    International Association for Cryptologic Research (IACR)

    Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures Georg properties: The delegatee actually signing and all intermediate delegators remain anonymous. As for group to its members--there is one single group signature verification key. The central feature is anonymity

  9. Verification of Adaptive Systems

    SciTech Connect

    Pullum, Laura L; Cui, Xiaohui; Vassev, Emil; Hinchey, Mike; Rouff, Christopher; Buskens, Richard

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  10. Verification Tools Secure Online Shopping, Banking

    NASA Technical Reports Server (NTRS)

    2010-01-01

    Just like rover or rocket technology sent into space, the software that controls these technologies must be extensively tested to ensure reliability and effectiveness. Ames Research Center invented the open-source Java Pathfinder (JPF) toolset for the deep testing of Java-based programs. Fujitsu Labs of America Inc., based in Sunnyvale, California, improved the capabilities of the JPF Symbolic Pathfinder tool, establishing the tool as a means of thoroughly testing the functionality and security of Web-based Java applications such as those used for Internet shopping and banking.

  11. Analysis of a Biometric Authentication Protocol for Signature Creation Application

    E-print Network

    Ryan, Mark

    Analysis of a Biometric Authentication Protocol for Signature Creation Application A. Salaiwarakul.D.Ryan}@cs.bham.ac.uk Abstract. This paper presents an analysis of biometric authentication for signa- ture creation application shows that the protocol holds the biometric data securely while the verification of the safety property

  12. Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions

    E-print Network

    International Association for Cryptologic Research (IACR)

    Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions Arnaud Boscher Irdeto Fault attacks are one of the most severe attacks against secure embed- ded cryptographic implementations the inverse operation (verification) in order to secure the algorithm against fault attacks. We propose new

  13. Cryptanalysis on an Algorithm for Efficient Digital Signatures

    E-print Network

    International Association for Cryptologic Research (IACR)

    counted) Signer's computations 1536 MMs (1.5 |d|) 240 MMs (1.5 |q|) Verifier's computations 2 MMs 480 MMs Total computation (Signer + Verifier) 1538 MMs 720 MMs The signer/verifier may be a host computer computation (computational cost of generation and verification signature) still requires hundreds of MMs

  14. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... From the Federal Register Online via the Government Printing Office DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Enterprise Income Verification (EIV) System User Access Authorization Form and Rules.... This notice also lists the following information: Title of Proposal: Enterprise Income...

  15. Electronic Signatures for Public Procurement across Europe

    NASA Astrophysics Data System (ADS)

    Ølnes, Jon; Andresen, Anette; Arbia, Stefano; Ernst, Markus; Hagen, Martin; Klein, Stephan; Manca, Giovanni; Rossi, Adriano; Schipplick, Frank; Tatti, Daniele; Wessolowski, Gesa; Windheuser, Jan

    The PEPPOL (Pan-European Public Procurement On-Line) project is a large scale pilot under the CIP programme of the EU, exploring electronic public procurement in a unified European market. An important element is interoperability of electronic signatures across borders, identified today as a major obstacle to cross-border procurement. PEPPOL will address use of signatures in procurement processes, in particular tendering but also post-award processes like orders and invoices. Signature policies, i.e. quality requirements and requirements on information captured in the signing process, will be developed. This as well as technical interoperability of e-signatures across Europe will finally be piloted in demonstrators starting late 2009 or early 2010.

  16. Developing composite signatures

    NASA Astrophysics Data System (ADS)

    Hawley, Chadwick T.; Carpenter, Tom; Cappelaere, Patrice G.; Frye, Stu; Lemoigne-Stewart, Jacqueline J.; Mandle, Dan; Montgomery, Sarah; Williams-Bess, Autumn

    2011-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper explores the merits of using composite signatures, in lieu of waiting for opportunities for the more elusive diagnostic signatures, to satisfy key essential elements of information Keywords: signature, composite signature, civil disaster (EEI) associated with civil disaster-related problems. It discusses efforts to refine composite signature development methodology and quantify the relative value of composite vs. diagnostic signatures. The objectives are to: 1) investigate and develop innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral; 2) explore the feasibility of collecting representative composite signatures using current and emerging intelligence, surveillance, and reconnaissance (ISR) collection architectures leveraging civilian and commercial architectures; and 3) collaborate extensively with scientists and engineers from U.S. government organizations and laboratories, the defense industry, and academic institutions.

  17. 75 FR 4100 - Enterprise Income Verification (EIV) System-Debts Owed to PHAs and Terminations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-26

    ... From the Federal Register Online via the Government Printing Office DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Enterprise Income Verification (EIV) System-Debts Owed to PHAs and Terminations AGENCY.... This Notice Also Lists the Following Information Title of Proposal: Enterprise Income Verification...

  18. Simulation verification techniques study

    NASA Technical Reports Server (NTRS)

    Schoonmaker, P. B.; Wenglinski, T. H.

    1975-01-01

    Results are summarized of the simulation verification techniques study which consisted of two tasks: to develop techniques for simulator hardware checkout and to develop techniques for simulation performance verification (validation). The hardware verification task involved definition of simulation hardware (hardware units and integrated simulator configurations), survey of current hardware self-test techniques, and definition of hardware and software techniques for checkout of simulator subsystems. The performance verification task included definition of simulation performance parameters (and critical performance parameters), definition of methods for establishing standards of performance (sources of reference data or validation), and definition of methods for validating performance. Both major tasks included definition of verification software and assessment of verification data base impact. An annotated bibliography of all documents generated during this study is provided.

  19. Signatures support program

    NASA Astrophysics Data System (ADS)

    Hawley, Chadwick T.

    2009-05-01

    The Signatures Support Program (SSP) leverages the full spectrum of signature-related activities (collections, processing, development, storage, maintenance, and dissemination) within the Department of Defense (DOD), the intelligence community (IC), other Federal agencies, and civil institutions. The Enterprise encompasses acoustic, seismic, radio frequency, infrared, radar, nuclear radiation, and electro-optical signatures. The SSP serves the war fighter, the IC, and civil institutions by supporting military operations, intelligence operations, homeland defense, disaster relief, acquisitions, and research and development. Data centers host and maintain signature holdings, collectively forming the national signatures pool. The geographically distributed organizations are the authoritative sources and repositories for signature data; the centers are responsible for data content and quality. The SSP proactively engages DOD, IC, other Federal entities, academia, and industry to locate signatures for inclusion in the distributed national signatures pool and provides world-wide 24/7 access via the SSP application.

  20. Trajectory Analysis for User Verification and Recognition6

    E-print Network

    Chen, Sheng-Wei

    users or automatic programs, such as bots. Specifically, the ap- proach focuses on finding the hidden state-of-the-art ap- proaches, for both of the verification and recognition tasks. Key words: account security, bot detection, dissimilarity measure, Isomap, manifold learning, on-line game, trajectory

  1. College Student Web Use, Perceptions of Information Credibility, and Verification Behavior

    ERIC Educational Resources Information Center

    Metzger, Miriam J.; Flanagin, Andrew J.; Zwarun, Lara

    2003-01-01

    Concerns about the potentially dubious nature of online information and users' ability to evaluate it appropriately prompted this research on college students' use of Web-based information, their perceptions of information credibility, and their online verification behaviors. Two studies were conducted to address these issues. Results of the first…

  2. Linux Driver Verification (Position Paper)

    E-print Network

    Beyer, Dirk

    Linux Driver Verification (Position Paper) Dirk Beyer1 and Alexander K. Petrenko2 1 University of Passau, Germany 2 ISPRAS, Moscow, Russia Abstract. Linux driver verification is a large application area for software verification methods, in particular, for functional, safety, and se- curity verification. Linux

  3. Mobile Pit verification system design based on passive special nuclear material verification in weapons storage facilities

    SciTech Connect

    Paul, J. N.; Chin, M. R.; Sjoden, G. E.

    2013-07-01

    A mobile 'drive by' passive radiation detection system to be applied in special nuclear materials (SNM) storage facilities for validation and compliance purposes has been designed through the use of computational modeling and new radiation detection methods. This project was the result of work over a 1 year period to create optimal design specifications to include creation of 3D models using both Monte Carlo and deterministic codes to characterize the gamma and neutron leakage out each surface of SNM-bearing canisters. Results were compared and agreement was demonstrated between both models. Container leakages were then used to determine the expected reaction rates using transport theory in the detectors when placed at varying distances from the can. A 'typical' background signature was incorporated to determine the minimum signatures versus the probability of detection to evaluate moving source protocols with collimation. This established the criteria for verification of source presence and time gating at a given vehicle speed. New methods for the passive detection of SNM were employed and shown to give reliable identification of age and material for highly enriched uranium (HEU) and weapons grade plutonium (WGPu). The finalized 'Mobile Pit Verification System' (MPVS) design demonstrated that a 'drive-by' detection system, collimated and operating at nominally 2 mph, is capable of rapidly verifying each and every weapon pit stored in regularly spaced, shelved storage containers, using completely passive gamma and neutron signatures for HEU and WGPu. This system is ready for real evaluation to demonstrate passive total material accountability in storage facilities. (authors)

  4. 17 CFR 1.4 - Electronic signatures, acknowledgments and verifications.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... futures commission merchant, a pool participant or a client of a commodity trading advisor, or a... pool operator, commodity trading advisor, swap dealer, or major swap participant elects generally to... operator, commodity trading advisor, swap dealer, or major swap participant must adopt and use...

  5. Practical Short Signature Batch Verification Anna Lisa Ferrara

    E-print Network

    International Association for Cryptologic Research (IACR)

    are everywhere as an integrated part of our surroundings, there are going to be a host of devices exchanging messages with each other, e.g., sensor networks, vehicle-2-vehicle communications [14, 36 of messages from different sources: Raya and Hubaux also suggest that vehicles will transmit safety messages

  6. Scientists Using TCGA Data Identify 21 Mutational Signatures in Cancer

    Cancer.gov

    Many mutations have been implicated in human cancer, but the biological mechanisms that produce them remain largely unknown. In a study published online in Nature on August 14, 2013, researchers identified 21 signatures of mutational processes underlying 30 types of cancer. Characterizing mutational signatures may provide a greater understanding of the mechanistic basis of cancer and potentially lead to better treatments that target its root causes.

  7. Uncertainty in hydrological signatures

    NASA Astrophysics Data System (ADS)

    Westerberg, I. K.; McMillan, H. K.

    2015-09-01

    Information about rainfall-runoff processes is essential for hydrological analyses, modelling and water-management applications. A hydrological, or diagnostic, signature quantifies such information from observed data as an index value. Signatures are widely used, e.g. for catchment classification, model calibration and change detection. Uncertainties in the observed data - including measurement inaccuracy and representativeness as well as errors relating to data management - propagate to the signature values and reduce their information content. Subjective choices in the calculation method are a further source of uncertainty. We review the uncertainties relevant to different signatures based on rainfall and flow data. We propose a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrate it in two catchments for common signatures including rainfall-runoff thresholds, recession analysis and basic descriptive signatures of flow distribution and dynamics. Our intention is to contribute to awareness and knowledge of signature uncertainty, including typical sources, magnitude and methods for its assessment. We found that the uncertainties were often large (i.e. typical intervals of ±10-40 % relative uncertainty) and highly variable between signatures. There was greater uncertainty in signatures that use high-frequency responses, small data subsets, or subsets prone to measurement errors. There was lower uncertainty in signatures that use spatial or temporal averages. Some signatures were sensitive to particular uncertainty types such as rating-curve form. We found that signatures can be designed to be robust to some uncertainty sources. Signature uncertainties of the magnitudes we found have the potential to change the conclusions of hydrological and ecohydrological analyses, such as cross-catchment comparisons or inferences about dominant processes.

  8. A Blind Quantum Signature Scheme with ?-type Entangled States

    NASA Astrophysics Data System (ADS)

    Yin, Xun-Ru; Ma, Wen-Ping; Liu, Wei-Yan

    2012-02-01

    A blind quantum signature scheme with ?-type entangled states is proposed, which can be applied to E-voting system. In this scheme, the particles in ?-type state sequence are used for quantum key distribution first, and then for quantum signature. Our scheme is characterized by its blindness, impossibility of forgery, impossibility of disavowal. In addition, our scheme can perform an audit program with respect to the validity of the verification process in the light of actual requirements. The security of the scheme is also analyzed.

  9. Voltage verification unit

    DOEpatents

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  10. Modular data structure verification

    E-print Network

    Kuncak, Viktor (Viktor Jaroslav), 1977-

    2007-01-01

    This dissertation describes an approach for automatically verifying data structures, focusing on techniques for automatically proving formulas that arise in such verification. I have implemented this approach with my ...

  11. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...2014-07-01 2014-07-01 false PM balance verifications and weighing process verification... Pm Measurements § 1065.390 PM balance verifications and weighing process verification... (1) Independent verification of PM balance performance within 370 days before...

  12. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 2010-07-01 false PM balance verifications and weighing process verification... Pm Measurements § 1065.390 PM balance verifications and weighing process verification... (1) Independent verification of PM balance performance within 370 days before...

  13. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...2012-07-01 2012-07-01 false PM balance verifications and weighing process verification... Pm Measurements § 1065.390 PM balance verifications and weighing process verification... (1) Independent verification of PM balance performance within 370 days before...

  14. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 2013-07-01 false PM balance verifications and weighing process verification... Pm Measurements § 1065.390 PM balance verifications and weighing process verification... (1) Independent verification of PM balance performance within 370 days before...

  15. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...2011-07-01 2011-07-01 false PM balance verifications and weighing process verification... Pm Measurements § 1065.390 PM balance verifications and weighing process verification... (1) Independent verification of PM balance performance within 370 days before...

  16. Toward Automatic Verification of Goal-Oriented Flow Simulations

    NASA Technical Reports Server (NTRS)

    Nemec, Marian; Aftosmis, Michael J.

    2014-01-01

    We demonstrate the power of adaptive mesh refinement with adjoint-based error estimates in verification of simulations governed by the steady Euler equations. The flow equations are discretized using a finite volume scheme on a Cartesian mesh with cut cells at the wall boundaries. The discretization error in selected simulation outputs is estimated using the method of adjoint-weighted residuals. Practical aspects of the implementation are emphasized, particularly in the formulation of the refinement criterion and the mesh adaptation strategy. Following a thorough code verification example, we demonstrate simulation verification of two- and three-dimensional problems. These involve an airfoil performance database, a pressure signature of a body in supersonic flow and a launch abort with strong jet interactions. The results show reliable estimates and automatic control of discretization error in all simulations at an affordable computational cost. Moreover, the approach remains effective even when theoretical assumptions, e.g., steady-state and solution smoothness, are relaxed.

  17. HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO).

    E-print Network

    Leistikow, Bruce N.

    HOME DEPARTMENT CAMPUS PHONE online at the At Your Service website (AYSO). want to view your statement online. statements online at At Your Service Online (AYSO). EMPLOYEE SIGNATURE DATE Davis, CA 95616 Option may take up to two pay periods before in effect. Physical location

  18. Online Advertising

    E-print Network

    Goldfarb, Avi

    This chapter explores what makes online advertising different from traditional advertising channels. We argue that online advertising differs from traditional advertising channels in two important ways: measurability and ...

  19. Quantum digital signature scheme

    E-print Network

    Muhammad Nadeem; Xiaolin Wang

    2015-12-30

    Digital signatures are the building blocks of modern communication to prevent masquerading by any party other than recipients, repudiation by signatory and forgery by any individual recipient. Digital signature scheme is said to be standard if the signature (a) is a pattern depending upon the message to be signed, (b) is built upon some information publically known and unique to the signatory, (c) can be stored by all the recipients. While classical methods provide computational security only, quantum mechanics guarantees information-theoretically secure and standard digital signature schemes. However, standard quantum digital signature schemes are based on quantum one-way functions and hence require long term quantum memory for storing quantum signatures, which is not practically feasible yet. We demonstrate here a standard quantum digital signature scheme by replacing quantum one-way functions with multiparty controlled EPR channels. It allows signatory to generate non-locally correlated quantum signatures, instead of multiple copies of a unique quantum state, and assures security against any individual since others have non-locally correlated information.

  20. Digital Signature Management.

    ERIC Educational Resources Information Center

    Hassler, Vesna; Biely, Helmut

    1999-01-01

    Describes the Digital Signature Project that was developed in Austria to establish an infrastructure for applying smart card-based digital signatures in banking and electronic-commerce applications. Discusses the need to conform to international standards, an international certification infrastructure, and security features for a public directory…

  1. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) County DATE · SURVIVING DEPENDENT Home phone (include area code) Name of deceased retiree/employee HOME ADDRESS (if will not be able to enroll in the future. Name SS# Date Signature Return this form to Employee Benefits A. Name

  2. Verification in Referral-Based Crowdsourcing

    PubMed Central

    Naroditskiy, Victor; Rahwan, Iyad; Cebrian, Manuel; Jennings, Nicholas R.

    2012-01-01

    Online social networks offer unprecedented potential for rallying a large number of people to accomplish a given task. Here we focus on information gathering tasks where rare information is sought through “referral-based crowdsourcing”: the information request is propagated recursively through invitations among members of a social network. Whereas previous work analyzed incentives for the referral process in a setting with only correct reports, misreporting is known to be both pervasive in crowdsourcing applications, and difficult/costly to filter out. A motivating example for our work is the DARPA Red Balloon Challenge where the level of misreporting was very high. In order to undertake a formal study of verification, we introduce a model where agents can exert costly effort to perform verification and false reports can be penalized. This is the first model of verification and it provides many directions for future research, which we point out. Our main theoretical result is the compensation scheme that minimizes the cost of retrieving the correct answer. Notably, this optimal compensation scheme coincides with the winning strategy of the Red Balloon Challenge. PMID:23071530

  3. Requirement Assurance: A Verification Process

    NASA Technical Reports Server (NTRS)

    Alexander, Michael G.

    2011-01-01

    Requirement Assurance is an act of requirement verification which assures the stakeholder or customer that a product requirement has produced its "as realized product" and has been verified with conclusive evidence. Product requirement verification answers the question, "did the product meet the stated specification, performance, or design documentation?". In order to ensure the system was built correctly, the practicing system engineer must verify each product requirement using verification methods of inspection, analysis, demonstration, or test. The products of these methods are the "verification artifacts" or "closure artifacts" which are the objective evidence needed to prove the product requirements meet the verification success criteria. Institutional direction is given to the System Engineer in NPR 7123.1A NASA Systems Engineering Processes and Requirements with regards to the requirement verification process. In response, the verification methodology offered in this report meets both the institutional process and requirement verification best practices.

  4. Quantum Money with Classical Verification

    E-print Network

    Gavinsky, Dmitry

    2011-01-01

    We construct a quantum money scheme that allows verification through classical communication with bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification.

  5. MULTIVESSEL BATCH DISTILLATION EXPERIMENTAL VERIFICATION

    E-print Network

    Skogestad, Sigurd

    MULTIVESSEL BATCH DISTILLATION ­ EXPERIMENTAL VERIFICATION Bernd Wittgens and Sigurd Skogestad 1 The experimental verification of the operation of a multivessel batch distillation column, operated under total vessels, provides a generalization of previously proposed batch distillation schemes. We propose a simple

  6. Explaining Verification Conditions

    NASA Technical Reports Server (NTRS)

    Deney, Ewen; Fischer, Bernd

    2006-01-01

    The Hoare approach to program verification relies on the construction and discharge of verification conditions (VCs) but offers no support to trace, analyze, and understand the VCs themselves. We describe a systematic extension of the Hoare rules by labels so that the calculus itself can be used to build up explanations of the VCs. The labels are maintained through the different processing steps and rendered as natural language explanations. The explanations can easily be customized and can capture different aspects of the VCs; here, we focus on their structure and purpose. The approach is fully declarative and the generated explanations are based only on an analysis of the labels rather than directly on the logical meaning of the underlying VCs or their proofs. Keywords: program verification, Hoare calculus, traceability.

  7. Nuclear disarmament verification

    SciTech Connect

    DeVolpi, A.

    1993-12-31

    Arms control treaties, unilateral actions, and cooperative activities -- reflecting the defusing of East-West tensions -- are causing nuclear weapons to be disarmed and dismantled worldwide. In order to provide for future reductions and to build confidence in the permanency of this disarmament, verification procedures and technologies would play an important role. This paper outlines arms-control objectives, treaty organization, and actions that could be undertaken. For the purposes of this Workshop on Verification, nuclear disarmament has been divided into five topical subareas: Converting nuclear-weapons production complexes, Eliminating and monitoring nuclear-weapons delivery systems, Disabling and destroying nuclear warheads, Demilitarizing or non-military utilization of special nuclear materials, and Inhibiting nuclear arms in non-nuclear-weapons states. This paper concludes with an overview of potential methods for verification.

  8. Verification and validation benchmarks.

    SciTech Connect

    Oberkampf, William Louis; Trucano, Timothy Guy

    2007-02-01

    Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

  9. An archaeal genomic signature

    NASA Technical Reports Server (NTRS)

    Graham, D. E.; Overbeek, R.; Olsen, G. J.; Woese, C. R.

    2000-01-01

    Comparisons of complete genome sequences allow the most objective and comprehensive descriptions possible of a lineage's evolution. This communication uses the completed genomes from four major euryarchaeal taxa to define a genomic signature for the Euryarchaeota and, by extension, the Archaea as a whole. The signature is defined in terms of the set of protein-encoding genes found in at least two diverse members of the euryarchaeal taxa that function uniquely within the Archaea; most signature proteins have no recognizable bacterial or eukaryal homologs. By this definition, 351 clusters of signature proteins have been identified. Functions of most proteins in this signature set are currently unknown. At least 70% of the clusters that contain proteins from all the euryarchaeal genomes also have crenarchaeal homologs. This conservative set, which appears refractory to horizontal gene transfer to the Bacteria or the Eukarya, would seem to reflect the significant innovations that were unique and fundamental to the archaeal "design fabric." Genomic protein signature analysis methods may be extended to characterize the evolution of any phylogenetically defined lineage. The complete set of protein clusters for the archaeal genomic signature is presented as supplementary material (see the PNAS web site, www.pnas.org).

  10. Uncertainty in hydrological signatures

    NASA Astrophysics Data System (ADS)

    McMillan, Hilary; Westerberg, Ida

    2015-04-01

    Information that summarises the hydrological behaviour or flow regime of a catchment is essential for comparing responses of different catchments to understand catchment organisation and similarity, and for many other modelling and water-management applications. Such information types derived as an index value from observed data are known as hydrological signatures, and can include descriptors of high flows (e.g. mean annual flood), low flows (e.g. mean annual low flow, recession shape), the flow variability, flow duration curve, and runoff ratio. Because the hydrological signatures are calculated from observed data such as rainfall and flow records, they are affected by uncertainty in those data. Subjective choices in the method used to calculate the signatures create a further source of uncertainty. Uncertainties in the signatures may affect our ability to compare different locations, to detect changes, or to compare future water resource management scenarios. The aim of this study was to contribute to the hydrological community's awareness and knowledge of data uncertainty in hydrological signatures, including typical sources, magnitude and methods for its assessment. We proposed a generally applicable method to calculate these uncertainties based on Monte Carlo sampling and demonstrated it for a variety of commonly used signatures. The study was made for two data rich catchments, the 50 km2 Mahurangi catchment in New Zealand and the 135 km2 Brue catchment in the UK. For rainfall data the uncertainty sources included point measurement uncertainty, the number of gauges used in calculation of the catchment spatial average, and uncertainties relating to lack of quality control. For flow data the uncertainty sources included uncertainties in stage/discharge measurement and in the approximation of the true stage-discharge relation by a rating curve. The resulting uncertainties were compared across the different signatures and catchments, to quantify uncertainty magnitude and bias, and to test how uncertainty depended on the density of the raingauge network and flow gauging station characteristics. The uncertainties were sometimes large (i.e. typical intervals of ±10-40% relative uncertainty) and highly variable between signatures. Uncertainty in the mean discharge was around ±10% for both catchments, while signatures describing the flow variability had much higher uncertainties in the Mahurangi where there was a fast rainfall-runoff response and greater high-flow rating uncertainty. Event and total runoff ratios had uncertainties from ±10% to ±15% depending on the number of rain gauges used; precipitation uncertainty was related to interpolation rather than point uncertainty. Uncertainty distributions in these signatures were skewed, and meant that differences in signature values between these catchments were often not significant. We hope that this study encourages others to use signatures in a way that is robust to data uncertainty.

  11. Signature extension studies

    NASA Technical Reports Server (NTRS)

    Vincent, R. K.; Thomas, G. S.; Nalepka, R. F.

    1974-01-01

    The importance of specific spectral regions to signature extension is explored. In the recent past, the signature extension task was focused on the development of new techniques. Tested techniques are now used to investigate this spectral aspect of the large area survey. Sets of channels were sought which, for a given technique, were the least affected by several sources of variation over four data sets and yet provided good object class separation on each individual data set. Using sets of channels determined as part of this study, signature extension was accomplished between data sets collected over a six-day period and over a range of about 400 kilometers.

  12. 2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID#: ____________________

    E-print Network

    Massachusetts at Amherst, University of

    2014-2015 Verification of Social Security Number & Date of Birth A. STUDENT INFORMATION SPIRE ID Name First Name Middle Initial My correct date of birth is: ________/__________/________________ MM DD _________________________________________ ________________________ Student's Signature Date C. REQUIRED DOCUMENTS TO SUBMIT Original or Notarized copy of one

  13. A quantum proxy group signature scheme based on an entangled five-qubit state

    NASA Astrophysics Data System (ADS)

    Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru

    2015-09-01

    A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.

  14. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    This presentation will be given at the EPA Science Forum 2005 in Washington, DC. The Environmental Technology Verification Program (ETV) was initiated in 1995 to speed implementation of new and innovative commercial-ready environemntal technologies by providing objective, 3rd pa...

  15. Spectroscopic signatures of isomnerization

    E-print Network

    Baraban, Joshua Herschel Goldblum

    2013-01-01

    This thesis explores spectroscopic signatures of isomerization, especially new patterns that emerge and report on chemically relevant portions of the potential energy surface, such as the transition state. The most important ...

  16. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) DATE OF BIRTH individuals you wish to cover. Last name Month Day YearFirst name Birthdate SPOUSE/DOMESTIC PARTNER Gender

  17. Improved Verification for Aerospace Systems

    NASA Technical Reports Server (NTRS)

    Powell, Mark A.

    2008-01-01

    Aerospace systems are subject to many stringent performance requirements to be verified with low risk. This report investigates verification planning using conditional approaches vice the standard classical statistical methods, and usage of historical surrogate data for requirement validation and in verification planning. The example used in this report to illustrate the results of these investigations is a proposed mission assurance requirement with the concomitant maximum acceptable verification risk for the NASA Constellation Program Orion Launch Abort System (LAS). This report demonstrates the following improvements: 1) verification planning using conditional approaches vice classical statistical methods results in plans that are more achievable and feasible; 2) historical surrogate data can be used to bound validation of performance requirements; and, 3) incorporation of historical surrogate data in verification planning using conditional approaches produces even less costly and more reasonable verification plans. The procedures presented in this report may produce similar improvements and cost savings in verification for any stringent performance requirement for an aerospace system.

  18. Ladar signature simulation

    NASA Astrophysics Data System (ADS)

    Estep, Jeff; Gu, Zu-Han

    An account is given of a development program for a laboratory apparatus that would conduct monostatic measurements of the bidirectional reflectance properties of target samples and the generation of laser radar signatures on the basis of these data. The resulting Monostatic Bidirectional Reflectometer will be sufficiently flexible to accommodate various laser sources as detectors, accurately measuring target bidirectional reflectance distribution function and combining these data with geometrical target models for signature predictions.

  19. Meteor signature interpretation

    SciTech Connect

    Canavan, G.H.

    1997-01-01

    Meteor signatures contain information about the constituents of space debris and present potential false alarms to early warnings systems. Better models could both extract the maximum scientific information possible and reduce their danger. Accurate predictions can be produced by models of modest complexity, which can be inverted to predict the sizes, compositions, and trajectories of object from their signatures for most objects of interest and concern.

  20. 38 CFR 74.2 - What are the eligibility requirements a concern must meet for VetBiz VIP Verification Program?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... requirements a concern must meet for VetBiz VIP Verification Program? 74.2 Section 74.2 Pensions, Bonuses, and... Guidelines § 74.2 What are the eligibility requirements a concern must meet for VetBiz VIP Verification... online Vendor Information Pages database forms at http://www.VetBiz.gov, and has been examined by...

  1. 38 CFR 74.2 - What are the eligibility requirements a concern must meet for VetBiz VIP Verification Program?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... requirements a concern must meet for VetBiz VIP Verification Program? 74.2 Section 74.2 Pensions, Bonuses, and... Guidelines § 74.2 What are the eligibility requirements a concern must meet for VetBiz VIP Verification... online Vendor Information Pages database forms at http://www.VetBiz.gov, and has been examined by...

  2. Method and computer product to increase accuracy of time-based software verification for sensor networks

    DOEpatents

    Foo Kune, Denis (Saint Paul, MN); Mahadevan, Karthikeyan (Mountain View, CA)

    2011-01-25

    A recursive verification protocol to reduce the time variance due to delays in the network by putting the subject node at most one hop from the verifier node provides for an efficient manner to test wireless sensor nodes. Since the software signatures are time based, recursive testing will give a much cleaner signal for positive verification of the software running on any one node in the sensor network. In this protocol, the main verifier checks its neighbor, who in turn checks its neighbor, and continuing this process until all nodes have been verified. This ensures minimum time delays for the software verification. Should a node fail the test, the software verification downstream is halted until an alternative path (one not including the failed node) is found. Utilizing techniques well known in the art, having a node tested twice, or not at all, can be avoided.

  3. Quantum money with classical verification

    SciTech Connect

    Gavinsky, Dmitry

    2014-12-04

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  4. Quantum Money with Classical Verification

    E-print Network

    Dmitry Gavinsky

    2012-03-15

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  5. Quantum money with classical verification

    NASA Astrophysics Data System (ADS)

    Gavinsky, Dmitry

    2014-12-01

    We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme exists that does not require quantum communication for coin verification. Our scheme is secure against adaptive adversaries - this property is not directly related to the possibility of classical verification, nevertheless none of the earlier quantum money constructions is known to possess it.

  6. Practical Quantum Digital Signature

    E-print Network

    Hua-Lei Yin; Yao Fu; Zeng-Bing Chen

    2015-09-29

    Guaranteeing non-repudiation and unforgeability as well as transferability of a signatory is one of the most vital safeguards in today's e-commerce era. Based on fundamental laws of quantum physics, quantum digital signature (QDS) aims to provide information-theoretical security for digital signature widely used nowadays. However, up to date, the previously proposed QDS schemes are impractical due to various challenging problems and most importantly, the requirement of authenticated quantum channels between participants. Here, for the first time, we eliminate all existing problems by proposing a practical and surprisingly simple QDS protocol, whose unconditional security is proven. Our QDS scheme can be implemented over a distance of more than 100 km under technology comparable to quantum key distribution. QDS is an important compliment to quantum key distribution and provides unconditionally secure protection to applications requiring digital signature.

  7. 78 FR 58492 - Generator Verification Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-24

    ...Part 40 [Docket No. RM13-16-000] Generator Verification Reliability Standards AGENCY...Verification and Data Reporting of Generator Real and Reactive Power Capability and...Verification of Models and Data for Generator Excitation Control System or Plant...

  8. Software Verification and Testing Lecture Notes: Testing I

    E-print Network

    Struth, Georg

    Software Verification and Testing Lecture Notes: Testing I #12;Motivation verification: · powerful · automated techniques rather limited testing: (as "poor man's verification") · can only detect presence mathematical skills 1 #12;Motivation verification vs testing: · verification used often in early stages

  9. Ladar signature simulation

    NASA Astrophysics Data System (ADS)

    Estep, Jeffrey A.; Gu, Zu-Han

    1992-09-01

    The design of laser radars and the determination of laser radar signatures of various vehicles require accurate data on the monostatic reflectivity of many target materials to far-field laser illumination at many different wavelengths. Modelling software is required that will take the monostatic reflectance data as an input, and combine this data with geometrical models to develop a laser radar signature. Recently a program has been started at Surface Optics Corporation to design and develop a laboratory system for the monostatic measurement of the bidirectional reflectance properties of target samples and generation of laser radar signatures from this data. This system, the Monostatic Bidirectional Reflectometer (MBR), will be flexible enough to accommodate various laser sources and detectors. The MBR will be capable of accurate measurement of the BRDF of target samples and combining this data with geometrical target models for signature predictions which will be further used for development of hardware in the loop simulations at a reduction in the cost of live-fire evaluation of various weapon systems.

  10. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) COUNTY Date eligible individuals you wish to cover. Last name Month Day YearFirst name Birthdate SPOUSE Gender MALE FEMALE MALE FEMALE MALE FEMALE 2. 3. 4. 5. 6. 7. Primary Care Physician Name HMO ONLY Primary Care

  11. Signature required APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Signature required APPLICANT'S NAME Last OFFICE USE ONLY Home phone (include area code) Date signed Retiree + spouse Family Cancel Revised 9.24.14 Complete home address (include city, state, zip) Last name Month Day YearFirst name Birthdate SPOUSE Gender MALE FEMALE Children NATURAL or ADOPTED STEP OTHER

  12. Retiree signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Retiree signature APPLICANT'S NAME Last MAILING ADDRESS (Include city, state, zip) COUNTY OFFICE to: Employee Benefits Human Resources Bldg. 215 S. Jackson St. Athens, GA 30602-4133 A. Name* (Provide reason at right. Below, list all individuals you wish to cover.) 4 Last name Month Day Year

  13. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) DATE OF BIRTH the form and submit as indicated below. List all eligible individuals you wish to cover. Last name Month Day YearFirst name Birthdate Gender Children NATURAL or ADOPTED STEP OTHER NATURAL or ADOPTED STEP

  14. Signature required APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Signature required APPLICANT'S NAME Last OFFICE USE ONLY Email address Date signed Assigned 81x ID://www.usg.edu/hr/benefits/healthcare Last name Month Day YearFirst name Birthdate SPOUSE Gender MALE FEMALE Children NATURAL or ADOPTED STEP calendar year. Primary Care Physician Name Primary Care Physician ID # (if listed at left) 1 2 3 4 5 6 1 2

  15. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) DATE OF BIRTH address) (Include city, state, zip) Name of current/former UGA dental-insured employee Complete & return as indicated below. List all eligible individuals you wish to cover. Last name Month Day Year First name

  16. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) DATE OF BIRTH: http://www.usg.edu/hr/benefits/vision List all eligible individuals you wish to cover. Last name Month Day YearFirst name Birthdate SPOUSE/DOMESTIC PARTNER Gender MALE FEMALE Children NATURAL or ADOPTED

  17. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) County APPLICANT'S DATE OF BIRTH Mo. Day Year DATE OF DEATH OF RETIREE/EMPLOYEE Mo. Day Year Date signed Name of deceased retiree/employee First MI Widow(er) Dependent Male Female Dental Insurance A. Name of insurance co

  18. Signature required APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Signature required APPLICANT'S NAME Last OFFICE USE ONLY Daytime phone (Include area code) Date of qualifying event: Complete home address Last name Month Day YearFirst name Birthdate SPOUSE/DOMESTIC PARTNER Name of current/former UGA vision-insured employee Relationship of applicant to current/former UGA

  19. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) County's email address (optional) First MI Widow(er) Dependent Male Female A. Name of insurance co. (s) B. Effective date(s) of policy(ies) C. Contract number(s) D. Type of contract E. Name of group(s) (employers

  20. Signature required APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Signature required APPLICANT'S NAME Last OFFICE USE ONLY Daytime phone (Include area code) Date__________________________________________ Reason for change in coverage and date of qualifying event: Complete home address Last name Month Day YearFirst name Birthdate SPOUSE/DOMESTIC PARTNER Gender MALE FEMALE Children NATURAL or ADOPTED STEP

  1. Applicant signature APPLICANT'S NAME

    E-print Network

    Arnold, Jonathan

    Applicant signature APPLICANT'S NAME Last BILLING ADDRESS (Include city, state, zip) Date of birth individuals you wish to cover. Last name Month Day YearFirst name Birthdate GenderChildren NATURAL or ADOPTED HR to complete) Name of current/former UGA health-insured employee Employee ID# (81x) of current

  2. Identification of host response signatures of infection.

    SciTech Connect

    Branda, Steven S.; Sinha, Anupama; Bent, Zachary

    2013-02-01

    Biological weapons of mass destruction and emerging infectious diseases represent a serious and growing threat to our national security. Effective response to a bioattack or disease outbreak critically depends upon efficient and reliable distinguishing between infected vs healthy individuals, to enable rational use of scarce, invasive, and/or costly countermeasures (diagnostics, therapies, quarantine). Screening based on direct detection of the causative pathogen can be problematic, because culture- and probe-based assays are confounded by unanticipated pathogens (e.g., deeply diverged, engineered), and readily-accessible specimens (e.g., blood) often contain little or no pathogen, particularly at pre-symptomatic stages of disease. Thus, in addition to the pathogen itself, one would like to detect infection-specific host response signatures in the specimen, preferably ones comprised of nucleic acids (NA), which can be recovered and amplified from tiny specimens (e.g., fingerstick draws). Proof-of-concept studies have not been definitive, however, largely due to use of sub-optimal sample preparation and detection technologies. For purposes of pathogen detection, Sandia has developed novel molecular biology methods that enable selective isolation of NA unique to, or shared between, complex samples, followed by identification and quantitation via Second Generation Sequencing (SGS). The central hypothesis of the current study is that variations on this approach will support efficient identification and verification of NA-based host response signatures of infectious disease. To test this hypothesis, we re-engineered Sandia's sophisticated sample preparation pipelines, and developed new SGS data analysis tools and strategies, in order to pioneer use of SGS for identification of host NA correlating with infection. Proof-of-concept studies were carried out using specimens drawn from pathogen-infected non-human primates (NHP). This work provides a strong foundation for large-scale, highly-efficient efforts to identify and verify infection-specific host NA signatures in human populations.

  3. Lightweight Email Signatures (Extended Abstract)

    E-print Network

    Adida, Ben

    2006-01-01

    We present Lightweight Email Signatures (LES), a simple cryptographic architecture for authenticating email. LES is an extension of DKIM, the recent IETF effort to standardize domain-based email signatures. LES shares ...

  4. 75 FR 77959 - VetBiz Vendor Information Pages Verification Program; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ...-461-7485. Correction In FR Doc. 2010-30550, published on December 7, 2010, at 75 FR 76080, make the... From the Federal Register Online via the Government Printing Office DEPARTMENT OF VETERANS AFFAIRS VetBiz Vendor Information Pages Verification Program; Correction AGENCY: Center for...

  5. 75 FR 76080 - Agency Information Collection (VetBiz Vendor Information Pages Verification Program) Activity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-07

    ... From the Federal Register Online via the Government Printing Office DEPARTMENT OF VETERANS AFFAIRS Agency Information Collection (VetBiz Vendor Information Pages Verification Program) Activity Under OMB... . Please refer to ``OMB Control No. 2900- 0675.'' SUPPLEMENTAL INFORMATION: Title: VetBiz...

  6. 76 FR 3859 - Trade Acknowledgment and Verification of Security-Based Swap Transactions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... the frequency of any payments; (9) whether the security-based swap will be cleared by a clearing... From the Federal Register Online via the Government Printing Office SECURITIES AND EXCHANGE COMMISSION 17 CFR Part 240 RIN 3235-AK91 Trade Acknowledgment and Verification of Security-Based...

  7. 75 FR 12772 - Federal Labor Standards Payee Verification and Payment Processing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-17

    ... discrepancies have been resolved, and to issue wage restitution payments on behalf of construction and... From the Federal Register Online via the Government Printing Office DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Federal Labor Standards Payee Verification and Payment Processing AGENCY: Office...

  8. VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY

    E-print Network

    Stevenson, D. E. "Steve"

    VERIFICATION AND VALIDATION OF MODELS IN THE NATIONAL SCIENCE DIGITAL LIBRARY D. E. STEVENSON Abstract. The National Science Digital Library is the Nation's online library for education and re- search Science Digital Library in a Nutshell "The National Science Foundation's (NSF) National Science

  9. Verification of particle simulation of radio frequency waves in fusion Animesh Kuley,1,2,a)

    E-print Network

    Lin, Zhihong

    Verification of particle simulation of radio frequency waves in fusion plasmas Animesh Kuley,1,2,a (Received 14 May 2013; accepted 8 October 2013; published online 24 October 2013) Radio frequency (RF) waves. INTRODUCTION The importance of radio frequency (RF) waves as a source for heating and current drive has been

  10. Verification of nonlinear particle simulation of radio frequency waves A. Kuley,1,a)

    E-print Network

    Lin, Zhihong

    Verification of nonlinear particle simulation of radio frequency waves in tokamak A. Kuley,1,a) Z://dx.doi.org/10.1063/1.4934606] I. INTRODUCTION Magnetic fusion devices rely on radio frequency (RF) waves 2015; accepted 13 October 2015; published online 27 October 2015) Nonlinear simulation model for radio

  11. Software Verification and Validation Procedure

    SciTech Connect

    Olund, Thomas S.

    2008-09-15

    This Software Verification and Validation procedure provides the action steps for the Tank Waste Information Network System (TWINS) testing process. The primary objective of the testing process is to provide assurance that the software functions as intended, and meets the requirements specified by the client. Verification and validation establish the primary basis for TWINS software product acceptance.

  12. HDL to verification logic translator

    NASA Technical Reports Server (NTRS)

    Gambles, J. W.; Windley, P. J.

    1992-01-01

    The increasingly higher number of transistors possible in VLSI circuits compounds the difficulty in insuring correct designs. As the number of possible test cases required to exhaustively simulate a circuit design explodes, a better method is required to confirm the absence of design faults. Formal verification methods provide a way to prove, using logic, that a circuit structure correctly implements its specification. Before verification is accepted by VLSI design engineers, the stand alone verification tools that are in use in the research community must be integrated with the CAD tools used by the designers. One problem facing the acceptance of formal verification into circuit design methodology is that the structural circuit descriptions used by the designers are not appropriate for verification work and those required for verification lack some of the features needed for design. We offer a solution to this dilemma: an automatic translation from the designers' HDL models into definitions for the higher-ordered logic (HOL) verification system. The translated definitions become the low level basis of circuit verification which in turn increases the designer's confidence in the correctness of higher level behavioral models.

  13. Model-driven software verification

    NASA Technical Reports Server (NTRS)

    Holzmann, Gerard J.; Joshi, Rajeev

    2003-01-01

    In this paper we explore a different approach to software verification. With this approach, a software application can be included, without substantial change, into a verification test-harness and then verified directly, while presearving the ability to apply data abstraction techniques. Only the test-harness is written in the language of the model checker.

  14. Verification of LHS distributions.

    SciTech Connect

    Swiler, Laura Painton

    2006-04-01

    This document provides verification test results for normal, lognormal, and uniform distributions that are used in Sandia's Latin Hypercube Sampling (LHS) software. The purpose of this testing is to verify that the sample values being generated in LHS are distributed according to the desired distribution types. The testing of distribution correctness is done by examining summary statistics, graphical comparisons using quantile-quantile plots, and format statistical tests such as the Chisquare test, the Kolmogorov-Smirnov test, and the Anderson-Darling test. The overall results from the testing indicate that the generation of normal, lognormal, and uniform distributions in LHS is acceptable.

  15. SPHERE Science Verification

    NASA Astrophysics Data System (ADS)

    Leibundgut, B.; Beuzit, J.-L.; Gibson, N.; Girard, J.; Kasper, M.; Kerber, F.; Lundin, L.; Mawet, D.; McClure, M.; Milli, J.; Petr-Gotzens, M.; Siebenmorgen, R.; van den Ancker, M.; Wahhaj, Z.

    2015-03-01

    Science Verification (SV) for the latest instrument to arrive on Paranal, the high-contrast and spectro-polarimetric extreme adaptive optics instrument SPHERE, is described. The process through which the SV proposals were solicited and evaluated is briefly outlined; the resulting observations took place in December 2014 and February 2015. A wide range of targets was observed, ranging from the Solar System, young stars with planets and discs, circumstellar environments of evolved stars to a galaxy nucleus. Some of the first results are previewed.

  16. Quantum blind signature based on Two-State Vector Formalism

    NASA Astrophysics Data System (ADS)

    Qi, Su; Zheng, Huang; Qiaoyan, Wen; Wenmin, Li

    2010-11-01

    Two-State Vector Formalism (TSVF) including pre- and postselected states is a complete description of a system between two measurements. Consequently TSVF gives a perfect solution to the Mean King problem. In this paper, utilizing the dramatic correlation in the verification, we propose a quantum blind signature scheme based on TSVF. Compared with Wen's scheme, our scheme has 100% efficiency. Our scheme guarantees the unconditional security. Moreover, the proposed scheme, which is easy to implement, can be applied to E-payment system.

  17. Signature-based authentication system using watermarking in the ridgelet and Radon-DCT domain

    NASA Astrophysics Data System (ADS)

    Maiorana, Emanuele; Campisi, Patrizio; Neri, Alessandro

    2007-10-01

    In this paper we propose a signature-based biometric system, where watermarking is applied to signature images in order to hide and keep secret some signature features in a static representation of the signature itself. Being a behavioral biometric, signatures are intrinsically different from other commonly used biometric data, possessing dynamic properties which can not be extracted from a single signature image. The marked images can be used for user authentication, letting their static characteristics being analyzed by automatic algorithms or security attendants. When a higher security is needed, the embedded features can be extracted and used, thus realizing a multi-level decision procedure. The proposed watermarking techniques are tailored to images with sharpened edges, just like a signature picture. In order to obtain a robust method, able to hide relevant data while keeping intact the original structure of the host, the mark is embedded as close as possible to the lines that constitute the signature, using the properties of the Radon transform. An extensive set of experimental results, obtained varying the system's parameters and concerning both the mark extraction and the verification performances, show the effectiveness of our approach.

  18. Wake Signature Detection

    NASA Astrophysics Data System (ADS)

    Spedding, Geoffrey R.

    2014-01-01

    An accumulated body of quantitative evidence shows that bluff-body wakes in stably stratified environments have an unusual degree of coherence and organization, so characteristic geometries such as arrays of alternating-signed vortices have very long lifetimes, as measured in units of buoyancy timescales, or in the downstream distance scaled by a body length. The combination of pattern geometry and persistence renders the detection of these wakes possible in principle. It now appears that identifiable signatures can be found from many disparate sources: Islands, fish, and plankton all have been noted to generate features that can be detected by climate modelers, hopeful navigators in open oceans, or hungry predators. The various types of wakes are reviewed with notes on why their signatures are important and to whom. A general theory of wake pattern formation is lacking and would have to span many orders of magnitude in Reynolds number.

  19. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false PM balance verifications and weighing... § 1065.390 PM balance verifications and weighing process verification. (a) Scope and frequency. This section describes three verifications. (1) Independent verification of PM balance performance within...

  20. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false PM balance verifications and weighing... § 1065.390 PM balance verifications and weighing process verification. (a) Scope and frequency. This section describes three verifications. (1) Independent verification of PM balance performance within...

  1. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false PM balance verifications and weighing... § 1065.390 PM balance verifications and weighing process verification. (a) Scope and frequency. This section describes three verifications. (1) Independent verification of PM balance performance within...

  2. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false PM balance verifications and weighing... § 1065.390 PM balance verifications and weighing process verification. (a) Scope and frequency. This section describes three verifications. (1) Independent verification of PM balance performance within...

  3. 40 CFR 1065.390 - PM balance verifications and weighing process verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false PM balance verifications and weighing... § 1065.390 PM balance verifications and weighing process verification. (a) Scope and frequency. This section describes three verifications. (1) Independent verification of PM balance performance within...

  4. Knowledge Signatures for Information Integration

    SciTech Connect

    Thomson, Judi; Cowell, Andrew J.; Paulson, Patrick R.; Butner, R. Scott; Whiting, Mark A.

    2003-10-25

    This paper introduces the notion of a knowledge signature: a concise, ontologically-driven representation of the semantic characteristics of data. Knowledge signatures provide programmatic access to data semantics while allowing comparisons to be made across different types of data such as text, images or video, enabling efficient, automated information integration. Through observation, which determines the degree of association between data and ontological concepts, and refinement, which uses the axioms and structure of the domain ontology to place the signature more accurately within the context of the domain, knowledge signatures can be created. A comparison of such signatures for two different pieces of data results in a measure of their semantic separation. This paper discusses the definition of knowledge signatures along with the design and prototype implementation of a knowledge signature generator.

  5. Electromagnetic Signature Technique as a Promising Tool to Verify Nuclear Weapons Storage and Dismantlement under a Nuclear Arms Control Regime

    SciTech Connect

    Bunch, Kyle J.; Williams, Laura S.; Jones, Anthony M.; Ramuhalli, Pradeep

    2012-08-01

    The 2010 ratification of the New START Treaty has been widely regarded as a noteworthy national security achievement for both the Obama administration and the Medvedev-Putin regime, but deeper cuts are envisioned under future arms control regimes. Future verification needs will include monitoring the storage of warhead components and fissile materials and verifying dismantlement of warheads, pits, secondaries, and other materials. From both the diplomatic and technical perspectives, verification under future arms control regimes will pose new challenges. Since acceptable verification technology must protect sensitive design information and attributes, non-nuclear non-sensitive signatures may provide a significant verification tool without the use of additional information barriers. The use of electromagnetic signatures to monitor nuclear material storage containers is a promising technology with the potential to fulfill these challenging requirements. Research performed at Pacific Northwest National Laboratory (PNNL) has demonstrated that low frequency electromagnetic signatures of sealed metallic containers can be used to confirm the presence of specific components on a “yes/no” basis without revealing classified information. Arms control inspectors might use this technique to verify the presence or absence of monitored items, including both nuclear and non-nuclear materials. Although additional research is needed to study signature aspects such as uniqueness and investigate container-specific scenarios, the technique potentially offers a rapid and cost-effective tool to verify reduction and dismantlement of U.S. and Russian nuclear weapons.

  6. Online Learning

    ERIC Educational Resources Information Center

    Perry, Edward H.; Pilati, Michelle L.

    2011-01-01

    Distance education, which began as correspondence courses in the nineteenth century and grew into educational television during the twentieth century, evolved into learning on the Web by the mid-1990s. Accompanying the rise in online learning has been a similar rise in organizations and publications dedicated to serving the needs of online

  7. Online Pricing.

    ERIC Educational Resources Information Center

    Garman, Nancy; And Others

    1990-01-01

    The first of four articles describes the move by the European Space Agency to eliminate connect time charges on its online retrieval system. The remaining articles describe the pricing structure of DIALOG, compare the two pricing schemes, and discuss online pricing from the user's point of view. (CLB)

  8. Verification of VENTSAR

    SciTech Connect

    Simpkins, A.A.

    1995-01-01

    The VENTSAR code is an upgraded and improved version of the VENTX code, which estimates concentrations on or near a building from a release at a nearby location. The code calculates the concentrations either for a given meteorological exceedance probability or for a given stability and wind speed combination. A single building can be modeled which lies in the path of the plume, or a penthouse can be added to the top of the building. Plume rise may also be considered. Release types can be either chemical or radioactive. Downwind concentrations are determined at user-specified incremental distances. This verification report was prepared to demonstrate that VENTSAR is properly executing all algorithms and transferring data. Hand calculations were also performed to ensure proper application of methodologies.

  9. Design for manufacturability Design verification

    E-print Network

    Patel, Chintan

    ITRS Design #12;Design · Design for manufacturability · Design verification #12;Design for Manufacturability · Architecture challenges · Logic and circuit challenges · Layout and physical design challenges · Expected to be the source of multiple DFM challenges · Invest in variability reduction or design

  10. Runtime verification for stochastic systems

    E-print Network

    Wilcox, Cristina M

    2010-01-01

    We desire a capability for the safety monitoring of complex, mixed hardware/software systems, such as a semi-autonomous car. The field of runtime verification has developed many tools for monitoring the safety of software ...

  11. EMPLOYMENT VERIFICATION LETTER Student's Name: _

    E-print Network

    Stuart, Steven J.

    Rev. 10/04 EMPLOYMENT VERIFICATION LETTER Student's Name: _ (Family Name) (First) (Middle Initial-6000254______ Name of Student's Immediate Supervisor (Print)____________________________ Employer Name (Print above certifies that the above named person is a J-1 visa student at Clemson University

  12. Signature CERN-URSS

    ScienceCinema

    None

    2011-04-25

    Le DG W.Jentschke souhaite la bienvenue à l'assemblée et aux invités pour la signature du protocole entre le Cern et l'URSS qui est un événement important. C'est en 1955 que 55 visiteurs soviétiques ont visité le Cern pour la première fois. Le premier DG au Cern, F.Bloch, et Mons.Amaldi sont aussi présents. Tandis que le discours anglais de W.Jentschke est traduit en russe, le discours russe de Mons.Morozov est traduit en anglais.

  13. Identifying, Visualizing, and Fusing Social Media Data to Support Nonproliferation and Arms Control Treaty Verification: Preliminary Results

    SciTech Connect

    Gastelum, Zoe N.; Cramer, Nicholas O.; Benz, Jacob M.; Kreyling, Sean J.; Henry, Michael J.; Corley, Courtney D.; Whattam, Kevin M.

    2013-07-11

    While international nonproliferation and arms control verification capabilities have their foundations in physical and chemical sensors, state declarations, and on-site inspections, verification experts are beginning to consider the importance of open source data to complement and support traditional means of verification. One of those new, and increasingly expanding, sources of open source information is social media, which can be ingested and understood through social media analytics (SMA). Pacific Northwest National Laboratory (PNNL) is conducting research to further our ability to identify, visualize, and fuse social media data to support nonproliferation and arms control treaty verification efforts. This paper will describe our preliminary research to examine social media signatures of nonproliferation or arms control proxy events. We will describe the development of our preliminary nonproliferation and arms control proxy events, outline our initial findings, and propose ideas for future work.

  14. Nondestructive verification with minimal movement of irradiated light-water-reactor fuel assemblies

    SciTech Connect

    Phillips, J.R.; Bosler, G.E.; Halbig, J.K.; Klosterbuer, S.F.; Menlove, H.O.

    1982-10-01

    Nondestructive verification of irradiated light-water reactor fuel assemblies can be performed rapidly and precisely by measuring their gross gamma-ray and neutron signatures. A portable system measured fuel assemblies with exposures ranging from 18.4 to 40.6 GWd/tU and with cooling times ranging from 1575 to 2638 days. Differences in the measured results for side or corner measurements are discussed. 25 figures, 20 tables.

  15. Advanced spectral signature discrimination algorithm

    NASA Astrophysics Data System (ADS)

    Chakravarty, Sumit; Cao, Wenjie; Samat, Alim

    2013-05-01

    This paper presents a novel approach to the task of hyperspectral signature analysis. Hyperspectral signature analysis has been studied a lot in literature and there has been a lot of different algorithms developed which endeavors to discriminate between hyperspectral signatures. There are many approaches for performing the task of hyperspectral signature analysis. Binary coding approaches like SPAM and SFBC use basic statistical thresholding operations to binarize a signature which are then compared using Hamming distance. This framework has been extended to techniques like SDFC wherein a set of primate structures are used to characterize local variations in a signature together with the overall statistical measures like mean. As we see such structures harness only local variations and do not exploit any covariation of spectrally distinct parts of the signature. The approach of this research is to harvest such information by the use of a technique similar to circular convolution. In the approach we consider the signature as cyclic by appending the two ends of it. We then create two copies of the spectral signature. These three signatures can be placed next to each other like the rotating discs of a combination lock. We then find local structures at different circular shifts between the three cyclic spectral signatures. Texture features like in SDFC can be used to study the local structural variation for each circular shift. We can then create different measure by creating histogram from the shifts and thereafter using different techniques for information extraction from the histograms. Depending on the technique used different variant of the proposed algorithm are obtained. Experiments using the proposed technique show the viability of the proposed methods and their performances as compared to current binary signature coding techniques.

  16. Multimodal signature modeling of humans

    NASA Astrophysics Data System (ADS)

    Cathcart, J. Michael; Kocher, Brian; Prussing, Keith; Lane, Sarah; Thomas, Alan

    2010-04-01

    Georgia Tech been investigating method for the detection of covert personnel in traditionally difficult environments (e.g., urban, caves). This program focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification and characterization of potential observables. Both aspects are needed to support the development of personnel detection and tracking algorithms. The difficult nature of these personnel-related problems dictates a multimodal sensing approach. Human signature data of sufficient and accurate quality and quantity do not exist, thus the development of an accurate signature model for a human is needed. This model should also simulate various human activities to allow motion-based observables to be exploited. This paper will describe a multimodal signature modeling approach that incorporates human physiological aspects, thermoregulation, and dynamics into the signature calculation. This approach permits both passive and active signatures to be modeled. The focus of the current effort involved the computation of signatures in urban environments. This paper will discuss the development of a human motion model for use in simulating both electro-optical signatures and radar-based signatures. Video sequences of humans in a simulated urban environment will also be presented; results using these sequences for personnel tracking will be presented.

  17. Signatures of dark matter

    NASA Astrophysics Data System (ADS)

    Baltz, Edward Anthony

    It is well known that most of the mass in the universe remains unobserved save for its gravitational effect on luminous matter. The nature of this ``dark matter'' remains a mystery. From measurements of the primordial deuterium abundance, the theory of big bang nucleosynthesis predicts that there are not enough baryons to account for the amount of dark matter observed, thus the missing mass must take an exotic form. Several promising candidates have been proposed. In this work I will describe my research along two main lines of inquiry into the dark matter puzzle. The first possibility is that the dark matter is exotic massive particles, such as those predicted by supersymmetric extensions to the standard model of particle physics. Such particles are generically called WIMPs, for weakly interacting massive particles. Focusing on the so-called neutralino in supersymmetric models, I discuss the possible signatures of such particles, including their direct detection via nuclear recoil experiments and their indirect detection via annihilations in the halos of galaxies, producing high energy antiprotons, positrons and gamma rays. I also discuss signatures of the possible slow decays of such particles. The second possibility is that there is a population of black holes formed in the early universe. Any dark objects in galactic halos, black holes included, are called MACHOs, for massive compact halo objects. Such objects can be detected by their gravitational microlensing effects. Several possibilities for sources of baryonic dark matter are also interesting for gravitational microlensing. These include brown dwarf stars and old, cool white dwarf stars. I discuss the theory of gravitational microlensing, focusing on the technique of pixel microlensing. I make predictions for several planned microlensing experiments with ground based and space based telescopes. Furthermore, I discuss binary lenses in the context of pixel microlensing. Finally, I develop a new technique for extracting the masses of the lenses from a pixel microlensing survey.

  18. Hard and Soft Safety Verifications

    NASA Technical Reports Server (NTRS)

    Wetherholt, Jon; Anderson, Brenda

    2012-01-01

    The purpose of this paper is to examine the differences between and the effects of hard and soft safety verifications. Initially, the terminology should be defined and clarified. A hard safety verification is datum which demonstrates how a safety control is enacted. An example of this is relief valve testing. A soft safety verification is something which is usually described as nice to have but it is not necessary to prove safe operation. An example of a soft verification is the loss of the Solid Rocket Booster (SRB) casings from Shuttle flight, STS-4. When the main parachutes failed, the casings impacted the water and sank. In the nose cap of the SRBs, video cameras recorded the release of the parachutes to determine safe operation and to provide information for potential anomaly resolution. Generally, examination of the casings and nozzles contributed to understanding of the newly developed boosters and their operation. Safety verification of SRB operation was demonstrated by examination for erosion or wear of the casings and nozzle. Loss of the SRBs and associated data did not delay the launch of the next Shuttle flight.

  19. Verification of Secure Biometric Authentication Protocols

    E-print Network

    Ryan, Mark

    Verification of Secure Biometric Authentication Protocols by Anongporn Salaiwarakul A thesis the permission of the copyright holder. #12;Abstract The thesis presents verification of biometric authentication the protocols hold their intended properties. We have selected three biometric authentication protocols

  20. Generation of RTL verification input stimulus 

    E-print Network

    Selvarathinam, Anand Manivannan

    2001-01-01

    intervention. Simulation is widely used for verifying RTL designs despite its limitation. For a given coverage metric, the verification input vectors are generated to attain a higher level of coverage. Many verification coverage measures were proposed...

  1. Structural verification for GAS experiments

    NASA Technical Reports Server (NTRS)

    Peden, Mark Daniel

    1992-01-01

    The purpose of this paper is to assist the Get Away Special (GAS) experimenter in conducting a thorough structural verification of its experiment structural configuration, thus expediting the structural review/approval process and the safety process in general. Material selection for structural subsystems will be covered with an emphasis on fasteners (GSFC fastener integrity requirements) and primary support structures (Stress Corrosion Cracking requirements and National Space Transportation System (NSTS) requirements). Different approaches to structural verifications (tests and analyses) will be outlined especially those stemming from lessons learned on load and fundamental frequency verification. In addition, fracture control will be covered for those payloads that utilize a door assembly or modify the containment provided by the standard GAS Experiment Mounting Plate (EMP). Structural hazard assessment and the preparation of structural hazard reports will be reviewed to form a summation of structural safety issues for inclusion in the safety data package.

  2. Working Memory Mechanism in Proportional Quantifier Verification

    ERIC Educational Resources Information Center

    Zajenkowski, Marcin; Szymanik, Jakub; Garraffa, Maria

    2014-01-01

    The paper explores the cognitive mechanisms involved in the verification of sentences with proportional quantifiers (e.g. "More than half of the dots are blue"). The first study shows that the verification of proportional sentences is more demanding than the verification of sentences such as: "There are seven blue and eight yellow…

  3. 78 FR 58492 - Generator Verification Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-24

    ... MOD-024-1 (Verification of Generator Gross and Net Real Power Capability) and MOD-025-1 (Verification of Generator Gross and Net Reactive Power Capability) prior to the effective date of MOD-025-2. DATES... Generator Gross and Net Real Power Capability) and MOD-025-1 (Verification of Generator Gross and...

  4. Enrollment Verification Request Admissions and Records

    E-print Network

    Ravikumar, B.

    Enrollment Verification Request Admissions and Records You can request a verification of your SSU enrollment from Admissions and Records by completing this verification of enrollment form. Please fill out both the "MAIL ENROLLMENT VERIFICAITON TO" AND "STUDENT ADDRESS" boxes. Please type or print

  5. NISTIR 7284 Personal Identity Verification Card

    E-print Network

    NISTIR 7284 Personal Identity Verification Card Management Report Jim Dray David Corcoran #12;Personal Identity Verification Card Management Report NISTIR 7284 Jim Dray David Corcoran C O M P U T E R William A. Jeffrey, Director #12;Personal Identity Verification Card Management Report REPORTS ON COMPUTER

  6. Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest Wisconsin (USA)

    E-print Network

    Wisconsin at Madison, University of

    Charcoal signatures defined by multivariate analysis of charcoal records from 10 lakes in northwest online 20 November 2010 Keywords: Fire history Charcoal analysis Fire regime Wisconsin Sand plain CHAR Charster We show how sedimentary charcoal records from multiple sites within a single landscape can be used

  7. Excitonic signatures in the optical response of single-wall carbon

    E-print Network

    Heinz, Tony F.

    of Rayleigh scattering spectra at the single nanotube level reveals clear exciton­phonon sideExcitonic signatures in the optical response of single-wall carbon nanotubes Christophe Voisin*,1, accepted 14 December 2011 Published online 30 January 2012 Keywords carbon nanotubes, excitons

  8. On the signature of LINCOS

    NASA Astrophysics Data System (ADS)

    Ollongren, Alexander

    2010-12-01

    Suppose the international SETI effort yields the discovery of some signal of evidently non-natural origin. Could it contain linguistic information formulated in some kind of Lingua Cosmica? One way to get insight into this matter is to consider what specific (bio) linguistic signature( s) could be attached to a cosmic language for interstellar communication—designed by humans or an alien society having reached a level of intelligence (and technology) comparable to or surpassing ours. For this purpose, we consider in the present paper the logico-linguistic system LINCOS for ( A)CETI, developed during a number of years by the author in several papers and a monograph [1]. The system has a two-fold signature, which distinguishes it significantly from natural languages. In fact abstract and concrete signatures can be distinguished. That an abstract kind occurs is due to the manner in which abstractions of reality are represented in LINCOS-texts. They can take compound forms because the system is multi-expressive—partly due to the availability of inductive (recursive) entities. On the other hand, the concrete signature of LINCOS is related to the distribution of delimiters and predefined tokens in texts. Assigning measures to concrete signatures will be discussed elsewhere. The present contribution concentrates on the abstract signature of the language. At the same time, it is realized that an alien Lingua Cosmica might, but not necessarily needs to have this kind of signatures.

  9. Formal verification of mathematical software

    NASA Technical Reports Server (NTRS)

    Sutherland, D.

    1984-01-01

    Methods are investigated for formally specifying and verifying the correctness of mathematical software (software which uses floating point numbers and arithmetic). Previous work in the field was reviewed. A new model of floating point arithmetic called the asymptotic paradigm was developed and formalized. Two different conceptual approaches to program verification, the classical Verification Condition approach and the more recently developed Programming Logic approach, were adapted to use the asymptotic paradigm. These approaches were then used to verify several programs; the programs chosen were simplified versions of actual mathematical software.

  10. Quantum Online Memory Checking

    E-print Network

    Wim van Dam; Qingqing Yuan

    2010-02-15

    The problem of memory checking considers storing files on an unreliable public server whose memory can be modified by a malicious party. The main task is to design an online memory checker with the capability to verify that the information on the server has not been corrupted. To store n bits of public information, the memory checker has s private reliable bits for verification purpose; while to retrieve each bit of public information the checker communicates t bits with the public memory. Earlier work showed that, for classical memory checkers, the lower bound s*t \\in Omega(n) holds. In this article we study quantum memory checkers that have s private qubits and that are allowed to quantum query the public memory using t qubits. We prove an exponential improvement over the classical setting by showing the existence of a quantum checker that, using quantum fingerprints, requires only s \\in O(log n) qubits of local memory and t \\in O(polylog n) qubits of communication with the public memory.

  11. ETV TECHNOLOGIES UNDERGOING VERIFICATION (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM)

    EPA Science Inventory

    There are 109 technologies undergoing verification in the following categories: Air, Water, Monitoring, Pollution Prevention and Independent. For the air category there are 12 in the Air Pollution Control Technology Pilot and 6 in the Greenhouse Gas Technology Pilot. In the water...

  12. CHEMICAL INDUCTION MIXER VERIFICATION - ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Wet-Weather Flow Technologies Pilot of the Environmental Technology Verification (ETV) Program, which is supported by the U.S. Environmental Protection Agency and facilitated by NSF International, has recently evaluated the performance of chemical induction mixers used for di...

  13. Development of Asset Fault Signatures for Prognostic and Health Management in the Nuclear Industry

    SciTech Connect

    Vivek Agarwal; Nancy J. Lybeck; Randall Bickford; Richard Rusaw

    2014-06-01

    Proactive online monitoring in the nuclear industry is being explored using the Electric Power Research Institute’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. The FW-PHM Suite is a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. The FW-PHM Suite has four main modules: Diagnostic Advisor, Asset Fault Signature (AFS) Database, Remaining Useful Life Advisor, and Remaining Useful Life Database. This paper focuses on development of asset fault signatures to assess the health status of generator step-up generators and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. At the most basic level, fault signatures are comprised of an asset type, a fault type, and a set of one or more fault features (symptoms) that are indicative of the specified fault. The AFS Database is populated with asset fault signatures via a content development exercise that is based on the results of intensive technical research and on the knowledge and experience of technical experts. The developed fault signatures capture this knowledge and implement it in a standardized approach, thereby streamlining the diagnostic and prognostic process. This will support the automation of proactive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  14. Hybrid Enrichment Assay Methods for a UF6 Cylinder Verification Station: FY10 Progress Report

    SciTech Connect

    Smith, Leon E.; Jordan, David V.; Orton, Christopher R.; Misner, Alex C.; Mace, Emily K.

    2010-08-01

    Pacific Northwest National Laboratory (PNNL) is developing the concept of an automated UF6 cylinder verification station that would be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until the arrival of International Atomic Energy Agency (IAEA) inspectors. At the center of this unattended system is a hybrid enrichment assay technique that combines the traditional enrichment-meter method (based on the 186 keV peak from 235U) with non-traditional neutron-induced high-energy gamma-ray signatures (spawned primarily by 234U alpha emissions and 19F(alpha, neutron) reactions). Previous work by PNNL provided proof-of-principle for the non-traditional signatures to support accurate, full-volume interrogation of the cylinder enrichment, thereby reducing the systematic uncertainties in enrichment assay due to UF6 heterogeneity and providing greater sensitivity to material substitution scenarios. The work described here builds on that preliminary evaluation of the non-traditional signatures, but focuses on a prototype field system utilizing NaI(Tl) and LaBr3(Ce) spectrometers, and enrichment analysis algorithms that integrate the traditional and non-traditional signatures. Results for the assay of Type-30B cylinders ranging from 0.2 to 4.95 wt% 235U, at an AREVA fuel fabrication plant in Richland, WA, are described for the following enrichment analysis methods: 1) traditional enrichment meter signature (186 keV peak) as calculated using a square-wave convolute (SWC) algorithm; 2) non-traditional high-energy gamma-ray signature that provides neutron detection without neutron detectors and 3) hybrid algorithm that merges the traditional and non-traditional signatures. Uncertainties for each method, relative to the declared enrichment for each cylinder, are calculated and compared to the uncertainties from an attended HPGe verification station at AREVA, and the IAEA’s uncertainty target values for feed, tail and product cylinders. A summary of the major findings from the field measurements and subsequent analysis follows: • Traditional enrichment-meter assay using specially collimated NaI spectrometers and a Square-Wave-Convolute algorithm can achieve uncertainties comparable to HPGe and LaBr for product, natural and depleted cylinders. • Non-traditional signatures measured using NaI spectrometers enable interrogation of the entire cylinder volume and accurate measurement of absolute 235U mass in product, natural and depleted cylinders. • A hybrid enrichment assay method can achieve lower uncertainties than either the traditional or non-traditional methods acting independently because there is a low degree of correlation in the systematic errors of the two individual methods (wall thickness variation and 234U/235U variation, respectively). This work has indicated that the hybrid NDA method has the potential to serve as the foundation for an unattended cylinder verification station. When compared to today’s handheld cylinder-verification approach, such a station would have the following advantages: 1) improved enrichment assay accuracy for product, tail and feed cylinders; 2) full-volume assay of absolute 235U mass; 3) assay of minor isotopes (234U and 232U) important to verification of feedstock origin; single instrumentation design for both Type 30B and Type 48 cylinders; and 4) substantial reduction in the inspector manpower associated with cylinder verification.

  15. Democratic Group Signatures Mark Manulis

    E-print Network

    Manulis, Mark

    -University of Bochum, Germany mark.manulis@rub.de For many mutli-party applications group signatures are important and is required to be trusted to act as predestinated. On the other hand there exist multi-party applications

  16. Intrusion detection using secure signatures

    DOEpatents

    Nelson, Trent Darnel; Haile, Jedediah

    2014-09-30

    A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

  17. Program Verification and System Dependability

    NASA Astrophysics Data System (ADS)

    Jackson, Michael

    Formal verification of program correctness is a long-standing ambition, recently given added prominence by a “Grand Challenge” project. Major emphases have been on the improvement of languages for program specification and program development, and on the construction of verification tools. The emphasis on tools commands general assent, but while some researchers focus on narrow verification aimed only at program correctness, others want to pursue wide verification aimed at the larger goal of system dependability. This paper presents an approach to system dependability based on problem frames and suggests how this approach can be supported by formal software tools. Dependability is to be understood and evaluated in the physical and human problem world of a system. The complexity and non-formal nature of the problem world demand the development and evolution of normal designs and normal design practices for specialised classes of systems and subsystems. The problem frames discipline of systems analysis and development that can support normal design practices is explained and illustrated. The role of formal reasoning in achieving dependability is discussed and some conceptual, linguistic and software tools are suggested.

  18. Online Auctions 1 Online Auctions

    E-print Network

    Rumpe, Bernhard

    in the upcoming Internet market places. ONLINE AUCTIONS IN THE CONTEXT OF THE INTERNET MARKETPLACE Electronic the Internet will be a market enabler of unforeseen possibilities. Just in the last few years it became apparent that doing business over the Internet can simplify marketing and purchasing considerably (see e

  19. The Global Diffusion of Societal Verification Tools: A Quantitative Assessment of the Public’s Ability to Engage Nonproliferation Treaty Monitoring

    SciTech Connect

    Sayre, Amanda M.; Kreyling, Sean J.; West, Curtis L.

    2015-07-11

    The spread of nuclear and dual-use technologies and the need for more robust, effective and efficient nonproliferation and arms control treaties has led to an increasing need for innovative verification approaches and technologies. This need, paired with advancements in online computing, mobile devices, commercially available satellite imagery and the evolution of online social networks, has led to a resurgence of the concept of societal verification for arms control and nonproliferation treaties. In the event a country accepts its citizens’ assistance in supporting transparency, confidence-building and societal verification, the host government will need a population that is willing and able to participate. While scholarly interest in societal verification continues to grow, social scientific research on the topic is lacking. The aim of this paper is to begin the process of understanding public societal verification capabilities, extend the availability of quantitative research on societal verification and set in motion complementary research to increase the breadth and depth of knowledge on this topic. This paper presents a potential framework and outlines a research roadmap for the development of such a societal verification capability index.

  20. Extra Dimensional Signatures for CLIC

    E-print Network

    Thomas G. Rizzo

    2001-08-28

    A brief overview is presented of the signatures for several different models with extra dimensions at CLIC, an $e^+e^-$ linear collider with a center of mass energy of 3-5 TeV and an integrated luminosity of order 1 $ab^{-1}$. In all cases the search reach for the resulting new physics signatures is found to be in the range of $\\simeq$15-80 TeV.

  1. Ballastic signature identification systems study

    NASA Technical Reports Server (NTRS)

    Reich, A.; Hine, T. L.

    1976-01-01

    The results are described of an attempt to establish a uniform procedure for documenting (recording) expended bullet signatures as effortlessly as possible and to build a comprehensive library of these signatures in a form that will permit the automated comparison of a new suspect bullet with the prestored library. The ultimate objective is to achieve a standardized format that will permit nationwide interaction between police departments, crime laboratories, and other interested law enforcement agencies.

  2. Regression Verification Using Impact Summaries

    NASA Technical Reports Server (NTRS)

    Backes, John; Person, Suzette J.; Rungta, Neha; Thachuk, Oksana

    2013-01-01

    Regression verification techniques are used to prove equivalence of syntactically similar programs. Checking equivalence of large programs, however, can be computationally expensive. Existing regression verification techniques rely on abstraction and decomposition techniques to reduce the computational effort of checking equivalence of the entire program. These techniques are sound but not complete. In this work, we propose a novel approach to improve scalability of regression verification by classifying the program behaviors generated during symbolic execution as either impacted or unimpacted. Our technique uses a combination of static analysis and symbolic execution to generate summaries of impacted program behaviors. The impact summaries are then checked for equivalence using an o-the-shelf decision procedure. We prove that our approach is both sound and complete for sequential programs, with respect to the depth bound of symbolic execution. Our evaluation on a set of sequential C artifacts shows that reducing the size of the summaries can help reduce the cost of software equivalence checking. Various reduction, abstraction, and compositional techniques have been developed to help scale software verification techniques to industrial-sized systems. Although such techniques have greatly increased the size and complexity of systems that can be checked, analysis of large software systems remains costly. Regression analysis techniques, e.g., regression testing [16], regression model checking [22], and regression verification [19], restrict the scope of the analysis by leveraging the differences between program versions. These techniques are based on the idea that if code is checked early in development, then subsequent versions can be checked against a prior (checked) version, leveraging the results of the previous analysis to reduce analysis cost of the current version. Regression verification addresses the problem of proving equivalence of closely related program versions [19]. These techniques compare two programs with a large degree of syntactic similarity to prove that portions of one program version are equivalent to the other. Regression verification can be used for guaranteeing backward compatibility, and for showing behavioral equivalence in programs with syntactic differences, e.g., when a program is refactored to improve its performance, maintainability, or readability. Existing regression verification techniques leverage similarities between program versions by using abstraction and decomposition techniques to improve scalability of the analysis [10, 12, 19]. The abstractions and decomposition in the these techniques, e.g., summaries of unchanged code [12] or semantically equivalent methods [19], compute an over-approximation of the program behaviors. The equivalence checking results of these techniques are sound but not complete-they may characterize programs as not functionally equivalent when, in fact, they are equivalent. In this work we describe a novel approach that leverages the impact of the differences between two programs for scaling regression verification. We partition program behaviors of each version into (a) behaviors impacted by the changes and (b) behaviors not impacted (unimpacted) by the changes. Only the impacted program behaviors are used during equivalence checking. We then prove that checking equivalence of the impacted program behaviors is equivalent to checking equivalence of all program behaviors for a given depth bound. In this work we use symbolic execution to generate the program behaviors and leverage control- and data-dependence information to facilitate the partitioning of program behaviors. The impacted program behaviors are termed as impact summaries. The dependence analyses that facilitate the generation of the impact summaries, we believe, could be used in conjunction with other abstraction and decomposition based approaches, [10, 12], as a complementary reduction technique. An evaluation of our regression verification technique shows that our approach is capable of leveragin

  3. Radar signatures of road vehicles: airborne SAR experiments

    NASA Astrophysics Data System (ADS)

    Palubinskas, G.; Runge, H.; Reinartz, P.

    2005-10-01

    The German radar satellite TerraSAR-X is a high resolution, dual receive antenna SAR satellite, which will be launched in spring 2006. Since it will have the capability to measure the velocity of moving targets, the acquired interferometric data can be useful for traffic monitoring applications on a global scale. DLR has started already the development of an automatic and operational processing system which will detect cars, measure their speed and assign them to a road. Statistical approaches are used to derive the vehicle detection algorithm, which require the knowledge of the radar signatures of vehicles, especially under consideration of the geometry of the radar look direction and the vehicle orientation. Simulation of radar signatures is a very difficult task due to the lack of realistic models of vehicles. In this paper the radar signatures of the parking cars are presented. They are estimated experimentally from airborne E-SAR X-band data, which have been collected during flight campaigns in 2003-2005. Several test cars of the same type placed in carefully selected orientation angles and several over-flights with different heading angles made it possible to cover the whole range of aspect angles from 0° to 180°. The large synthetic aperture length or beam width angle of 7° can be divided into several looks. Thus processing of each look separately allows to increase the angle resolution. Such a radar signature profile of one type of vehicle over the whole range of aspect angles in fine resolution can be used further for the verification of simulation studies and for the performance prediction for traffic monitoring with TerraSAR-X.

  4. Signature Authority Flow Chart March 11, 2010

    E-print Network

    Goodman, Robert M.

    Signature Authority Flow Chart March 11, 2010 Updated: May 3, 2012 #12;Signature Authority Flow;Signature Authority Flow Chart RIAS Page 1 of 4 Prepared by the Office of Financial & Business Preparer1 Approver (Bus. Office)2 Rachele Sylvan Dean Goodman #12;Signature Authority Flow Chart RIAS Q

  5. Application of computer vision to automatic prescription verification in pharmaceutical mail order

    NASA Astrophysics Data System (ADS)

    Alouani, Ali T.

    2005-05-01

    In large volume pharmaceutical mail order, before shipping out prescriptions, licensed pharmacists ensure that the drug in the bottle matches the information provided in the patient prescription. Typically, the pharmacist has about 2 sec to complete the prescription verification process of one prescription. Performing about 1800 prescription verification per hour is tedious and can generate human errors as a result of visual and brain fatigue. Available automatic drug verification systems are limited to a single pill at a time. This is not suitable for large volume pharmaceutical mail order, where a prescription can have as many as 60 pills and where thousands of prescriptions are filled every day. In an attempt to reduce human fatigue, cost, and limit human error, the automatic prescription verification system (APVS) was invented to meet the need of large scale pharmaceutical mail order. This paper deals with the design and implementation of the first prototype online automatic prescription verification machine to perform the same task currently done by a pharmacist. The emphasis here is on the visual aspects of the machine. The system has been successfully tested on 43,000 prescriptions.

  6. MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature

    E-print Network

    International Association for Cryptologic Research (IACR)

    , we propose a combined MQ signature scheme based on the yet unbroken UOV (Unbalanced Oil and Vinegar parameter choice) Unbalanced Oil and Vinegar (UOV) scheme [17]. Sakumoto et al. [23] proposed provably

  7. Simulating realistic predator signatures in quantitative fatty acid signature analysis

    USGS Publications Warehouse

    Bromaghin, Jeffrey F.

    2015-01-01

    Diet estimation is an important field within quantitative ecology, providing critical insights into many aspects of ecology and community dynamics. Quantitative fatty acid signature analysis (QFASA) is a prominent method of diet estimation, particularly for marine mammal and bird species. Investigators using QFASA commonly use computer simulation to evaluate statistical characteristics of diet estimators for the populations they study. Similar computer simulations have been used to explore and compare the performance of different variations of the original QFASA diet estimator. In both cases, computer simulations involve bootstrap sampling prey signature data to construct pseudo-predator signatures with known properties. However, bootstrap sample sizes have been selected arbitrarily and pseudo-predator signatures therefore may not have realistic properties. I develop an algorithm to objectively establish bootstrap sample sizes that generates pseudo-predator signatures with realistic properties, thereby enhancing the utility of computer simulation for assessing QFASA estimator performance. The algorithm also appears to be computationally efficient, resulting in bootstrap sample sizes that are smaller than those commonly used. I illustrate the algorithm with an example using data from Chukchi Sea polar bears (Ursus maritimus) and their marine mammal prey. The concepts underlying the approach may have value in other areas of quantitative ecology in which bootstrap samples are post-processed prior to their use.

  8. Biometric Cryptosystem Using Online Alisher Kholmatov and Berrin Yanikoglu

    E-print Network

    Yanikoglu, Berrin

    Biometric Cryptosystem Using Online Signatures Alisher Kholmatov and Berrin Yanikoglu Sabanci@su.sabanciuniv.edu, berrin@sabanciuniv.edu Abstract. Biometric cryptosystems combine cryptography and biomet- rics to benefit security levels, biometrics brings in non-repudiation and eliminates the need to remember pass- words

  9. Verification and transparency in future arms control

    SciTech Connect

    Pilat, J.F.

    1996-09-01

    Verification`s importance has changed dramatically over time, although it always has been in the forefront of arms control. The goals and measures of verification and the criteria for success have changed with the times as well, reflecting such factors as the centrality of the prospective agreement to East-West relations during the Cold War, the state of relations between the United States and the Soviet Union, and the technologies available for monitoring. Verification`s role may be declining in the post-Cold War period. The prospects for such a development will depend, first and foremost, on the high costs of traditional arms control, especially those associated with requirements for verification. Moreover, the growing interest in informal, or non-negotiated arms control does not allow for verification provisions by the very nature of these arrangements. Multilateral agreements are also becoming more prominent and argue against highly effective verification measures, in part because of fears of promoting proliferation by opening sensitive facilities to inspectors from potential proliferant states. As a result, it is likely that transparency and confidence-building measures will achieve greater prominence, both as supplements to and substitutes for traditional verification. Such measures are not panaceas and do not offer all that we came to expect from verification during the Cold war. But they may be the best possible means to deal with current problems of arms reductions and restraints at acceptable levels of expenditure.

  10. Online Organic Chemistry

    ERIC Educational Resources Information Center

    Janowicz, Philip A.

    2010-01-01

    This is a comprehensive study of the many facets of an entirely online organic chemistry course. Online homework with structure-drawing capabilities was found to be more effective than written homework. Online lecture was found to be just as effective as in-person lecture, and students prefer an online lecture format with shorter Webcasts. Online

  11. Negotiating Femininities Online

    ERIC Educational Resources Information Center

    Davies, Julia

    2004-01-01

    Much has been written about the potential for online learning (Fryer, 1997; www. ngfl.gov.uk/ngfl/index.html). However this literature typically emphasizes not online learning but online education. In this paper I focus on the potential for online learning, specifically learning about issues surrounding femininity in the presence of online peers,…

  12. Signature molecular descriptor : advanced applications.

    SciTech Connect

    Visco, Donald Patrick, Jr.

    2010-04-01

    In this work we report on the development of the Signature Molecular Descriptor (or Signature) for use in the solution of inverse design problems as well as in highthroughput screening applications. The ultimate goal of using Signature is to identify novel and non-intuitive chemical structures with optimal predicted properties for a given application. We demonstrate this in three studies: green solvent design, glucocorticoid receptor ligand design and the design of inhibitors for Factor XIa. In many areas of engineering, compounds are designed and/or modified in incremental ways which rely upon heuristics or institutional knowledge. Often multiple experiments are performed and the optimal compound is identified in this brute-force fashion. Perhaps a traditional chemical scaffold is identified and movement of a substituent group around a ring constitutes the whole of the design process. Also notably, a chemical being evaluated in one area might demonstrate properties very attractive in another area and serendipity was the mechanism for solution. In contrast to such approaches, computer-aided molecular design (CAMD) looks to encompass both experimental and heuristic-based knowledge into a strategy that will design a molecule on a computer to meet a given target. Depending on the algorithm employed, the molecule which is designed might be quite novel (re: no CAS registration number) and/or non-intuitive relative to what is known about the problem at hand. While CAMD is a fairly recent strategy (dating to the early 1980s), it contains a variety of bottlenecks and limitations which have prevented the technique from garnering more attention in the academic, governmental and industrial institutions. A main reason for this is how the molecules are described in the computer. This step can control how models are developed for the properties of interest on a given problem as well as how to go from an output of the algorithm to an actual chemical structure. This report provides details on a technique to describe molecules on a computer, called Signature, as well as the computer-aided molecule design algorithm built around Signature. Two applications are provided of the CAMD algorithm with Signature. The first describes the design of green solvents based on data in the GlaxoSmithKline (GSK) Solvent Selection Guide. The second provides novel non-steroidal glucocorticoid receptor ligands with some optimally predicted properties. In addition to using the CAMD algorithm with Signature, it is demonstrated how to employ Signature in a high-throughput screening study. Here, after classifying both active and inactive inhibitors for the protein Factor XIa using Signature, the model developed is used to screen a large, publicly-available database called PubChem for the most active compounds.

  13. Ontology Matching with Semantic Verification

    PubMed Central

    Jean-Mary, Yves R.; Shironoshita, E. Patrick; Kabuka, Mansur R.

    2009-01-01

    ASMOV (Automated Semantic Matching of Ontologies with Verification) is a novel algorithm that uses lexical and structural characteristics of two ontologies to iteratively calculate a similarity measure between them, derives an alignment, and then verifies it to ensure that it does not contain semantic inconsistencies. In this paper, we describe the ASMOV algorithm, and then present experimental results that measure its accuracy using the OAEI 2008 tests, and that evaluate its use with two different thesauri: WordNet, and the Unified Medical Language System (UMLS). These results show the increased accuracy obtained by combining lexical, structural and extensional matchers with semantic verification, and demonstrate the advantage of using a domain-specific thesaurus for the alignment of specialized ontologies. PMID:20186256

  14. Gender verification testing in sport.

    PubMed

    Ferris, E A

    1992-07-01

    Gender verification testing in sport, first introduced in 1966 by the International Amateur Athletic Federation (IAAF) in response to fears that males with a physical advantage in terms of muscle mass and strength were cheating by masquerading as females in women's competition, has led to unfair disqualifications of women athletes and untold psychological harm. The discredited sex chromatin test, which identifies only the sex chromosome component of gender and is therefore misleading, was abandoned in 1991 by the IAAF in favour of medical checks for all athletes, women and men, which preclude the need for gender testing. But, women athletes will still be tested at the Olympic Games at Albertville and Barcelona using polymerase chain reaction (PCR) to amplify DNA sequences on the Y chromosome which identifies genetic sex only. Gender verification testing may in time be abolished when the sporting community are fully cognizant of its scientific and ethical implications. PMID:1450892

  15. Experimental verification of quantum computations

    E-print Network

    Stefanie Barz; Joseph F. Fitzsimons; Elham Kashefi; Philip Walther

    2013-08-30

    Quantum computers are expected to offer substantial speedups over their classical counterparts and to solve problems that are intractable for classical computers. Beyond such practical significance, the concept of quantum computation opens up new fundamental questions, among them the issue whether or not quantum computations can be certified by entities that are inherently unable to compute the results themselves. Here we present the first experimental verification of quantum computations. We show, in theory and in experiment, how a verifier with minimal quantum resources can test a significantly more powerful quantum computer. The new verification protocol introduced in this work utilizes the framework of blind quantum computing and is independent of the experimental quantum-computation platform used. In our scheme, the verifier is only required to generate single qubits and transmit them to the quantum computer. We experimentally demonstrate this protocol using four photonic qubits and show how the verifier can test the computer's ability to perform measurement-based quantum computations.

  16. PERFORMANCE VERIFICATION OF ANIMAL WATER TREATMENT TECHNOLOGIES THROUGH EPA'S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The U.S. Environmental Protection Agency created the Environmental Technology Verification Program (ETV) to further environmental protection by accelerating the commercialization of new and innovative technology through independent performance verification and dissemination of in...

  17. PERFORMANCE VERIFICATION OF STORMWATER TREATMENT DEVICES UNDER EPA?S ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program was created to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The program?s goal is to further environmental protection by a...

  18. ENROLLMENT VERIFICATION REQUEST Students are responsible for providing postage for enrollment verifications.

    E-print Network

    Nicholson, Bruce J.

    ENROLLMENT VERIFICATION REQUEST Students are responsible for providing postage for enrollment be verified after the Census Day. Please see your school's academic calendar for this date. Enrollment request for Enrollment Verification will have to be made. Name

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION: GENERIC VERIFICATION PROTOCOL FOR BIOLOGICAL AND AEROSOL TESTING OF GENERAL VENTILATION AIR CLEANERS

    EPA Science Inventory

    The U.S. Environmental Protection Agency established the Environmental Technology Verification Program to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of product performance. Research Triangl...

  20. Formal verification of AI software

    NASA Technical Reports Server (NTRS)

    Rushby, John; Whitehurst, R. Alan

    1989-01-01

    The application of formal verification techniques to Artificial Intelligence (AI) software, particularly expert systems, is investigated. Constraint satisfaction and model inversion are identified as two formal specification paradigms for different classes of expert systems. A formal definition of consistency is developed, and the notion of approximate semantics is introduced. Examples are given of how these ideas can be applied in both declarative and imperative forms.

  1. reports online Anexclusivedigitalextension

    E-print Network

    Fletcher, Robin

    ! CONTENTS Queen's Law Reports Online is a periodic electronic update of Queen's Law Reports magazinereports online April 2015 NEW! Anexclusivedigitalextension ofyouralumnimagazine, Queen's Law Reports! #12;QUEEN'S LAW REPORTS ONLINE 1 INTRODUCTION DEAN'S COUNCIL MEMBERS Chair Sheila A. Murray, Law

  2. Verification Challenges at Low Numbers

    SciTech Connect

    Benz, Jacob M.; Booker, Paul M.; McDonald, Benjamin S.

    2013-06-01

    Many papers have dealt with the political difficulties and ramifications of deep nuclear arms reductions, and the issues of “Going to Zero”. Political issues include extended deterrence, conventional weapons, ballistic missile defense, and regional and geo-political security issues. At each step on the road to low numbers, the verification required to ensure compliance of all parties will increase significantly. Looking post New START, the next step will likely include warhead limits in the neighborhood of 1000 . Further reductions will include stepping stones at1000 warheads, 100’s of warheads, and then 10’s of warheads before final elimination could be considered of the last few remaining warheads and weapons. This paper will focus on these three threshold reduction levels, 1000, 100’s, 10’s. For each, the issues and challenges will be discussed, potential solutions will be identified, and the verification technologies and chain of custody measures that address these solutions will be surveyed. It is important to note that many of the issues that need to be addressed have no current solution. In these cases, the paper will explore new or novel technologies that could be applied. These technologies will draw from the research and development that is ongoing throughout the national laboratory complex, and will look at technologies utilized in other areas of industry for their application to arms control verification.

  3. Nuclear Data Verification and Standardization

    SciTech Connect

    Karam, Lisa R.; Arif, Muhammad; Thompson, Alan K.

    2011-10-01

    The objective of this interagency program is to provide accurate neutron interaction verification and standardization data for the U.S. Department of Energy Division of Nuclear Physics programs which include astrophysics, radioactive beam studies, and heavy-ion reactions. The measurements made in this program are also useful to other programs that indirectly use the unique properties of the neutron for diagnostic and analytical purposes. These include homeland security, personnel health and safety, nuclear waste disposal, treaty verification, national defense, and nuclear based energy production. The work includes the verification of reference standard cross sections and related neutron data employing the unique facilities and capabilities at NIST and other laboratories as required; leadership and participation in international intercomparisons and collaborations; and the preservation of standard reference deposits. An essential element of the program is critical evaluation of neutron interaction data standards including international coordinations. Data testing of critical data for important applications is included. The program is jointly supported by the Department of Energy and the National Institute of Standards and Technology.

  4. Graph Analytics for Signature Discovery

    SciTech Connect

    Hogan, Emilie A.; Johnson, John R.; Halappanavar, Mahantesh; Lo, Chaomei

    2013-06-01

    Within large amounts of seemingly unstructured data it can be diffcult to find signatures of events. In our work we transform unstructured data into a graph representation. By doing this we expose underlying structure in the data and can take advantage of existing graph analytics capabilities, as well as develop new capabilities. Currently we focus on applications in cybersecurity and communication domains. Within cybersecurity we aim to find signatures for perpetrators using the pass-the-hash attack, and in communications we look for emails or phone calls going up or down a chain of command. In both of these areas, and in many others, the signature we look for is a path with certain temporal properties. In this paper we discuss our methodology for finding these temporal paths within large graphs.

  5. Molecular signatures for vaccine development.

    PubMed

    Maertzdorf, J; Kaufmann, S H E; Weiner, J

    2015-09-29

    The immune system has evolved complex and specialized mechanisms to mount specific defense responses against the various types of pathogens it encounters. For the development of new vaccines, it is crucial to gain a better understanding of what these mechanisms are and how they work. The field of vaccinology has adopted high-throughput profiling techniques to gain more detailed insights into the various immune responses elicited by different vaccines and natural infections. From all detailed transcriptional profiles generated today, a general picture of immunological responses emerges. First, almost every type of vaccine induces an early interferon-dominated signature. Second, different vaccine formulations induce distinct transcriptional signatures, representing the highly specialized defense mechanisms that must cope with the different pathogens and insults they cause. Transcriptional profiling has shifted its attention toward early molecular signatures, with a growing awareness that early innate responses are likely critical instructors for the development of adaptive immunity at later time points. PMID:25858856

  6. Measurement of sniper infrared signatures

    NASA Astrophysics Data System (ADS)

    Kastek, M.; Dulski, R.; Trzaskawka, P.; Bieszczad, G.

    2009-09-01

    The paper presents some practical aspects of sniper IR signature measurements. Description of particular signatures for sniper and background in typical scenarios has been presented. We take into consideration sniper activities in open area as well as in urban environment. The measurements were made at field test ground. High precision laboratory measurements were also performed. Several infrared cameras were used during measurements to cover all measurement assumptions. Some of the cameras are measurement class devices with high accuracy and speed. The others are microbolometer cameras with FPA detector similar to those used in real commercial counter-sniper systems. The registration was made in SWIR and LWIR spectral bands simultaneously. An ultra fast visual camera was also used for visible spectra registration. Exemplary sniper IR signatures for typical situation were presented.

  7. Signature Visualization of Software Binaries

    SciTech Connect

    Panas, T

    2008-07-01

    In this paper we present work on the visualization of software binaries. In particular, we utilize ROSE, an open source compiler infrastructure, to pre-process software binaries, and we apply a landscape metaphor to visualize the signature of each binary (malware). We define the signature of a binary as a metric-based layout of the functions contained in the binary. In our initial experiment, we visualize the signatures of a series of computer worms that all originate from the same line. These visualizations are useful for a number of reasons. First, the images reveal how the archetype has evolved over a series of versions of one worm. Second, one can see the distinct changes between version. This allows the viewer to form conclusions about the development cycle of a particular worm.

  8. Enrichment Assay Methods for a UF6 Cylinder Verification Station

    SciTech Connect

    Smith, Leon E.; Jordan, David V.; Misner, Alex C.; Mace, Emily K.; Orton, Christopher R.

    2010-11-30

    International Atomic Energy Agency (IAEA) inspectors currently perform periodic inspections at uranium enrichment plants to verify UF6 cylinder enrichment declarations. Measurements are typically performed with handheld high-resolution sensors on a sampling of cylinders taken to be representative of the facility’s entire cylinder inventory. These enrichment assay methods interrogate only a small fraction of the total cylinder volume, and are time-consuming and expensive to execute for inspectors. Pacific Northwest National Laboratory (PNNL) is developing an unattended measurement system capable of automated enrichment measurements over the full volume of Type 30B and Type 48 cylinders. This Integrated Cylinder Verification System (ICVS) could be located at key measurement points to positively identify each cylinder, measure its mass and enrichment, store the collected data in a secure database, and maintain continuity of knowledge on measured cylinders until IAEA inspector arrival. The focus of this paper is the development of nondestructive assay (NDA) methods that combine “traditional” enrichment signatures (e.g. 185-keV emission from U-235) and more-penetrating “non-traditional” signatures (e.g. high-energy neutron-induced gamma rays spawned primarily from U-234 alpha emission) collected by medium-resolution gamma-ray spectrometers (i.e. sodium iodide or lanthanum bromide). The potential of these NDA methods for the automated assay of feed, tail and product cylinders is explored through MCNP modeling and with field measurements on a cylinder population ranging from 0.2% to 5% in U-235 enrichment.

  9. Magnetic cleanliness verification approach on tethered satellite

    NASA Technical Reports Server (NTRS)

    Messidoro, Piero; Braghin, Massimo; Grande, Maurizio

    1990-01-01

    Magnetic cleanliness testing was performed on the Tethered Satellite as the last step of an articulated verification campaign aimed at demonstrating the capability of the satellite to support its TEMAG (TEthered MAgnetometer) experiment. Tests at unit level and analytical predictions/correlations using a dedicated mathematical model (GANEW program) are also part of the verification activities. Details of the tests are presented, and the results of the verification are described together with recommendations for later programs.

  10. Dust devil signatures in infrasound records of the International Monitoring System

    NASA Astrophysics Data System (ADS)

    Lorenz, Ralph D.; Christie, Douglas

    2015-03-01

    We explore whether dust devils have a recognizable signature in infrasound array records, since several Comprehensive Nuclear-Test-Ban Treaty verification stations conducting continuous measurements with microbarometers are in desert areas which see dust devils. The passage of dust devils (and other boundary layer vortices, whether dust laden or not) causes a local temporary drop in pressure: the high-pass time domain filtering in microbarometers results in a "heartbeat" signature, which we observe at the Warramunga station in Australia. We also observe a ~50 min pseudoperiodicity in the occurrence of these signatures and some higher-frequency infrasound. Dust devils do not significantly degrade the treaty verification capability. The pipe arrays for spatial averaging used in infrasound monitoring degrade the detection efficiency of small devils, but the long observation time may allow a useful census of large vortices, and thus, the high-sensitivity infrasonic array data from the monitoring network can be useful in studying columnar vortices in the lower atmosphere.

  11. CAMPR3: a database on sequences, structures and signatures of antimicrobial peptides

    PubMed Central

    Waghu, Faiza Hanif; Barai, Ram Shankar; Gurung, Pratima; Idicula-Thomas, Susan

    2016-01-01

    Antimicrobial peptides (AMPs) are known to have family-specific sequence composition, which can be mined for discovery and design of AMPs. Here, we present CAMPR3; an update to the existing CAMP database available online at www.camp3.bicnirrh.res.in. It is a database of sequences, structures and family-specific signatures of prokaryotic and eukaryotic AMPs. Family-specific sequence signatures comprising of patterns and Hidden Markov Models were generated for 45 AMP families by analysing 1386 experimentally studied AMPs. These were further used to retrieve AMPs from online sequence databases. More than 4000 AMPs could be identified using these signatures. AMP family signatures provided in CAMPR3 can thus be used to accelerate and expand the discovery of AMPs. CAMPR3 presently holds 10247 sequences, 757 structures and 114 family-specific signatures of AMPs. Users can avail the sequence optimization algorithm for rational design of AMPs. The database integrated with tools for AMP sequence and structure analysis will be a valuable resource for family-based studies on AMPs. PMID:26467475

  12. Fleet-Wide Prognostic and Health Management Suite: Asset Fault Signature Database

    SciTech Connect

    Vivek Agarwal; Nancy J. Lybeck; Randall Bickford; Richard Rusaw

    2015-06-01

    Proactive online monitoring in the nuclear industry is being explored using the Electric Power Research Institute’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software. The FW-PHM Suite is a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. The FW-PHM Suite has four main modules: (1) Diagnostic Advisor, (2) Asset Fault Signature (AFS) Database, (3) Remaining Useful Life Advisor, and (4) Remaining Useful Life Database. The paper focuses on the AFS Database of the FW-PHM Suite, which is used to catalog asset fault signatures. A fault signature is a structured representation of the information that an expert would use to first detect and then verify the occurrence of a specific type of fault. The fault signatures developed to assess the health status of generator step-up transformers are described in the paper. The developed fault signatures capture this knowledge and implement it in a standardized approach, thereby streamlining the diagnostic and prognostic process. This will support the automation of proactive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  13. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 2013-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  14. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 2011-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  15. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 2010-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  16. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2012-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  17. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 2014-07-01 false Inertial PM balance verifications. 1065.395 Section...Measurements § 1065.395 Inertial PM balance verifications. This section describes...verify the performance of an inertial PM balance. (a) Independent verification....

  18. 24 CFR 5.512 - Verification of eligible immigration status.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

  19. 24 CFR 5.512 - Verification of eligible immigration status.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...2014-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

  20. 24 CFR 5.512 - Verification of eligible immigration status.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...2012-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

  1. 24 CFR 5.512 - Verification of eligible immigration status.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...2013-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

  2. 24 CFR 5.512 - Verification of eligible immigration status.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Verification of eligible immigration status. 5.512 Section 5.512...5.512 Verification of eligible immigration status. (a) General. Except...system. Primary verification of the immigration status of the person is...

  3. Ballistic Signature Identification System Study

    NASA Technical Reports Server (NTRS)

    1976-01-01

    The first phase of a research project directed toward development of a high speed automatic process to be used to match gun barrel signatures imparted to fired bullets was documented. An optical projection technique has been devised to produce and photograph a planar image of the entire signature, and the phototransparency produced is subjected to analysis using digital Fourier transform techniques. The success of this approach appears to be limited primarily by the accuracy of the photographic step since no significant processing limitations have been encountered.

  4. GRASShopper Complete Heap Verification with Mixed Specifications

    E-print Network

    Wies, Thomas

    GRASShopper Complete Heap Verification with Mixed Specifications Ruzica Piskac1 , Thomas Wies2GRASShopper guarantees enable GRASShopper to produce detailed counterex- amples for incorrect or underspecified programs

  5. Hydrologic data-verification management program plan

    USGS Publications Warehouse

    Alexander, C.W.

    1982-01-01

    Data verification refers to the performance of quality control on hydrologic data that have been retrieved from the field and are being prepared for dissemination to water-data users. Water-data users now have access to computerized data files containing unpublished, unverified hydrologic data. Therefore, it is necessary to develop techniques and systems whereby the computer can perform some data-verification functions before the data are stored in user-accessible files. Computerized data-verification routines can be developed for this purpose. A single, unified concept describing master data-verification program using multiple special-purpose subroutines, and a screen file containing verification criteria, can probably be adapted to any type and size of computer-processing system. Some traditional manual-verification procedures can be adapted for computerized verification, but new procedures can also be developed that would take advantage of the powerful statistical tools and data-handling procedures available to the computer. Prototype data-verification systems should be developed for all three data-processing environments as soon as possible. The WATSTORE system probably affords the greatest opportunity for long-range research and testing of new verification subroutines. (USGS)

  6. Gender verification in competitive sports.

    PubMed

    Simpson, J L; Ljungqvist, A; de la Chapelle, A; Ferguson-Smith, M A; Genel, M; Carlson, A S; Ehrhardt, A A; Ferris, E

    1993-11-01

    The possibility that men might masquerade as women and be unfair competitors in women's sports is accepted as outrageous by athletes and the public alike. Since the 1930s, media reports have fuelled claims that individuals who once competed as female athletes subsequently appeared to be men. In most of these cases there was probably ambiguity of the external genitalia, possibly as a result of male pseudohermaphroditism. Nonetheless, beginning at the Rome Olympic Games in 1960, the International Amateur Athletics Federation (IAAF) began establishing rules of eligibility for women athletes. Initially, physical examination was used as a method for gender verification, but this plan was widely resented. Thus, sex chromatin testing (buccal smear) was introduced at the Mexico City Olympic Games in 1968. The principle was that genetic females (46,XX) show a single X-chromatic mass, whereas males (46,XY) do not. Unfortunately, sex chromatin analysis fell out of common diagnostic use by geneticists shortly after the International Olympic Committee (IOC) began its implementation for gender verification. The lack of laboratories routinely performing the test aggravated the problem of errors in interpretation by inexperienced workers, yielding false-positive and false-negative results. However, an even greater problem is that there exist phenotypic females with male sex chromatin patterns (e.g. androgen insensitivity, XY gonadal dysgenesis). These individuals have no athletic advantage as a result of their congenital abnormality and reasonably should not be excluded from competition. That is, only the chromosomal (genetic) sex is analysed by sex chromatin testing, not the anatomical or psychosocial status. For all the above reasons sex chromatin testing unfairly excludes many athletes. Although the IOC offered follow-up physical examinations that could have restored eligibility for those 'failing' sex chromatin tests, most affected athletes seemed to prefer to 'retire'. All these problems remain with the current laboratory based gender verification test, polymerase chain reaction based testing of the SRY gene, the main candidate for male sex determination. Thus, this 'advance' in fact still fails to address the fundamental inequities of laboratory based gender verification tests. The IAAF considered the issue in 1991 and 1992, and concluded that gender verification testing was not needed. This was thought to be especially true because of the current use of urine testing to exclude doping: voiding is observed by an official in order to verify that a sample from a given athlete has actually come from his or her urethra. That males could masquerade as females in these circumstances seems extraordinarily unlikely. Screening for gender is no longer undertaken at IAAF competitions. PMID:8272686

  7. GENERIC VERIFICATION PROTOCOL FOR THE VERIFICATION OF PESTICIDE SPRAY DRIFT REDUCTION TECHNOLOGIES FOR ROW AND FIELD CROPS

    EPA Science Inventory

    This ETV program generic verification protocol was prepared and reviewed for the Verification of Pesticide Drift Reduction Technologies project. The protocol provides a detailed methodology for conducting and reporting results from a verification test of pesticide drift reductio...

  8. A Scala DSL for RETE-Based Runtime Verification

    NASA Technical Reports Server (NTRS)

    Havelund, Klaus

    2013-01-01

    Runtime verification (RV) consists in part of checking execution traces against formalized specifications. Several systems have emerged, most of which support specification notations based on state machines, regular expressions, temporal logic, or grammars. The field of Artificial Intelligence (AI) has for an even longer period of time studied rule-based production systems, which at a closer look appear to be relevant for RV, although seemingly focused on slightly different application domains, such as for example business processes and expert systems. The core algorithm in many of these systems is the Rete algorithm. We have implemented a Rete-based runtime verification system, named LogFire (originally intended for offline log analysis but also applicable to online analysis), as an internal DSL in the Scala programming language, using Scala's support for defining DSLs. This combination appears attractive from a practical point of view. Our contribution is in part conceptual in arguing that such rule-based frameworks originating from AI may be suited for RV.

  9. Signature simulation of mixed materials

    NASA Astrophysics Data System (ADS)

    Carson, Tyler D.; Salvaggio, Carl

    2015-05-01

    Soil target signatures vary due to geometry, chemical composition, and scene radiometry. Although radiative transfer models and function-fit physical models may describe certain targets in limited depth, the ability to incorporate all three signature variables is difficult. This work describes a method to simulate the transient signatures of soil by first considering scene geometry synthetically created using 3D physics engines. Through the assignment of spectral data from the Nonconventional Exploitation Factors Data System (NEFDS), the synthetic scene is represented as a physical mixture of particles. Finally, first principles radiometry is modeled using the Digital Imaging and Remote Sensing Image Generation (DIRSIG) model. With DIRSIG, radiometric and sensing conditions were systematically manipulated to produce and record goniometric signatures. The implementation of this virtual goniometer allows users to examine how a target bidirectional reflectance distribution function (BRDF) will change with geometry, composition, and illumination direction. By using 3D computer graphics models, this process does not require geometric assumptions that are native to many radiative transfer models. It delivers a discrete method to circumnavigate the significant cost of time and treasure associated with hardware-based goniometric data collections.

  10. Disaster relief through composite signatures

    NASA Astrophysics Data System (ADS)

    Hawley, Chadwick T.; Hyde, Brian; Carpenter, Tom; Nichols, Steve

    2012-06-01

    A composite signature is a group of signatures that are related in such a way to more completely or further define a target or operational endeavor at a higher fidelity. This paper builds on previous work developing innovative composite signatures associated with civil disasters, including physical, chemical and pattern/behavioral. For the composite signature approach to be successful it requires effective data fusion and visualization. This plays a key role in both preparedness and the response and recovery which are critical to saving lives. Visualization tools enhance the overall understanding of the crisis by pulling together and analyzing the data, and providing a clear and complete analysis of the information to the organizations/agencies dependant on it for a successful operation. An example of this, Freedom Web, is an easy-to-use data visualization and collaboration solution for use in homeland security, emergency preparedness, situational awareness, and event management. The solution provides a nationwide common operating picture for all levels of government through a web based, map interface. The tool was designed to be utilized by non-geospatial experts and is easily tailored to the specific needs of the users. Consisting of standard COTS and open source databases and a web server, users can view, edit, share, and highlight information easily and quickly through a standard internet browser.

  11. Turbulence Modeling Verification and Validation

    NASA Technical Reports Server (NTRS)

    Rumsey, Christopher L.

    2014-01-01

    Computational fluid dynamics (CFD) software that solves the Reynolds-averaged Navier-Stokes (RANS) equations has been in routine use for more than a quarter of a century. It is currently employed not only for basic research in fluid dynamics, but also for the analysis and design processes in many industries worldwide, including aerospace, automotive, power generation, chemical manufacturing, polymer processing, and petroleum exploration. A key feature of RANS CFD is the turbulence model. Because the RANS equations are unclosed, a model is necessary to describe the effects of the turbulence on the mean flow, through the Reynolds stress terms. The turbulence model is one of the largest sources of uncertainty in RANS CFD, and most models are known to be flawed in one way or another. Alternative methods such as direct numerical simulations (DNS) and large eddy simulations (LES) rely less on modeling and hence include more physics than RANS. In DNS all turbulent scales are resolved, and in LES the large scales are resolved and the effects of the smallest turbulence scales are modeled. However, both DNS and LES are too expensive for most routine industrial usage on today's computers. Hybrid RANS-LES, which blends RANS near walls with LES away from walls, helps to moderate the cost while still retaining some of the scale-resolving capability of LES, but for some applications it can still be too expensive. Even considering its associated uncertainties, RANS turbulence modeling has proved to be very useful for a wide variety of applications. For example, in the aerospace field, many RANS models are considered to be reliable for computing attached flows. However, existing turbulence models are known to be inaccurate for many flows involving separation. Research has been ongoing for decades in an attempt to improve turbulence models for separated and other nonequilibrium flows. When developing or improving turbulence models, both verification and validation are important steps in the process. Verification insures that the CFD code is solving the equations as intended (no errors in the implementation). This is typically done either through the method of manufactured solutions (MMS) or through careful step-by-step comparisons with other verified codes. After the verification step is concluded, validation is performed to document the ability of the turbulence model to represent different types of flow physics. Validation can involve a large number of test case comparisons with experiments, theory, or DNS. Organized workshops have proved to be valuable resources for the turbulence modeling community in its pursuit of turbulence modeling verification and validation. Workshop contributors using different CFD codes run the same cases, often according to strict guidelines, and compare results. Through these comparisons, it is often possible to (1) identify codes that have likely implementation errors, and (2) gain insight into the capabilities and shortcomings of different turbulence models to predict the flow physics associated with particular types of flows. These are valuable lessons because they help bring consistency to CFD codes by encouraging the correction of faulty programming and facilitating the adoption of better models. They also sometimes point to specific areas needed for improvement in the models. In this paper, several recent workshops are summarized primarily from the point of view of turbulence modeling verification and validation. Furthermore, the NASA Langley Turbulence Modeling Resource website is described. The purpose of this site is to provide a central location where RANS turbulence models are documented, and test cases, grids, and data are provided. The goal of this paper is to provide an abbreviated survey of turbulence modeling verification and validation efforts, summarize some of the outcomes, and give some ideas for future endeavors in this area.

  12. ETVOICE (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM)

    EPA Science Inventory

    The purpose of ETVoice, hosted by the USEPA's Environmental Technology Verification (ETV) Program, is to inform subscribers of verification products, events and news related to the ETV Program. Messages will be posted as needed to inform subscibers of hot topics. An archive of pa...

  13. The monitoring and verification of nuclear weapons

    SciTech Connect

    Garwin, Richard L.

    2014-05-09

    This paper partially reviews and updates the potential for monitoring and verification of nuclear weapons, including verification of their destruction. Cooperative monitoring with templates of the gamma-ray spectrum are an important tool, dependent on the use of information barriers.

  14. 9 CFR 417.8 - Agency verification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan;...

  15. 9 CFR 417.8 - Agency verification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS § 417.8 Agency verification. FSIS will verify the adequacy of the HACCP plan(s) by determining that each HACCP plan meets the requirements of this part and all other applicable regulations. Such verification may include: (a) Reviewing the HACCP plan;...

  16. IMPROVING AIR QUALITY THROUGH ENVIRONMENTAL TECHNOLOGY VERIFICATIONS

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) began the Environmental Technology Verification (ETV) Program in 1995 as a means of working with the private sector to establish a market-based verification process available to all environmental technologies. Under EPA's Office of R...

  17. ENVIRONMENTAL TECHNOLOGY VERIFICATION FOR INDOOR AIR PRODUCTS

    EPA Science Inventory

    The paper discusses environmental technology verification (ETV) for indoor air products. RTI is developing the framework for a verification testing program for indoor air products, as part of EPA's ETV program. RTI is establishing test protocols for products that fit into three...

  18. Microprocessor Design Verification Warren A. Hunt, Jr.

    E-print Network

    Boyer, Robert Stephen

    microprocessor itself does not contain any memory; the memory system is specified as a separate process whichMicroprocessor Design Verification Warren A. Hunt, Jr. Copyright © 1989 Warren A. Hunt, Jr Abstract. The verification of a microprocessor design has been accomplished using a mechanical theorem

  19. SECURE IRIS VERIFICATION Shenglin Yang1

    E-print Network

    Verbauwhede, Ingrid

    authentication of a person based on the unique characteristics possessed by the individual. Biometric systems reference is stored for protecting the sensitive biometric data. An Error Correcting Code (ECC) technique. Index Terms-- iris, personal verification, data security 1. INTRODUCTION Biometric verification provides

  20. Quantum Money with Classical Verification Dmitry Gavinsky

    E-print Network

    Gavinsky, Dmitry

    Quantum Money with Classical Verification Dmitry Gavinsky NEC Laboratories America, Inc. Princeton, NJ, U.S.A. Abstract We propose and construct a quantum money scheme that allows verification through classical communication with a bank. This is the first demonstration that a secure quantum money scheme

  1. 9 CFR 416.17 - Agency verification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... REGULATORY REQUIREMENTS UNDER THE FEDERAL MEAT INSPECTION ACT AND THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification. FSIS shall verify the adequacy and effectiveness of the Sanitation.... Such verification may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the daily...

  2. 9 CFR 416.17 - Agency verification.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... REGULATORY REQUIREMENTS UNDER THE FEDERAL MEAT INSPECTION ACT AND THE POULTRY PRODUCTS INSPECTION ACT SANITATION § 416.17 Agency verification. FSIS shall verify the adequacy and effectiveness of the Sanitation.... Such verification may include: (a) Reviewing the Sanitation SOP's; (b) Reviewing the daily...

  3. 40 CFR 1066.220 - Linearity verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Linearity verification. 1066.220 Section 1066.220 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR POLLUTION CONTROLS VEHICLE-TESTING PROCEDURES Dynamometer Specifications § 1066.220 Linearity verification. (a) Scope and frequency. Perform linearity...

  4. The BLAST Query Language for Software Verification

    E-print Network

    Beyer, Dirk

    Abstraction Software verification Tool, is a fully au- tomatic engine for software model checking [11]. Blast of a semantic property invokes the Blast model-checking engine. A semantic property may also referThe BLAST Query Language for Software Verification Dirk Beyer1 , Adam J. Chlipala2 , Thomas A

  5. 14 CFR 460.17 - Verification program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... TRANSPORTATION LICENSING HUMAN SPACE FLIGHT REQUIREMENTS Launch and Reentry with Crew § 460.17 Verification... software in an operational flight environment before allowing any space flight participant on board during... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Verification program. 460.17 Section...

  6. 14 CFR 460.17 - Verification program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... TRANSPORTATION LICENSING HUMAN SPACE FLIGHT REQUIREMENTS Launch and Reentry with Crew § 460.17 Verification... software in an operational flight environment before allowing any space flight participant on board during... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Verification program. 460.17 Section...

  7. ENVIRONMENTAL TECHNOLOGY VERIFICATION AND INDOOR AIR

    EPA Science Inventory

    The paper discusses environmental technology verification and indoor air. RTI has responsibility for a pilot program for indoor air products as part of the U.S. EPA's Environmental Technology Verification (ETV) program. The program objective is to further the development of sel...

  8. University Student Online Plagiarism

    ERIC Educational Resources Information Center

    Wang, Yu-mei

    2008-01-01

    This article reports a study investigating university student online plagiarism. The following questions are investigated: (a) What is the incidence of student online plagiarism? (b) What are student perceptions regarding online plagiarism? (c) Are there any differences in terms of student perceptions of online plagiarism and print plagiarism? (d)…

  9. Library Online Systems.

    ERIC Educational Resources Information Center

    Folda, Linda; And Others

    1989-01-01

    Issues related to library online systems are discussed in six articles. Topics covered include staff education through vendor demonstrations, evaluation of online public access catalogs, the impact of integrated online systems on cataloging operations, the merits of smart and dumb barcodes, and points to consider in planning for the next online

  10. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 1 2012-10-01 2012-10-01 false Contractor's signature. 4... ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with an... be signed by that individual, and the signature shall be followed by the individual's typed,...

  11. (Convertible) Undeniable Signatures without Random Oracles

    E-print Network

    International Association for Cryptologic Research (IACR)

    (Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen 1 , Man Ho Au 1 , Joseph K a convertible undeniable signature scheme without random oracles. Our construction is based on the Waters the existing undeniable signatures without random oracles due to Laguillaumie and Vergnaud. Keywords

  12. Strongly Unforgeable IDbased Signatures Without Random Oracles

    E-print Network

    International Association for Cryptologic Research (IACR)

    Strongly Unforgeable ID­based Signatures Without Random Oracles Chifumi Sato 1 , Takeshi Okamoto 2 a strongly unforgeable ID­based signature scheme without random oracles. 4 The signature size of our scheme without random oracles is one of the most important themes of study, since commonly used hash functions

  13. (Convertible) Undeniable Signatures without Random Oracles

    E-print Network

    International Association for Cryptologic Research (IACR)

    (Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen1 , Man Ho Au1 , Joseph K a convertible undeniable signature scheme without random oracles. Our construction is based on the Waters the existing undeniable signatures without random oracles due to Laguillaumie and Vergnaud. Keywords

  14. Signature Tree Generation for Polymorphic Worms

    E-print Network

    Xiao, Bin

    Signature Tree Generation for Polymorphic Worms Yong Tang, Bin Xiao, Member, IEEE, and Xicheng Lu generate accurate signatures for worms, especially polymorphic worms. In this paper, we propose a new NSG system--PolyTree, to defend against polymorphic worms. We observe that signatures from worms

  15. Analyzing Online Behaviors, Roles, and Learning Communities via Online Discussions

    ERIC Educational Resources Information Center

    Yeh, Yu-Chu

    2010-01-01

    Online learning communities are an important means of sharing and creating knowledge. Online behaviors and online roles can reveal how online learning communities function. However, no study has elucidated the relationships among online behaviors, online roles, and online learning communities. In this study, 32 preservice teachers participated in…

  16. 77 FR 40612 - Notice to All Interested Parties of the Termination of the Receivership of 10375, Signature Bank...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... From the Federal Register Online via the Government Publishing Office FEDERAL DEPOSIT INSURANCE CORPORATION Notice to All Interested Parties of the Termination of the Receivership of 10375, Signature Bank, Windsor, CO Notice is hereby given that the Federal Deposit Insurance Corporation (``FDIC'') as...

  17. Signatures of gene expression noise in cellular systems Julia Rausenberger a,b,*, Christian Fleck b,c

    E-print Network

    Timmer, Jens

    Review Signatures of gene expression noise in cellular systems Julia Rausenberger a,b,*, Christian t i c l e i n f o Article history: Available online 11 June 2009 Keywords: Gene expression noise Stochastic modeling Transcription factor Population distribution a b s t r a c t Noise in gene expression

  18. Attitudes toward buying online.

    PubMed

    Yang, Bijou; Lester, David

    2004-02-01

    A survey of 11 positive features and 10 discouraging features of online shopping was carried out on 180 students and identified certain behavioral patterns for online shoppers versus non-shoppers. It was found that online shoppers have consistently stronger positive feelings about online shopping than do non-shoppers. On the other hand, non-shoppers have more negative feelings about online shopping than do shoppers, but not consistently so. Online shoppers are aware of some of the discouraging features of online shopping, but these features do not deter them from shopping online. The implication for marketers is that they should focus on making the experience of online shopping more accommodating and more user-friendly since the positive features of online shopping ("convenience" and "efficiency") appear to be more important than the negative features ("effort/impersonality"). PMID:15006173

  19. Face verification across age progression.

    PubMed

    Ramanathan, Narayanan; Chellappa, Rama

    2006-11-01

    Human faces undergo considerable amounts of varialions with aging. While face recognition systems have been proven to be sensitive to factors such as illumination and pose, their sensitivity to facial aging effects is yet to be studied. How does age progression affect the similarity between a pair of face images of an individual? What is the confidence associated with establishing the identity between a pair of age separated face images? In this paper, we develop a Bayesian age difference classifier that classifies face images of individuals based on age differences and performs face verification across age progression. Further, we study the similarity of faces across age progression. Since age separated face images invariably differ in illumination and pose, we propose preprocessing methods for minimizing such variations. Experimental results using a database comprising of pairs of face images that were retrieved from the passports of 465 individuals are presented. The verification system for faces separated by as many as nine years, attains an equal error rate of 8.5%. PMID:17076395

  20. RISKIND verification and benchmark comparisons

    SciTech Connect

    Biwer, B.M.; Arnish, J.J.; Chen, S.Y.; Kamboj, S.

    1997-08-01

    This report presents verification calculations and benchmark comparisons for RISKIND, a computer code designed to estimate potential radiological consequences and health risks to individuals and the population from exposures associated with the transportation of spent nuclear fuel and other radioactive materials. Spreadsheet calculations were performed to verify the proper operation of the major options and calculational steps in RISKIND. The program is unique in that it combines a variety of well-established models into a comprehensive treatment for assessing risks from the transportation of radioactive materials. Benchmark comparisons with other validated codes that incorporate similar models were also performed. For instance, the external gamma and neutron dose rate curves for a shipping package estimated by RISKIND were compared with those estimated by using the RADTRAN 4 code and NUREG-0170 methodology. Atmospheric dispersion of released material and dose estimates from the GENII and CAP88-PC codes. Verification results have shown the program to be performing its intended function correctly. The benchmark results indicate that the predictions made by RISKIND are within acceptable limits when compared with predictions from similar existing models.

  1. Cognitive Bias in Systems Verification

    NASA Technical Reports Server (NTRS)

    Larson, Steve

    2012-01-01

    Working definition of cognitive bias: Patterns by which information is sought and interpreted that can lead to systematic errors in decisions. Cognitive bias is used in diverse fields: Economics, Politics, Intelligence, Marketing, to name a few. Attempts to ground cognitive science in physical characteristics of the cognitive apparatus exceed our knowledge. Studies based on correlations; strict cause and effect is difficult to pinpoint. Effects cited in the paper and discussed here have been replicated many times over, and appear sound. Many biases have been described, but it is still unclear whether they are all distinct. There may only be a handful of fundamental biases, which manifest in various ways. Bias can effect system verification in many ways . Overconfidence -> Questionable decisions to deploy. Availability -> Inability to conceive critical tests. Representativeness -> Overinterpretation of results. Positive Test Strategies -> Confirmation bias. Debiasing at individual level very difficult. The potential effect of bias on the verification process can be managed, but not eliminated. Worth considering at key points in the process.

  2. Video-Based Fingerprint Verification

    PubMed Central

    Qin, Wei; Yin, Yilong; Liu, Lili

    2013-01-01

    Conventional fingerprint verification systems use only static information. In this paper, fingerprint videos, which contain dynamic information, are utilized for verification. Fingerprint videos are acquired by the same capture device that acquires conventional fingerprint images, and the user experience of providing a fingerprint video is the same as that of providing a single impression. After preprocessing and aligning processes, “inside similarity” and “outside similarity” are defined and calculated to take advantage of both dynamic and static information contained in fingerprint videos. Match scores between two matching fingerprint videos are then calculated by combining the two kinds of similarity. Experimental results show that the proposed video-based method leads to a relative reduction of 60 percent in the equal error rate (EER) in comparison to the conventional single impression-based method. We also analyze the time complexity of our method when different combinations of strategies are used. Our method still outperforms the conventional method, even if both methods have the same time complexity. Finally, experimental results demonstrate that the proposed video-based method can lead to better accuracy than the multiple impressions fusion method, and the proposed method has a much lower false acceptance rate (FAR) when the false rejection rate (FRR) is quite low. PMID:24008283

  3. Secure Quantum Signatures Using Insecure Quantum Channels

    E-print Network

    Ryan Amiri; Petros Wallden; Adrian Kent; Erika Andersson

    2015-07-10

    Digital signatures are widely used for authenticity and transferability of messages. Currently used classical schemes have only computational security. We present an unconditionally secure quantum signature scheme where all trust assumptions on the quantum channels are removed, which also has reduced signature size compared to previous quantum schemes. We show that in practice, the noise threshold for out scheme is less strict than for distilling a highly secure key using quantum key distribution. This shows that "direct" quantum signature schemes can be preferable to signature schemes relying on quantum key distribution.

  4. Infrared signature studies of aerospace vehicles

    NASA Astrophysics Data System (ADS)

    Mahulikar, Shripad P.; Sonawane, Hemant R.; Arvind Rao, G.

    2007-10-01

    Infrared (IR) emissions from aircraft are used to detect, track, and lock-on to the target. MAN Portable Air Defence Systems (MANPADS) have emerged as a major cause of aircraft and helicopter loss. Therefore, IR signature studies are important to counter this threat for survivability enhancement, and are an important aspect of stealth technology. This paper reviews contemporary developments in this discipline, with particular emphasis on IR signature prediction from aerospace vehicles. The role of atmosphere in IR signature analysis, and relation between IR signature level and target susceptibility are illustrated. Also, IR signature suppression systems and countermeasure techniques are discussed, to highlight their effectiveness and implications in terms of penalties.

  5. Signatures of a shadow biosphere.

    PubMed

    Davies, Paul C W; Benner, Steven A; Cleland, Carol E; Lineweaver, Charles H; McKay, Christopher P; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere. PMID:19292603

  6. Signatures of a Shadow Biosphere

    NASA Astrophysics Data System (ADS)

    Davies, Paul C. W.; Benner, Steven A.; Cleland, Carol E.; Lineweaver, Charles H.; McKay, Christopher P.; Wolfe-Simon, Felisa

    2009-03-01

    Astrobiologists are aware that extraterrestrial life might differ from known life, and considerable thought has been given to possible signatures associated with weird forms of life on other planets. So far, however, very little attention has been paid to the possibility that our own planet might also host communities of weird life. If life arises readily in Earth-like conditions, as many astrobiologists contend, then it may well have formed many times on Earth itself, which raises the question whether one or more shadow biospheres have existed in the past or still exist today. In this paper, we discuss possible signatures of weird life and outline some simple strategies for seeking evidence of a shadow biosphere.

  7. Polarization signatures of airborne particulates

    NASA Astrophysics Data System (ADS)

    Raman, Prashant; Fuller, Kirk A.; Gregory, Don A.

    2013-07-01

    Exploratory research has been conducted with the aim of completely determining the polarization signatures of selected particulates as a function of wavelength. This may lead to a better understanding of the interaction between electromagnetic radiation and such materials, perhaps leading to the point detection of bio-aerosols present in the atmosphere. To this end, a polarimeter capable of measuring the complete Mueller matrix of highly scattering samples in transmission and reflection (with good spectral resolution from 300 to 1100 nm) has been developed. The polarization properties of Bacillus subtilis (surrogate for anthrax spore) are compared to ambient particulate matter species such as pollen, dust, and soot. Differentiating features in the polarization signatures of these samples have been identified, thus demonstrating the potential applicability of this technique for the detection of bio-aerosol in the ambient atmosphere.

  8. EXAMINING THE ROLE AND RESEARCH CHALLENGES OF SOCIAL MEDIA AS A TOOL FOR NONPROLIFERATION AND ARMS CONTROL TREATY VERIFICATION

    SciTech Connect

    Henry, Michael J.; Cramer, Nicholas O.; Benz, Jacob M.; Gastelum, Zoe N.; Kreyling, Sean J.; West, Curtis L.

    2014-05-13

    Traditional arms control treaty verification activities typically involve a combination of technical measurements via physical and chemical sensors, state declarations, political agreements, and on-site inspections involving international subject matter experts. However, the ubiquity of the internet, and the electronic sharing of data that it enables, has made available a wealth of open source information with the potential to benefit verification efforts. Open source information is already being used by organizations such as the International Atomic Energy Agency to support the verification of state-declared information, prepare inspectors for in-field activities, and to maintain situational awareness . The recent explosion in social media use has opened new doors to exploring the attitudes, moods, and activities around a given topic. Social media platforms, such as Twitter, Facebook, and YouTube, offer an opportunity for individuals, as well as institutions, to participate in a global conversation at minimal cost. Social media data can also provide a more data-rich environment, with text data being augmented with images, videos, and location data. The research described in this paper investigates the utility of applying social media signatures as potential arms control and nonproliferation treaty verification tools and technologies, as determined through a series of case studies. The treaty relevant events that these case studies touch upon include detection of undeclared facilities or activities, determination of unknown events recorded by the International Monitoring System (IMS), and the global media response to the occurrence of an Indian missile launch. The case studies examine how social media can be used to fill an information gap and provide additional confidence to a verification activity. The case studies represent, either directly or through a proxy, instances where social media information may be available that could potentially augment the evaluation of an event. The goal of this paper is to instigate a discussion within the verification community as to where and how social media can be effectively utilized to complement and enhance traditional treaty verification efforts. In addition, this paper seeks to identify areas of future research and development necessary to adapt social media analytic tools and techniques, and to form the seed for social media analytics to aid and inform arms control and nonproliferation policymakers and analysts. While social media analysis (as well as open source analysis as a whole) will not ever be able to replace traditional arms control verification measures, they do supply unique signatures that can augment existing analysis.

  9. Infrared signature generation of airborne targets

    NASA Astrophysics Data System (ADS)

    Whalen, Michael R.

    1993-08-01

    This report proposes a generic methodology for generating infrared signatures of airborne targets. The various issues, assumptions and simplifications utilized in signature studies are outlines to insure baseline consistency among future models and evaluation tools. More specifically, the target is characterized on a component level, and the at-aperture signature is generated by the correct inclusion of atmospheric transmission. While the technique and general concepts may apply to all airborne targets, this study places emphasis on cruise missiles and related targets due to their low contrast. For these targets, the background signature becomes more important as both the emitted target radiance and the reflected background radiance contribute to the overall signature. Example target signatures generated using the proposed methodology will be presented following the discussion of signature modeling.

  10. A new quantum blind signature with unlinkability

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhang, Jian-Biao; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-08-01

    Recently, some quantum blind signature protocols have been proposed. However, the previous schemes cannot satisfy the unlinkability requirement. To overcome the drawback of unlinkability in the previous schemes, we propose a new quantum blind signature based on Bell states with the help of an authentic party. In this paper, we provide a method to inject a randomizing factor into a message when it is signed by the signer and then get rid of the blind factor from the blinded signature when it is verified by the verifier. Even when the message owner publishes the message-signature pair, the signer cannot identify the association between the message-signature pair and the blind signature he generated. Therefore, our scheme really realizes unlinkability property. At last, analysis results show that this scheme satisfies the basis security requirements of a weak signature such as no-counterfeiting, no-disavowing, blindness and traceability, and our total efficiency is not less than the previous schemes.

  11. Competition on Software Verification University of Passau, Germany

    E-print Network

    Beyer, Dirk

    Competition on Software Verification (SV-COMP) Dirk Beyer University of Passau, Germany Abstract Competition on Software Verification. The verification community has performed competitions in various areas in the past, and SV-COMP'12 is the first competition of verification tools that take software programs

  12. Health Services Queen's University Policy on Verification of Illness

    E-print Network

    Fletcher, Robin

    Health Services Queen's University Policy on Verification of Illness Health Counselling and Disability Services (HCDS) first developed a policy on issuing Verification of Illness (VOI) documentation Verification of Illness ("sick notes") 1. A "Verification of Illness" should only be required in situations

  13. Automated UF6 Cylinder Enrichment Assay: Status of the Hybrid Enrichment Verification Array (HEVA) Project: POTAS Phase II

    SciTech Connect

    Jordan, David V.; Orton, Christopher R.; Mace, Emily K.; McDonald, Benjamin S.; Kulisek, Jonathan A.; Smith, Leon E.

    2012-06-01

    Pacific Northwest National Laboratory (PNNL) intends to automate the UF6 cylinder nondestructive assay (NDA) verification currently performed by the International Atomic Energy Agency (IAEA) at enrichment plants. PNNL is proposing the installation of a portal monitor at a key measurement point to positively identify each cylinder, measure its mass and enrichment, store the data along with operator inputs in a secure database, and maintain continuity of knowledge on measured cylinders until inspector arrival. This report summarizes the status of the research and development of an enrichment assay methodology supporting the cylinder verification concept. The enrichment assay approach exploits a hybrid of two passively-detected ionizing-radiation signatures: the traditional enrichment meter signature (186-keV photon peak area) and a non-traditional signature, manifested in the high-energy (3 to 8 MeV) gamma-ray continuum, generated by neutron emission from UF6. PNNL has designed, fabricated, and field-tested several prototype assay sensor packages in an effort to demonstrate proof-of-principle for the hybrid assay approach, quantify the expected assay precision for various categories of cylinder contents, and assess the potential for unsupervised deployment of the technology in a portal-monitor form factor. We refer to recent sensor-package prototypes as the Hybrid Enrichment Verification Array (HEVA). The report provides an overview of the assay signatures and summarizes the results of several HEVA field measurement campaigns on populations of Type 30B UF6 cylinders containing low-enriched uranium (LEU), natural uranium (NU), and depleted uranium (DU). Approaches to performance optimization of the assay technique via radiation transport modeling are briefly described, as are spectroscopic and data-analysis algorithms.

  14. Requirements, Verification, and Compliance (RVC) Database Tool

    NASA Technical Reports Server (NTRS)

    Rainwater, Neil E., II; McDuffee, Patrick B.; Thomas, L. Dale

    2001-01-01

    This paper describes the development, design, and implementation of the Requirements, Verification, and Compliance (RVC) database used on the International Space Welding Experiment (ISWE) project managed at Marshall Space Flight Center. The RVC is a systems engineer's tool for automating and managing the following information: requirements; requirements traceability; verification requirements; verification planning; verification success criteria; and compliance status. This information normally contained within documents (e.g. specifications, plans) is contained in an electronic database that allows the project team members to access, query, and status the requirements, verification, and compliance information from their individual desktop computers. Using commercial-off-the-shelf (COTS) database software that contains networking capabilities, the RVC was developed not only with cost savings in mind but primarily for the purpose of providing a more efficient and effective automated method of maintaining and distributing the systems engineering information. In addition, the RVC approach provides the systems engineer the capability to develop and tailor various reports containing the requirements, verification, and compliance information that meets the needs of the project team members. The automated approach of the RVC for capturing and distributing the information improves the productivity of the systems engineer by allowing that person to concentrate more on the job of developing good requirements and verification programs and not on the effort of being a "document developer".

  15. Physical description of nuclear materials identification system (NMIS) signatures

    NASA Astrophysics Data System (ADS)

    Mihalczo, J. T.; Mullens, J. A.; Mattingly, J. K.; Valentine, T. E.

    2000-08-01

    This paper describes all time and frequency analysis parameters measured with a new correlation processor (capability up to 1 GHz sampling rates and up to five input data channels) for three input channels: (1) the 252Cf source ionization chamber; (2) a detection channel; and (3) a second detection channel. An intuitive and physical description of the various measured quantities is given as well as a brief mathematical description and a brief description of how the data are acquired. If the full five-channel capability is used, the number of measured quantities increases in number but not in type. The parameters provided by this new processor can be divided into two general classes: time analysis signatures and their related frequency analysis signatures. The time analysis signatures include the number of time m pulses occurs in a time interval, that is triggered randomly, upon a detection event, or upon a source fission event triggered. From the number of pulses in a time interval, the moments, factorial moments, and Feynmann variance can be obtained. Recent implementations of third- and fourth-order time and frequency analysis signatures in this processor are also briefly described. Thus, this processor used with a timed source of input neutrons contains all of the information from a pulsed neutron measurement, one and two detector Rossi- ? measurements, multiplicity measurements, and third- and fourth-order correlation functions. This processor, although originally designed for active measurements with a 252Cf interrogating source, has been successfully used passively (without 252Cf source) for systems with inherent neutron sources such as fissile systems of plutonium. Data from active measurements with an 18.75 kg highly enriched uranium (93.2 wt%, 235U) metal casting for storage are presented to illustrate some of the various time and frequency analysis parameters. This processor, which is a five-channel time correlation analyzer with time channel widths as small as 1 ns, was developed at the Oak Ridge National Laboratory and the Oak Ridge Y-12 Plant where it is in use for verification and confirmation of weapons components and other fissile materials in storage and for receipts from other Department of Energy and Department of Defense Facilities.

  16. Gender verification of female athletes.

    PubMed

    Elsas, L J; Ljungqvist, A; Ferguson-Smith, M A; Simpson, J L; Genel, M; Carlson, A S; Ferris, E; de la Chapelle, A; Ehrhardt, A A

    2000-01-01

    The International Olympic Committee (IOC) officially mandated gender verification for female athletes beginning in 1968 and continuing through 1998. The rationale was to prevent masquerading males and women with "unfair, male-like" physical advantage from competing in female-only events. Visual observation and gynecological examination had been tried on a trial basis for two years at some competitions leading up to the 1968 Olympic Games, but these invasive and demeaning processes were jettisoned in favor of laboratory-based genetic tests. Sex chromatin and more recently DNA analyses for Y-specific male material were then required of all female athletes immediately preceding IOC-sanctioned sporting events, and many other international and national competitions following the IOC model. On-site gender verification has since been found to be highly discriminatory, and the cause of emotional trauma and social stigmatization for many females with problems of intersex who have been screened out from competition. Despite compelling evidence for the lack of scientific merit for chromosome-based screening for gender, as well as its functional and ethical inconsistencies, the IOC persisted in its policy for 30 years. The coauthors of this manuscript have worked with some success to rescind this policy through educating athletes and sports governors regarding the psychological and physical nature of sexual differentiation, and the inequities of genetic sex testing. In 1990, the International Amateur Athletics Federation (IAAF) called for abandonment of required genetic screening of women athletes, and by 1992 had adopted a fairer, medically justifiable model for preventing only male "impostors" in international track and field. At the recent recommendation of the IOC Athletes Commission, the Executive Board of the IOC has finally recognized the medical and functional inconsistencies and undue costs of chromosome-based methods. In 1999, the IOC ratified the abandonment of on-site genetic screening of females at the next Olympic Games in Australia. This article reviews the history and rationales for fairness in female-only sports that have led to the rise and fall of on-site, chromosome-based gender verification at international sporting events. PMID:11252710

  17. Specificity in ROS Signaling and Transcript Signatures

    PubMed Central

    Vaahtera, Lauri; Brosché, Mikael; Wrzaczek, Michael

    2014-01-01

    Abstract Significance: Reactive oxygen species (ROS), important signaling molecules in plants, are involved in developmental control and stress adaptation. ROS production can trigger broad transcriptional changes; however, it is not clear how specificity in transcriptional regulation is achieved. Recent Advances: A large collection of public transcriptome data from the model plant Arabidopsis thaliana is available for analysis. These data can be used for the analysis of biological processes that are associated with ROS signaling and for the identification of suitable transcriptional indicators. Several online tools, such as Genevestigator and Expression Angler, have simplified the task to analyze, interpret, and visualize this wealth of data. Critical Issues: The analysis of the exact transcriptional responses to ROS requires the production of specific ROS in distinct subcellular compartments with precise timing, which is experimentally difficult. Analyses are further complicated by the effect of ROS production in one subcellular location on the ROS accumulation in other compartments. In addition, even subtle differences in the method of ROS production or treatment can lead to significantly different outcomes when various stimuli are compared. Future Directions: Due to the difficulty of inducing ROS production specifically with regard to ROS type, subcellular localization, and timing, we propose that the concept of a “ROS marker gene” should be re-evaluated. We suggest guidelines for the analysis of transcriptional data in ROS signaling. The use of “ROS signatures,” which consist of a set of genes that together can show characteristic and indicative responses, should be preferred over the use of individual marker genes. Antioxid. Redox Signal. 21, 1422–1441. PMID:24180661

  18. Verification of NBS class 4 transport protocol

    NASA Astrophysics Data System (ADS)

    Sidhu, D. P.; Blumer, T. P.

    1986-08-01

    This paper discusses the verification of the connection management aspects of a transport layer protocol available from the National Bureau of Standards. An automated protocol development technique is used to verify a subset of the protocol with respect to the protocol properties of completeness, deadlock freeness, boundedness, and termination. The analysis points out several error situations in which the completeness property does not hold for the protocol. An overview of the protocol development technique used in specification and verification of the protocol is given, the transport layer protocol is described, and the results obtained by applying the automated verification technique to this protocol are presented.

  19. Liquefied Natural Gas (LNG) dispenser verification device

    NASA Astrophysics Data System (ADS)

    Xiong, Maotao; Yang, Jie-bin; Zhao, Pu-jun; Yu, Bo; Deng, Wan-quan

    2013-01-01

    The composition of working principle and calibration status of LNG (Liquefied Natural Gas) dispenser in China are introduced. According to the defect of weighing method in the calibration of LNG dispenser, LNG dispenser verification device has been researched. The verification device bases on the master meter method to verify LNG dispenser in the field. The experimental results of the device indicate it has steady performance, high accuracy level and flexible construction, and it reaches the international advanced level. Then LNG dispenser verification device will promote the development of LNG dispenser industry in China and to improve the technical level of LNG dispenser manufacture.

  20. 75 FR 42575 - Electronic Signature and Storage of Form I-9, Employment Eligibility Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-22

    ...Employers may change electronic storage systems as...organizations involved in human resource management and modifies...records maintained in an electronic storage system...United States with the resources (e.g., appropriate...Ensure that whenever the electronic record is...

  1. Off-line signature verification: a comparison between human and machine performance

    E-print Network

    Herbst, Ben

    financial benefits that the automatic clearing of cheques will have for the ban- king industry. Banks still as to make the adoption of such a system economically viable. We recently developed an HMM-based off-line sig of previous work. (2) Our system is computationally efficient. This makes the adoption of our system econom

  2. KAT-7 Science Verification Highlights

    NASA Astrophysics Data System (ADS)

    Lucero, Danielle M.; Carignan, Claude; KAT-7 Science Data; Processing Team, KAT-7 Science Commissioning Team

    2015-01-01

    KAT-7 is a pathfinder of the Square Kilometer Array precursor MeerKAT, which is under construction. Its short baselines and low system temperature make it sensitive to large scale, low surface brightness emission. This makes it an ideal instrument to use in searches for faint extended radio emission and low surface density extraplanar gas. We present an update on the progress of several such ongoing KAT-7 science verification projects. These include a large scale radio continuum and polarization survey of the Galactic Center, deep HI observations (100+ hours) of nearby disk galaxies (e.g. NGC253 and NGC3109), and targeted searches for HI tidal tails in galaxy groups (e.g. IC1459). A brief status update for MeerKAT will also be presented if time permits.

  3. NUMERICAL VERIFICATION OF EQUILIBRIUM CHEMISTRY

    SciTech Connect

    Piro, Markus; Lewis, Brent; Thompson, Dr. William T.; Simunovic, Srdjan; Besmann, Theodore M

    2010-01-01

    A numerical tool is in an advanced state of development to compute the equilibrium compositions of phases and their proportions in multi-component systems of importance to the nuclear industry. The resulting software is being conceived for direct integration into large multi-physics fuel performance codes, particularly for providing boundary conditions in heat and mass transport modules. However, any numerical errors produced in equilibrium chemistry computations will be propagated in subsequent heat and mass transport calculations, thus falsely predicting nuclear fuel behaviour. The necessity for a reliable method to numerically verify chemical equilibrium computations is emphasized by the requirement to handle the very large number of elements necessary to capture the entire fission product inventory. A simple, reliable and comprehensive numerical verification method is presented which can be invoked by any equilibrium chemistry solver for quality assurance purposes.

  4. Verification of FANTASTIC integrated code

    NASA Technical Reports Server (NTRS)

    Chauhan, Rajinder Singh

    1987-01-01

    FANTASTIC is an acronym for Failure Analysis Nonlinear Thermal and Structural Integrated Code. This program was developed by Failure Analysis Associates, Palo Alto, Calif., for MSFC to improve the accuracy of solid rocket motor nozzle analysis. FANTASTIC has three modules: FACT - thermochemical analysis; FAHT - heat transfer analysis; and FAST - structural analysis. All modules have keywords for data input. Work is in progress for the verification of the FAHT module, which is done by using data for various problems with known solutions as inputs to the FAHT module. The information obtained is used to identify problem areas of the code and passed on to the developer for debugging purposes. Failure Analysis Associates have revised the first version of the FANTASTIC code and a new improved version has been released to the Thermal Systems Branch.

  5. Verification of NASA Emergent Systems

    NASA Technical Reports Server (NTRS)

    Rouff, Christopher; Vanderbilt, Amy K. C. S.; Truszkowski, Walt; Rash, James; Hinchey, Mike

    2004-01-01

    NASA is studying advanced technologies for a future robotic exploration mission to the asteroid belt. This mission, the prospective ANTS (Autonomous Nano Technology Swarm) mission, will comprise of 1,000 autonomous robotic agents designed to cooperate in asteroid exploration. The emergent properties of swarm type missions make them powerful, but at the same time are more difficult to design and assure that the proper behaviors will emerge. We are currently investigating formal methods and techniques for verification and validation of future swarm-based missions. The advantage of using formal methods is their ability to mathematically assure the behavior of a swarm, emergent or otherwise. The ANT mission is being used as an example and case study for swarm-based missions for which to experiment and test current formal methods with intelligent swam. Using the ANTS mission, we have evaluated multiple formal methods to determine their effectiveness in modeling and assuring swarm behavior.

  6. A prospective evaluation of a breast cancer prognosis signature in the observational RASTER study

    PubMed Central

    Drukker, CA; Bueno-de-Mesquita, JM; Retèl, VP; van Harten, WH; van Tinteren, H; Wesseling, J; Roumen, RMH; Knauer, M; van 't Veer, LJ; Sonke, GS; Rutgers, EJT; van de Vijver, MJ; Linn, SC

    2013-01-01

    The 70-gene signature (MammaPrint™) has been developed on retrospective series of breast cancer patients to predict the risk of breast cancer distant metastases. The microarRAy-prognoSTics-in-breast-cancER (RASTER) study was the first study designed to prospectively evaluate the performance of the 70-gene signature, which result was available for 427 patients (cT1–3N0M0). Adjuvant systemic treatment decisions were based on the Dutch CBO 2004 guidelines, the 70-gene signature and doctors' and patients' preferences. Five-year distant-recurrence-free-interval (DRFI) probabilities were compared between subgroups based on the 70-gene signature and Adjuvant! Online (AOL) (10-year survival probability <90% was defined as high-risk). Median follow-up was 61.6 months. Fifteen percent (33/219) of the 70-gene signature low-risk patients received adjuvant chemotherapy (ACT) versus 81% (169/208) of the 70-gene signature high-risk patients. The 5-year DRFI probabilities for 70-gene signature low-risk (n = 219) and high-risk (n = 208) patients were 97.0% and 91.7%. The 5-year DRFI probabilities for AOL low-risk (n = 132) and high-risk (n = 295) patients were 96.7% and 93.4%. For 70-gene signature low-risk–AOL high-risk patients (n = 124), of whom 76% (n = 94) had not received ACT, 5-year DRFI was 98.4%. In the AOL high-risk group, 32% (94/295) less patients would be eligible to receive ACT if the 70-gene signature was used. In this prospective community-based observational study, the 5-year DRFI probabilities confirmed the additional prognostic value of the 70-gene signature to clinicopathological risk estimations such as AOL. Omission of adjuvant chemotherapy as judged appropriate by doctors and patients and instigated by a low-risk 70-gene signature result, appeared not to compromise outcome. PMID:23371464

  7. Analytics for online markets

    E-print Network

    Johnson, Kris (Kris Dianne)

    2015-01-01

    Online markets are becoming increasingly important in today's world as more people gain access to the internet. Furthermore, the explosion of data that is collected via these online markets provides us with new opportunities ...

  8. TOXLINE (TOXICOLOGY INFORMATION ONLINE)

    EPA Science Inventory

    TOXLINE? (TOXicology information onLINE) are the National Library of Medicines extensive collection of online bibliographic information covering the pharmacological, biochemical, physiological, and toxicological effects of drugs and other chemicals. TOXLINE and TOXLINE65 together...

  9. The Online Underworld.

    ERIC Educational Resources Information Center

    Scrogan, Len

    1988-01-01

    Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)

  10. The PASCAL-HDM Verification System

    NASA Technical Reports Server (NTRS)

    1983-01-01

    The PASCAL-HDM verification system is described. This system supports the mechanical generation of verification conditions from PASCAL programs and HDM-SPECIAL specifications using the Floyd-Hoare axiomatic method. Tools are provided to parse programs and specifications, check their static semantics, generate verification conditions from Hoare rules, and translate the verification conditions appropriately for proof using the Shostak Theorem Prover, are explained. The differences between standard PASCAL and the language handled by this system are explained. This consists mostly of restrictions to the standard language definition, the only extensions or modifications being the addition of specifications to the code and the change requiring the references to a function of no arguments to have empty parentheses.

  11. ETV - ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) - RISK MANAGEMENT

    EPA Science Inventory

    In October 1995, the Environmental Technology Verification (ETV) Program was established by EPA. The goal of ETV is to provide credible performance data for commercial-ready environmental technologies to speed their implementation for the benefit of vendors, purchasers, permitter...

  12. Environmental Technology Verification Program (ETV) Policy Compendium

    EPA Science Inventory

    The Policy Compendium summarizes operational decisions made to date by participants in the U.S. Environmental Protection Agency's (EPA's) Environmental Technology Verification Program (ETV) to encourage consistency among the ETV centers. The policies contained herein evolved fro...

  13. A relational framework for bounded program verification

    E-print Network

    Dennis, Gregory D. (Gregory David), 1980-

    2009-01-01

    All software verification techniques, from theorem proving to testing, share the common goal of establishing a program's correctness with both (1) a high degree of confidence and (2) a low cost to the user, two criteria ...

  14. DIMENSIONS IN CM.1. QUALITY VERIFICATION

    E-print Network

    McDonald, Kirk

    .00 1563.00 1943.00 201.68 NOTES DIMENSIONS IN CM.1. QUALITY VERIFICATION REQUIREMENTS DOCUMENTS MATERIAL MILL TEST REPORT LEAK TEST REPORT CLEANING CERT WELD / BRAZE INSPECTION REPORT HEAT TREAT REPORT

  15. Proof Planning for Automating Hardware Verification 

    E-print Network

    Cantu-Ortiz, Francisco Javier

    In this thesis we investigate the applicability of proof planning to automate the verification of hardware systems. Proof planning is a meta-level reasoning technique which captures patterns of proof common to a family of ...

  16. Alternative Breaks Emergency Contact & Verification of Medical

    E-print Network

    Tipple, Brett

    Alternative Breaks Emergency Contact & Verification of Medical Insurance Form Participant Name: ___________________________ Emergency Contact/Medical Info Please list any allergies, medical conditions or medications you of Utah policy. Do you have personal medical health insurance? Yes No If Yes: I

  17. SVMSVM: Support vector machine speaker verification methodology. 

    E-print Network

    Wan, Vincent; Renals, Steve

    2003-01-01

    Support vector machines with the Fisher and score-space kernels are used for text independent speaker verification to provide direct q discrimination between complete utterances. This is unlike approaches such as discriminatively trained Gaussian...

  18. ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM: FUEL CELLS

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) Environmental Technology Verification (ETV) Program evaluates the performance of innovative air, water, pollution prevention and monitoring technologies that have the potential to improve human health and the environment. This techno...

  19. VERIFICATION OF GLOBAL CLIMATE CHANGE MITIGATION TECHNOLOGIES

    EPA Science Inventory

    This is a continuation of independent performance evaluations of environmental technologies under EPA's Environmental Technology Verification Program. Emissions of some greenhouse gases, most notably methane. can be controlled profitably now, even in the absence of regulations. ...

  20. HDM/PASCAL Verification System User's Manual

    NASA Technical Reports Server (NTRS)

    Hare, D.

    1983-01-01

    The HDM/Pascal verification system is a tool for proving the correctness of programs written in PASCAL and specified in the Hierarchical Development Methodology (HDM). This document assumes an understanding of PASCAL, HDM, program verification, and the STP system. The steps toward verification which this tool provides are parsing programs and specifications, checking the static semantics, and generating verification conditions. Some support functions are provided such as maintaining a data base, status management, and editing. The system runs under the TOPS-20 and TENEX operating systems and is written in INTERLISP. However, no knowledge is assumed of these operating systems or of INTERLISP. The system requires three executable files, HDMVCG, PARSE, and STP. Optionally, the editor EMACS should be on the system in order for the editor to work. The file HDMVCG is invoked to run the system. The files PARSE and STP are used as lower forks to perform the functions of parsing and proving.

  1. MAMA Software Features: Quantification Verification Documentation-1

    SciTech Connect

    Ruggiero, Christy E.; Porter, Reid B.

    2014-05-21

    This document reviews the verification of the basic shape quantification attributes in the MAMA software against hand calculations in order to show that the calculations are implemented mathematically correctly and give the expected quantification results.

  2. Runtime verification of object lifetime specifications

    E-print Network

    Benjamin, Zev (Zev A.)

    2009-01-01

    This thesis reports on the implementation of a runtime verification system for object lifetime specifications. This system is used to explore and evaluate the expressiveness object lifetime specifications. Object lifetime ...

  3. 40 CFR 1066.220 - Linearity verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...correlation with previous measurements or the influence of hysteresis; you may select reference values in ascending or descending...then descend to incorporate the effects of any instrument hysteresis into the linearity verification. (8) Set the...

  4. 40 CFR 1066.220 - Linearity verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...correlation with previous measurements or the influence of hysteresis; you may select reference values in ascending or descending...then descend to incorporate the effects of any instrument hysteresis into the linearity verification. (8) Set the...

  5. Infrared signatures for remote sensing

    SciTech Connect

    McDowell, R.S.; Sharpe, S.W.; Kelly, J.F.

    1994-04-01

    PNL`s capabilities for infrared and near-infrared spectroscopy include tunable-diode-laser (TDL) systems covering 300--3,000 cm{sup {minus}1} at <10-MHz bandwidth; a Bruker Fourier-transform infrared (FTIR) spectrometer for the near- to far-infrared at 50-MHz resolution; and a stable line-tunable, 12-w cw CO{sub 2} laser. PNL also has a beam expansion source with a 12-cm slit, which provides a 3-m effective path for gases at {approximately}10 K, giving a Doppler width of typically 10 MHz; and long-path static gas cells (to 100 m). In applying this equipment to signatures work, the authors emphasize the importance of high spectral resolution for detecting and identifying atmospheric interferences; for identifying the optimum analytical frequencies; for deriving, by spectroscopic analysis, the molecular parameters needed for modeling; and for obtaining data on species and/or bands that are not in existing databases. As an example of such spectroscopy, the authors have assigned and analyzed the C-Cl stretching region of CCl{sub 4} at 770--800 cm{sup {minus}1}. This is an important potential signature species whose IR absorption has remained puzzling because of the natural isotopic mix, extensive hot-band structure, and a Fermi resonance involving a nearby combination band. Instrument development projects include the IR sniffer, a small high-sensitivity, high-discrimination (Doppler-limited) device for fence-line or downwind monitoring that is effective even in regions of atmospheric absorption; preliminary work has achieved sensitivities at the low-ppb level. Other work covers trace species detection with TDLs, and FM-modulated CO{sub 2} laser LIDAR. The authors are planning a field experiment to interrogate the Hanford tank farm for signature species from Rattlesnake Mountain, a standoff of ca. 15 km, to be accompanied by simultaneous ground-truthing at the tanks.

  6. Towards Trustable Digital Evidence with PKIDEV: PKI Based Digital Evidence Verification Model

    NASA Astrophysics Data System (ADS)

    Uzunay, Yusuf; Incebacak, Davut; Bicakci, Kemal

    How to Capture and Preserve Digital Evidence Securely? For the investigation and prosecution of criminal activities that involve computers, digital evidence collected in the crime scene has a vital importance. On one side, it is a very challenging task for forensics professionals to collect them without any loss or damage. On the other, there is the second problem of providing the integrity and authenticity in order to achieve legal acceptance in a court of law. By conceiving digital evidence simply as one instance of digital data, it is evident that modern cryptography offers elegant solutions for this second problem. However, to our knowledge, there is not any previous work proposing a systematic model having a holistic view to address all the related security problems in this particular case of digital evidence verification. In this paper, we present PKIDEV (Public Key Infrastructure based Digital Evidence Verification model) as an integrated solution to provide security for the process of capturing and preserving digital evidence. PKIDEV employs, inter alia, cryptographic techniques like digital signatures and secure time-stamping as well as latest technologies such as GPS and EDGE. In our study, we also identify the problems public-key cryptography brings when it is applied to the verification of digital evidence.

  7. Quantum signatures of Chimera states

    E-print Network

    V. M. Bastidas; I. Omelchenko; A. Zakharova; E. Schöll; T. Brandes

    2015-05-11

    Chimera states are complex spatiotemporal patterns in networks of identical oscillators, characterized by the coexistence of synchronized and desynchronized dynamics. Here we propose to extend the phenomenon of chimera states to the quantum regime, and uncover intriguing quantum signatures of these states. We calculate the quantum fluctuations about semiclassical trajectories and demonstrate that chimera states in the quantum regime can be characterized by bosonic squeezing, weighted quantum correlations, and measures of mutual information. Our findings reveal the relation of chimera states to quantum information theory, and give promising directions for experimental realization of chimera states in quantum systems.

  8. Observational Signatures of Magnetic Reconnection

    NASA Technical Reports Server (NTRS)

    Savage, Sabrina

    2014-01-01

    Magnetic reconnection is often referred to as the primary source of energy release during solar flares. Directly observing reconnection occurring in the solar atmosphere, however, is not trivial considering that the scale size of the diffusion region is magnitudes smaller than the observational capabilities of current instrumentation, and coronal magnetic field measurements are not currently sufficient to capture the process. Therefore, predicting and studying observationally feasible signatures of the precursors and consequences of reconnection is necessary for guiding and verifying the simulations that dominate our understanding. I will present a set of such observations, particularly in connection with long-duration solar events, and compare them with recent simulations and theoretical predictions.

  9. A verification library for multibody simulation software

    NASA Technical Reports Server (NTRS)

    Kim, Sung-Soo; Haug, Edward J.; Frisch, Harold P.

    1989-01-01

    A multibody dynamics verification library, that maintains and manages test and validation data is proposed, based on RRC Robot arm and CASE backhoe validation and a comparitive study of DADS, DISCOS, and CONTOPS that are existing public domain and commercial multibody dynamic simulation programs. Using simple representative problems, simulation results from each program are cross checked, and the validation results are presented. Functionalities of the verification library are defined, in order to automate validation procedure.

  10. Handbook: Design of automated redundancy verification

    NASA Technical Reports Server (NTRS)

    Ford, F. A.; Hasslinger, T. W.; Moreno, F. J.

    1971-01-01

    The use of the handbook is discussed and the design progress is reviewed. A description of the problem is presented, and examples are given to illustrate the necessity for redundancy verification, along with the types of situations to which it is typically applied. Reusable space vehicles, such as the space shuttle, are recognized as being significant in the development of the automated redundancy verification problem.

  11. GRIMHX verification and validation summary report

    SciTech Connect

    Crowe, R.D.; Toffer, H.; Turmble, E.F.

    1991-12-01

    As part of the software quality assurance requirements, the reactor analyses codes used for the calculation of key reactor operating and safety parameters require formal verification and validation. The GRIMHX code is used in such applications; this document summarizes the past efforts in this area and combines them with recent new analyses performed by WSRC and Westinghouse Hanford Company (WHC). As such, this document is the most up-to-date compilation of verification and validation information pertaining to the GRIMHX code.

  12. The reduced frequency unannounced verification model

    SciTech Connect

    Canty, M.J.; Stein, G. ); Avenhaus, R. )

    1988-01-01

    The quantification of inspection randomization models within the context of international safeguards is extended to include the possibility of false alarms associated with measurement errors. Results are used to refine a fuel cycle approach based on randomization of verification across nuclear facilities (the reduced frequency unannounced verification model). Earlier conclusions regarding the usefulness of the model as a means to conserve inspection resources and to reduce safeguards intrusiveness are confirmed.

  13. Signature Product Code for Predicting Protein-Protein Interactions

    Energy Science and Technology Software Center (ESTSC)

    2004-09-25

    The SigProdV1.0 software consists of four programs which together allow the prediction of protein-protein interactions using only amino acid sequences and experimental data. The software is based on the use of tensor products of amino acid trimers coupled with classifiers known as support vector machines. Essentially the program looks for amino acid trimer pairs which occur more frequently in protein pairs which are known to interact. These trimer pairs are then used to make predictionsmore »about unknown protein pairs. A detailed description of the method can be found in the paper: S. Martin, D. Roe, J.L. Faulon. "Predicting protein-protein interactions using signature products," Bioinformatics, available online from Advance Access, Aug. 19, 2004.« less

  14. Signature Product Code for Predicting Protein-Protein Interactions

    SciTech Connect

    2004-09-25

    The SigProdV1.0 software consists of four programs which together allow the prediction of protein-protein interactions using only amino acid sequences and experimental data. The software is based on the use of tensor products of amino acid trimers coupled with classifiers known as support vector machines. Essentially the program looks for amino acid trimer pairs which occur more frequently in protein pairs which are known to interact. These trimer pairs are then used to make predictions about unknown protein pairs. A detailed description of the method can be found in the paper: S. Martin, D. Roe, J.L. Faulon. "Predicting protein-protein interactions using signature products," Bioinformatics, available online from Advance Access, Aug. 19, 2004.

  15. Research towards a systematic signature discovery process

    SciTech Connect

    Baker, Nathan A.; Barr, Jonathan L.; Bonheyo, George T.; Joslyn, Cliff A.; Krishnaswami, Kannan; Oxley, Mark; Quadrel, Richard W.; Sego, Landon H.; Tardiff, Mark F.; Wynne, Adam S.

    2013-06-04

    In its most general form, a signature is a unique or distinguishing measurement, pattern, or collection of data that identifies a phenomenon (object, action, or behavior) of interest. The discovery of signatures is an important aspect of a wide range of disciplines from basic science to national security for the rapid and efficient detection and/or prediction of phenomena. Current practice in signature discovery is typically accomplished by asking domain experts to characterize and/or model individual phenomena to identify what might compose a useful signature. What is lacking is an approach that can be applied across a broad spectrum of domains and information sources to efficiently and robustly construct candidate signatures, validate their reliability, measure their quality, and overcome the challenge of detection -- all in the face of dynamic conditions, measurement obfuscation and noisy data environments. Our research has focused on the identification of common elements of signature discovery across application domains and the synthesis of those elements into a systematic process for more robust and efficient signature development. In this way, a systematic signature discovery process lays the groundwork for leveraging knowledge obtained from signatures to a particular domain or problem area, and, more generally, to problems outside that domain. This paper presents the initial results of this research by discussing a mathematical framework for representing signatures and placing that framework in the context of a systematic signature discovery process. Additionally, the basic steps of this process are described with details about the methods available to support the different stages of signature discovery, development, and deployment.

  16. Implementing Online Physical Education

    ERIC Educational Resources Information Center

    Mohnsen, Bonnie

    2012-01-01

    Online physical education, although seemingly an oxymoron, appears to be the wave of the future at least for some students. The purpose of this article is to explore research and options for online learning in physical education and to examine a curriculum, assessment, and instructional model for online learning. The article examines how physical…

  17. Developing Online Doctoral Programmes

    ERIC Educational Resources Information Center

    Chipere, Ngoni

    2015-01-01

    The objectives of the study were to identify best practices in online doctoral programming and to synthesise these practices into a framework for developing online doctoral programmes. The field of online doctoral studies is nascent and presents challenges for conventional forms of literature review. The literature was therefore reviewed using a…

  18. Assessing Online Learning

    ERIC Educational Resources Information Center

    Comeaux, Patricia, Ed.

    2004-01-01

    Students in traditional as well as online classrooms need more than grades from their instructors--they also need meaningful feedback to help bridge their academic knowledge and skills with their daily lives. With the increasing number of online learning classrooms, the question of how to consistently assess online learning has become increasingly…

  19. Verification and Validation in Computational Fluid Dynamics

    SciTech Connect

    OBERKAMPF, WILLIAM L.; TRUCANO, TIMOTHY G.

    2002-03-01

    Verification and validation (V and V) are the primary means to assess accuracy and reliability in computational simulations. This paper presents an extensive review of the literature in V and V in computational fluid dynamics (CFD), discusses methods and procedures for assessing V and V, and develops a number of extensions to existing ideas. The review of the development of V and V terminology and methodology points out the contributions from members of the operations research, statistics, and CFD communities. Fundamental issues in V and V are addressed, such as code verification versus solution verification, model validation versus solution validation, the distinction between error and uncertainty, conceptual sources of error and uncertainty, and the relationship between validation and prediction. The fundamental strategy of verification is the identification and quantification of errors in the computational model and its solution. In verification activities, the accuracy of a computational solution is primarily measured relative to two types of highly accurate solutions: analytical solutions and highly accurate numerical solutions. Methods for determining the accuracy of numerical solutions are presented and the importance of software testing during verification activities is emphasized.

  20. The Internet and clinical trials: background, online resources, examples and issues. | accrualnet.cancer.gov

    Cancer.gov

    The Internet is increasingly being used to improve clinical trial knowledge and awareness and facilitate participant recruitment. Online clinical trial registries connect potential clinical trial participants with research teams. Individual clinical trial Web sites provide easy-to-understand information to the public. Potential participants can be screened using online questionnaires, and enrollment and consent forms can be made available for download or digital signature.

  1. Novel Quantum Proxy Signature without Entanglement

    NASA Astrophysics Data System (ADS)

    Xu, Guang-bao

    2015-08-01

    Proxy signature is an important research topic in classic cryptography since it has many application occasions in our real life. But only a few quantum proxy signature schemes have been proposed up to now. In this paper, we propose a quantum proxy signature scheme, which is designed based on quantum one-time pad. Our scheme can be realized easily since it only uses single-particle states. Security analysis shows that it is secure and meets all the properties of a proxy signature, such as verifiability, distinguishability, unforgeability and undeniability.

  2. Secure Obfuscation for Encrypted Group Signatures

    PubMed Central

    Fan, Hongfei; Liu, Qin

    2015-01-01

    In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686

  3. Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures

    E-print Network

    International Association for Cryptologic Research (IACR)

    -Verifier Signatures Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk Dept. of Computing, Macquarie University, Australia of this fact, because the verifier's secret key allows him to forge the designated-verifier signatures without

  4. Online Monitoring of Plant Assets in the Nuclear Industry

    SciTech Connect

    Nancy Lybeck; Vivek Agarwal; Binh Pham; Richard Rusaw; Randy Bickford

    2013-10-01

    Today’s online monitoring technologies provide opportunities to perform predictive and proactive health management of assets within many different industries, in particular the defense and aerospace industries. The nuclear industry can leverage these technologies to enhance safety, productivity, and reliability of the aging fleet of existing nuclear power plants. The U.S. Department of Energy’s Light Water Reactor Sustainability Program is collaborating with the Electric Power Research Institute’s (EPRI’s) Long-Term Operations program to implement online monitoring in existing nuclear power plants. Proactive online monitoring in the nuclear industry is being explored using EPRI’s Fleet-Wide Prognostic and Health Management (FW-PHM) Suite software, a set of web-based diagnostic and prognostic tools and databases that serves as an integrated health monitoring architecture. This paper focuses on development of asset fault signatures used to assess the health status of generator step-up transformers and emergency diesel generators in nuclear power plants. Asset fault signatures describe the distinctive features based on technical examinations that can be used to detect a specific fault type. Fault signatures are developed based on the results of detailed technical research and on the knowledge and experience of technical experts. The Diagnostic Advisor of the FW-PHM Suite software matches developed fault signatures with operational data to provide early identification of critical faults and troubleshooting advice that could be used to distinguish between faults with similar symptoms. This research is important as it will support the automation of predictive online monitoring techniques in nuclear power plants to diagnose incipient faults, perform proactive maintenance, and estimate the remaining useful life of assets.

  5. Theoretical Characterizaiton of Visual Signatures

    NASA Astrophysics Data System (ADS)

    Kashinski, D. O.; Chase, G. M.; di Nallo, O. E.; Scales, A. N.; Vanderley, D. L.; Byrd, E. F. C.

    2015-05-01

    We are investigating the accuracy of theoretical models used to predict the visible, ultraviolet, and infrared spectra, as well as other properties, of product materials ejected from the muzzle of currently fielded systems. Recent advances in solid propellants has made the management of muzzle signature (flash) a principle issue in weapons development across the calibers. A priori prediction of the electromagnetic spectra of formulations will allow researchers to tailor blends that yield desired signatures and determine spectrographic detection ranges. Quantum chemistry methods at various levels of sophistication have been employed to optimize molecular geometries, compute unscaled vibrational frequencies, and determine the optical spectra of specific gas-phase species. Electronic excitations are being computed using Time Dependent Density Functional Theory (TD-DFT). A full statistical analysis and reliability assessment of computational results is currently underway. A comparison of theoretical results to experimental values found in the literature is used to assess any affects of functional choice and basis set on calculation accuracy. The status of this work will be presented at the conference. Work supported by the ARL, DoD HPCMP, and USMA.

  6. Thermal AGN Signatures in Blazars

    E-print Network

    Eric S. Perlman; Brett Addison; Markos Georganopoulos; Brian Wingert; Philip Graff

    2008-07-15

    Long ignored in blazars because of the dominance of the beamed radiation from the jet, the topic of thermal emissions in these objects is just beginning to be explored. While this emission is weak in most blazars compared to the dominant nonthermal jet components, there is a growing body of evidence that suggests that thermal emission is observable even in the most highly beamed objects. The emitting regions, which can include the accretion disk as well as the torus, are key parts of the central engine which also powers the jets. They also may be of critical importance in helping us decide between unified scheme models. We will review the observational evidence for thermal emissions in blazars, with an emphasis on recent work, and the spectral and variability characteristics that have been observed. The majority of the evidence for thermal emission in blazars (now observed in several objects) has come as a result of multiwavelength campaigns, where the object showed a clear bump in the optical-UV in a faint state. However, evidence exists from other avenues as well, including both purely spectral and variability based arguments as well as statistical analyses of large samples of objects. We will also discuss the impact of thermal emission on an object's overall SED, including its Comptonized signatures. Finally, we will assess the current standing of unified scheme models as respects thermal signatures and the prospects for detecting thermal emission with new telescopes and missions, and further utilizing it as a probe of the central engine of blazars.

  7. SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2015; 00:130

    E-print Network

    Regehr, John

    makes the test case suitable for the purpose at hand--detecting some fault, covering some code, inducing SOFTWARE TESTING, VERIFICATION AND RELIABILITY Softw. Test. Verif. Reliab. 2015; 00:1­30 Published is a test case for? Sometimes, to expose a fault. Tests can also exercise code, use memory or time

  8. 40 CFR 1065.550 - Gas analyzer range verification and drift verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... with a CLD and the removed water is corrected based on measured CO2, CO, THC, and NOX concentrations... concentration subcomponents (e.g., THC and CH4 for NMHC) separately. For example, for NMHC measurements, perform drift verification on NMHC; do not verify THC and CH4 separately. (2) Drift verification requires...

  9. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Electronic signature components and controls. 11... SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.200 Electronic signature components and controls. (a) Electronic signatures that are not based upon biometrics shall:...

  10. Ecient Blind and Partially Blind Signatures Without Random Oracles

    E-print Network

    International Association for Cryptologic Research (IACR)

    Ecient Blind and Partially Blind Signatures Without Random Oracles Tatsuaki Okamoto NTT eective in many applications (e.g., blind signatures, group signatures, anonymous credentials etc.) than, this paper presents ecient blind signatures and par- tially blind signatures that are secure in the standard

  11. Efficient Blind and Partially Blind Signatures Without Random Oracles

    E-print Network

    International Association for Cryptologic Research (IACR)

    Efficient Blind and Partially Blind Signatures Without Random Oracles Tatsuaki Okamoto NTT effective in many applications (e.g., blind signatures, group signatures, anonymous credentials etc.) than, this paper presents efficient blind signatures and par­ tially blind signatures that are secure

  12. Chameleon Hashing and Signatures Hugo Krawczyk \\Lambda Tal Rabin y

    E-print Network

    International Association for Cryptologic Research (IACR)

    Chameleon Hashing and Signatures Hugo Krawczyk \\Lambda Tal Rabin y October 1997 Abstract We introduce chameleon signatures that provide with an undeniable commitment of the signer to the contents. These signatures are closely related to ``undeniable signatures'', but chameleon signatures allow for simpler

  13. Anonymous signature scheme Chunbo Ma and Jun Ao

    E-print Network

    International Association for Cryptologic Research (IACR)

    Anonymous signature scheme Chunbo Ma and Jun Ao School of Information and Communication, Guilin. In order to hide the identity of a signer, an anonymous signature scheme is presented in this paper the signature to its source is impossible. The proposed anonymous signature is similarly to ring signature

  14. Verification of Functional Fault Models and the Use of Resource Efficient Verification Tools

    NASA Technical Reports Server (NTRS)

    Bis, Rachael; Maul, William A.

    2015-01-01

    Functional fault models (FFMs) are a directed graph representation of the failure effect propagation paths within a system's physical architecture and are used to support development and real-time diagnostics of complex systems. Verification of these models is required to confirm that the FFMs are correctly built and accurately represent the underlying physical system. However, a manual, comprehensive verification process applied to the FFMs was found to be error prone due to the intensive and customized process necessary to verify each individual component model and to require a burdensome level of resources. To address this problem, automated verification tools have been developed and utilized to mitigate these key pitfalls. This paper discusses the verification of the FFMs and presents the tools that were developed to make the verification process more efficient and effective.

  15. DNA Methylation Signature of Childhood Chronic Physical Aggression in T Cells of Both Men and Women

    PubMed Central

    Guillemin, Claire; Provençal, Nadine; Suderman, Matthew; Côté, Sylvana M.; Vitaro, Frank; Hallett, Michael; Tremblay, Richard E.; Szyf, Moshe

    2014-01-01

    Background High frequency of physical aggression is the central feature of severe conduct disorder and is associated with a wide range of social, mental and physical health problems. We have previously tested the hypothesis that differential DNA methylation signatures in peripheral T cells are associated with a chronic aggression trajectory in males. Despite the fact that sex differences appear to play a pivotal role in determining the development, magnitude and frequency of aggression, most of previous studies focused on males, so little is known about female chronic physical aggression. We therefore tested here whether or not there is a signature of physical aggression in female DNA methylation and, if there is, how it relates to the signature observed in males. Methodology/Principal Findings Methylation profiles were created using the method of methylated DNA immunoprecipitation (MeDIP) followed by microarray hybridization and statistical and bioinformatic analyses on T cell DNA obtained from adult women who were found to be on a chronic physical aggression trajectory (CPA) between 6 and 12 years of age compared to women who followed a normal physical aggression trajectory. We confirmed the existence of a well-defined, genome-wide signature of DNA methylation associated with chronic physical aggression in the peripheral T cells of adult females that includes many of the genes similarly associated with physical aggression in the same cell types of adult males. Conclusions This study in a small number of women presents preliminary evidence for a genome-wide variation in promoter DNA methylation that associates with CPA in women that warrant larger studies for further verification. A significant proportion of these associations were previously observed in men with CPA supporting the hypothesis that the epigenetic signature of early life aggression in females is composed of a component specific to females and another common to both males and females. PMID:24475181

  16. Visual inspection for CTBT verification

    SciTech Connect

    Hawkins, W.; Wohletz, K.

    1997-03-01

    On-site visual inspection will play an essential role in future Comprehensive Test Ban Treaty (CTBT) verification. Although seismic and remote sensing techniques are the best understood and most developed methods for detection of evasive testing of nuclear weapons, visual inspection can greatly augment the certainty and detail of understanding provided by these more traditional methods. Not only can visual inspection offer ``ground truth`` in cases of suspected nuclear testing, but it also can provide accurate source location and testing media properties necessary for detailed analysis of seismic records. For testing in violation of the CTBT, an offending party may attempt to conceal the test, which most likely will be achieved by underground burial. While such concealment may not prevent seismic detection, evidence of test deployment, location, and yield can be disguised. In this light, if a suspicious event is detected by seismic or other remote methods, visual inspection of the event area is necessary to document any evidence that might support a claim of nuclear testing and provide data needed to further interpret seismic records and guide further investigations. However, the methods for visual inspection are not widely known nor appreciated, and experience is presently limited. Visual inspection can be achieved by simple, non-intrusive means, primarily geological in nature, and it is the purpose of this report to describe the considerations, procedures, and equipment required to field such an inspection.

  17. Learning Assumptions for Compositional Verification

    NASA Technical Reports Server (NTRS)

    Cobleigh, Jamieson M.; Giannakopoulou, Dimitra; Pasareanu, Corina; Clancy, Daniel (Technical Monitor)

    2002-01-01

    Compositional verification is a promising approach to addressing the state explosion problem associated with model checking. One compositional technique advocates proving properties of a system by checking properties of its components in an assume-guarantee style. However, the application of this technique is difficult because it involves non-trivial human input. This paper presents a novel framework for performing assume-guarantee reasoning in an incremental and fully automated fashion. To check a component against a property, our approach generates assumptions that the environment needs to satisfy for the property to hold. These assumptions are then discharged on the rest of the system. Assumptions are computed by a learning algorithm. They are initially approximate, but become gradually more precise by means of counterexamples obtained by model checking the component and its environment, alternately. This iterative process may at any stage conclude that the property is either true or false in the system. We have implemented our approach in the LTSA tool and applied it to the analysis of a NASA system.

  18. Development of advanced seal verification

    NASA Technical Reports Server (NTRS)

    Workman, Gary L.; Kosten, Susan E.; Abushagur, Mustafa A.

    1992-01-01

    The purpose of this research is to develop a technique to monitor and insure seal integrity with a sensor that has no active elements to burn-out during a long duration activity, such as a leakage test or especially during a mission in space. The original concept proposed is that by implementing fiber optic sensors, changes in the integrity of a seal can be monitored in real time and at no time should the optical fiber sensor fail. The electrical components which provide optical excitation and detection through the fiber are not part of the seal; hence, if these electrical components fail, they can be easily changed without breaking the seal. The optical connections required for the concept to work does present a functional problem to work out. The utility of the optical fiber sensor for seal monitoring should be general enough that the degradation of a seal can be determined before catastrophic failure occurs and appropriate action taken. Two parallel efforts were performed in determining the feasibility of using optical fiber sensors for seal verification. In one study, research on interferometric measurements of the mechanical response of the optical fiber sensors to seal integrity was studied. In a second study, the implementation of the optical fiber to a typical vacuum chamber was implemented and feasibility studies on microbend experiments in the vacuum chamber were performed. Also, an attempt was made to quantify the amount of pressure actually being applied to the optical fiber using finite element analysis software by Algor.

  19. Monitoring and verification R&D

    SciTech Connect

    Pilat, Joseph F; Budlong - Sylvester, Kory W; Fearey, Bryan L

    2011-01-01

    The 2010 Nuclear Posture Review (NPR) report outlined the Administration's approach to promoting the agenda put forward by President Obama in Prague on April 5, 2009. The NPR calls for a national monitoring and verification R&D program to meet future challenges arising from the Administration's nonproliferation, arms control and disarmament agenda. Verification of a follow-on to New START could have to address warheads and possibly components along with delivery capabilities. Deeper cuts and disarmament would need to address all of these elements along with nuclear weapon testing, nuclear material and weapon production facilities, virtual capabilities from old weapon and existing energy programs and undeclared capabilities. We only know how to address some elements of these challenges today, and the requirements may be more rigorous in the context of deeper cuts as well as disarmament. Moreover, there is a critical need for multiple options to sensitive problems and to address other challenges. There will be other verification challenges in a world of deeper cuts and disarmament, some of which we are already facing. At some point, if the reductions process is progressing, uncertainties about past nuclear materials and weapons production will have to be addressed. IAEA safeguards will need to continue to evolve to meet current and future challenges, and to take advantage of new technologies and approaches. Transparency/verification of nuclear and dual-use exports will also have to be addressed, and there will be a need to make nonproliferation measures more watertight and transparent. In this context, and recognizing we will face all of these challenges even if disarmament is not achieved, this paper will explore possible agreements and arrangements; verification challenges; gaps in monitoring and verification technologies and approaches; and the R&D required to address these gaps and other monitoring and verification challenges.

  20. On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature

    NASA Astrophysics Data System (ADS)

    Panigrahy, Saroj Kumar; Jena, Debasish; Korra, Sathya Babu; Jena, Sanjay Kumar

    Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification.

  1. A Real Quantum Designated Verifier Signature Scheme

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Min; Zhou, Yi-Hua; Yang, Yu-Guang

    2015-09-01

    The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren't the real traditional designated verifier signature schemes, because the designated person hasn't the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the "validity of a signature" and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

  2. NaturePublishing .............................................................. Spectral signature of cosmological

    E-print Network

    Barkana, Rennan

    M( which is a difficult theoretical challenge explain. nearby quasars, objects could formed in central gravitationally inside massive ) haloes of matter 2 . There hitherto been observational evidence presence pull, where absorption infalling hydrogen produces a distinct spectral signature. signature be recent

  3. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Electronic signatures. 850.106 Section... (CONTINUED) RETIREMENT SYSTEMS MODERNIZATION General Provisions § 850.106 Electronic signatures. (a) Subject to any provisions prescribed by the Director under § 850.104— (1) An electronic communication may...

  4. Microbiomic Signatures of Psoriasis: Feasibility and Methodology

    E-print Network

    Statnikov, Alexander

    signatures for the diagnosis of psoriasis from microbiomic data. P soriasis is a chronic inflammatory diseaseMicrobiomic Signatures of Psoriasis: Feasibility and Methodology Comparison Alexander Statnikov1 York. Psoriasis is a common chronic inflammatory disease of the skin. We sought to use bacterial

  5. Security of Blind Digital Signatures (Extended Abstract)

    E-print Network

    Luby, Michael

    Security of Blind Digital Signatures (Extended Abstract) Ari Juels 1? Michael Luby 2 Rafail, Morristown, NJ 07960­6438, USA. Email: rafail@bellcore.com. Abstract. Blind digital signatures were introduced by Chaum. In this paper, we show how security and blindness properties for blind digital

  6. Composite Signature Based Watermarking for Fingerprint Authentication

    E-print Network

    for image authentication, to biometrics to assist in forensic analysis. Using a signature extracted from it with a calculated signature. Various correlation metrics determine the identity degree of biometric authentication of fingerprints. Keywords PhasemarkTM, biometric authentication, fingerprint, watermarking, composite filter

  7. Anonymous Signature Schemes Guomin Yang1

    E-print Network

    International Association for Cryptologic Research (IACR)

    Anonymous Signature Schemes Guomin Yang1 , Duncan S. Wong1 , Xiaotie Deng1 , and Huaxiong Wang2 1, it is generally unclear or suspicious of whether a signature scheme itself can guarantee the anonymity of the signer. In this paper, we give some affirmative answers to it. We formally define the signer anonymity

  8. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with...

  9. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with...

  10. 48 CFR 4.102 - Contractor's signature.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 1 2011-10-01 2011-10-01 false Contractor's signature. 4.102 Section 4.102 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION GENERAL ADMINISTRATIVE MATTERS Contract Execution 4.102 Contractor's signature. (a) Individuals. A contract with...

  11. Three plasma metabolite signatures for diagnosing high altitude pulmonary edema

    PubMed Central

    Guo, Li; Tan, Guangguo; Liu, Ping; Li, Huijie; Tang, Lulu; Huang, Lan; Ren, Qian

    2015-01-01

    High-altitude pulmonary edema (HAPE) is a potentially fatal condition, occurring at altitudes greater than 3,000 m and affecting rapidly ascending, non-acclimatized healthy individuals. However, the lack of biomarkers for this disease still constitutes a bottleneck in the clinical diagnosis. Here, ultra-high performance liquid chromatography coupled with Q-TOF mass spectrometry was applied to study plasma metabolite profiling from 57 HAPE and 57 control subjects. 14 differential plasma metabolites responsible for the discrimination between the two groups from discovery set (35 HAPE subjects and 35 healthy controls) were identified. Furthermore, 3 of the 14 metabolites (C8-ceramide, sphingosine and glutamine) were selected as candidate diagnostic biomarkers for HAPE using metabolic pathway impact analysis. The feasibility of using the combination of these three biomarkers for HAPE was evaluated, where the area under the receiver operating characteristic curve (AUC) was 0.981 and 0.942 in the discovery set and the validation set (22 HAPE subjects and 22 healthy controls), respectively. Taken together, these results suggested that this composite plasma metabolite signature may be used in HAPE diagnosis, especially after further investigation and verification with larger samples. PMID:26459926

  12. Three plasma metabolite signatures for diagnosing high altitude pulmonary edema

    NASA Astrophysics Data System (ADS)

    Guo, Li; Tan, Guangguo; Liu, Ping; Li, Huijie; Tang, Lulu; Huang, Lan; Ren, Qian

    2015-10-01

    High-altitude pulmonary edema (HAPE) is a potentially fatal condition, occurring at altitudes greater than 3,000 m and affecting rapidly ascending, non-acclimatized healthy individuals. However, the lack of biomarkers for this disease still constitutes a bottleneck in the clinical diagnosis. Here, ultra-high performance liquid chromatography coupled with Q-TOF mass spectrometry was applied to study plasma metabolite profiling from 57 HAPE and 57 control subjects. 14 differential plasma metabolites responsible for the discrimination between the two groups from discovery set (35 HAPE subjects and 35 healthy controls) were identified. Furthermore, 3 of the 14 metabolites (C8-ceramide, sphingosine and glutamine) were selected as candidate diagnostic biomarkers for HAPE using metabolic pathway impact analysis. The feasibility of using the combination of these three biomarkers for HAPE was evaluated, where the area under the receiver operating characteristic curve (AUC) was 0.981 and 0.942 in the discovery set and the validation set (22 HAPE subjects and 22 healthy controls), respectively. Taken together, these results suggested that this composite plasma metabolite signature may be used in HAPE diagnosis, especially after further investigation and verification with larger samples.

  13. Holographic signatures of cosmological singularities.

    PubMed

    Engelhardt, Netta; Hertog, Thomas; Horowitz, Gary T

    2014-09-19

    To gain insight into the quantum nature of cosmological singularities, we study anisotropic Kasner solutions in gauge-gravity duality. The dual description of the bulk evolution towards the singularity involves N=4 super Yang-Mills theory on the expanding branch of deformed de Sitter space and is well defined. We compute two-point correlators of Yang-Mills operators of large dimensions using spacelike geodesics anchored on the boundary. The correlators show a strong signature of the singularity around horizon scales and decay at large boundary separation at different rates in different directions. More generally, the boundary evolution exhibits a process of particle creation similar to that in inflation. This leads us to conjecture that information on the quantum nature of cosmological singularities is encoded in long-wavelength features of the boundary wave function. PMID:25279620

  14. Signature of anisotropic bubble collisions

    NASA Astrophysics Data System (ADS)

    Salem, Michael P.

    2010-09-01

    Our universe may have formed via bubble nucleation in an eternally inflating background. Furthermore, the background may have a compact dimension—the modulus of which tunnels out of a metastable minimum during bubble nucleation—which subsequently grows to become one of our three large spatial dimensions. When in this scenario our bubble universe collides with other ones like it, the collision geometry is constrained by the reduced symmetry of the tunneling instanton. While the regions affected by such bubble collisions still appear (to leading order) as disks in an observer’s sky, the centers of these disks all lie on a single great circle, providing a distinct signature of anisotropic bubble nucleation.

  15. Metabolic Signatures of Bacterial Vaginosis

    PubMed Central

    Morgan, Martin T.; Fiedler, Tina L.; Djukovic, Danijel; Hoffman, Noah G.; Raftery, Daniel; Marrazzo, Jeanne M.

    2015-01-01

    ABSTRACT Bacterial vaginosis (BV) is characterized by shifts in the vaginal microbiota from Lactobacillus dominant to a microbiota with diverse anaerobic bacteria. Few studies have linked specific metabolites with bacteria found in the human vagina. Here, we report dramatic differences in metabolite compositions and concentrations associated with BV using a global metabolomics approach. We further validated important metabolites using samples from a second cohort of women and a different platform to measure metabolites. In the primary study, we compared metabolite profiles in cervicovaginal lavage fluid from 40 women with BV and 20 women without BV. Vaginal bacterial representation was determined using broad-range PCR with pyrosequencing and concentrations of bacteria by quantitative PCR. We detected 279 named biochemicals; levels of 62% of metabolites were significantly different in women with BV. Unsupervised clustering of metabolites separated women with and without BV. Women with BV have metabolite profiles marked by lower concentrations of amino acids and dipeptides, concomitant with higher levels of amino acid catabolites and polyamines. Higher levels of the signaling eicosanoid 12-hydroxyeicosatetraenoic acid (12-HETE), a biomarker for inflammation, were noted in BV. Lactobacillus crispatus and Lactobacillus jensenii exhibited similar metabolite correlation patterns, which were distinct from correlation patterns exhibited by BV-associated bacteria. Several metabolites were significantly associated with clinical signs and symptoms (Amsel criteria) used to diagnose BV, and no metabolite was associated with all four clinical criteria. BV has strong metabolic signatures across multiple metabolic pathways, and these signatures are associated with the presence and concentrations of particular bacteria. PMID:25873373

  16. Real time gamma-ray signature identifier

    DOEpatents

    Rowland, Mark (Alamo, CA); Gosnell, Tom B. (Moraga, CA); Ham, Cheryl (Livermore, CA); Perkins, Dwight (Livermore, CA); Wong, James (Dublin, CA)

    2012-05-15

    A real time gamma-ray signature/source identification method and system using principal components analysis (PCA) for transforming and substantially reducing one or more comprehensive spectral libraries of nuclear materials types and configurations into a corresponding concise representation/signature(s) representing and indexing each individual predetermined spectrum in principal component (PC) space, wherein an unknown gamma-ray signature may be compared against the representative signature to find a match or at least characterize the unknown signature from among all the entries in the library with a single regression or simple projection into the PC space, so as to substantially reduce processing time and computing resources and enable real-time characterization and/or identification.

  17. Signatures of mutational processes in human cancer

    PubMed Central

    Alexandrov, Ludmil B.; Nik-Zainal, Serena; Wedge, David C.; Aparicio, Samuel A.J.R.; Behjati, Sam; Biankin, Andrew V.; Bignell, Graham R.; Bolli, Niccolo; Borg, Ake; Børresen-Dale, Anne-Lise; Boyault, Sandrine; Burkhardt, Birgit; Butler, Adam P.; Caldas, Carlos; Davies, Helen R.; Desmedt, Christine; Eils, Roland; Eyfjörd, Jórunn Erla; Foekens, John A.; Greaves, Mel; Hosoda, Fumie; Hutter, Barbara; Ilicic, Tomislav; Imbeaud, Sandrine; Imielinsk, Marcin; Jäger, Natalie; Jones, David T.W.; Jones, David; Knappskog, Stian; Kool, Marcel; Lakhani, Sunil R.; López-Otín, Carlos; Martin, Sancha; Munshi, Nikhil C.; Nakamura, Hiromi; Northcott, Paul A.; Pajic, Marina; Papaemmanuil, Elli; Paradiso, Angelo; Pearson, John V.; Puente, Xose S.; Raine, Keiran; Ramakrishna, Manasa; Richardson, Andrea L.; Richter, Julia; Rosenstiel, Philip; Schlesner, Matthias; Schumacher, Ton N.; Span, Paul N.; Teague, Jon W.; Totoki, Yasushi; Tutt, Andrew N.J.; Valdés-Mas, Rafael; van Buuren, Marit M.; van ’t Veer, Laura; Vincent-Salomon, Anne; Waddell, Nicola; Yates, Lucy R.; Zucman-Rossi, Jessica; Futreal, P. Andrew; McDermott, Ultan; Lichter, Peter; Meyerson, Matthew; Grimmond, Sean M.; Siebert, Reiner; Campo, Elías; Shibata, Tatsuhiro; Pfister, Stefan M.; Campbell, Peter J.; Stratton, Michael R.

    2013-01-01

    All cancers are caused by somatic mutations. However, understanding of the biological processes generating these mutations is limited. The catalogue of somatic mutations from a cancer genome bears the signatures of the mutational processes that have been operative. Here, we analysed 4,938,362 mutations from 7,042 cancers and extracted more than 20 distinct mutational signatures. Some are present in many cancer types, notably a signature attributed to the APOBEC family of cytidine deaminases, whereas others are confined to a single class. Certain signatures are associated with age of the patient at cancer diagnosis, known mutagenic exposures or defects in DNA maintenance, but many are of cryptic origin. In addition to these genome-wide mutational signatures, hypermutation localized to small genomic regions, kataegis, is found in many cancer types. The results reveal the diversity of mutational processes underlying the development of cancer with potential implications for understanding of cancer etiology, prevention and therapy. PMID:23945592

  18. Dynamic characteristics of signatures: effects of writer style on genuine and simulated signatures.

    PubMed

    Mohammed, Linton; Found, Bryan; Caligiuri, Michael; Rogers, Doug

    2015-01-01

    The aims of this study were to determine if computer-measured dynamic features (duration, size, velocity, jerk, and pen pressure) differ between genuine and simulated signatures. Sixty subjects (3 equal groups of 3 signature styles) each provided 10 naturally written (genuine) signatures. Each of these subjects then provided 15 simulations of each of three model signatures. The genuine (N = 600) and simulated (N = 2700) signatures were collected using a digitizing tablet. MovAlyzeR(®) software was used to estimate kinematic parameters for each pen stroke. Stroke duration, velocity, and pen pressure were found to discriminate between genuine and simulated signatures regardless of the simulator's own style of signature or the style of signature being simulated. However, there was a significant interaction between style and condition for size and jerk (a measure of smoothness). The results of this study, based on quantitative analysis and dynamic handwriting features, indicate that the style of the simulator's own signature and the style of signature being simulated can impact the characteristics of handwriting movements for simulations. Writer style characteristics might therefore need to be taken into consideration as potentially significant when evaluating signature features with a view to forming opinions regarding authenticity. PMID:25420668

  19. Neighborhood repulsed metric learning for kinship verification.

    PubMed

    Lu, Jiwen; Zhou, Xiuzhuang; Tan, Yap-Pen; Shang, Yuanyuan; Zhou, Jie

    2014-02-01

    Kinship verification from facial images is an interesting and challenging problem in computer vision, and there are very limited attempts on tackle this problem in the literature. In this paper, we propose a new neighborhood repulsed metric learning (NRML) method for kinship verification. Motivated by the fact that interclass samples (without a kinship relation) with higher similarity usually lie in a neighborhood and are more easily misclassified than those with lower similarity, we aim to learn a distance metric under which the intraclass samples (with a kinship relation) are pulled as close as possible and interclass samples lying in a neighborhood are repulsed and pushed away as far as possible, simultaneously, such that more discriminative information can be exploited for verification. To make better use of multiple feature descriptors to extract complementary information, we further propose a multiview NRML (MNRML) method to seek a common distance metric to perform multiple feature fusion to improve the kinship verification performance. Experimental results are presented to demonstrate the efficacy of our proposed methods. Finally, we also test human ability in kinship verification from facial images and our experimental results show that our methods are comparable to that of human observers. PMID:24356353

  20. Verification against perturbed analyses and observations

    NASA Astrophysics Data System (ADS)

    Bowler, N. E.; Cullen, M. J. P.; Piccolo, C.

    2015-07-01

    It has long been known that verification of a forecast against the sequence of analyses used to produce those forecasts can under-estimate the magnitude of forecast errors. Here we show that under certain conditions the verification of a short-range forecast against a perturbed analysis coming from an ensemble data assimilation scheme can give the same root-mean-square error as verification against the truth. This means that a perturbed analysis can be used as a reliable proxy for the truth. However, the conditions required for this result to hold are rather restrictive: the analysis must be optimal, the ensemble spread must be equal to the error in the mean, the ensemble size must be large and the forecast being verified must be the background forecast used in the data assimilation. Although these criteria are unlikely to be met exactly it becomes clear that for most cases verification against a perturbed analysis gives better results than verification against an unperturbed analysis. We demonstrate the application of these results in a idealised model framework and a numerical weather prediction context. In deriving this result we recall that an optimal (Kalman) analysis is one for which the analysis increments are uncorrelated with the analysis errors.

  1. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other...

  2. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other...

  3. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other...

  4. 21 CFR 11.200 - Electronic signature components and controls.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1... signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other...

  5. Online Robust PCA Online Sparse + Low-Rank Matrix Recovery

    E-print Network

    Vaswani, Namrata

    Online Robust PCA or Online Sparse + Low-Rank Matrix Recovery Namrata Vaswani Dept. of Electrical Sparse Matrix Recovery Online Robust PCA Recovery from incomplete data: the question In many applications Robust PCA 2/53 #12;Online Sparse Matrix Recovery Online Robust PCA Recovery from incomplete data

  6. A feasibility study of treatment verification using EPID cine images for hypofractionated lung radiotherapy.

    PubMed

    Tang, Xiaoli; Lin, Tong; Jiang, Steve

    2009-09-21

    We propose a novel approach for potential online treatment verification using cine EPID (electronic portal imaging device) images for hypofractionated lung radiotherapy based on a machine learning algorithm. Hypofractionated radiotherapy requires high precision. It is essential to effectively monitor the target to ensure that the tumor is within the beam aperture. We modeled the treatment verification problem as a two-class classification problem and applied an artificial neural network (ANN) to classify the cine EPID images acquired during the treatment into corresponding classes-with the tumor inside or outside of the beam aperture. Training samples were generated for the ANN using digitally reconstructed radiographs (DRRs) with artificially added shifts in the tumor location-to simulate cine EPID images with different tumor locations. Principal component analysis (PCA) was used to reduce the dimensionality of the training samples and cine EPID images acquired during the treatment. The proposed treatment verification algorithm was tested on five hypofractionated lung patients in a retrospective fashion. On average, our proposed algorithm achieved a 98.0% classification accuracy, a 97.6% recall rate and a 99.7% precision rate. PMID:19687565

  7. ETV INTERNATIONAL OUTREACH ACTIVITIES (ENVIRONMENTAL TECHNOLOGY VERIFICATION (ETV) PROGRAM

    EPA Science Inventory

    The Environmental Technology Verification (ETV) Program's international outrearch activities have extended as far as Canada, Germany, Taiwan and the Philippines. Vendors from Canada and Germany were hosted at verification tests of turbidimeters. In May 1999, EPA's ETV Coordinator...

  8. Verification of full functional correctness for imperative linked data structures

    E-print Network

    Zee, Karen K

    2010-01-01

    We present the verification of full functional correctness for a collection of imperative linked data structures implemented in Java. A key technique that makes this verification possible is a novel, integrated proof ...

  9. Exploration of small enrollment speaker verification on handheld devices

    E-print Network

    Woo, Ram H. (Ram Han)

    2005-01-01

    This thesis explores the problem of robust speaker verification for handheld devices under the context of extremely limited training data. Although speaker verification technology is an area of great promise for security ...

  10. ADAPTIVE CONDITIONAL PRONUNCIATION MODELING USING ARTICULATORY FEATURES FOR SPEAKER VERIFICATION

    E-print Network

    Mak, Man-Wai

    of speaker data is insufficient for a direct estimation. Ex- perimental results show that the adaptationADAPTIVE CONDITIONAL PRONUNCIATION MODELING USING ARTICULATORY FEATURES FOR SPEAKER VERIFICATION Ka- nunciation modeling (AFCPM) technique for speaker verification. The technique models the pronunciation

  11. 40 CFR 1066.265 - Acceleration and deceleration verification.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 2013-07-01 false Acceleration and deceleration verification. 1066...Dynamometer Specifications § 1066.265 Acceleration and deceleration verification. ...dynamometer's ability to achieve targeted acceleration and deceleration rates....

  12. 40 CFR 1066.265 - Acceleration and deceleration verification.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...2014-07-01 2014-07-01 false Acceleration and deceleration verification. 1066...Dynamometer Specifications § 1066.265 Acceleration and deceleration verification. ...dynamometer's ability to achieve targeted acceleration and deceleration rates....

  13. 40 CFR 1066.265 - Acceleration and deceleration verification.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...2012-07-01 2012-07-01 false Acceleration and deceleration verification. 1066...Dynamometer Specifications § 1066.265 Acceleration and deceleration verification. ...dynamometer's ability to achieve targeted acceleration and deceleration rates....

  14. ForPeerReview Verification of Mountain Weather Information Service

    E-print Network

    Birch, Cathryn

    ForPeerReview Verification of Mountain Weather Information Service forecasts for three upland areas Centre, Mountain Weather Information Service Marsham, John; University of Leeds, National Centre for Atmospheric Science Keywords: Mountain weather, Weather forecasting, Forecast verification http

  15. Generic Protocol for the Verification of Ballast Water Treatment Technology

    EPA Science Inventory

    In anticipation of the need to address performance verification and subsequent approval of new and innovative ballast water treatment technologies for shipboard installation, the U.S Coast Guard and the Environmental Protection Agency‘s Environmental Technology Verification Progr...

  16. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...TESTS AND INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing...that automated vital systems are designed...based upon the failure analysis, if required...

  17. 20 CFR 211.15 - Verification of compensation claimed.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...2010-04-01 false Verification of compensation claimed. 211.15 Section 211.15...RAILROAD RETIREMENT ACT CREDITABLE RAILROAD COMPENSATION § 211.15 Verification of compensation claimed. Compensation...

  18. 20 CFR 211.15 - Verification of compensation claimed.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...2011-04-01 false Verification of compensation claimed. 211.15 Section 211.15...RAILROAD RETIREMENT ACT CREDITABLE RAILROAD COMPENSATION § 211.15 Verification of compensation claimed. Compensation...

  19. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  20. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  1. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  2. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  3. 45 CFR 1626.7 - Verification of eligible alien status.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Verification of eligible alien status. 1626.7 Section 1626.7 Public...CORPORATION RESTRICTIONS ON LEGAL ASSISTANCE TO ALIENS § 1626.7 Verification of eligible alien status. (a) An alien seeking...

  4. 76 FR 21225 - Documents Acceptable for Employment Eligibility Verification

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-15

    ...Acceptable for Employment Eligibility Verification...Citizenship and Immigration Services (USCIS...entire Form I-9 employment verification...considers the Illegal Immigration Reform and Immigrant...acceptable for employment...

  5. ENVIRONMENTAL TECHNOLOGY VERIFICATION PROGRAM FOR MONITORING AND CHARACTERIZATION

    EPA Science Inventory

    The Environmental Technology Verification Program is a service of the Environmental Protection Agency designed to accelerate the development and commercialization of improved environmental technology through third party verification and reporting of performance. The goal of ETV i...

  6. SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY

    E-print Network

    Lindsay, Peter

    SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND of Information Technology The University of Queensland Queensland 4072, Australia 2 Defence Science Technology Science Technology Organisation (DSTO) and the Software Verification Research Centre (SVRC) to study

  7. A Tutorial on Text-Independent Speaker Verification

    E-print Network

    Bimbot, Frederic

    This paper presents an overview of a state-of-the-art text-independent speaker verification system. First, an introduction proposes a modular scheme of the training and test phases of a speaker verification system. Then, ...

  8. A feature based comparison of pen and swipe based signature characteristics.

    PubMed

    Robertson, Joshua; Guest, Richard

    2015-10-01

    Dynamic Signature Verification (DSV) is a biometric modality that identifies anatomical and behavioral characteristics when an individual signs their name. Conventionally signature data has been captured using pen/tablet apparatus. However, the use of other devices such as the touch-screen tablets has expanded in recent years affording the possibility of assessing biometric interaction on this new technology. To explore the potential of employing DSV techniques when a user signs or swipes with their finger, we report a study to correlate pen and finger generated features. Investigating the stability and correlation between a set of characteristic features recorded in participant's signatures and touch-based swipe gestures, a statistical analysis was conducted to assess consistency between capture scenarios. The results indicate that there is a range of static and dynamic features such as the rate of jerk, size, duration and the distance the pen traveled that can lead to interoperability between these two systems for input methods for use within a potential biometric context. It can be concluded that this data indicates that a general principle is that the same underlying constructional mechanisms are evident. PMID:26097008

  9. Meteoritics & Planetary Science 36, 351358 (2001) Available online at http://www.uark.edu/meteor

    E-print Network

    2001-01-01

    Meteoritics & Planetary Science 36, 351­358 (2001) Available online at http-enrichment signatures indicative of an interstellar heritage, and PAHs were found to be a major carrier of the deuterium having higher values than the aliphatic fractions. There is also evidence that suggests that PAHs may

  10. PUBLISHED ONLINE: 25 APRIL 2010 | DOI: 10.1038/NPHYS1652 Quantum entanglement in photosynthetic

    E-print Network

    Loss, Daniel

    ARTICLES PUBLISHED ONLINE: 25 APRIL 2010 | DOI: 10.1038/NPHYS1652 Quantum entanglement another1,2 . Such systems are called entangled, and entan- glement is a characteristic quantum mechanical conditions. Signatures of entanglement, a characteristically quantum feature, have been demonstrated

  11. Earth Science Enterprise Scientific Data Purchase Project: Verification and Validation

    NASA Technical Reports Server (NTRS)

    Jenner, Jeff; Policelli, Fritz; Fletcher, Rosea; Holecamp, Kara; Owen, Carolyn; Nicholson, Lamar; Dartez, Deanna

    2000-01-01

    This paper presents viewgraphs on the Earth Science Enterprise Scientific Data Purchase Project's verification,and validation process. The topics include: 1) What is Verification and Validation? 2) Why Verification and Validation? 3) Background; 4) ESE Data Purchas Validation Process; 5) Data Validation System and Ingest Queue; 6) Shipment Verification; 7) Tracking and Metrics; 8) Validation of Contract Specifications; 9) Earth Watch Data Validation; 10) Validation of Vertical Accuracy; and 11) Results of Vertical Accuracy Assessment.

  12. Fuel Retrieval System (FRS) Design Verification

    SciTech Connect

    YANOCHKO, R.M.

    2000-01-27

    This document was prepared as part of an independent review to explain design verification activities already completed, and to define the remaining design verification actions for the Fuel Retrieval System. The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR).

  13. Land Ice Verification and Validation Kit

    SciTech Connect

    2015-07-15

    To address a pressing need to better understand the behavior and complex interaction of ice sheets within the global Earth system, significant development of continental-scale, dynamical ice-sheet models is underway. The associated verification and validation process of these models is being coordinated through a new, robust, python-based extensible software package, the Land Ice Verification and Validation toolkit (LIVV). This release provides robust and automated verification and a performance evaluation on LCF platforms. The performance V&V involves a comprehensive comparison of model performance relative to expected behavior on a given computing platform. LIVV operates on a set of benchmark and test data, and provides comparisons for a suite of community prioritized tests, including configuration and parameter variations, bit-4-bit evaluation, and plots of tests where differences occur.

  14. Land Ice Verification and Validation Kit

    Energy Science and Technology Software Center (ESTSC)

    2015-07-15

    To address a pressing need to better understand the behavior and complex interaction of ice sheets within the global Earth system, significant development of continental-scale, dynamical ice-sheet models is underway. The associated verification and validation process of these models is being coordinated through a new, robust, python-based extensible software package, the Land Ice Verification and Validation toolkit (LIVV). This release provides robust and automated verification and a performance evaluation on LCF platforms. The performance V&Vmore »involves a comprehensive comparison of model performance relative to expected behavior on a given computing platform. LIVV operates on a set of benchmark and test data, and provides comparisons for a suite of community prioritized tests, including configuration and parameter variations, bit-4-bit evaluation, and plots of tests where differences occur.« less

  15. Critical Surface Cleaning and Verification Alternatives

    NASA Technical Reports Server (NTRS)

    Melton, Donald M.; McCool, A. (Technical Monitor)

    2000-01-01

    As a result of federal and state requirements, historical critical cleaning and verification solvents such as Freon 113, Freon TMC, and Trichloroethylene (TCE) are either highly regulated or no longer 0 C available. Interim replacements such as HCFC 225 have been qualified, however toxicity and future phase-out regulations necessitate long term solutions. The scope of this project was to qualify a safe and environmentally compliant LOX surface verification alternative to Freon 113, TCE and HCFC 225. The main effort was focused on initiating the evaluation and qualification of HCFC 225G as an alternate LOX verification solvent. The project was scoped in FY 99/00 to perform LOX compatibility, cleaning efficiency and qualification on flight hardware.

  16. Packaged low-level waste verification system

    SciTech Connect

    Tuite, K.T.; Winberg, M.; Flores, A.Y.; Killian, E.W.; McIsaac, C.V.

    1996-08-01

    Currently, states and low-level radioactive waste (LLW) disposal site operators have no method of independently verifying the radionuclide content of packaged LLW that arrive at disposal sites for disposal. At this time, disposal sites rely on LLW generator shipping manifests and accompanying records to insure that LLW received meets the waste acceptance criteria. An independent verification system would provide a method of checking generator LLW characterization methods and help ensure that LLW disposed of at disposal facilities meets requirements. The Mobile Low-Level Waste Verification System (MLLWVS) provides the equipment, software, and methods to enable the independent verification of LLW shipping records to insure that disposal site waste acceptance criteria are being met. The MLLWVS system was developed under a cost share subcontract between WMG, Inc., and Lockheed Martin Idaho Technologies through the Department of Energy`s National Low-Level Waste Management Program at the Idaho National Engineering Laboratory (INEL).

  17. PBL Verification with Radiosonde and Aircraft Data

    NASA Astrophysics Data System (ADS)

    Tsidulko, M.; McQueen, J.; Dimego, G.; Ek, M.

    2008-12-01

    Boundary layer depth is an important characteristic in weather forecasting and it is a key parameter in air quality modeling determining extent of turbulence and dispersion for pollutants. Real-time PBL depths from the NAM(WRF/NMM) model are verified with different types of observations. PBL depths verification is incorporated into NCEP verification system including an ability to provide a range of statistical characteristics for the boundary layer heights. For the model, several types of boundary layer definitions are used. PBL height from the TKE scheme, critical Ri number approach as well as mixed layer depth are compared with observations. Observed PBL depths are determined applying Ri number approach to radiosonde profiles. Also, preliminary study of using ACARS data for PBL verification is conducted.

  18. Going Online the MI Way.

    ERIC Educational Resources Information Center

    Feldt, Jill

    This booklet describes online searching using Materials Information, a metallurgy and metals science information service of the Institute of Metals in London and ASM International in Cleveland, Ohio, which is available through the major online vendors. Described in detail are online searching, online databases, costs, online hosts or vendors,…

  19. ENVIRONMENTAL TECHNOLOGY VERIFICATION REPORT - PERFORMANCE VERIFICATION OF THE W.L. GORE & ASSOCIATES GORE-SORBER SCREENING SURVEY

    EPA Science Inventory

    The U.S. Environmental Protection Agency (EPA) has created the Environmental Technology Verification Program (ETV) to facilitate the deployment of innovative or improved environmental technologies through performance verification and dissemination of information. The goal of the...

  20. 46 CFR 61.40-3 - Design verification testing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Design verification testing. 61.40-3 Section 61.40-3... INSPECTIONS Design Verification and Periodic Testing of Vital System Automation § 61.40-3 Design verification testing. (a) Tests must verify that automated vital systems are designed, constructed, and operate...

  1. Tool-Supported Verification of Product Line Requirements Prasanna Padmanabhan

    E-print Network

    Lutz, Robyn R.

    of requirements verification for product lines. We have implemented our approach in a requirements engineering verification for product lines. We have implemented our approach in a requirements engineering tool calledTool-Supported Verification of Product Line Requirements Prasanna Padmanabhan Citrix Systems, Inc

  2. 15 CFR 748.13 - Delivery Verification (DV).

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Delivery Verification (DV). 748.13... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope. (1) BIS may request the licensee to obtain verifications of delivery on a selective basis. A...

  3. Integrating Circuit Analyses for Assertion-based Verification

    E-print Network

    Sen, Alper

    Integrating Circuit Analyses for Assertion-based Verification of Programmable AMS Circuits Dogan-signal (AMS) verification environment. Therefore, we integrate common analog circuit analyses into mixed-signal time-domain verification still remains a challenge. In this paper, we integrate circuit

  4. How To Access Enrollment Verification Through MySSU

    E-print Network

    Ravikumar, B.

    How To Access Enrollment Verification Through MySSU Log onto your MySSU and click Student Center Under Academics go to the drop-down menu and click Enrollment Verification #12; To view and print Enrollment Verification from home, click "Allow to Print from My Browser. o IMP: If you choose this option

  5. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 34 2012-07-01 2012-07-01 false Inertial PM balance verifications... Inertial PM balance verifications. This section describes how to verify the performance of an inertial PM balance. (a) Independent verification. Have the balance manufacturer (or a representative approved by...

  6. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 33 2011-07-01 2011-07-01 false Inertial PM balance verifications... Inertial PM balance verifications. This section describes how to verify the performance of an inertial PM balance. (a) Independent verification. Have the balance manufacturer (or a representative approved by...

  7. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 33 2014-07-01 2014-07-01 false Inertial PM balance verifications... Inertial PM balance verifications. This section describes how to verify the performance of an inertial PM balance. (a) Independent verification. Have the balance manufacturer (or a representative approved by...

  8. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 34 2013-07-01 2013-07-01 false Inertial PM balance verifications... Inertial PM balance verifications. This section describes how to verify the performance of an inertial PM balance. (a) Independent verification. Have the balance manufacturer (or a representative approved by...

  9. 40 CFR 1065.395 - Inertial PM balance verifications.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Inertial PM balance verifications... Inertial PM balance verifications. This section describes how to verify the performance of an inertial PM balance. (a) Independent verification. Have the balance manufacturer (or a representative approved by...

  10. 19 CFR 181.74 - Verification visit procedures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... customs administration of its intention to conduct a verification visit in the United States, CBP may... 19 Customs Duties 2 2010-04-01 2010-04-01 false Verification visit procedures. 181.74 Section 181... § 181.74 Verification visit procedures. (a) Written consent required. Prior to conducting a...

  11. 15 CFR 748.13 - Delivery Verification (DV).

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 15 Commerce and Foreign Trade 2 2013-01-01 2013-01-01 false Delivery Verification (DV). 748.13... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope. (1) BIS may request the licensee to obtain verifications of delivery on a selective basis. A...

  12. 15 CFR 748.13 - Delivery Verification (DV).

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Delivery Verification (DV). 748.13... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope. (1) BIS may request the licensee to obtain verifications of delivery on a selective basis. A...

  13. 15 CFR 748.13 - Delivery Verification (DV).

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 15 Commerce and Foreign Trade 2 2014-01-01 2014-01-01 false Delivery Verification (DV). 748.13... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope. (1) BIS may request the licensee to obtain verifications of delivery on a selective basis. A...

  14. 15 CFR 748.13 - Delivery Verification (DV).

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 15 Commerce and Foreign Trade 2 2012-01-01 2012-01-01 false Delivery Verification (DV). 748.13... (CLASSIFICATION, ADVISORY, AND LICENSE) AND DOCUMENTATION § 748.13 Delivery Verification (DV). (a) Scope. (1) BIS may request the licensee to obtain verifications of delivery on a selective basis. A...

  15. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Random verification audits. 983.67 Section...Reports, Books and Records § 983.67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification audits by the...

  16. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Random verification audits. 983.67 Section...Reports, Books and Records § 983.67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification audits by the...

  17. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Random verification audits. 983.67 Section...Reports, Books and Records § 983.67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification audits by the...

  18. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 2010-01-01 false Random verification audits. 983.67 Section...Reports, Books and Records § 983.67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification audits by the...

  19. 7 CFR 983.67 - Random verification audits.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Random verification audits. 983.67 Section...Reports, Books and Records § 983.67 Random verification audits. (a) All handlers' pistachio inventory shall be subject to random verification audits by the...

  20. LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF

    E-print Network

    Rathbun, Julie A.

    ATM 1109 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL PAGI OF VACUUM TEST DATE 9 SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION THERMAL VACUUM TEST LIST OF TABLES AND FIGURES;Figure 4.9 5. 1 5.2 5.3-5.4 5.5 5.6 5.7-5.8 LUNAR SEISMIC PROFILING EXPERIMENT DESIGN VERIFICATION

  1. Online shopping hesitation.

    PubMed

    Cho, Chang-Hoan; Kang, Jaewon; Cheon, Hongsik John

    2006-06-01

    This study was designed to understand which factors influence consumer hesitation or delay in online product purchases. The study examined four groups of variables (i.e., consumer characteristics, contextual factors perceived uncertainty factors, and medium/channel innovation factors) that predict three types of online shopping hesitation (i.e., overall hesitation, shopping cart abandonment, and hesitation at the final payment stage). We found that different sets of delay factors are related to different aspects of online shopping hesitation. The study concludes with suggestion for various delay-reduction devices to help consumers close their online decision hesitation. PMID:16780394

  2. Measurement and Verification (M&V) 

    E-print Network

    Masuda, H

    2014-01-01

    Commissioning® Process Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko Masuda, Juan-Carlos Baltazar, PhD, PE Ahmet Ugursal, PhD Clean Air Through Energy Efficiency (CATEE) Conference, Dallas, Texas. November 18, 2014 ESL-KT-14-11-39 CATEE 2014: Clean Air.... Measurement and Verification 2 ESL-KT-14-11-39 CATEE 2014: Clean Air Through Efficiency Conference, Dallas, Texas Nov. 18-20 Measurement and Verification (M&V) Joseph T. Martinez, PCC Carlos Yagua, PE Hiroko Masuda, Juan-Carlos Baltazar, PhD, PE Ahmet...

  3. The formal verification of generic interpreters

    NASA Technical Reports Server (NTRS)

    Windley, P.; Levitt, K.; Cohen, G. C.

    1991-01-01

    The task assignment 3 of the design and validation of digital flight control systems suitable for fly-by-wire applications is studied. Task 3 is associated with formal verification of embedded systems. In particular, results are presented that provide a methodological approach to microprocessor verification. A hierarchical decomposition strategy for specifying microprocessors is also presented. A theory of generic interpreters is presented that can be used to model microprocessor behavior. The generic interpreter theory abstracts away the details of instruction functionality, leaving a general model of what an interpreter does.

  4. Verification of Plan Models Using UPPAAL

    NASA Technical Reports Server (NTRS)

    Khatib, Lina; Muscettola, Nicola; Haveland, Klaus; Lau, Sonic (Technical Monitor)

    2001-01-01

    This paper describes work on the verification of HSTS, the planner and scheduler of the Remote Agent autonomous control system deployed in Deep Space 1 (DS1). The verification is done using UPPAAL, a real time model checking tool. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify. Finally, we conclude with a summary.

  5. Electric power system test and verification program

    NASA Technical Reports Server (NTRS)

    Rylicki, Daniel S.; Robinson, Frank, Jr.

    1994-01-01

    Space Station Freedom's (SSF's) electric power system (EPS) hardware and software verification is performed at all levels of integration, from components to assembly and system level tests. Careful planning is essential to ensure the EPS is tested properly on the ground prior to launch. The results of the test performed on breadboard model hardware and analyses completed to date have been evaluated and used to plan for design qualification and flight acceptance test phases. These results and plans indicate the verification program for SSF's 75-kW EPS would have been successful and completed in time to support the scheduled first element launch.

  6. Fuel Retrieval System Design Verification Report

    SciTech Connect

    GROTH, B.D.

    2000-04-11

    The Fuel Retrieval Subproject was established as part of the Spent Nuclear Fuel Project (SNF Project) to retrieve and repackage the SNF located in the K Basins. The Fuel Retrieval System (FRS) construction work is complete in the KW Basin, and start-up testing is underway. Design modifications and construction planning are also underway for the KE Basin. An independent review of the design verification process as applied to the K Basin projects was initiated in support of preparation for the SNF Project operational readiness review (ORR). A Design Verification Status Questionnaire, Table 1, is included which addresses Corrective Action SNF-EG-MA-EG-20000060, Item No.9 (Miller 2000).

  7. EOS-AM precision pointing verification

    NASA Astrophysics Data System (ADS)

    Throckmorton, A.; Braknis, E.; Bolek, J.

    The Earth Observing System (EOS) AM mission requires tight pointing knowledge to meet scientific objectives, in a spacecraft with low frequency flexible appendage modes. As the spacecraft controller reacts to various disturbance sources and as the inherent appendage modes are excited by this control action, verification of precision pointing knowledge becomes particularly challenging for the EOS-AM mission. As presently conceived, this verification includes a complementary set of multi-disciplinary analyses, hardware tests and real-time computer in the loop simulations, followed by collection and analysis of hardware test and flight data and supported by a comprehensive data base repository for validated program values.

  8. Proton Therapy Verification with PET Imaging

    PubMed Central

    Zhu, Xuping; Fakhri, Georges El

    2013-01-01

    Proton therapy is very sensitive to uncertainties introduced during treatment planning and dose delivery. PET imaging of proton induced positron emitter distributions is the only practical approach for in vivo, in situ verification of proton therapy. This article reviews the current status of proton therapy verification with PET imaging. The different data detecting systems (in-beam, in-room and off-line PET), calculation methods for the prediction of proton induced PET activity distributions, and approaches for data evaluation are discussed. PMID:24312147

  9. LHC signatures for the cascade seesaw mechanism

    NASA Astrophysics Data System (ADS)

    Chen, Chian-Shu; Zheng, Ya-Juan

    2015-10-01

    The cascade seesaw mechanism generates neutrino mass for higher-dimension (5+4n) operators through the tree-level diagram which brings the seesaw scale down to TeV. We investigate its collider signatures that are within reach of the LHC. In particular, both Type-II scalar and Type-III fermion seesaw signatures exist in such a scenario. Under the assumption that there are no mass splittings between the components in the scalar and fermion multiplets, we find that a multi-lepton final state from interplay of doubly charged scalar and heavy fermions can provide signatures distinguishable from conventional seesaw mechanisms.

  10. Formal verification of contracts for synchronous software components using NuSMV Formal verification of contracts for

    E-print Network

    Quantitative evaluation Code generation 5 / 19 #12;Formal verification of contracts for synchronous softwareFormal verification of contracts for synchronous software components using NuSMV Formal verification of contracts for synchronous software components using NuSMV Tobias Polzer Lehrstuhl für

  11. Molecular signatures of major depression.

    PubMed

    Cai, Na; Chang, Simon; Li, Yihan; Li, Qibin; Hu, Jingchu; Liang, Jieqin; Song, Li; Kretzschmar, Warren; Gan, Xiangchao; Nicod, Jerome; Rivera, Margarita; Deng, Hong; Du, Bo; Li, Keqing; Sang, Wenhu; Gao, Jingfang; Gao, Shugui; Ha, Baowei; Ho, Hung-Yao; Hu, Chunmei; Hu, Jian; Hu, Zhenfei; Huang, Guoping; Jiang, Guoqing; Jiang, Tao; Jin, Wei; Li, Gongying; Li, Kan; Li, Yi; Li, Yingrui; Li, Youhui; Lin, Yu-Ting; Liu, Lanfen; Liu, Tiebang; Liu, Ying; Liu, Yuan; Lu, Yao; Lv, Luxian; Meng, Huaqing; Qian, Puyi; Sang, Hong; Shen, Jianhua; Shi, Jianguo; Sun, Jing; Tao, Ming; Wang, Gang; Wang, Guangbiao; Wang, Jian; Wang, Linmao; Wang, Xueyi; Wang, Xumei; Yang, Huanming; Yang, Lijun; Yin, Ye; Zhang, Jinbei; Zhang, Kerang; Sun, Ning; Zhang, Wei; Zhang, Xiuqing; Zhang, Zhen; Zhong, Hui; Breen, Gerome; Wang, Jun; Marchini, Jonathan; Chen, Yiping; Xu, Qi; Xu, Xun; Mott, Richard; Huang, Guo-Jen; Kendler, Kenneth; Flint, Jonathan

    2015-05-01

    Adversity, particularly in early life, can cause illness. Clues to the responsible mechanisms may lie with the discovery of molecular signatures of stress, some of which include alterations to an individual's somatic genome. Here, using genome sequences from 11,670 women, we observed a highly significant association between a stress-related disease, major depression, and the amount of mtDNA (p = 9.00 × 10(-42), odds ratio 1.33 [95% confidence interval [CI] = 1.29-1.37]) and telomere length (p = 2.84 × 10(-14), odds ratio 0.85 [95% CI = 0.81-0.89]). While both telomere length and mtDNA amount were associated with adverse life events, conditional regression analyses showed the molecular changes were contingent on the depressed state. We tested this hypothesis with experiments in mice, demonstrating that stress causes both molecular changes, which are partly reversible and can be elicited by the administration of corticosterone. Together, these results demonstrate that changes in the amount of mtDNA and telomere length are consequences of stress and entering a depressed state. These findings identify increased amounts of mtDNA as a molecular marker of MD and have important implications for understanding how stress causes the disease. PMID:25913401

  12. (abstract) Topographic Signatures in Geology

    NASA Technical Reports Server (NTRS)

    Farr, Tom G.; Evans, Diane L.

    1996-01-01

    Topographic information is required for many Earth Science investigations. For example, topography is an important element in regional and global geomorphic studies because it reflects the interplay between the climate-driven processes of erosion and the tectonic processes of uplift. A number of techniques have been developed to analyze digital topographic data, including Fourier texture analysis. A Fourier transform of the topography of an area allows the spatial frequency content of the topography to be analyzed. Band-pass filtering of the transform produces images representing the amplitude of different spatial wavelengths. These are then used in a multi-band classification to map units based on their spatial frequency content. The results using a radar image instead of digital topography showed good correspondence to a geologic map, however brightness variations in the image unrelated to topography caused errors. An additional benefit to the use of Fourier band-pass images for the classification is that the textural signatures of the units are quantative measures of the spatial characteristics of the units that may be used to map similar units in similar environments.

  13. Molecular Signatures of Major Depression

    PubMed Central

    Cai, Na; Chang, Simon; Li, Yihan; Li, Qibin; Hu, Jingchu; Liang, Jieqin; Song, Li; Kretzschmar, Warren; Gan, Xiangchao; Nicod, Jerome; Rivera, Margarita; Deng, Hong; Du, Bo; Li, Keqing; Sang, Wenhu; Gao, Jingfang; Gao, Shugui; Ha, Baowei; Ho, Hung-Yao; Hu, Chunmei; Hu, Jian; Hu, Zhenfei; Huang, Guoping; Jiang, Guoqing; Jiang, Tao; Jin, Wei; Li, Gongying; Li, Kan; Li, Yi; Li, Yingrui; Li, Youhui; Lin, Yu-Ting; Liu, Lanfen; Liu, Tiebang; Liu, Ying; Liu, Yuan; Lu, Yao; Lv, Luxian; Meng, Huaqing; Qian, Puyi; Sang, Hong; Shen, Jianhua; Shi, Jianguo; Sun, Jing; Tao, Ming; Wang, Gang; Wang, Guangbiao; Wang, Jian; Wang, Linmao; Wang, Xueyi; Wang, Xumei; Yang, Huanming; Yang, Lijun; Yin, Ye; Zhang, Jinbei; Zhang, Kerang; Sun, Ning; Zhang, Wei; Zhang, Xiuqing; Zhang, Zhen; Zhong, Hui; Breen, Gerome; Wang, Jun; Marchini, Jonathan; Chen, Yiping; Xu, Qi; Xu, Xun; Mott, Richard; Huang, Guo-Jen; Kendler, Kenneth; Flint, Jonathan

    2015-01-01

    Summary Adversity, particularly in early life, can cause illness. Clues to the responsible mechanisms may lie with the discovery of molecular signatures of stress, some of which include alterations to an individual’s somatic genome. Here, using genome sequences from 11,670 women, we observed a highly significant association between a stress-related disease, major depression, and the amount of mtDNA (p = 9.00 × 10?42, odds ratio 1.33 [95% confidence interval [CI] = 1.29–1.37]) and telomere length (p = 2.84 × 10?14, odds ratio 0.85 [95% CI = 0.81–0.89]). While both telomere length and mtDNA amount were associated with adverse life events, conditional regression analyses showed the molecular changes were contingent on the depressed state. We tested this hypothesis with experiments in mice, demonstrating that stress causes both molecular changes, which are partly reversible and can be elicited by the administration of corticosterone. Together, these results demonstrate that changes in the amount of mtDNA and telomere length are consequences of stress and entering a depressed state. These findings identify increased amounts of mtDNA as a molecular marker of MD and have important implications for understanding how stress causes the disease. PMID:25913401

  14. Molecular signatures of vaccine adjuvants.

    PubMed

    Olafsdottir, Thorunn; Lindqvist, Madelene; Harandi, Ali M

    2015-09-29

    Mass vaccination has saved millions of human lives and improved the quality of life in both developing and developed countries. The emergence of new pathogens and inadequate protection conferred by some of the existing vaccines such as vaccines for tuberculosis, influenza and pertussis especially in certain age groups have resulted in a move from empirically developed vaccines toward more pathogen tailored and rationally engineered vaccines. A deeper understanding of the interaction of innate and adaptive immunity at molecular level enables the development of vaccines that selectively target certain type of immune responses without excessive reactogenicity. Adjuvants constitute an imperative element of modern vaccines. Although a variety of candidate adjuvants have been evaluated in the past few decades, only a limited number of vaccine adjuvants are currently available for human use. A better understanding of the mode of action of adjuvants is pivotal to harness the potential of existing and new adjuvants in shaping a desired immune response. Recent advancement in systems biology powered by the emerging cutting edge omics technology has led to the identification of molecular signatures rapidly induced after vaccination in the blood that correlate and predict a later protective immune response or vaccine safety. This can pave ways to prospectively determine the potency and safety of vaccines and adjuvants. This review is intended to highlight the importance of big data analysis in advancing our understanding of the mechanisms of actions of adjuvants to inform rational development of future human vaccines. PMID:25989447

  15. Infrared signatures from bomb detonations

    NASA Astrophysics Data System (ADS)

    Orson, Jay A.; Bagby, William F.; Perram, Glen P.

    2003-04-01

    Remote observations of the temporal and spectral characteristics of the infrared emissions from bomb detonations have been correlated with explosion conditions. A Fourier transform interferometer was used to record spectra in the 1.6-20 ?m range at spectral resolutions of 4-16 cm -1 and temporal resolutions of 0.047-0.123 s. Field observations of 56 detonation events included a set of aircraft delivered ordinance and a series of static ground detonations for a variety of bomb sizes, types and environmental conditions. The emission is well represented by a gray body with continuously decreasing temperature and characteristic decay times of 1-4 s, providing only limited variability with detonation conditions. However, the fireball size times the emissivity as a function of time can be determined from the spectra without imaging and provides a more sensitive signature. The degree of temporal overlap as a function of frequency for a pair of detonation events provides a very sensitive discriminator for explosion conditions. The temporal overlap decreases with increasing emission frequency for all the observed events, indicating more information content at higher frequencies.

  16. Online Advertising in Social Networks

    NASA Astrophysics Data System (ADS)

    Bagherjeiran, Abraham; Bhatt, Rushi P.; Parekh, Rajesh; Chaoji, Vineet

    Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. This chapter focuses on the role of social network information in online display advertising.

  17. Optical Verification Laboratory Demonstration System for High Security Identification Cards

    NASA Technical Reports Server (NTRS)

    Javidi, Bahram

    1997-01-01

    Document fraud including unauthorized duplication of identification cards and credit cards is a serious problem facing the government, banks, businesses, and consumers. In addition, counterfeit products such as computer chips, and compact discs, are arriving on our shores in great numbers. With the rapid advances in computers, CCD technology, image processing hardware and software, printers, scanners, and copiers, it is becoming increasingly easy to reproduce pictures, logos, symbols, paper currency, or patterns. These problems have stimulated an interest in research, development and publications in security technology. Some ID cards, credit cards and passports currently use holograms as a security measure to thwart copying. The holograms are inspected by the human eye. In theory, the hologram cannot be reproduced by an unauthorized person using commercially-available optical components; in practice, however, technology has advanced to the point where the holographic image can be acquired from a credit card-photographed or captured with by a CCD camera-and a new hologram synthesized using commercially-available optical components or hologram-producing equipment. Therefore, a pattern that can be read by a conventional light source and a CCD camera can be reproduced. An optical security and anti-copying device that provides significant security improvements over existing security technology was demonstrated. The system can be applied for security verification of credit cards, passports, and other IDs so that they cannot easily be reproduced. We have used a new scheme of complex phase/amplitude patterns that cannot be seen and cannot be copied by an intensity-sensitive detector such as a CCD camera. A random phase mask is bonded to a primary identification pattern which could also be phase encoded. The pattern could be a fingerprint, a picture of a face, or a signature. The proposed optical processing device is designed to identify both the random phase mask and the primary pattern [1-3]. We have demonstrated experimentally an optical processor for security verification of objects, products, and persons. This demonstration is very important to encourage industries to consider the proposed system for research and development.

  18. Result verification, code verification and computation of support values in phylogenetics.

    PubMed

    Stamatakis, Alexandros; Izquierdo-Carrasco, Fernando

    2011-05-01

    Verification in phylogenetics represents an extremely difficult subject. Phylogenetic analysis deals with the reconstruction of evolutionary histories of species, and as long as mankind is not able to travel in time, it will not be possible to verify deep evolutionary histories reconstructed with modern computational methods. Here, we focus on two more tangible issues that are related to verification in phylogenetics (i) the inference of support values on trees that provide some notion about the 'correctness' of the tree within narrow limits and, more importantly; (ii) issues pertaining to program verification, especially with respect to codes that rely heavily on floating-point arithmetics. Program verification represents a largely underestimated problem in computational science that can have fatal effects on scientific conclusions. PMID:21257650

  19. The AdaptiV Approach to Verification of Adaptive Systems

    SciTech Connect

    Rouff, Christopher; Buskens, Richard; Pullum, Laura L; Cui, Xiaohui; Hinchey, Mike

    2012-01-01

    Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

  20. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...the person conducting or intending to conduct the weather modification activities referred to therein by such...

  1. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National... or intending to conduct the weather modification activities referred to therein by such...

  2. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National... or intending to conduct the weather modification activities referred to therein by such...

  3. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National... or intending to conduct the weather modification activities referred to therein by such...

  4. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National... or intending to conduct the weather modification activities referred to therein by such...

  5. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...REGULATIONS MAINTAINING REC-ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...behalf of the person conducting or intending to conduct the weather modification activities referred to therein by such...

  6. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...REGULATIONS MAINTAINING REC- ORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...behalf of the person conducting or intending to conduct the weather modification activities referred to therein by such...

  7. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...REGULATIONS MAINTAINING RECORDS AND SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All...behalf of the person conducting or intending to conduct the weather modification activities referred to therein by such...

  8. 76 FR 30542 - Adult Signature Services

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-26

    ...omit columns on Form 3877 that are not applicable to Adult Signature. Required elements are the package identification code (PIC), address, 5-digit destination ZIP Code, and applicable fees. To obtain firm sheets receipted by the USPS, the...

  9. Analysis of multispectral signatures of the shot

    NASA Astrophysics Data System (ADS)

    Kastek, Mariusz; Dulski, Rafa?; Pi?tkowski, Tadeusz; Madura, Henryk; Bare?a, Jaros?aw; Polakowski, Henryk

    2011-06-01

    The paper presents some practical aspects of sniper IR signature measurements. Description of particular signatures for sniper shot in typical scenarios has been presented. We take into consideration sniper activities in the open area as well as in urban environment. The measurements were made at field test ground. High precision laboratory measurements were also performed. Several infrared cameras were used during measurements to cover all measurement assumptions. Some of the cameras are measurement-class devices with high accuracy and frame rates. The registrations were simultaneously made in UV, NWIR, SWIR and LWIR spectral bands. The infrared cameras have possibilities to install optical filters for multispectral measurement. An ultra fast visual camera was also used for visible spectra registration. Exemplary sniper IR signatures for typical situation were presented. LWIR imaging spectroradiometer HyperCam was also used during the laboratory measurements and field experiments. The signatures collected by HyperCam were useful for the determination of spectral characteristics of shot.

  10. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...Commerce and Foreign Trade (Continued) NATIONAL OCEANIC AND ATMOSPHERIC ADMINISTRATION, DEPARTMENT OF COMMERCE GENERAL REGULATIONS...Signature. All reports filed with the National Oceanic and Atmospheric Administration must be dated and signed by or on behalf...

  11. Experimental demonstration of photonic quantum digital signatures

    NASA Astrophysics Data System (ADS)

    Collins, Robert J.; Clarke, Patrick J.; Dunjko, Vedran; Andersson, Erika; Jeffers, John; Buller, Gerald S.

    2012-09-01

    Digital signature schemes are often used in interconnected computer networks to verify the origin and authenticity of messages. Current classical digital signature schemes based on so-called "one-way functions" rely on computational complexity to provide security over sufficiently long timescales. However, there are currently no mathematical proofs that such functions will always be computationally complex. Quantum digital signatures offers a means of confirming both origin and authenticity of a message with security verified by information theoretical limits. The message cannot be forged or repudiated. We have constructed, tested and analyzed the security of what is, to the best of our knowledge, the first example of an experimental quantum digital signature system.

  12. Composite Signature Based Watermarking for Fingerprint Authentication

    E-print Network

    Ahmed, Farid

    Composite Signature Based Watermarking for Fingerprint Authentication Farid Ahmed Department of fingerprints. Keywords PhasemarkTM, biometric authentication, fingerprint, watermarking, composite filter their physiological and behavioral characteristics such as fingerprint, face, iris, hand geometry, keystroke, voice

  13. 15 CFR 908.16 - Signature.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... SUBMITTING REPORTS ON WEATHER MODIFICATION ACTIVITIES § 908.16 Signature. All reports filed with the National... or intending to conduct the weather modification activities referred to therein by such...

  14. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  15. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  16. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  17. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  18. 5 CFR 850.106 - Electronic signatures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...recognition; (2) Cryptographic control methods, including— (i) Shared symmetric key cryptography; (ii) Public/private key (asymmetric) cryptography, also known as digital signatures; (3) Any combination of methods described...

  19. Online Knowledge Communities.

    ERIC Educational Resources Information Center

    de Vries, Sjoerd; Bloemen, Paul; Roossink, Lonneke

    This paper describes the concept of online knowledge communities. The concept is defined, and six qualities of online communities are identified: members (user roles are clearly defined); mission (generally accepted goal-statement, ideas, beliefs, etc.); commitment (members give their loyalty to the mission); social interaction (frequent…

  20. Online Videoconferencing Products: Update

    ERIC Educational Resources Information Center

    Burton, Douglas; Kitchen, Tim

    2011-01-01

    Software allowing real-time online video connectivity is rapidly evolving. The ability to connect students, staff, and guest speakers instantaneously carries great benefits for the online distance education classroom. This evaluation report compares four software applications at opposite ends of the cost spectrum: "DimDim", "Elluminate VCS",…

  1. Online Collaboration: Curriculum Unbound!

    ERIC Educational Resources Information Center

    Waters, John K.

    2007-01-01

    Freed from the nuisances of paper-based methods, districts are making creative use of digital tools to move their curricular documents online, where educators can collaborate on course development and lesson planning. Back in 2003, Amarillo Independent School District (Texas) had begun using the Blackboard Content System to provide lessons online.…

  2. Compositional Algorithmic Verification of Software Product Lines

    E-print Network

    Gurov, Dilian

    to their application con- text. Software product line engineering [23] aims at developing a set of systems variantsCompositional Algorithmic Verification of Software Product Lines Ina Schaefer1 , Dilian Gurov2 line engineering allows large software sys- tems to be developed and adapted for varying customer needs

  3. Environmental Technology Verification (ETV) Quality Program (Poster)

    EPA Science Inventory

    This is a poster created for the ETV Quality Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The...

  4. WORKSHOP ON VERIFICATION OF WATER QUALITY MODELS

    EPA Science Inventory

    The U.S. Environmental Protection Agency sponsored a 'National Workshop on the Verification of Water Quality Models' to evaluate the state-of-the-art of water quality modeling and make specific recommendations for the direction of future modeling efforts. Participants represented...

  5. Environmental Technology Verification Program Fact Sheet

    EPA Science Inventory

    This is a Fact Sheet for the ETV Program. The EPA Environmental Technology Verification Program (ETV) develops test protocols and verifies the performance of innovative technologies that have the potential to improve protection of human health and the environment. The program ...

  6. 1 Verification Techniques software testing: search bugs

    E-print Network

    Verschelde, Jan

    static and dynamic testing 2 Programming by Contract assert statements in Python using preconditions objectives and requirements of software verification Software is a product, subject to quality control is part of the software development process (be it waterfall or spiral): 1 companies often employ as many

  7. LONG TERM VERIFICATION OF DUST SUPPRESSION PERFORMANCE

    EPA Science Inventory

    The paper focuses on the Environmental Technology Verification (ETV) Program and provides data from a 3-month test as an example of the Program's output. Research Triangle Institute and its subcontractor, Midwest Research Institute, are verifying the performance of dust suppressi...

  8. Automatic Verification of Autonomous Robot Missions

    E-print Network

    or critical missions, performance guarantees should be made available. This paper overviews a software system and the environment are then evaluated by VIPARS, a verification software module in development, and compared to specific performance criteria. The user is returned a probability that the performance criteria will hold

  9. ROTIV: RFID Ownership Transfer with Issuer Verification

    E-print Network

    International Association for Cryptologic Research (IACR)

    ROTIV: RFID Ownership Transfer with Issuer Verification Kaoutar Elkhiyaoui, Erik-Oliver Blass.molva}@eurecom.fr Abstract. RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner owns to evaluate a hash function. 1 Introduction Supply chain management is one of the main applications of RFID

  10. Heuristic Optimization and Dynamical System Safety Verification

    E-print Network

    Neller, Todd W.

    safety verification task: Given bounds on the system parameters of a stepper motor (e.g. viscous fric S N S S N 3. 4. 1. 2. Fig. 1. Simple Stepper Motor Stepping and Jm are load and motor shaft inertia), and an open­loop motor acceleration control, verify that no scenario exists in which the motor stalls. We

  11. DATE OF BIRTH VERIFICATION RETURN FORM

    E-print Network

    Minnesota, University of

    DATE OF BIRTH VERIFICATION RETURN FORM: BY MAIL TO: Office of Student Finance 20 Fraser Hall 106. DIRECTIONS--You must verify your date of birth for processing of your 2014­2015 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your birth certificate, U.S. passport

  12. DATE OF BIRTH VERIFICATION RETURN FORM

    E-print Network

    Minnesota, University of

    DATE OF BIRTH VERIFICATION RETURN FORM: BY MAIL TO: Office of Student Finance 20 Fraser Hall 106--You must verify your date of birth for processing of your 2015­2016 Free Application for Federal Student Aid (FAFSA) to continue. Please attach a legible copy of your birth certificate, U.S. passport

  13. Hybrid cc, Hybrid Automata and Program Verification

    E-print Network

    Jagadeesan, Radha

    of differential equations and real analysis on the one hand, and the theory of programming languages on the otherHybrid cc, Hybrid Automata and Program Verification (Extended Abstract) Vineet Gupta ? Radha Jagadeesan ?? Vijay Saraswat ? 1 Introduction Synchronous programming. Discrete event driven systems [HP85

  14. Secure Fuzzy Vault Based Fingerprint Verification System

    E-print Network

    Verbauwhede, Ingrid

    in the field of biometric authentication. A. Fingerprint Fuzzy Vault The fuzzy commitment scheme is first fingerprint verification system based on the fuzzy vault scheme, where the sensitive biometric template with an acceptable unlock rate for the legal users is achieved. I. INTRODUCTION The authentication system based

  15. Distributed Verification and Hardness of Distributed Approximation

    E-print Network

    Distributed Verification and Hardness of Distributed Approximation Atish Das Sarma Google Foundation (BSF). Permission to make digital or hard copies of all or part of this work for personal on the hardness of distributed approxi- mation for many classical optimization problems including minimum spanning

  16. DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION

    E-print Network

    DISTRIBUTED VERIFICATION AND HARDNESS OF DISTRIBUTED APPROXIMATION ATISH DAS SARMA, STEPHAN HOLZER on the hardness of distributed approximation for many classical optimization problems including minimum spanning the previous hardness of approximation bound of Elkin [STOC 2004] as well as the lower bound for (exact) MST

  17. Automatic Generation of Invariants in Processor Verification

    E-print Network

    Dill, David L.

    Automatic Generation of Invariants in Processor Verification Jeffrey X. Su, David L. Dill, and Clark W. Barrett Computer Science Department Stanford University Abstract. A central task in formal the method and exercised it on a description of the FLASH Protocol Processor (PP), a microprocessor designed

  18. Secure Location Verification Using Radio Broadcast

    E-print Network

    Nesterenko, Mikhail

    , exploits the difference between propagation speeds of radio and sound waves to estimate the position1 Secure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Abstract of the prover. In this paper, we propose a solution that leverages the broadcast nature of the radio signal

  19. Secure Location Verification Using Radio Broadcast

    E-print Network

    Nesterenko, Mikhail

    the difference between propagation speeds of radio and sound waves to estimate the position of the proverSecure Location Verification Using Radio Broadcast Adnan Vora and Mikhail Nesterenko Computer. In this paper, we propose a solution that leverages the broadcast nature of the radio signal emitted

  20. Hardware verification at Computational Logic, Inc.

    NASA Technical Reports Server (NTRS)

    Brock, Bishop C.; Hunt, Warren A., Jr.

    1990-01-01

    The following topics are covered in viewgraph form: (1) hardware verification; (2) Boyer-Moore logic; (3) core RISC; (4) the FM8502 fabrication, implementation specification, and pinout; (5) hardware description language; (6) arithmetic logic generator; (7) near term expected results; (8) present trends; (9) future directions; (10) collaborations and technology transfer; and (11) technology enablers.