Science.gov

Sample records for private overlays secure

  1. Algorithmsf or Secure Overlay Services Algorithmsf or Secure Overlay Service

    E-print Network

    to a servlet f or the target . lient A customer of the S he term is use to ref er to A s connecte the conte t of this a er the term ill ref er to an overlay hich contains the eacons servlets if they are clients that connect into routers ithin the O . Servlet A no e in the overlay hich rovi es access

  2. Using overlays to improve network security

    NASA Astrophysics Data System (ADS)

    Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel

    2002-07-01

    As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.

  3. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  4. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  5. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  6. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  7. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  8. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 true Privately owned weapons-security. 552.116 Section 552...Washington § 552.116 Privately owned weapons—security. Privately owned arms...secured in the manner required for military weapons and ammunition but separate from...

  9. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  10. Secure Overlay Network Design Li (Erran) Li1

    E-print Network

    Li, Li Erran

    and Artificial Intelligence Lab mirrokni@theory.csail.mit.edu Abstract. Due to the increasing security threats infrastructure is very challenging due to security threats in the Internet. Distributed Denial of Service #12;(DDoS) attacks are a major threat to Internet security. Attacks against high-profile web sites

  11. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    NASA Astrophysics Data System (ADS)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  12. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  13. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  14. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  15. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records Administration, Information Security Oversight... relating to the Classified National Security Information Program for State, Local, Tribal, and...

  16. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... National Security Information Program for State, Local, Tribal, and Private Sector Entities By the... established a Classified National Security Information Program (Program) designed to safeguard and govern access to classified national security information shared by the Federal Government with State,...

  17. Analysis of Routing Algorithms for Secure Overlay Services DLC 4/22/02 1

    E-print Network

    the traffic to a servlet for the target. · Client: A customer of the ISP. The term is used to refer to LANs the beacons, servlets and access points as required by SOS. The nodes may be within ISP(s) or client nodes that connect into routers within the POP. · Servlet: A node in the overlay which provides access to the target

  18. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  19. Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising Privacy

    E-print Network

    Amir, Yair

    Cryptography for Secure and Private Databases: Enabling Practical Data Access without Compromising search or a look at one's health records. While much research has considered the problem of securing data harm his patient's interests (e.g., queries by a disease specialist might indicate a potential

  20. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware-software combined hybrid approach because of a too limited phase space of a single RFID for any meaningful encryption approach. Furthermore, a useful biological lesson is not to put all eggs in one basket, "if you don't get it all, you can't hack it". According to the Radar physics, we can choose the amplitude, the frequency, the phase, the polarization, and two radiation energy supply principles, the capacitance coupling (~6m) and the inductance coupling (<1m), to code the pair of tags differently. A casual skimmer equipped with single-mode reader can not read all. We consider near-field and mid-field applications each in this paper. The near-field is at check-out counters or the convey-belt inventory involving sensitive and invariant data. The mid-field search & rescue involves not only item/person identification, but also the geo-location. If more RF power becomes cheaper & portable for longer propagation distance in the near future, then a triangulation with pair of secured readers, located at known geo-locations, could interrogate and identify items/persons and their locations in a GPS-blind environment.

  1. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  2. Secure Evaluation of Private Linear Branching Programs with Medical Applications

    E-print Network

    International Association for Cryptologic Research (IACR)

    @research.bell-labs.com 3 Horst G¨ortz Institute for IT-Security, Ruhr-University Bochum, Germany {ahmad.sadeghi,thomas.schneider}@trust.rub of privacy of both parties. On the one hand, the user's data might be sensitive and security-critical (e diagnostics, trade- and work-flow information in benchmarking of enterprises). On the other hand, the service

  3. Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication

    NASA Astrophysics Data System (ADS)

    Gong, Li-Hua; Liu, Ye; Zhou, Nan-Run

    2013-09-01

    Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.

  4. Malicious-Client Security in Blind Seer: A Scalable Private DBMS

    E-print Network

    International Association for Cryptologic Research (IACR)

    Malicious-Client Security in Blind Seer: A Scalable Private DBMS Ben Fisch, Binh Vo, Fernando Krell DBMS that affords both client query privacy and server data protection. It also provides the ability to enforce authorization policies on the system, restricting client's queries while maintaining the privacy

  5. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  6. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  7. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Contractors performing private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  8. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ...This Rule establishes policy, assigns responsibilities and provides procedures for the regulation of the selection, accountability, training, equipping, and conduct of personnel performing private security functions under a covered contract during contingency operations, combat operations or other significant military operations. It also assigns responsibilities and establishes procedures for......

  9. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD. PMID:26453195

  10. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by any... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and...

  11. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by any... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and...

  12. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by any... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and...

  13. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by any... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and...

  14. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by any... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and...

  15. The effectiveness of an electronic security management system in a privately owned apartment complex.

    PubMed

    Greenberg, David F; Roush, Jeffrey B

    2009-02-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment buildings in New York City. Crime rates in a control apartment complex under the same ownership, and in the police precinct in which the 2 complexes are located, serve as controls. PMID:19001121

  16. Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 2005) Identity Theft Protection in Structured Overlays

    E-print Network

    Almeroth, Kevin C.

    Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 2005) Identity Theft-scale stor- age. We identify the main attack in these networks as a form of P2P identity theft, where scale, use of low cost identities, and distribution across independent network domains, we cannot treat

  17. Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 2005) Identity Theft Protection in Structured Overlays #

    E-print Network

    Almeroth, Kevin C.

    Appears in Proceedings of the 1st Workshop on Secure Network Protocols (NPSec 2005) Identity Theft­scale stor­ age. We identify the main attack in these networks as a form of P2P identity theft, where scale, use of low cost identities, and distribution across independent network domains, we cannot treat

  18. Contracting-out in the United Kingdom: a partnership between social security and private pension plans.

    PubMed

    Daykin, Chris

    2002-01-01

    Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans. PMID:12503327

  19. Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-Teen Mobile Safety

    E-print Network

    Washington at Seattle, University of

    Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-Teen, are advertised as useful or even necessary for good parenting of teens. Simultaneously, there is a growing market for parent-teen relationships, af- fecting domains such as privacy, trust, and maturation. Not only the teen

  20. Polymer concrete overlays

    NASA Astrophysics Data System (ADS)

    Banks, R. K.; Oconnor, D. L.; Butler, H. D.; Hustace, D.; Craig, F. S.

    1982-01-01

    The status and performance to date of an experimental bridge deck overlay of polymer concrete consisting of 4 courses of polyester styrene resin and sand aggregate are given. The primary purpose of such an overlay is to bar against moisture penetrating into the top surface of the concrete and perpetuating corrosion of the reinforcing steel, and also to keep away further chloride contamination.

  1. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  2. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  3. 26 CFR 1.141-4 - Private security or payment test.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... date, the issuer may assume that the future interest rate on a variable yield bond will be the then... business use (for example, a facility that is the subject of a management contract that results in private... for P by D, a nongovernmental person, under a management contract that results in private business...

  4. The business of medicine: how to overcome financial obstacles and secure financing for your private practice and ancillary services business.

    PubMed

    Nayor, David

    2012-01-01

    Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms. PMID:22920034

  5. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV. PMID:20377597

  6. The application of nuclear and national security safeguard strategies to the insider threat in the private sector

    SciTech Connect

    Campbell, G.K. )

    1991-01-01

    This paper reports that the insider threat in commercial enterprises represents multi-billion dollar losses on an annual basis. While much of this experience is in low value, theft-related shrinkage, there are a growing number of organizations where the loss or compromise of critical assets or interruption of vital systems cannot be tolerated. In very real ways, the survival of the organization may turn on the hostile acts of knowledgeable insiders. The nuclear and National security information operations environments represents a baseline of experience from which the corporate world can draw for cost-effective, alternative approaches to this threat. However, it is equally clear that there are a variety of subtle and obvious constraints imposed by the private sector's mission, service delivery, lifestyle and cost-benefit requirements which dictate careful planning and user involvement in safeguards development and application. Where protection of our National security assets are grounded in a consequence-driven set of policies and standards, the private sector is often subject to the lack of a similar (but directly analogous) policy foundation.

  7. Electrically conductive polymer concrete overlays

    NASA Astrophysics Data System (ADS)

    Fontana, J. J.; Webster, R. P.

    1984-08-01

    The use of cathodic protection to prevent the corrosion of reinforcing steel in concrete structures has been well established. Application of a durable, skid-resistant electrically conductive polymer concrete overlay would advance the use of cathodic protection for the highway industry. Laboratory studies indicate that electrically conductive polymer concrete overlays using conductive fillers, such as calcined coke breeze, in conjunction with polyester or vinyl ester resins have resistivities of 1 to 10 ohm-cm. Both multiple-layer and premixed mortar-type overlays were made. Shear bond strengths of the conductive overlays to concrete substrates vary from 600 to 1300 psi, with the premixed overlays having bond strengths 50 to 100% higher than the multiple-layer overlays.

  8. Sociological investigation of infant overlaying death 

    E-print Network

    Sartain, Sheree

    2012-11-28

    Overlaying was a common nineteenth century explanation of sudden infant death while bedsharing. This thesis shows that in many cases the term overlaying was a misnomer, and instead it identifies infant overlaying death ...

  9. Method for Providing Secure and Private Fine-grained Access to Outsourced Data

    E-print Network

    New South Wales, University of

    in encrypted form and associated with access control mechanism. In this work, we consider the Attribute based Policy Attribute based Encryption (CP-ABE) scheme to support write operations. We define a group among: Security; fine-grained access control; attribute based encryption (ABE); write operation. 1 Introduction

  10. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Li, Jian; Jia, Lu; Zhou, Hong-Fu; Zhang, Ting-Ting

    2015-09-01

    We propose a new quantum private comparison protocol with the help of a semi-honest third party (TP), enabling two participants to compare the equality of their private inputs without exposing any information about their respective private inputs. Different from previous protocols, our protocol utilizes the properties of entanglement swapping between three-particle W-Class state and Bell state. The presented protocol can ensure correctness, fairness and security. Meanwhile, all the quantum particles undergo a one-way transmission, and all the participants including TP are just required having the ability to perform Bell-state measurement and exclusive-or operation which make our protocol more feasible and efficient. At last, the security of this protocol with respect to various kinds of attacks is analyzed in detail.

  11. Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

    E-print Network

    Hall, Rob; Fienberg, Stephen

    2011-01-01

    Preserving the privacy of individual databases when carrying out statistical calculations has a long history in statistics and had been the focus of much recent attention in machine learning In this paper, we present a protocol for computing logistic regression when the data are held by separate parties without actually combining information sources by exploiting results from the literature on multi-party secure computation. We provide only the final result of the calculation compared with other methods that share intermediate values and thus present an opportunity for compromise of values in the combined database. Our paper has two themes: (1) the development of a secure protocol for computing the logistic parameters, and a demonstration of its performances in practice, and (2) and amended protocol that speeds up the computation of the logistic function. We illustrate the nature of the calculations and their accuracy using an extract of data from the Current Population Survey divided between two parties.

  12. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  13. Strategies of Conflict in Coexisting Streaming Overlays

    E-print Network

    Li, Baochun

    Strategies of Conflict in Coexisting Streaming Overlays Chuan Wu, Baochun Li Department-to-peer streaming overlays, corresponding to channels of programming. With coex- isting streaming overlays, one to satisfy the required streaming rate in each overlay, as well as to minimize streaming costs. In this paper

  14. Secure and Manageable Virtual Private Networks for End-users Kenichi Kourai Toshio Hirotsu Koji Sato Osamu Akashi Kensuke Fukuda

    E-print Network

    Kourai, Kenichi

    - pensable for people who exchange private information via the Internet. VPNs protect private information receive mail from the mail server inside her corporate network. Simultaneously, she may use online shopping sites and send private information such as her credit card number using SSL [4]. Moreover, VPNs

  15. New analytical algorithm for overlay accuracy

    NASA Astrophysics Data System (ADS)

    Ham, Boo-Hyun; Yun, Sangho; Kwak, Min-Cheol; Ha, Soon Mok; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    The extension of optical lithography to 2Xnm and beyond is often challenged by overlay control. With reduced overlay measurement error budget in the sub-nm range, conventional Total Measurement Uncertainty (TMU) data is no longer sufficient. Also there is no sufficient criterion in overlay accuracy. In recent years, numerous authors have reported new method of the accuracy of the overlay metrology: Through focus and through color. Still quantifying uncertainty in overlay measurement is most difficult work in overlay metrology. According to the ITRS roadmap, total overlay budget is getting tighter than former device node as a design rule shrink on each device node. Conventionally, the total overlay budget is defined as the square root of square sum of the following contributions: the scanner overlay performance, wafer process, metrology and mask registration. All components have been supplying sufficiently performance tool to each device nodes, delivering new scanner, new metrology tools, and new mask e-beam writers. Especially the scanner overlay performance was drastically decreased from 9nm in 8x node to 2.5nm in 3x node. The scanner overlay seems to reach the limitation the overlay performance after 3x nod. The importance of the wafer process overlay as a contribution of total wafer overlay became more important. In fact, the wafer process overlay was decreased by 3nm between DRAM 8x node and DRAM 3x node. We develop an analytical algorithm for overlay accuracy. And a concept of nondestructive method is proposed in this paper. For on product layer we discovered the layer has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. In this paper, authors suggest an analytical algorithm for overlay accuracy. And a concept of non-destructive method is proposed in this paper. For on product layers, we discovered it has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. Furthermore total overlay error data is decomposed into two parts: the systematic error and the random error. And we tried to show both error components characteristic, systematic error has a good correlation with residual error by scanner condition, whereas, random error has a good correlation with residual error as going process steps. Furthermore, we demonstrate the practical using case with proposed method that shows the working of the high order method through systematic error. Our results show that to characterize an overlay data that is suitable for use in advanced technology nodes requires much more than just evaluating the conventional metrology metrics of TIS and TMU.

  16. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  17. Securing Structured Overlays against Identity Attacks

    E-print Network

    Almeroth, Kevin C.

    for a given file, or return falsified contents of an online shopper's shopping cart. In this paper, we define a generalized form of the Identity attack, and propose a lightweight detection and tracking system that protects application component. For example, Amazon uses Dynamo servers to store informa- tion about user shopping

  18. Fabrication of magnetic bubble memory overlay

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Self-contained magnetic bubble memory overlay is fabricated by process that employs epitaxial deposition to form multi-layered complex of magnetically active components on single chip. Overlay fabrication comprises three metal deposition steps followed by subtractive etch.

  19. 32nm overlay improvement capabilities

    NASA Astrophysics Data System (ADS)

    Eichelberger, Brad; Huang, Kevin; O'Brien, Kelly; Tien, David; Tsai, Frank; Minvielle, Anna; Singh, Lovejeet; Schefske, Jeffrey

    2008-03-01

    The industry is facing a major challenge looking forward on the technology roadmap with respect to overlay control. Immersion lithography has established itself as the POR for 45nm and for the next few nodes. As the gap closes between scanner capability and device requirements new methodologies need to be taken into consideration. Double patterning lithography is an approach that's being considered for 32 and below, but it creates very strict demands for overlay performance. The fact that a single layer device will need to be patterned using two sequential single processes creates a strong coupling between the 1st and 2nd exposure. The coupling effect during the double patterning process results in extremely tight tolerances for overlay error and scanner capabilities. The purpose of this paper is to explore a new modeling method to improve lithography performance for the 32nm node. Not necessarily unique for double patterning, but as a general approach to improve overlay performance regardless of which patterning process is implemented. We will achieve this by performing an in depth source of variance analysis of current scanner performance and project the anticipated improvements from our new modeling approach. Since the new modeling approach will involve 2nd and 3rd order corrections we will also provide and analysis that outlines current metrology capabilities and sampling optimizations to further expand the opportunities of an efficient implementation of such approach.

  20. Advanced overlay analysis through design based metrology

    NASA Astrophysics Data System (ADS)

    Ji, Sunkeun; Yoo, Gyun; Jo, Gyoyeon; Kang, Hyunwoo; Park, Minwoo; Kim, Jungchan; Park, Chanha; Yang, Hyunjo; Yim, Donggyu; Maruyama, Kotaro; Park, Byungjun; Yamamoto, Masahiro

    2015-03-01

    As design rule shrink, overlay has been critical factor for semiconductor manufacturing. However, the overlay error which is determined by a conventional measurement with an overlay mark based on IBO and DBO often does not represent the physical placement error in the cell area. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion caused by etching or CMP also can be a source of the mismatch. In 2014, we have demonstrated that method of overlay measurement in the cell area by using DBM (Design Based Metrology) tool has more accurate overlay value than conventional method by using an overlay mark. We have verified the reproducibility by measuring repeatable patterns in the cell area, and also demonstrated the reliability by comparing with CD-SEM data. We have focused overlay mismatching between overlay mark and cell area until now, further more we have concerned with the cell area having different pattern density and etch loading. There appears a phenomenon which has different overlay values on the cells with diverse patterning environment. In this paper, the overlay error was investigated from cell edge to center. For this experiment, we have verified several critical layers in DRAM by using improved(Better resolution and speed) DBM tool, NGR3520.

  1. On-demand Overlay Networks for Large Scientific Data Transfers

    SciTech Connect

    Ramakrishnan, Lavanya; Guok, Chin; Jackson, Keith; Kissel, Ezra; Swany, D. Martin; Agarwal, Deborah

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  2. Coloured Overlays and Their Benefit for Reading.

    ERIC Educational Resources Information Center

    Wilkins, Arnold J.; Lewis, Elizabeth; Smith, Fiona; Rowland, Elizabeth; Tweedie, Wendy

    2001-01-01

    Presents three studies where children in mainstream schools compared text on white paper with identical text covered in turn by each of 10 differently-colored plastic overlays. Shows consistency with regard to the proportion of children in mainstream education who report beneficial perceptual effects with colored overlays and who demonstrate…

  3. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mĺrtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  4. FINANCIAL SUPPORT FOR THE PRIVATE SECTOR AFTER AN ANTHRAX BIOTERRORISM

    E-print Network

    FINANCIAL SUPPORT FOR THE PRIVATE SECTOR AFTER AN ANTHRAX BIOTERRORISM INCIDENT September Technology Center for Homeland Security Financial Support for the Private Sector After an Anthrax; 1 FINANCIAL SUPPORT FOR THE PRIVATE SECTOR AFTER AN ANTHRAX BIOTERRORISM INCIDENT Through

  5. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  6. Secure Input Overlays : increasing security for sensitive data on Android

    E-print Network

    Sobel, Louis (Louis A.)

    2015-01-01

    Mobile devices and the applications that run on them are an important part of people's lives. Often, an untrusted mobile application will need to obtain sensitive inputs, such as credit card information or passwords, from ...

  7. CFDP for Interplanetary Overlay Network

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol for Interplanetary Overlay Network (CFDP-ION) is an implementation of CFDP that uses IO' s DTN (delay tolerant networking) implementation as its UT (unit-data transfer) layer. Because the DTN protocols effect automatic, reliable transmission via multiple relays, CFDP-ION need only satisfy the requirements for Class 1 ("unacknowledged") CFDP. This keeps the implementation small, but without loss of capability. This innovation minimizes processing resources by using zero-copy objects for file data transmission. It runs without modification in VxWorks, Linux, Solaris, and OS/X. As such, this innovation can be used without modification in both flight and ground systems. Integration with DTN enables the CFDP implementation itself to be very simple; therefore, very small. Use of ION infrastructure minimizes consumption of storage and processing resources while maximizing safety.

  8. An Overlay Subscription Network for Live Internet TV Broadcast

    E-print Network

    Cai, Ying

    An Overlay Subscription Network for Live Internet TV Broadcast Ying Cai, Member, IEEE, and Jianming Zhou Abstract--We propose a framework, called Overlay Subscription Network (OSN), for live Internet TV, for large-scale and cost-effective TV broadcast. Index Terms--Overlay subscription networks, overlay

  9. Qmerit-calibrated overlay to improve overlay accuracy and device performance

    NASA Astrophysics Data System (ADS)

    Ullah, Md Zakir; Jazim, Mohamed Fazly Mohamed; Sim, Stella; Lim, Alan; Hiem, Biow; Chuen, Lieu Chia; Ang, Jesline; Lim, Ek Chow; Klein, Dana; Amit, Eran; Volkovitch, Roie; Tien, David; Choi, DongSub

    2015-03-01

    In advanced semiconductor industries, the overlay error budget is getting tighter due to shrinkage in technology. To fulfill the tighter overlay requirements, gaining every nanometer of improved overlay is very important in order to accelerate yield in high-volume manufacturing (HVM) fabs. To meet the stringent overlay requirements and to overcome other unforeseen situations, it is becoming critical to eliminate the smallest imperfections in the metrology targets used for overlay metrology. For standard cases, the overlay metrology recipe is selected based on total measurement uncertainty (TMU). However, under certain circumstances, inaccuracy due to target imperfections can become the dominant contributor to the metrology uncertainty and cannot be detected and quantified by the standard TMU. For optical-based overlay (OBO) metrology targets, mark asymmetry is a common issue which can cause measurement inaccuracy, and it is not captured by standard TMU. In this paper, a new calibration method, Archer Self-Calibration (ASC), has been established successfully in HVM fabs to improve overlay accuracy on image-based overlay (IBO) metrology targets. Additionally, a new color selection methodology has been developed for the overlay metrology recipe as part of this calibration method. In this study, Qmerit-calibrated data has been used for run-to-run control loop at multiple devices. This study shows that color filter can be chosen more precisely with the help of Qmerit data. Overlay stability improved by 10~20% with best color selection, without causing any negative impact to the products. Residual error, as well as overlay mean plus 3-sigma, showed an improvement of up to 20% when Qmerit-calibrated data was used. A 30% improvement was seen in certain electrical data associated with tested process layers.

  10. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California legislation…

  11. Is Private Speech Really Private

    E-print Network

    Smith, Ashley

    2011-01-01

    This study sought to answer the question “is private speech really private?” by assessing if participants spoke more to themselves when in the company of the experimenter or when they were alone. The similarity between ...

  12. Scatterometry or imaging overlay: a comparative study

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that both imaging overlay technology and DBO-1 technology are fully successful and have a valid roadmap for the next few design nodes, with some use cases better suited for one or the other measurement technologies. Having both imaging and DBO technology options available in parallel, allows Overlay Engineers a mix and match overlay measurement strategy, providing back up when encountering difficulties with one of the technologies and benefiting from the best of both technologies for every use case.

  13. 77 FR 15566 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ...Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency...encumbered by certain types of private transfer fee covenants and in certain related securities...encumbered by certain private transfer fees. To allow full public participation...

  14. 76 FR 6702 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ...Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency...encumbered by certain types of private transfer fee covenants and in certain related securities...proposed rule would except private transfer fees paid to homeowner associations,...

  15. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  16. Solidification of an alloy 625 weld overlay

    SciTech Connect

    DuPont, J.N.

    1996-11-01

    The solidification behavior (microsegregation, secondary phase formation, and solidification temperature range) of an Alloy 625 weld overlay deposited on 2.25Cr-1Mo steel by gas metal arc welding was investigated by light and electron optical microscopy, electron microprobe, and differential thermal analysis techniques. The overlay deposit was found to terminate solidification at {approx}1,216 C by a {gamma}/Laves eutectic-type reaction. The Laves phase was highly enriched in Nb, Mo, and Si. The solidification reaction and microsegregation potential of major alloying elements in the overlay deposit are compared to other Nb-bearing Ni base alloys and found to be very similar to those for Alloy 718. Solidification cracks observed in the overlay were attributed to the wide solidification temperature range ({approx}170 C) and formation of interdendritic ({gamma} + Laves) constituent. Reasonable agreement is obtained between the calculated and measured volume percent ({gamma} + Laves) constituent with the Scheil equation by treating the overlay system as a simple {gamma}-Nb binary and using an experimentally determined k{sub Nb} value from electron microprobe data.

  17. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Not Available

    1994-11-01

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB`s.

  18. 75 FR 66822 - Study on Extraterritorial Private Rights of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ...extended to cover transnational securities fraud. The Commission is soliciting comment...cases involving transnational securities fraud. Congress further directed the Commission...Act in cases of transnational securities fraud should be extended to private rights...

  19. Weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  20. Patent Overlay Mapping: Visualizing Technological Distance

    E-print Network

    Kay, Luciano; Youtie, Jan; Porter, Alan L; Rafols, Ismael

    2012-01-01

    The purpose of this paper is to present a new global patent map that represents all technological categories, and a method to locate patent data of individual organizations and technological fields on the global map. This second patent overlay map technique is shown to be of potential interest to support competitive intelligence and policy decision-making. The global patent map is based on similarities in citing-to-cited relationships between categories of the International Patent Classification (IPC) of European Patent Office (EPO) patents from 2000 to 2006. This patent dataset, extracted from PatStat database, represents more than 760,000 patent records in more than 400 IPC categories. To illustrate the kind of analytical support offered by this approach, the paper shows the overlay of nanotechnology-related patenting activities of two companies and two different nanotechnology subfields on to the global patent map. The exercise shows the potential of patent overlay maps to visualize technological areas and...

  1. KML Super Overlay to WMS Translator

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  2. Coloured Overlays, Visual Discomfort, Visual Search and Classroom Reading.

    ERIC Educational Resources Information Center

    Tyrrell, Ruth; And Others

    1995-01-01

    States that 46 children aged 12-16 were shown a page of meaningless text covered with plastic overlays, including 7 that were various colors and 1 that was clear. Explains that each child selected the overlay that made reading easiest. Notes that children who read with a colored overlay complained of visual discomfort when they read without the…

  3. Improving the Fault Resilience of Overlay Multicast for Media Streaming

    E-print Network

    Jarvis, Stephen

    Improving the Fault Resilience of Overlay Multicast for Media Streaming Guang Tan, Student Member in the context of live media streaming by exploring 1) how to construct a stable multicast tree that minimizes, multicast, media streaming, peer-to-peer, overlay. Ç 1 INTRODUCTION OVERLAY multicast [7] (or application

  4. Summary of Concrete Overlays Existing concrete pavement

    E-print Network

    Summary of Concrete Overlays Existing concrete pavement with surface distresses Prepared surface Monolithic pavement with new concrete surface Existing asphalt pavement with surface distresses Milled pavement with asphalt surface distresses Milled and cleaned surface New 2­5 in. (5.1­12.7 cm) bonded

  5. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance...

  6. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... Infrastructure Private Sector Clearance Program (PSCP). DHS previously published this ICR in the Federal...

  7. Wafer to wafer overlay control algorithm implementation based on statistics

    NASA Astrophysics Data System (ADS)

    Lee, Byeong Soo; Kang, Young Seog; Kong, Jeong Heung; Hwang, Hyun Woo; Song, Myeong Gyu

    2015-03-01

    For mass production of DRAM device, a stable and effective overlay control becomes more and more important as DRAM design rule shrinks. Existent technologies were already applied to overcome this situation. Nevertheless, we are still suffered from tight overlay margin and forced to move from lot-based to wafer-based overlay control. However, the wafer-based control method requires a huge amount of measurement resource. In this paper, we present the insight for the wafer-based overlay correction with optimal measurement resource which is suitable for mass production. The experiment which is the wafer-based overlay correction by several statistical analyses carried out for 2X nm node DRAM. Among them, linear regression is a strong candidate for wafer-based overlay control, which improved up to 0.8 nm of maximum overlay.

  8. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management...

  9. 76 FR 8265 - Conformance Period for Entities Engaged in Prohibited Proprietary Trading or Private Equity Fund...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-14

    ...hedge fund or private equity fund...Act, Public Law 111-203...section 8 of the International Banking Act...and ``private equity fund...the fund's private placement...securities laws.\\39...potentially allowing evasions of the...

  10. How big does a coloured overlay have to be?

    PubMed

    Waldie, Michelle; Wilkins, Arnold

    2004-01-01

    Coloured overlays and coloured lenses can both increase reading speed, but when they do their colour is not necessarily the same, suggesting that the beneficial effects of a coloured filter might depend upon the area of the visual field that it colours. We investigated the effects of overlays on reading speed and varied the size of the overlay and the colour of the surround. Children who had been assessed with coloured overlays were required to read a passage of randomly ordered common words. The words were printed in black ink as a block of text positioned centrally on an A4 page of white paper in landscape orientation. The speed of reading was compared under four conditions: (1) without an overlay; (2) with an overlay of the chosen colour covering the entire page; (3) with the overlay cut so that it just covered the text but left the margin white; (4) with the overlay of the chosen colour covering the text but with the margin coloured a complementary colour, using a second overlay. The children who were using an overlay read more quickly with the overlay; those who were no longer using the overlay did not. Although the block of text covered less than half the page, the colour and nature of the margin did not affect reading speed significantly. These findings suggest that in order to be effective at improving reading speed an overlay needs to cover the text, but not necessarily the remainder of the page, which means that smaller overlays may sometimes be sufficient. PMID:14687202

  11. Overlay metrology tool calibration using blossom

    NASA Astrophysics Data System (ADS)

    Binns, Lewis A.; Smith, Nigel P.; Dasari, Prasad

    2008-03-01

    As overlay budgets continue to shrink, there is an increasing need to more fully characterize the tools used to measure overlay. In a previous paper, it was shown how a single-layer Blossom overlay target could be utilized to measure aberrations across the field of view of an overlay tool in an efficient and low-cost manner. In this paper, we build upon this method, and discuss the results obtained, and experiences gained in applying this method to a fleet of currently operational overlay tools. In particular, the post-processing of the raw calibration data is discussed in detail, and a number of different approaches are considered. The quadrant-based and full-field based methods described previously are compared, along with a half-field method. In each case we examine a number of features, including the trade off between ease of use (including the total number of measurements required) versus sensitivity / potential signal to noise ratio. We also examine how some techniques are desensitized to specific types of tool or mark aberration, and suggest how to combine these with non-desensitized methods to quickly identify these anomalies. There are two distinct applications of these tool calibration methods. Firstly, they can be used as part of the tool build and qualification process, to provide absolute metrics of imaging quality. Secondly, they can be of significant assistance in diagnosing tool or metrology issues or providing preventative maintenance diagnostics, as (as shown previously) under normal operation the results show very high consistency, even compared to aggressive overlay requirements. Previous work assumed that the errors in calibration, from reticle creation through to the metrology itself, would be Gaussian in nature; in this paper we challenge that assumption, and examine a specific scenario that would lead to very non-Gaussian behavior. In the tool build / qualification application, most scenarios lead to a systematic trend being superimposed over Gaussian-distributed measurements; these cases are relatively simple to treat. However, in the tool diagnosis application, typical behavior will be very non- Gaussian in nature, for example individual outlier measurements, or exhibiting bimodal or other probability distributions. In such cases, we examine the effect that this has on the analysis, and show that such anomalous behaviors can occur "under the radar" of analyses that assume Gaussian behavior. Perhaps more interestingly, the detection / identification of non-Gaussian behavior (as opposed to the parameters of a best fit Gaussian probability density function) can be a useful tool in quickly isolating specific metrology problems. We also show that deviation of a single tool, relative to the tool fleet, is a more sensitive indicator of potential issues.

  12. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  13. Overlay Tolerances For VLSI Using Wafer Steppers

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Rice, Rory

    1988-01-01

    In order for VLSI circuits to function properly, the masking layers used in the fabrication of those devices must overlay each other to within the manufacturing tolerance incorporated in the circuit design. The capabilities of the alignment tools used in the masking process determine the overlay tolerances to which circuits can be designed. It is therefore of considerable importance that these capabilities be well characterized. Underestimation of the overlay accuracy results in unnecessarily large devices, resulting in poor utilization of wafer area and possible degradation of device performance. Overestimation will result in significant yield loss because of the failure to conform to the tolerances of the design rules. The proper methodology for determining the overlay capabilities of wafer steppers, the most commonly used alignment tool for the production of VLSI circuits, is the subject of this paper. Because cost-effective manufacturing process technology has been the driving force of VLSI, the impact on productivity is a primary consideration in all discussions. Manufacturers of alignment tools advertise the capabilities of their equipment. It is notable that no manufacturer currently characterizes his aligners in a manner consistent with the requirements of producing very large integrated circuits, as will be discussed. This has resulted in the situation in which the evaluation and comparison of the capabilities of alignment tools require the attention of a lithography specialist. Unfortunately, lithographic capabilities must be known by many other people, particularly the circuit designers and the managers responsible for the financial consequences of the high prices of modern alignment tools. All too frequently, the designer or manager is confronted with contradictory data, one set coming from his lithography specialist, and the other coming from a sales representative of an equipment manufacturer. Since the latter generally attempts to make his merchandise appear as attractive as possible, the lithographer is frequently placed in the position of having to explain subtle issues in order to justify his decisions. It is the purpose of this paper to provide that explanation.

  14. Nonicosahedral Equilibrium Overlayers of Icosahedral Quasicrystals

    NASA Astrophysics Data System (ADS)

    Yurechko, M.; Grushko, B.; Ebert, Ph.

    2005-12-01

    We demonstrate that icosahedral Al-Pd-Mn quasicrystals can have nonicosahedrally ordered thermodynamic equilibrium overlayers. The formation of orthorhombic or decagonal equilibrium surface structures is determined by the phase equilibrium of the ternary alloy at given composition and temperature as well as by the surface acting as nucleation site. Nonequilibrium steady-state orthorhombic and hexagonal structures can also be derived with the same methodology when taking preferential evaporation into account. The results describe consistently all presently observed surface structures.

  15. Accommodation, pattern glare, and coloured overlays.

    PubMed

    Allen, Peter M; Dedi, Sonia; Kumar, Dimple; Patel, Tanuj; Aloo, Mohammed; Wilkins, Arnold J

    2012-01-01

    We manipulated the accommodative response using positive and negative lenses to study any association between symptoms of pattern glare and accommodation. Two groups of eighteen young adults were selected from seventy-eight on the basis (i) that their rate of reading increased by 5% or more with an overlay compared to their rate without it, and (ii) that they reported more than 2 symptoms of pattern glare (group 1) or had no such increment in reading speed and reported fewer than 3 symptoms (group 2). Under double-masked conditions participants observed at 0.4 m a pattern of stripes while measurements of accommodation were made using an open field autorefractor with and without positive and negative trial lenses (0.75 D), and with and without a coloured overlay. Pattern glare was also assessed with and without the trial lenses. Without lenses, the mean accommodative response in group 1 was 1.55 D, a lag of 0.95 D +/- 0.24 D relative to the demand. The lag decreased by 0.43 D (p < 0.0001) when the chosen overlay was used, an effect that was not shown in group 2 even when lag increased with negative trial lenses (p = 0.13). In both groups, pattern glare scores were reduced by the trial lenses, but were unaffected by the sign of the lenses. This suggests that symptoms of pattern glare are not strongly associated with accommodative response. PMID:23586285

  16. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  17. Private advantage

    SciTech Connect

    Marier, D.; Stoiaken, L.

    1988-03-01

    At least a half dozen independent power producers put out initial public offerings in 1985-86 and the experts were projecting more to come. Most executives of private development companies admitted that they had at least taken a hard look at going public. Several quarters worth of disappointing earnings and the October market crash have brought attention back to the activities of private companies. Fortunately for the industry, at about the same time public-equity markets were closing down, new sources of debt and equity were entering the field in a big way-including insurance companies, pension funds, and utilities. While the development should be good news for all companies in the field (private equity is not necessarily earmarked for private companies), the impact of the crash has made it more difficult for public companies to make their case to the new equity players. The newest players, the unregulated utility subsidiaries, the fastest growing segment in the industry, are probably in a position to put a major dent in the business.

  18. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  19. Experimental AC (Asphalt Concrete) overlays of PCC pavement

    NASA Astrophysics Data System (ADS)

    Smith, R. D.

    1983-11-01

    A series of experimental asphalt concrete (AC) overlays was constructed over an existing distressed portland cement concrete pavement on Interstate 80 near Boca, California. The experimental overlays included rubberized dense-graded AC, rubberized open-graded AC, a rubber flush coat interlayer, dense-graded AC with short polyester fibers and Bituthene interlayer strips. The report presents a description and discussion of AC mix batching, construction observations, laboratory testing, overlay covering, and initial performance evaluation.

  20. Highly corrosion resistant weld overlay for oil patch applications

    SciTech Connect

    Hibner, E.L.; Maligas, M.N.; Vicic, J.C.

    1994-12-31

    Petroleum equipment companies currently sell 4130 and 4140 steel pipe with alloy 625 (UNS N06625) weld overlay for Oil Patch applications. Alloy 686 (UNS N06686), because of it`s superior corrosion resistance, is currently being evaluated as a replacement material for alloy 625. Mechanical properties and Slow Strain Rate test results for the alloy 686 weld overlay are discussed relative to the alloy 625 weld overlay.

  1. Assessment of a Cambridge Structural Database-driven overlay program.

    PubMed

    Giangreco, Ilenia; Olsson, Tjelvar S G; Cole, Jason C; Packer, Martin J

    2014-11-24

    We recently published an improved methodology for overlaying multiple flexible ligands and an extensive data set for validating pharmacophore programs. Here, we combine these two developments and present evidence of the effectiveness of the new overlay methodology at predicting correct superimpositions for systems with varying levels of complexity. The overlay program was able to generate correct predictions for 95%, 73%, and 39% of systems classified as easy, moderate, and hard, respectively. PMID:25392927

  2. Mediated Overlay Services (MOSES): Network Security as a Composable Service

    E-print Network

    Keromytis, Angelos D.

    {stelios,angel,angelos}@cs.columbia.edu Abstract In recent years, organizations have been shifting focus (MSSPs) is often difficult to transition to, offers little control to the organization, does not allow, and discuss a broad research agenda toward realizing this vision. 1 Introduction As organizations

  3. Real cell overlay measurement through design based metrology

    NASA Astrophysics Data System (ADS)

    Yoo, Gyun; Kim, Jungchan; Park, Chanha; Lee, Taehyeong; Ji, Sunkeun; Jo, Gyoyeon; Yang, Hyunjo; Yim, Donggyu; Yamamoto, Masahiro; Maruyama, Kotaro; Park, Byungjun

    2014-04-01

    Until recent device nodes, lithography has been struggling to improve its resolution limit. Even though next generation lithography technology is now facing various difficulties, several innovative resolution enhancement technologies, based on 193nm wavelength, were introduced and implemented to keep the trend of device scaling. Scanner makers keep developing state-of-the-art exposure system which guarantees higher productivity and meets a more aggressive overlay specification. "The scaling reduction of the overlay error has been a simple matter of the capability of exposure tools. However, it is clear that the scanner contributions may no longer be the majority component in total overlay performance. The ability to control correctable overlay components is paramount to achieve the desired performance.(2)" In a manufacturing fab, the overlay error, determined by a conventional overlay measurement: by using an overlay mark based on IBO and DBO, often does not represent the physical placement error in the cell area of a memory device. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion, caused by etching or CMP, also can be a source of the mismatch. Therefore, the requirement of a direct overlay measurement in the cell pattern gradually increases in the manufacturing field, and also in the development level. In order to overcome the mismatch between conventional overlay measurement and the real placement error of layer to layer in the cell area of a memory device, we suggest an alternative overlay measurement method utilizing by design, based metrology tool. A basic concept of this method is shown in figure1. A CD-SEM measurement of the overlay error between layer 1 and 2 could be the ideal method but it takes too long time to extract a lot of data from wafer level. An E-beam based DBM tool provides high speed to cover the whole wafer with high repeatability. It is enabled by using the design as a reference for overlay measurement and a high speed scan system. In this paper, we have demonstrated that direct overlay measurement in the cell area can distinguish the mismatch exactly, instead of using overlay mark. This experiment was carried out for several critical layer in DRAM and Flash memory, using DBM(Design Based Metrology) tool, NGR2170™.

  4. Investigation of Iron Aluminide Weld Overlays

    SciTech Connect

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  5. EE 122: Overlay Networks and p2p Networks

    E-print Network

    California at Irvine, University of

    Announcements No class Wednesday. Happy Thanksgiving! Homework 3 grades available by Wednesday Homework 4 (over IP) 7 Overview Resilient Overlay Network (RON) Overlay Multicast Peer-to-peer systems 8 #12;5 17 How Did it Start? A killer application: Naptser Free music over the Internet Key idea

  6. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  7. Spectrum allocation with beamforming antenna in heterogeneous overlaying networks

    E-print Network

    Bahk, Saewoong

    1 Spectrum allocation with beamforming antenna in heterogeneous overlaying networks Sunheui Ryoo spectrum reuse. In this paper, we explore schemes to mitigate cross-tier interference with beamforming antennas for overlay networks. In our model, fem- tocells can operate with frequency spectrum

  8. Verme: Worm Containment in Overlay Networks Filipe Freitas1

    E-print Network

    Ferreira, Paulo

    Verme: Worm Containment in Overlay Networks Filipe Freitas1 , Edgar Marques1 , Rodrigo Rodrigues2 Max Planck Institute for Software Systems (MPI-SWS) Abstract Topological worms, such as those random scanning worms be- cause they have knowledge of a subset of the overlay nodes, and choose

  9. Defending against Eclipse attacks on overlay networks Atul Singh1

    E-print Network

    Druschel, Peter

    Defending against Eclipse attacks on overlay networks Atul Singh1 Miguel Castro2 Peter Druschel1, it can "eclipse" correct nodes and pre- vent correct overlay operation. This Eclipse attack is more general than the Sybil attack. Attackers can use a Sybil attack to launch an Eclipse attack by inventing

  10. 76 FR 80971 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: National Archives and Records Administration, Information Security Oversight... relating to the Classified National Security Information Program for State, Local, Tribal, and...

  11. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... discuss the matters relating to the Classified National Security Information Program for State,...

  12. Overlay improvement using Legendre-Zernike model-based overlay corrections and monitoring with interpolated metric

    NASA Astrophysics Data System (ADS)

    Ullah, Md Zakir; Javvaji, Rajanish; Lim, Alan; Chuen, Lieu Chia; Habets, Boris; Buhl, Stefan; Erley, Georg; Tottewitz, Steven; Bellmann, Enrico

    2015-03-01

    This paper focuses on orthogonal model corrections where model parameters do not influence each other as long as the measurement layout is sufficiently symmetric. For the grid correction we used Zernike polynomials, and for the intrafield correction we used a two-dimensional set of Legendre polynomials. We enabled these corrections by developing a transformation matrix as an exposure tool is incapable of correcting such orthogonal polynomials. Simulation with OVALiS shows that the linear parameters get stabilized by several factors when using a combined Zernike/Legendre model. The correlation between linear and higher order parameters disappears, and overlay mean plus 3-sigma improves up to ~15-20%. Simulated data agrees well with experimental and electrical data. Additionally, we introduced an interpolated metric that probed the wafer and field with a dense grid. This interpolated metric showed that the Zernike/Legendre model-based correction does not cause over-correction like that seen on standard polynomial models. We have tested higher order process corrections comprehensively by enabling an orthogonal model, as well as by making use of interpolated metrics to monitor the overlay performance. These orthogonal models can be implemented in the production line based on inline overlay data where interpolated metrics will ensure that there is no over-correction and no negative impact on product.

  13. Privatization and Education

    ERIC Educational Resources Information Center

    Dash, Neena

    2009-01-01

    This paper highlights emerging trends, programmes and policies in privatization of education in Western countries. These trends are educational vouchers, choice of private schools, private school liberalization, private contracting of specific services, tuition tax credits and deductions for parents ,subsidies and assistance grants to private

  14. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  15. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  16. Supersparse overlay sampling plans: an evaluation of methods and algorithms for optimizing overlay quality control and metrology tool throughput

    NASA Astrophysics Data System (ADS)

    Pellegrini, Joseph C.; Hatab, Ziad R.; Bush, Jeffrey M.; Glass, Thomas R.

    1999-06-01

    Traditionally, overlay metrology has ben primarily used for quality control of developed wafers. The secondary roles of overlay metrology, stepper modeling and feedback control, have become more prominent in recent years. In particular, the design of overlay sampling plans is usually strongly influenced by the requirements imposed by stepper modeling. Previous research has shown that intrafield sampling plans must be symmetric and repeating in order to support stable feedback control. These constraints impact the tradeoff between overlay tool throughput and quality control by imposing a higher than necessary cost on measuring additional exposure fields for irregular errors. In this paper we examine the concept of using super sparse overlays among plans along with innovative analysis methods and algorithms for stepper modeling. Super sparse sampling plans are defined as where the field by field intrafield sampling is irregular and asymmetric. When compared to typical sampling plans, super sparse plans allow the overlay tool to examine a 2 to 4 times the number of fields on a wafer with the same number of total measurements. In order to support super sparse sampling, it is necessary to employ innovative algorithms, which are capable of performing stepper modeling without losing result integrity. In this paper we report on the relative performance of regular versus super spares sampling plans for quality control, stepper modeling and overlay tool throughput.

  17. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  18. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  19. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  20. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  1. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  2. Full-Information Lookups for Peer-to-Peer Overlays

    E-print Network

    Rodrigues, Rodrigo

    Most peer-to-peer lookup schemes keep a small amount of routing state per node, typically logarithmic in the number of overlay nodes. This design assumes that routing information at each member node must be kept small so ...

  3. Comparing Physical, Overlay, and Touch Screen Parameter Controls

    E-print Network

    Tory, Melanie

    Comparing Physical, Overlay, and Touch Screen Parameter Controls Melanie Tory University and movement tasks with dial and slider controls on horizontal touch screens. Results showed that physical physical controls are impractical. Author Keywords Input; touch screen; physical control; slider; dial

  4. Coloured overlays and their effects on reading speed: a review.

    PubMed

    Wilkins, Arnold

    2002-09-01

    Coloured overlays can reduce symptoms of visual stress and improve reading speed. These benefits are reliable and are not attributable simply to placebo effects. Five percent of children in mainstream education read at least 25% more quickly with an overlay, provided they have chosen the colour. The suboptimal design of children's text and the high level of classroom lighting may be partly responsible. PMID:12358317

  5. Augmenting reality in Direct View Optical (DVO) overlay applications

    NASA Astrophysics Data System (ADS)

    Hogan, Tim; Edwards, Tim

    2014-06-01

    The integration of overlay displays into rifle scopes can transform precision Direct View Optical (DVO) sights into intelligent interactive fire-control systems. Overlay displays can provide ballistic solutions within the sight for dramatically improved targeting, can fuse sensor video to extend targeting into nighttime or dirty battlefield conditions, and can overlay complex situational awareness information over the real-world scene. High brightness overlay solutions for dismounted soldier applications have previously been hindered by excessive power consumption, weight and bulk making them unsuitable for man-portable, battery powered applications. This paper describes the advancements and capabilities of a high brightness, ultra-low power text and graphics overlay display module developed specifically for integration into DVO weapon sight applications. Central to the overlay display module was the development of a new general purpose low power graphics controller and dual-path display driver electronics. The graphics controller interface is a simple 2-wire RS-232 serial interface compatible with existing weapon systems such as the IBEAM ballistic computer and the RULR and STORM laser rangefinders (LRF). The module features include multiple graphics layers, user configurable fonts and icons, and parameterized vector rendering, making it suitable for general purpose DVO overlay applications. The module is configured for graphics-only operation for daytime use and overlays graphics with video for nighttime applications. The miniature footprint and ultra-low power consumption of the module enables a new generation of intelligent DVO systems and has been implemented for resolutions from VGA to SXGA, in monochrome and color, and in graphics applications with and without sensor video.

  6. ``Electric growth`` of metal overlayers on semiconductor substrates

    SciTech Connect

    Zhang, Z.; Cho, J.H. |; Niu, Q.; Shih, C.K.; Suo, Z.

    1998-02-01

    In this article, the authors present the main results from their recent studies of metal overlayer growth on semiconductor substrates. They show that a variety of novel phenomena can exist in such systems, resulting from several competing interactions. The confined motion of the conduction electrons within the metal overlayer can mediate a surprisingly long-range repulsive force between the metal-semiconductor interface and the growth front, acting to stabilize the overlayer. Electron transfer from the overlayer to the substrate leads to an attractive force between the two interfaces, acting to destabilize the overlayer. Interface-induced Friedel oscillations in electron density can further impose an oscillatory modulation onto the two previous interactions. These three competing factors, of all electronic nature, can make a flat metal overlayer critically, marginally, or magically stable, or totally unstable against roughening. The authors further show that, for many systems, these electronic effects can easily win over the effect of stress. First-principles studies of a few representative systems support the main features of the present electronic growth concept.

  7. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 2011-07-01 false Protection of private aids to navigation. 66.01-50 Section 66.01-50... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  8. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 2013-07-01 false Protection of private aids to navigation. 66.01-50 Section 66.01-50... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  9. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...2011-07-01 2011-07-01 false Private aids to navigation other than State owned. 66.05-35... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation §...

  10. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...2012-07-01 2012-07-01 false Private aids to navigation other than State owned. 66.05-35... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation §...

  11. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...2014-07-01 2014-07-01 false Private aids to navigation other than State owned. 66.05-35... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation §...

  12. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2012-07-01 false Protection of private aids to navigation. 66.01-50 Section 66.01-50... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  13. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 2010-07-01 false Protection of private aids to navigation. 66.01-50 Section 66.01-50... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  14. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 2010-07-01 false Private aids to navigation other than State owned. 66.05-35... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation §...

  15. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 2014-07-01 false Protection of private aids to navigation. 66.01-50 Section 66.01-50... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  16. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 2013-07-01 false Private aids to navigation other than State owned. 66.05-35... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation §...

  17. 75 FR 66822 - Study on Extraterritorial Private Rights of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ... Act'') should be extended to cover transnational securities fraud. The Commission is soliciting... securities fraud. Congress further directed the Commission to conduct a study to determine whether, and to... cases of transnational securities fraud should be extended to private rights of action to the...

  18. Quantum data locking for high-rate private communication

    E-print Network

    Cosmo Lupo; Seth Lloyd

    2015-03-31

    We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.

  19. Toward Secure Services from Untrusted Developers

    E-print Network

    Brodsky, Micah Z. (Micah Zev)

    2007-08-06

    We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...

  20. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  1. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF...

  2. Instructional geographic information science Map overlay and spatial abilities

    NASA Astrophysics Data System (ADS)

    Tricot, Thomas Alexander, II

    The fundamental goal of this study is to determine if the complex spatial concept of map overlay can be effectively learned by young adolescents through the utilization of an instructional technique based within the foundations of Instructional Geographic Information Science (InGIScience). Percent correct and reaction times were the measures used to analyze the ability of young adolescents to learn the intersect, erase, and union functions of map overlay. The ability to solve for missing inputs, output, or function was also analyzed. Young adolescents of the test group scored higher percent correct and recorded faster reaction times than those of the control group or adults of the expert group by the end of the experiment. The intersect function of map overlay was more difficult in terms of percent correct and reaction time than the erase or union functions. Solving for the first or second input consistently resulted in lower percent correct and higher reaction times throughout the experiment. No overall performance differences were shown to exist between males and females. Results of a subjective "real-world" test also indicated learning by young adolescents. This study has shown that the practice of repetitive instruction and testing has proven effective for enhancing spatial abilities with regard to the map overlay concept. This study found that with practice, young adolescents can learn the map overlay concept and perform at levels equal to or greater than adults. This study has helped to answer the question of whether this development of spatial abilities is possible.

  3. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-print Network

    Weis, Stephen August, 1978-

    2006-01-01

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  4. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...applications respecting private aids to navigation for spoil banks, artificial islands and dredged...

  5. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...applications respecting private aids to navigation for spoil banks, artificial islands and dredged...

  6. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...applications respecting private aids to navigation for spoil banks, artificial islands and dredged...

  7. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...applications respecting private aids to navigation for spoil banks, artificial islands and dredged...

  8. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications § 67.35-10...applications respecting private aids to navigation for spoil banks, artificial islands and dredged...

  9. Private-Loan Reliance Worries Colleges

    ERIC Educational Resources Information Center

    Basken, Paul

    2008-01-01

    At many colleges across the nation, as administrators fret about the effects of a worsening economy, students arriving this fall will get more help securing jobs and more advice on paying for their educations. Some students will even find colleges willing to cut their tuition bills. This article reports that as banks tighten standards for private

  10. Flexible TWDM PON with WDM overlay for converged services

    NASA Astrophysics Data System (ADS)

    Cheng, Ning

    2015-12-01

    This paper reviews recent developments of flexible TWDM PON (time- and wavelength-division multiplexed passive optical network) with pluggable transceivers for pay-as-you-grow deployment, load balancing, channel protection and power saving. Different architectures for TWDM PON with WDM (wavelength division multiplexed) overlay for converged broadband services are discussed and experimental results are presented for WDM overlay using low-cost self-seeded RSOA (reflective semiconductor optical amplifiers). Challenging issues and possible solutions for future evolution toward software defined flexible PONs (FlexPONs) are also discussed with respect to dynamic lambda flow, elastic bandwidth and flexible reach.

  11. Near-Surface Buckling in Strained Metal Overlayer Systems

    NASA Astrophysics Data System (ADS)

    Hwang, R. Q.; Hamilton, J. C.; Stevens, J. L.; Foiles, S. M.

    1995-12-01

    Scanning tunneling microscopy (STM) images of Ag films grown on Ru(0001) reveal a periodic unit cell with a structural transformation at silver coverages slightly less than one monolayer. Dislocations in the overlayers are similar to the Au(111) herringbone structure; however, Ag/Ru(0001) exhibits two novel differences from previously observed herringbone structures. First, the unit cell dimensions change dramatically as a function of coverage. Second, STM images of Ag/Ru(0001) are inverted relative to those for Au(111). We show that this image inversion is due to substantial relaxations perpendicular to the surface resulting from local strains in the silver overlayer.

  12. High-frequency nonreciprocal reflection from magnetic films with overlayers

    SciTech Connect

    Wang, Ying; Nie, Yan; Camley, R. E.

    2013-11-14

    We perform a theoretical study of the nonreciprocal reflection of high-frequency microwave radiation from ferromagnetic films with thin overlayers. Reflection from metallic ferromagnetic films is always near unity and shows no nonreciprocity. In contrast, reflection from a structure which has a dielectric overlayer on top of a film composed of insulated ferromagnetic nanoparticles or nanostructures can show significant nonreciprocity in the 75–80?GHz frequency range, a very high value. This can be important for devices such as isolators or circulators.

  13. Measured residual stresses in overlay pipe weldments removed from service

    SciTech Connect

    Shack, W.J.

    1985-02-01

    Surface and throughwall residual stresses were measured on an elbow-to-pipe weldment that had been removed from the Hatch-2 reactor about a year after the application of a weld overlay. The results were compared with experimental measurements on three mock-up weldments and with finite-element calculations. The comparison shows that there are significant differences in the form and magnitude of the residual stress distributions. However, even after more than a year of service, the residual stresses over most of the inner surface of the actual plant weldment with an overlay were strongly compressive. 3 refs., 7 figs.

  14. Simplified Solution for Periodic Thermal Discontinuities in Asphalt Overlays Bonded to Rigid Pavements

    E-print Network

    Paulino, Glaucio H.

    Simplified Solution for Periodic Thermal Discontinuities in Asphalt Overlays Bonded to Rigid discontinuities distributed in a hot mix asphalt overlay bonded to a rigid pavement, where the length Database subject headings: Thermal stresses; Fracture mechanics; Asphalt pavements; Rigid pavements

  15. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  16. Privatization in Education.

    ERIC Educational Resources Information Center

    Rehfuss, John

    1995-01-01

    Privatization calls for substantially trimming the scope and breadth of government services, replacing them with private or other nongovernmental operators. The attraction of privatization is reduced costs and increased management flexibility. To date, the arrangement has received substantial support from students and parents in situations that…

  17. A Primer on Privatization.

    ERIC Educational Resources Information Center

    Menell, Seth J.; Phelps, Richard P.

    This paper provides a detailed examination of "contracting," a type of privatization, and is intended to clarify the issues surrounding decisions to privatize public services. Privatization introduces competition among market participants as a means of generating revenue, spurring development of an industry, and/or improving the quality of…

  18. 78 FR 75376 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTP-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... discuss matters relating to the Classified National Security Information Program for State, Local, Tribal... Administration; 700 Pennsylvania Avenue NW., Jefferson Room; Washington, DC 20408. FOR FURTHER...

  19. Throughput and Packet Delay Analysis of the Intermittent DCF for Overlay Access Networks

    NASA Astrophysics Data System (ADS)

    Adamis, Athanassios V.; Maliatsos, Konstantinos N.; Constantinou, Philip

    Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.

  20. ForPeerReview Dynamic Bandwidth Auctions in Multi-overlay P2P Streaming with

    E-print Network

    Li, Baochun

    based media distribution to achieve efficient multi-overlay streaming. Since such strategies of conflict with network coding based media dissemination, these streaming overlays adapt to peer dynamics, fairly share with a modern codec such as H.264, each overlay distributes a live media stream with a specific streaming rate

  1. Incidental Learning of Geospatial Concepts across Grade Levels: Map Overlay

    ERIC Educational Resources Information Center

    Battersby, Sarah E.; Golledge, Reginald G.; Marsh, Meredith J.

    2006-01-01

    In this paper, the authors evaluate map overlay, a concept central to geospatial thinking, to determine how it is naively and technically understood, as well as to identify when it is leaner innately. The evaluation is supported by results from studies at three grade levels to show the progression of incidentally learned geospatial knowledge as…

  2. Firefly-inspired Heartbeat Synchronization in Overlay Networks Ozalp Babaoglu

    E-print Network

    Montresor, Alberto

    Firefly-inspired Heartbeat Synchronization in Overlay Networks Ozalp Babaoglu Univ. Bologna, Italy synchronization in certain species of fireflies. In our protocol, nodes send flash messages to their neighbors flash messages using an algorithm inspired by mathematical models of firefly synchronization. We re

  3. Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays

    E-print Network

    Keinan, Alon

    Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays H°avard Johansen University ABSTRACT This paper describes and evaluates Fireflies, a scalable pro- tocol for supporting intrusion, Fireflies provides correct nodes with a reasonably current view of which nodes are live, as well as a pseudo

  4. Prediction of Reflection Cracking in Hot Mix Asphalt Overlays 

    E-print Network

    Tsai, Fang-Ling

    2011-02-22

    Reflection cracking is one of the main distresses in hot-mix asphalt (HMA) overlays. It has been a serious concern since early in the 20th century. Since then, several models have been developed to predict the extent and severity of reflection...

  5. T-Man: Gossip-based Overlay Topology Mark Jelasity

    E-print Network

    Jelasity, Márk

    T-Man: Gossip-based Overlay Topology Management M´ark Jelasity and Ozalp Babaoglu University of nodes can also be interpreted as a topology. In this paper we propose a generic protocol, T-Man, intuitive and flexible manner. At the same time, the T-Man protocol involves only local communication

  6. Video overlay of GPS precision timestamps Matt Montanaro

    E-print Network

    Richmond, Michael W.

    KIWIOSD Video overlay of GPS precision timestamps #12;Matt Montanaro Dr. Michael Richmond Rochester............................................................................................................16 Purpose of the KIWIOSD: The KIWIOSD device timestamps video frames to millisecond precision. A video feed from a source (video camera) is sent into the KIWI. A timing signal from a GPS receiver

  7. Investigations of Magnetic Overlayers at the Advanced Photon Source

    SciTech Connect

    Tobin, J G; Yu, S; Butterfield, M T

    2009-06-26

    Magnetic overlayers of Fe and Co have been investigated with X-ray Magnetic Circular Dichroism in X-ray Absorption Spectroscopy (XMCD-ABS) and Photoelectron Spectroscopy (PES), including Spin-Resolved Photoelectron Spectroscopy (SRPES), at Beamline 4 at the Advanced Photon Source (APS). Particular emphasis was placed upon the interrogation of the 2p levels of the Fe.

  8. BWR pipe crack and weld clad overlay studies

    SciTech Connect

    Shack, W.J.; Kassner, T.F.; Maiya, P.S.; Park, J.Y.; Ruther, W.E.; Rybicki, E.F.

    1985-10-01

    This paper presents results on (a) the influence of simulated BWR environments and temperature on the intergranular-stress-corrosion cracking (IGSCC) susceptibility of sensitized stainless steels (SS), (b) the stress-corrosion susceptibility of alternative piping materials, (c) analysis of field components to assess the effectiveness of in-service inspection techniques and the in-reactor performance of weld overlay repairs, and (d) finite-element analyses and experimental measurement of residual stresses in weldments with weld overlays. Fracture-mechanics crack-growth data are presented to confirm correlations between the critical corrosion potentials required to inhibit IGSCC and the level of impurities in the environment. Slow-strain-rate tests show that very low levels of impurities (25 ppb of sulfate) can produce suseptibility to transgranular-stress-corrosion cracking (TGSCC) in Type 316NG SS and that nitrogen levels is SS above 0.1 wt. % appear to increase susceptibility to TGSCC. Preliminary results on a German Type 347NG SS suggest that it is at least as resistant to TGSCC in impurity environments as Type 316NG SS. Measurements on overlay weldments removed from the Hatch-2 reactor confirm that compressive residual stresses are produced on the inner surface of the weldments by the overlay.

  9. Replication in Overlay Networks: A Multi-objective Optimization Approach

    E-print Network

    Miller, John A.

    Replication in Overlay Networks: A Multi-objective Optimization Approach Osama Al-Haj Hassan telephony are becoming increasingly popular. Many of these applications rely upon data-replication to achieve better performance, scalability, and reliabil- ity. However, replication entails various costs

  10. Recovery of Sublethally Injured Bacteria Using Selective Agar Overlays.

    ERIC Educational Resources Information Center

    McKillip, John L.

    2001-01-01

    This experiment subjects bacteria in a food sample and an environmental sample to conditions of sublethal stress in order to assess the effectiveness of the agar overlay method to recover sublethally injured cells compared to direct plating onto the appropriate selective medium. (SAH)

  11. 12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ON UPSTREAM EMBANKMENT OF DAM (FROM REPAIRS COMPLETED IN 1977) - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  12. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  13. Stabilizing Augmented Reality Overlays of Hinged and Curved Planar Regions

    E-print Network

    Fisher, Bob

    -detail, stable augmentation of video. 1 Introduction One of the fundamental operations in an Augmented RealityStabilizing Augmented Reality Overlays of Hinged and Curved Planar Regions Robert B. Fisher Abstract. Most Augmented Reality (AR) applications require model- to-scene feature point correspondences

  14. Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System

    E-print Network

    Nita-Rotaru, Cristina

    Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System Ruben Torres, Xin Sun, AAron Walters, Cristina Nita-Rotaru and Sanjay Rao Purdue University rtorresg,sun19,sanjayˇ @ecn. In this paper, we consider the unique challenges and opportunities of integrating key management algorithms

  15. T-Man: Gossip-Based Overlay Topology Management

    E-print Network

    T-Man: Gossip-Based Overlay Topology Management M´ark Jelasity and Ozalp Babaoglu University protocol, T-Man, for constructing and maintaining a large class of topologies. In the proposed framework in a straightforward, intuitive and flexible manner. At the same time, the T-Man protocol involves only local

  16. Eclipse Attacks on Overlay Networks: Threats and Defenses

    E-print Network

    Druschel, Peter

    Eclipse Attacks on Overlay Networks: Threats and Defenses Atul Singh, Tsuen-Wan "Johnny" Ngan of peers, forming a graph upon which a distributed application or service is implemented. In an "Eclipse of malicious nodes can eclipse a large number of correct victim nodes. This paper studies the impact of Eclipse

  17. Promoting Learning of Instructional Design via Overlay Design Tools

    ERIC Educational Resources Information Center

    Carle, Andrew Jacob

    2012-01-01

    I begin by introducing Virtual Design Apprenticeship (VDA), a learning model--built on a solid foundation of education principles and theories--that promotes learning of design skills via overlay design tools. In VDA, when an individual needs to learn a new design skill or paradigm she is provided accessible, concrete examples that have been…

  18. Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing

    E-print Network

    International Association for Cryptologic Research (IACR)

    Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing Roman Schlegel anonymous networks focus on providing strong anonymity for the price of having lower bandwidth, higher anonymize only a few specific applications. In this paper, we propose a new approach of constructing

  19. A Design of Overlay Anonymous Multicast Protocol , Xiaomei Liu1

    E-print Network

    Liu, Yunhao

    A Design of Overlay Anonymous Multicast Protocol Li Xiao1 , Xiaomei Liu1 , Wenjun Gu2 , Dong Xuan2 Multicast services are demanded by a variety of appli- cations. Many applications require anonymity during their communication. However, there has been very little work on anonymous multicasting and such services

  20. An Overlay Architecture for High Quality VoIP Streams

    E-print Network

    Amir, Yair

    , Stuart Goose, David Hedqvist, and Andreas Terzis, Member, IEEE, ACM Abstract-- The cost savings and novel}@cs.jhu.edu S. Goose and D. Hedqvist are with Siemens Corporate Research, Inc. Princeton, New Jersey. Email: {stuart.goose, david.hedqvist}@scr.siemens.com This paper describes an overlay architecture that can

  1. An Overlay Architecture for High Quality VoIP Streams

    E-print Network

    Amir, Yair

    An Overlay Architecture for High Quality VoIP Streams Yair Amir, Claudiu Danilov, Stuart Goose of Computer Science, Baltimore, Maryland. Email: {yairamir, claudiu, terzis}@cs.jhu.edu S. Goose and D. Hedqvist are with Siemens Corporate Research, Inc. Princeton, New Jersey. Email: {stuart.goose, david

  2. 17 CFR 275.202(a)(30)-1 - Foreign private advisers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Foreign private advisers. 275... private advisers. (a) Client. You may deem the following to be a single client for purposes of section 202...) You are not required to count a private fund as a client if you count any investor, as that term...

  3. 17 CFR 275.202(a)(30)-1 - Foreign private advisers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Foreign private advisers. 275... private advisers. (a) Client. You may deem the following to be a single client for purposes of section 202...) You are not required to count a private fund as a client if you count any investor, as that term...

  4. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  5. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  6. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  7. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  8. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  9. Quantum private comparison over noisy channels

    NASA Astrophysics Data System (ADS)

    Siddhu, Vikesh; Arvind

    2015-08-01

    Quantum private comparison (QPC) allows us to protect private information during its comparison. In the past, various three-party quantum protocols have been proposed that claim to work well under noisy conditions. Here, we tackle the problem of QPC under noise. We analyze the EPR-based protocol under depolarizing noise, bit flip and phase flip noise. We show how noise affects the robustness of the EPR-based protocol. We then present a straightforward protocol based on CSS codes to perform QPC which is robust against noise and secure under general attacks.

  10. 77 FR 70780 - Federal Acquisition Regulation; Submission for OMB Review; Contractors Performing Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Outside the United States. A notice was published in the Federal Register at 77 FR 43039, on July 23, 2012...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions...

  11. The Private User Network Interface--a GMPLS-compliant signaling

    NASA Astrophysics Data System (ADS)

    Papadimitriou, Dimitri; Rousseau, Bart; Körber, Wolfgang; Brockmann, Steffen; Verchčre, Dominique

    2004-03-01

    To address the integration of [IP/MPLS (multiprotocol label-switching)] packet and (optical) transport networks, the Optical Internetworking Forum (OIF) has defined a user-to-network interface (UNI) for overlay networks: the OIF UNI version 1.0, also referred to as the Public UNI. However, since its implementation agreement specification, it has become clear that this UNI--based on OIF-specific extensions to the generalized MPLS (GMPLS) protocols--will not be able to meet the future requirements of some operational environments. Hence a flexible, extensible, and fully GMPLS-compliant UNI is being defined at the Internet Engineering Task Force (IETF): the Private UNI (aka GMPLS for overlay networks). The Private UNI enhances the interaction between the packet and transport network control planes of a multilayer network architecture. This interface is particularly suitable for a control-plane interconnection model in which the equipment belongs to a common administrative entity (i.e., a single carrier environment). Signaling sessions through the Private UNI are used to invoke two main services that require constructive coordination between the network layers: provisioning and network recovery. Here we present the Private UNI specific GMPLS resource reservation protocol-traffic engineering (RSVP-TE) extensions in support of these services in IP/MPLS over SONET/SDH (synchronous optical network/synchronous digital hierarchy) GMPLS multilayer networks and illustrate how Private UNI signaling enhances coordination in multilayer network recovery.

  12. Near-Surface Buckling in Strained Metal Overlayer Systems

    SciTech Connect

    Hwang, R.Q.; Hamilton, J.C.; Stevens, J.L.; Foiles, S.M.

    1995-12-04

    Scanning tunneling microscopy (STM) images of Ag films grown on Ru(0001) reveal a periodic unit cell with a structural transformation at silver coverages slightly less than one monolayer. Dislocations in the overlayers are similar to the Au(111) herringbone structure; however, Ag/Ru(0001) exhibits two novel differences from previously observed herringbone structures. First, the unit cell dimensions change dramatically as a function of coverage. Second, STM images of Ag/Ru(0001) are inverted relative to those for Au(111). We show that this image inversion is due to substantial relaxations perpendicular to the surface resulting from local strains in the silver overlayer. {copyright} {ital 1995} {ital The} {ital American} {ital Physical} {ital Society}.

  13. Chapar: A Cross-Layer Overlay Event System for MANETs

    NASA Astrophysics Data System (ADS)

    Khakpour, Amir R.; Demeure, Isabelle

    In this paper, we present Chapar, an event system designed for mobile ad hoc networks that supports the publish-subscribe model as well as point-to-point and point-to-multipoint message sending. Chapar supports event persistency to resist transient disconnections and network partitioning. Following a cross-layer approach, Chapar is designed as an overlay network that uses the Multipoint Relays (MPRs) defined in OLSR as distributed brokers, and uses the OLSR routing table to disseminate the events. It therefore benefits from the way OLSR handles topology changes. The implementation performance is promising in the sense that no extra signaling is generated by mobility support and the generated overlay traffic is considerably less than the underlying routing protocol.

  14. Private Speech in Ballet

    ERIC Educational Resources Information Center

    Johnston, Dale

    2006-01-01

    Authoritarian teaching practices in ballet inhibit the use of private speech. This paper highlights the critical importance of private speech in the cognitive development of young ballet students, within what is largely a non-verbal art form. It draws upon research by Russian psychologist Lev Vygotsky and contemporary socioculturalists, to…

  15. The Limits of Privatization.

    ERIC Educational Resources Information Center

    Starr, Paul

    Transferring public services and public assets to private ownership is not an entirely new idea. Governments at all levels in the United States have for years contracted out many services. However, under the recently coined label "privatization," such policies now come recommended as a more comprehensive approach to the problems of modern…

  16. Laboring through Privatization.

    ERIC Educational Resources Information Center

    Bushweller, Kevin

    1994-01-01

    Hiring private contractors to manage school support services, such as food, maintenance, and busing, is a growing trend. Companies such as Marriott Corp., ServiceMaster, ARA Services, and Laidlaw Transit report that school business is steadily increasing. Unions staunchly oppose privatization. This article balances advantages and disadvantages,…

  17. Procrustes and Private Schooling.

    ERIC Educational Resources Information Center

    Shaw, Beverley

    1983-01-01

    R. J. Royce (Journal of Philosophy of Education; v16 p105-13) argues that private school education may be better or worse than state schooling and, because of this inequality, it must be abolished. Royce's arguments are analyzed to determine if abolishing private schooling would create a fairer society. (SR)

  18. Dialogue on Private Events

    ERIC Educational Resources Information Center

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior…

  19. Councilfor. Private Education ~

    E-print Network

    Neirotti, Juan Pablo

    for Private Education, Singapore and the Quality Assurance Agency for Higher Education Gloucester, United and quality assure the private education sector in Singapore, as well as facilitate capabilities development and to inform and encourage continuous improvement in the management of the quality of higher education

  20. Securities trading of concepts (STOC)

    E-print Network

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  1. HVM capabilities of CPE run-to-run overlay control

    NASA Astrophysics Data System (ADS)

    Subramany, Lokesh; Chung, Woong Jae; Gutjahr, Karsten; Garcia-Medina, Miguel; Sparka, Christian; Yap, Lipkong; Demirer, Onur; Karur-Shanmugam, Ramkumar; Riggs, Brent; Ramanathan, Vidya; Robinson, John C.; Pierson, Bill

    2015-03-01

    With the introduction of N2x and N1x process nodes, leading-edge factories are facing challenging demands of shrinking design margins. Previously un-corrected high-order signatures, and un-compensated temporal changes of high-order signatures, carry an important potential for improvement of on-product overlay (OPO). Until recently, static corrections per exposure (CPE), applied separately from the main APC correction, have been the industry's standard for critical layers [1], [2]. This static correction is setup once per device and layer and then updated periodically or when a machine change point generates a new overlay signature. This is a non-ideal setup for two reasons. First, any drift or sudden shift in tool signature between two CPE update periods can cause worse OPO and a higher rework rate, or, even worse, lead to yield loss at end of line. Second, these corrections are made from full map measurements that can be in excess of 1,000 measurements per wafer [3]. Advanced overlay control algorithms utilizing Run-to-Run (R2R) CPE can be used to reduce the overlay signatures on product in High Volume Manufacturing (HVM) environments. In this paper, we demonstrate the results of a R2R CPE control scheme in HVM. The authors show an improvement up to 20% OPO Mean+3Sigma values on several critical immersion layers at the 28nm and 14 nm technology nodes, and a reduction of out-of-spec residual points per wafer (validated on full map). These results are attained by closely tracking process tool signature changes by means of APC, and with an affordable metrology load which is significantly smaller than full wafer measurements.

  2. Dialogue on private events

    PubMed Central

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior differs from other behavior except in amplitude. Most participants took a cautious stance, noting not only conceptual pitfalls and empirical difficulties in the study of private events, but doubting the value of interpretive exercises about them. Others argued that despite such obstacles, in domains where experimental analyses cannot be done, interpretation of private events in the light of laboratory principles is the best that science can offer. One participant suggested that the notion that private events can be behavioral in nature be abandoned entirely; as an alternative, the phenomena should be reinterpreted only as physiological events. PMID:22477293

  3. Hg binding on Pd binary alloys and overlays

    SciTech Connect

    Sasmaz, E.; Aboud, S.; Wilcox, J.

    2009-05-15

    The vast majority of the mercury released from coal combustion is elemental mercury. Noble metals such as Pd, Au, Ag, and Cu have been proposed to capture elemental mercury. Density functional theory calculations are carried out to investigate mercury interactions with Pd binary alloys and overlays in addition to pure Pd, Au, Ag, and Cu surfaces using a projected augmented wave method with the Perdew-Wang generalized 0 gradient approximation. It has been determined that Pd has the highest mercury binding energy in comparison to other noble metals. In addition, Pd is found to be the primary surface atom responsible for improving the interaction of mercury with the surface atoms in both Pd binary alloys and overlays. Deposition of Pd overlays on Au and Ag enhance the reactivity of the surface by shifting the d-states of surface atoms up in energy. Strong mercury binding causes a significant overlap between the s- and p-states of Pd and the d-state of Mercury.

  4. Diffusion Barriers to Increase the Oxidative Life of Overlay Coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Lei, Jih-Fen

    1999-01-01

    Currently, most blades and vanes in the hottest section of aero gas turbine engines require some type of coating for oxidation protection. Newly developed single crystal superalloys have the mechanical potential to operate at increasingly higher component temperatures. However, at these elevated temperatures, coating/substrate interdiffusion can shorten the protective life of the coating. Diffusion barriers between overlay coatings and substrates are being examined to extend the protective life of the coating. A previously- developed finite-difference diffusion model has been modified to predict the oxidative life enhancement due to use of a diffusion barrier. The original diffusion model, designated COSIM, simulates Al diffusion in the coating to the growing oxide scale as well as Al diffusion into the substrate. The COSIM model incorporates an oxide growth and spalling model to provide the rate of Al consumption during cyclic oxidation. Coating failure is predicted when the Al concentration at the coating surface drops to a defined critical level. The modified COSIM model predicts the oxidative life of an overlay coating when a diffusion barrier is present eliminating diffusion of Al from the coating into the substrate. Both the original and the modified diffusion models have been used to predict the effectiveness of a diffusion barrier in extending the protective life of a NiCrAl overlay coating undergoing cyclic oxidation at 1100 C.

  5. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  6. Security: outline networking security

    E-print Network

    Biagioni, Edoardo S.

    the data: ssh/scp, https, secure POP/IMAP, PGP most protocols are not secure against traffic analysis host or circumvented security can lock out people who should have access data requiring security should not be sentSecurity: outline networking security security principles encryption authentication #12;networking

  7. Lithography overlay control improvement using patterned wafer geometry for sub-22nm technology nodes

    NASA Astrophysics Data System (ADS)

    Peterson, Joel; Rusk, Gary; Veeraraghavan, Sathish; Huang, Kevin; Koffas, Telly; Kimani, Peter; Sinha, Jaydeep

    2015-03-01

    The semiconductor industry continues to push the limits of immersion lithography through multiple patterning techniques for printing features with critical dimension 20 nm and below. As a result overlay has become one of the critical lithography control parameters impacting device performance and has a stringent budget for yielding at smaller half pitch nodes. Overlay has several sources of errors related to scanner, lens, mask, and wafer. Lithographers have developed both linear and higher order field and wafer models to successfully compensate for the static fingerprints from different sources of error. After the static modeled portion of the fingerprint is removed, the remaining overlay error can be characterized as unstable modeled error or un-modeled error, commonly called uncorrectable residual error. This paper explores the fundamental relationship of overlay to wafer geometry through mechanisms of process-induced contributions to the wafer overlay, categorized as plastic and elastic wafer deformation. Correlation of overlay to local features such as slip lines is proven experimentally. The paper describes methodologies and geometry-induced overlay metrics for the application of wafer geometry to perform overlay feedback and feed forward applications. Feedback applications allow for process development and controlling semiconductor processes through in-line monitoring of wafers. Feed forward applications could include geometrybased corrections to the scanner for compensating non-static wafer geometry related overlay errors, and grouping wafers based on higher-order geometry.

  8. Impacts of overlay correction model and metrology sampling scheme on device yield

    NASA Astrophysics Data System (ADS)

    Chiu, Chui-Fu; Huang, Chun-Yen; Shieh, Jason; Chiou, Tsann-Bim; Li, Albert; Shih, Chiang-Lin; Chen, Alek

    2012-03-01

    As the feature sizes continue to shrink, more overlay metrology data are needed to meet tighter overlay specifications which ensure high device yield. This study investigates the advantages of process corrections to overlay errors using various reduced measurement wafer schemes, and the improvement in yield that is realized using optimized overlay correction models. The capacitor layer of a 4x node DRAM product is chosen for verifying the sampling schemes in the experiment, because overlay errors of this layer are sensitive to device yield. The test wafers are split into five groups; four groups are sampled using various schemes and overlay correction models, and one group has a programmed overlay error. The post-correction overlay residuals in full wafer, baseline sampling and optimized sampling agree closely with predictions that are based on raw measurements. A scheme with iHOPC (intrafield high order process correction) partial third-order terms with a CPE (correction per exposure) function provides the best overlay performance. The averaged device yields of reduced sampling schemes are comparable with those of the full wafer scheme, however the reduction of the number of measurements that is made in optimized sampling reduce the metrology tool time by 26% from that required using the current scheme of factory. Therefore, the cost of metrology can be further reduced by applying the proposed optimized sampling map in the routine operations of fab.

  9. Privatization in Europe

    SciTech Connect

    Cartselos, T.

    1994-02-01

    Three factors have slowed the pace of power sector privatization, particularly in Europe: Capital shortages, political interests, scarce human capital resources. Balancing these factors are powerful drivers for privatization. These include the financial distress many European governments are facing, which limit their ability to continue subsidies and protection of unproductive state enterprises. Increasingly sophisticated customers are also demanding better products and services at lower prices. Privatization progress in Europe will probably move slowly and unevenly. Power generation will likely be the first beneficiary of any reform because it is not a natural monopoly. Transmission and distribution will remain regulated, despite discussion within the European Union regarding open or third-party access. What is likely to speed up the pace of privatization in some countries is a power crisis along the lines of what occurred in the Philippines. Greece, Italy and Portugal and perhaps the most likely prospects for such a scenario.

  10. Ductile film delamination from compliant substrates using hard overlayers

    PubMed Central

    Cordill, M.J.; Marx, V.M.; Kirchlechner, C.

    2014-01-01

    Flexible electronic devices call for copper and gold metal films to adhere well to polymer substrates. Measuring the interfacial adhesion of these material systems is often challenging, requiring the formulation of different techniques and models. Presented here is a strategy to induce well defined areas of delamination to measure the adhesion of copper films on polyimide substrates. The technique utilizes a stressed overlayer and tensile straining to cause buckle formation. The described method allows one to examine the effects of thin adhesion layers used to improve the adhesion of flexible systems. PMID:25641995

  11. Virtual overlay metrology for fault detection supported with integrated metrology and machine learning

    NASA Astrophysics Data System (ADS)

    Lee, Hong-Goo; Schmitt-Weaver, Emil; Kim, Min-Suk; Han, Sang-Jun; Kim, Myoung-Soo; Kwon, Won-Taik; Park, Sung-Ki; Ryan, Kevin; Theeuwes, Thomas; Sun, Kyu-Tae; Lim, Young-Wan; Slotboom, Daan; Kubis, Michael; Staecker, Jens

    2015-03-01

    While semiconductor manufacturing moves toward the 7nm node for logic and 15nm node for memory, an increased emphasis has been placed on reducing the influence known contributors have toward the on product overlay budget. With a machine learning technique known as function approximation, we use a neural network to gain insight to how known contributors, such as those collected with scanner metrology, influence the on product overlay budget. The result is a sufficiently trained function that can approximate overlay for all wafers exposed with the lithography system. As a real world application, inline metrology can be used to measure overlay for a few wafers while using the trained function to approximate overlay vector maps for the entire lot of wafers. With the approximated overlay vector maps for all wafers coming off the track, a process engineer can redirect wafers or lots with overlay signatures outside the standard population to offline metrology for excursion validation. With this added flexibility, engineers will be given more opportunities to catch wafers that need to be reworked, resulting in improved yield. The quality of the derived corrections from measured overlay metrology feedback can be improved using the approximated overlay to trigger, which wafers should or shouldn't be, measured inline. As a development or integration engineer the approximated overlay can be used to gain insight into lots and wafers used for design of experiments (DOE) troubleshooting. In this paper we will present the results of a case study that follows the machine learning function approximation approach to data analysis, with production overlay measured on an inline metrology system at SK hynix.

  12. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  13. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  14. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  15. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  16. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  17. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  18. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  19. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  20. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  1. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  2. 75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... ADMINISTRATION Information Security Oversight Office State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives and Records... amended (5 U.S.C. Appendix 2) and implementing regulation 41 CFR 101-6, the Information Security...

  3. On the Effectiveness of Global Private Regulation: The Implementation of the Equator Principles by Multinational Banks

    E-print Network

    Meyerstein, Ariel

    2011-01-01

    on Mining and Metals Voluntary Principles on Security andSecurity and Human rights— which include some of the world‘s biggest energy and miningand Mining (Langdon 2007). A related transnational public-private scheme is the Voluntary Principles on Security and

  4. Modeling Patterning of Heteroepitaxial Overlayers from Nano to Micron Scales

    NASA Astrophysics Data System (ADS)

    Ala-Nissila, Tapio

    2013-03-01

    Thin heteroepitaxial overlayers have been proposed as templates to generate stable, self-organized nanostructures at large length scales, with a variety of important technological applications. However, modeling strain-driven self-organization is a formidable challenge due to a large span of length and time scales involved. In this talk, I will present a method for predicting the patterning of ultrathin films on micron length scales with atomic resolution [K.R. Elder et al., Phys. Rev. Lett. 108, 226102 (2012)]. It is based on the Phase-Field Crystal model, which allows one to reach diffusive time scales for relaxation of the system. We make quantitative predictions for the type of superstructures (stripes, honeycomb, triangular) and length scales of pattern formation of both compressively strained and tensile overlayers on metal-metal systems, including Cu on Ru(0001), Cu on Pd(111), and Ag on Cu(111). Our findings are in excellent agreement with previous experiments and call for future experimental investigations of such systems.

  5. Lightweight storage and overlay networks for fault tolerance.

    SciTech Connect

    Oldfield, Ron A.

    2010-01-01

    The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands to millions of processors, In such environments, it is critical to have fault-tolerance mechanisms, including checkpoint/restart, that scale with the size of applications and the percentage of the system on which the applications execute. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a scalable solution. For example, on today's massive-scale systems that execute applications which consume most of the memory of the employed compute nodes, checkpoint operations generate I/O that consumes nearly 80% of the total I/O usage. Motivated by this observation, this project aims to improve I/O performance for application-directed checkpoints through the use of lightweight storage architectures and overlay networks. Lightweight storage provide direct access to underlying storage devices. Overlay networks provide caching and processing capabilities in the compute-node fabric. The combination has potential to signifcantly reduce I/O overhead for large-scale applications. This report describes our combined efforts to model and understand overheads for application-directed checkpoints, as well as implementation and performance analysis of a checkpoint service that uses available compute nodes as a network cache for checkpoint operations.

  6. Overlays of populations within a single file 1) Open a new histogram

    E-print Network

    .730.7147 www.amnis.com #12;Overlays of populations from different IDEAS files 1) Select Merge CIF files from the merged CIF file (the DAF will automatically be given the same name). 3) Select either an analysisOverlays of populations within a single file 1) Open a new histogram with the histogram tool. 2

  7. Content-Based Peer-to-Peer Network Overlay for Full-Text Federated Search

    E-print Network

    Callan, Jamie

    Content-Based Peer-to-Peer Network Overlay for Full-Text Federated Search Jie Lu Jamie Callan network overlay for full-text federated search over heterogeneous, open-domain contents. Local algorithms for providing federated search to large-scale networks of text digital libraries. Search in current P2P networks

  8. Thickness eects of water overlayer on its explosive evaporation at heated metal surfaces

    E-print Network

    Zhigilei, Leonid V.

    Thickness eects of water overlayer on its explosive evaporation at heated metal surfaces Yusheng on the character of its ejection from a heated Au surface. The simulations are performed for ®ve systems diering in the thickness of the water overlayer which was adsorbed on a metal substrate heated to 1000 K. For each system

  9. Improving Sensor Data Delivery During Disaster Scenarios with Resilient Overlay Networks

    E-print Network

    Venkatasubramanian, Nalini

    Improving Sensor Data Delivery During Disaster Scenarios with Resilient Overlay Networks Kyle E-to-one communica- tion, in particular Internet-connected sensors and their relation to disaster response. We explore the application of resilient overlay networks to aid these devices, or individuals if we consider

  10. Anonymous Routing in Structured Peer-to-Peer Overlays Nikita Borisov

    E-print Network

    Borisov, Nikita

    Anonymous Routing in Structured Peer-to-Peer Overlays by Nikita Borisov B.Math (University Professor David A. Wagner Professor David J. Aldous Spring 2005 #12;The dissertation of Nikita Borisov in Structured Peer-to-Peer Overlays Copyright 2005 by Nikita Borisov #12;1 Abstract Anonymous Routing

  11. Access Overlays: Improving Non-Visual Access to Large Touch Screens for Blind Users

    E-print Network

    Wobbrock, Jacob O.

    Access Overlays: Improving Non-Visual Access to Large Touch Screens for Blind Users Shaun K. Kane1@dgp.toronto.edu ladner@cs.washington.edu wobbrock@uw.edu ABSTRACT Many touch screens remain inaccessible to blind users touch screens or spatial data. In this paper, we introduce a set of three software-based access overlays

  12. The Case for Wireless Overlay Networks Randy H. Katz and Eric A. Brewer

    E-print Network

    California at Berkeley, University of

    Katz 1 The Case for Wireless Overlay Networks Randy H. Katz and Eric A. Brewer Electrical wireless overlay networks, extending traditional wired and internetworked processing ``islands'' to hosts on the move over coverage areas ranging from in­room, in­building, campus, metropol­ itan, and wide

  13. Towards a Common API for Structured Peer-to-Peer Overlays Frank Dabek

    E-print Network

    Druschel, Peter

    Towards a Common API for Structured Peer-to-Peer Overlays Frank Dabek ˇ Ben Zhao ˘ Peter Druschel effort to define com- mon APIs for structured peer-to-peer overlays and the key abstractions that can a different API and provides services with subtly different semantics. Thus, application designers must

  14. Towards a Common API for Structured Peer-to-Peer Overlays

    E-print Network

    Towards a Common API for Structured Peer-to-Peer Overlays Frank Dabek1 , Ben Zhao2 , Peter Druschel an ongoing effort to define common APIs for structured peer-to-peer overlays and the key abstractions a different API and provides ser- vices with subtly different semantics. Thus, application designers must

  15. Questioning the Benefits That Coloured Overlays Can Have for Reading in Students with and without Dyslexia

    ERIC Educational Resources Information Center

    Henderson, Lisa M.; Tsogka, Natassa; Snowling, Margaret J.

    2013-01-01

    Visual stress (the experience of visual distortions and discomfort during prolonged reading) is frequently identified and alleviated with coloured overlays or lenses. Previous studies have associated visual stress with dyslexia and as a consequence, coloured overlays are widely distributed to children and adults with reading difficulty. However,…

  16. Adaptive Overlay Topology for Mesh-Based P2P-TV Richard John Lobb

    E-print Network

    Adaptive Overlay Topology for Mesh-Based P2P-TV Systems Richard John Lobb University of Canterbury and maintaining the overlay top- ology in mesh-based P2P-TV systems. Our algorithm opti- mizes the topology-to-peer Live Streaming (P2P-TV) systems are can- didates for becoming the next Internet killer applications

  17. Verme: Worm Containment in Peer-to-Peer Overlays Filipe Freitas

    E-print Network

    Rodrigues, Luís E.T.

    Verme: Worm Containment in Peer-to-Peer Overlays Filipe Freitas Rodrigo Rodrigues Carlos Ribeiro Peer-to-peer overlays provide an ideal substrate for worm propagation. P2p-assisted worms have the po- tential to spread faster than traditional scanning worms because they have knowledge of a subset

  18. Early Experience with an Internet Broadcast System Based on Overlay Multicast

    E-print Network

    Ng, T. S. Eugene

    #12;1 Introduction The vision of enabling live video broadcast as a common Internet utilityEarly Experience with an Internet Broadcast System Based on Overlay Multicast Yang-hua Chu Aditya, NSF, Intel, or the U.S. government. #12;Keywords: overlay networks, Internet evaluation, peer

  19. Dynamic Bandwidth Auctions in Multi-overlay P2P Streaming with Network Coding

    E-print Network

    Li, Zongpeng

    1 Dynamic Bandwidth Auctions in Multi-overlay P2P Streaming with Network Coding Chuan Wu, Student, bli}@eecg.toronto.edu {zongpeng}@cpsc.ucalgary.ca Abstract--In peer-to-peer (P2P) live streaming applications such as IPTV, it is natural to accommodate multiple coexisting streaming overlays, corresponding

  20. Encaminamiento Inter-Dominio con Calidad de Servicio basada en una Arquitectura Overlay y QBGP

    E-print Network

    Masip Bruin, Xavier

    Encaminamiento Inter-Dominio con Calidad de Servicio basada en una Arquitectura Overlay y QBGP , Marilia Curado2 , Jordi Domingo-Pascual1, Josep Solé-Pareta1 1 Departament d'Arquitectura de Computadors de Servicio (QoS). Nuestro enfoque consiste en proporcionar una Arquitectura Overlay completamente

  1. Strain Response of Hot-Mix Asphalt Overlays for Bottom-Up Reflective Cracking

    E-print Network

    Ghauch, Ziad G

    2011-01-01

    This paper examines the strain response of typical HMA overlays above jointed PCC slabs prone to bottom-up reflective cracking. The occurrence of reflective cracking under the combined effect of traffic and environmental loading significantly reduces the design life of the HMA overlays and can lead to its premature failure. In this context, viscoelastic material properties combined with cyclic vehicle loadings and pavement temperature distribution were implemented in a series of FE models in order to study the evolution of horizontal tensile and shear strains at the bottom of the HMA overlay. The effect of several design parameters, such as subbase and subgrade moduli, vehicle speed, overlay thickness, and temperature condition, on the horizontal and shear strain response was investigated. Results obtained show that the rate of horizontal and shear strain increase at the bottom of the HMA overlay drop with higher vehicle speed, higher subgrade modulus, and higher subbase modulus. Moreover, the rate of horizon...

  2. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  3. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  4. Cryptography and Secure Two-Party Computation

    E-print Network

    May, J. Peter

    Cryptography and Secure Two-Party Computation Gabriel Bender August 21, 2006 1 The Millionaire of such a third party using cryptography. Secure two-party computation provides a generalization of this problem these constraints? 2 Private and Public-Key Cryptography Traditionally, cryptography has dealt with the secure

  5. Information Security Security Standards

    E-print Network

    Hammack, Richard

    by Advancement Services will be sent to VCU staff by the most secure method available. Data will only be supplied no longer needed. · Data supplied to external vendors must be sent to a secured site (https) Remote AccessInformation Security Security Standards University Advancement follows information security

  6. Quantum Nature of the Proton in Water-Hydroxyl Overlayers on Metal Surfaces Xin-Zheng Li,1

    E-print Network

    Alavi, Ali

    Quantum Nature of the Proton in Water-Hydroxyl Overlayers on Metal Surfaces Xin-Zheng Li,1 Matthew) Using ab initio path-integral molecular dynamics, we show that water-hydroxyl overlayers on transition and hydroxyl molecules [1­11]. These overlayers form because they offer the optimal balance of hydrogen (H

  7. Private School Accountability

    ERIC Educational Resources Information Center

    McTighe, Joe

    2004-01-01

    The No Child Left Behind Act has had a pervasive effect on American education in its drive to bring about improvement in student achievement through assessment and accountability. In its standards-based approach to reform, measurement by standardized tests is everything. In this article, the author discusses the issue of private school…

  8. Politics and Privatization.

    ERIC Educational Resources Information Center

    Keane, William G.; Flam, Samuel

    1998-01-01

    Experiences of a Michigan school district provide a case study for examining the political, economic, and community-relations issues embedded in a decision to privatize. Support can be achieved only if all parties feel they were given adequate attention during deliberations on the issue. (MLF)

  9. The privatization age? : which services are privatized and why

    E-print Network

    Zehavi, Amos J., 1968-

    2005-01-01

    This dissertation examines the determinants of the extent of privatization of service delivery. Despite the fact that right-wing governments extolling neo-liberal policies have placed privatization at the top of the policy ...

  10. Overlay improvement by exposure map based mask registration optimization

    NASA Astrophysics Data System (ADS)

    Shi, Irene; Guo, Eric; Chen, Ming; Lu, Max; Li, Gordon; Li, Rivan; Tian, Eric

    2015-03-01

    Along with the increased miniaturization of semiconductor electronic devices, the design rules of advanced semiconductor devices shrink dramatically. [1] One of the main challenges of lithography step is the layer-to-layer overlay control. Furthermore, DPT (Double Patterning Technology) has been adapted for the advanced technology node like 28nm and 14nm, corresponding overlay budget becomes even tighter. [2][3] After the in-die mask registration (pattern placement) measurement is introduced, with the model analysis of a KLA SOV (sources of variation) tool, it's observed that registration difference between masks is a significant error source of wafer layer-to-layer overlay at 28nm process. [4][5] Mask registration optimization would highly improve wafer overlay performance accordingly. It was reported that a laser based registration control (RegC) process could be applied after the pattern generation or after pellicle mounting and allowed fine tuning of the mask registration. [6] In this paper we propose a novel method of mask registration correction, which can be applied before mask writing based on mask exposure map, considering the factors of mask chip layout, writing sequence, and pattern density distribution. Our experiment data show if pattern density on the mask keeps at a low level, in-die mask registration residue error in 3sigma could be always under 5nm whatever blank type and related writer POSCOR (position correction) file was applied; it proves random error induced by material or equipment would occupy relatively fixed error budget as an error source of mask registration. On the real production, comparing the mask registration difference through critical production layers, it could be revealed that registration residue error of line space layers with higher pattern density is always much larger than the one of contact hole layers with lower pattern density. Additionally, the mask registration difference between layers with similar pattern density could also achieve under 5nm performance. We assume mask registration excluding random error is mostly induced by charge accumulation during mask writing, which may be calculated from surrounding exposed pattern density. Multi-loading test mask registration result shows that with x direction writing sequence, mask registration behavior in x direction is mainly related to sequence direction, but mask registration in y direction would be highly impacted by pattern density distribution map. It proves part of mask registration error is due to charge issue from nearby environment. If exposure sequence is chip by chip for normal multi chip layout case, mask registration of both x and y direction would be impacted analogously, which has also been proved by real data. Therefore, we try to set up a simple model to predict the mask registration error based on mask exposure map, and correct it with the given POSCOR (position correction) file for advanced mask writing if needed.

  11. Erosion studies on duplex and graded ceramic overlay coatings

    NASA Astrophysics Data System (ADS)

    Usmani, Saifi; Sampath, Sanjay

    1996-11-01

    The solid-particle erosion resistance of ceramic thermal barrier coatings (TBCs) is of considerable economic and industrial significance. Of additional significance to the service performance of these coatings is the effort to minimize the differences in coefficients of thermal expansion between the metallic substrate and the overlay TBC. A new design strategy toward this effort is the introduction of functionally graded interlayers between the metallic and ceramic layers. This research examines the role of interlayer grading, microstructure, and thermal cycling on the solid-particle erosion behavior of partially stabilized zirconia and alumina coatings at ambient and elevated temperatures. The results point to beneficial effects of grading and processing on the elevated temperature erosion response of these deposits.

  12. Dielectric overlayer for polarization discrimination in KTP channel waveguides.

    PubMed

    Risk, W P; Lau, S D; Kurdi, B N

    1993-11-01

    A 2-microm-thick dielectric film with a refractive index of 1.81 was deposited upon a KTP substrate containing channel waveguides fabricated by ion exchange. The resulting composite structure guided TM modes in the ion-exchanged KTP channel and TE modes in the dielectric film. The spatial separation of the guiding regions and the weak lateral confinement of the TE modes in the dielectric overlayer result in a greater round-trip loss for TE-polarized light when this composite waveguide structure is placed in an extended-cavity GaAlAs laser. This condition is sufficient to force the extended-cavity laser to oscillate in a TM mode, as required for frequency doubling of the diode-laser radiation in the periodically poled KTP waveguide. PMID:19829410

  13. BWR pipe crack and weld clad overlay studies

    SciTech Connect

    Shack, W.J.; Kassner, T.F.; Maiya, P.S.; Park, J.Y.; Ruther, W.E.

    1984-10-01

    Leaks and cracks in the heat-affected zones of weldments in austenitic stainless steel piping in boiling water reactors (BWRs) due to intergranular stress corrosion cracking (IGSCC) have been observed since the mid-1960s. Since that time, cracking has continued to occur, and indication have been found in all parts of the recirculation system, including the largest diameter lines. Proposed solutions for the problem include procedures that produce a more favorable residual stress state on the inner surface, materials that are more resistant to stress corrosion cracking (SCC), and changes in the reactor environment that decrease the susceptibility to cracking. In addition to the evaluation of these remedies, it is also important to gain a better understanding of the weld overlay procedure, which is the most widely used short-term repair for flawed piping.

  14. ECHO: a community video streaming system with interactive visual overlays

    NASA Astrophysics Data System (ADS)

    Cheung, Gene; Tan, Wai-tian; Shen, Bo; Ortega, Antonio

    2008-01-01

    We describe a networked video application where personalized avatars, controlled by a group of "hecklers", are overlaid on top of a real-time encoded video stream of an Internet game for multicast consumption. Rather than passively observing the streamed content individually, the interactivity of the controllable avatars, along with heckling voice exchange, engenders a sense of community during group viewing. We first describe how the system splits video into independent regions with and without avatars for processing in order to minimize complexity. Observing that the region with avatars is more delay-sensitive due to their interactivity, we then show that the regions can be logically packetized into separable sub-streams, and be transported and buffered with different delay requirements, so that the interactivity of the avatars can be maximized. The utility of our system extends beyond Internet game watching to general community streaming of live or pre-encoded video with visual overlays.

  15. Decentralized Service Allocation in a Broker Overlay Based Grid

    NASA Astrophysics Data System (ADS)

    Azab, Abdulrahman; Meling, Hein

    Grid computing is based on coordinated resource sharing in a dynamic environment of multi-institutional virtual organizations. Data exchanges, and service allocation, are challenging problems in the field of Grid computing. This is due to the decentralization of Grid systems. Building decentralized Grid systems with efficient resource management and software component mechanisms is a need for achieving the required efficiency and usability of Grid systems. In this work, a decentralized Grid system model is presented in which, the system is divided into virtual organizations each controlled by a broker. An overlay network of brokers is responsible for global resource management and managing allocation of services. Experimental results show that, the system achieves dependable performance with various loads of services, and broker failures.

  16. Blocking-Aware Private Record Linkage Ali Al-Lawati Dongwon Lee Patrick McDaniel

    E-print Network

    Yener, Aylin

    Blocking-Aware Private Record Linkage Ali Al-Lawati Dongwon Lee Patrick McDaniel Penn State / CSE is to devise secure blocking scheme to improve the performance of record linkage significantly while being the blocking framework. Therefore, our proposed blocking-aware private record linkage can perform large

  17. 76 FR 46626 - Safety Zone; Discovery World Private Wedding Firework Displays, Milwaukee, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Discovery World Private Wedding Firework... contrary to the public interest. Background and Purpose The Discovery World Private Wedding fireworks are a... will encompass all waters of Milwaukee Harbor in the vicinity of the Discovery World pier in...

  18. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  19. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  20. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  1. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  2. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  3. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  4. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  5. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  6. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  7. Weakly-Private Secret Sharing Schemes Amos Beimel1

    E-print Network

    Beimel, Amos

    Weakly-Private Secret Sharing Schemes Amos Beimel1 and Matthew Franklin2 1 Department of Computer. Abstract. Secret-sharing schemes are an important tool in cryptogra- phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret-sharing schemes realizing gen

  8. Effect of metrology time delay on overlay APC

    NASA Astrophysics Data System (ADS)

    Carlson, Alan; DiBiase, Debra

    2002-07-01

    The run-to-run control strategy of lithography APC is primarily composed of a feedback loop as shown in the diagram below. It is known that the insertion of a time delay in a feedback loop can cause degradation in control performance and could even cause a stable system to become unstable, if the time delay becomes sufficiently large. Many proponents of integrated metrology methods have cited the damage caused by metrology time delays as the primary justification for moving from a stand-alone to integrated metrology. While there is little dispute over the qualitative form of this argument, there has been very light published about the quantitative effects under real fab conditions - precisely how much control is lost due to these time delays. Another issue regarding time delays is that the length of these delays is not typically fixed - they vary from lot to lot and in some cases this variance can be large - from one hour on the short side to over 32 hours on the long side. Concern has been expressed that the variability in metrology time delays can cause undesirable dynamics in feedback loops that make it difficult to optimize feedback filters and gains and at worst could drive a system unstable. By using data from numerous fabs, spanning many sizes and styles of operation, we have conducted a quantitative study of the time delay effect on overlay run- to-run control. Our analysis resulted in the following conclusions: (1) There is a significant and material relationship between metrology time delay and overlay control under a variety of real world production conditions. (2) The run-to-run controller can be configured to minimize sensitivity to time delay variations. (3) The value of moving to integrated metrology can be quantified.

  9. Stimuli, Reinforcers, and Private Events

    ERIC Educational Resources Information Center

    Nevin, John A.

    2008-01-01

    Radical behaviorism considers private events to be a part of ongoing observable behavior and to share the properties of public events. Although private events cannot be measured directly, their roles in overt action can be inferred from mathematical models that relate private responses to external stimuli and reinforcers according to the same…

  10. Privatization Or Marketization: Educational Development in Post-Mao China

    NASA Astrophysics Data System (ADS)

    Mok, Ka Ho

    1997-09-01

    In the post-Mao era, the reformers have taken significant steps to privatize social policy and social welfare. Revamping the social security system and commodifying social services have become more prominent since the mid-eighties. Despite the post-Mao leaders' discomfort about the term "privatization", signs of state withdrawal from the provision of social policy and welfare are clear. The author argues that the emergence of private educational institutions indicates that China's educational development has gone through a similar process of privatization or quasi-marketization though the Chinese experience is different from that of Western counterparts. Specifically, this paper tries to examine how the flourishing market economy and the policy of decentralization have affected the development of China's higher education. No longer solely relying on public schools, private and minban (people run) educational institutions are becoming more popular in the new socialist market system. This paper attempts to examine how privatization and quasi- marketization have affected educational development in mainland China. The paper concludes with a discussion of the policy implications of the privatization of education in China.

  11. Governmental-Owner Power Imbalance and Privatization 

    E-print Network

    Xu, Kehan

    2011-10-21

    Privatization is defined as the sale of state-owned assets by governmental agencies to private investors (e.g., Megginson, Nash, Netter, and Poulsen, 2004; Villalonga, 2000). Research on privatization has focused on privatization techniques (e...

  12. GUC-Secure Set-Intersection Computation

    NASA Astrophysics Data System (ADS)

    Tian, Yuan; Zhang, Hao

    Secure set-intersection computation is one of the important problems in secure multiparty computation. We propose a general protocol construction for secure 2-party set-intersection computation based-on the anonymous IBE scheme and its user private-keys blind generation techniques. Compared with related works, this construction is provably GUC (generalized universally composable) secure in standard model with acceptable efficiency. In addition, an efficient instantiation based-on the Boyen-Waters IBE scheme is also presented.

  13. THE ADVANCED COURSE IN ENGINEERING ON CYBER A Learning Community for Developing Cyber-Security Leaders

    E-print Network

    : The Advanced Course in Engineering on Cyber Security (ACE-CS) is a public-private partnership to develop top. Through a public-private partnership among the Air Force Research Laboratory (AFRL), the US Military

  14. Patterning of Heteroepitaxial Overlayers from Nano to Micron Scales K. R. Elder,1,* G. Rossi,2

    E-print Network

    Elder, Ken

    Patterning of Heteroepitaxial Overlayers from Nano to Micron Scales K. R. Elder,1,* G. Rossi,2 P dimension- ality of the surface is the only driving force leading to surface reconstruction. More often

  15. Computerized polar plots by a cathode ray tube/grid overlay method

    NASA Technical Reports Server (NTRS)

    Freeman, J. M.; Shoup, E. L.

    1970-01-01

    Overlay is aligned with four calibration dots so it is not affected by CRT drift or changes in vertical or horizontal gain when producing Nyquist /frequency-response phase/amplitude/ plots. Method produces over 50 plots per hour.

  16. Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks

    E-print Network

    Qiao, Daji

    -aided Overlay Deployment and Relocation (SODaR) protocol as a possible solution. The key idea is to take manner until all syphons are connected. Simulation results show that, with SODaR, syphons are able

  17. 64nm pitch metal1 double patterning metrology: CD and OVL control by SEMCD, image based overlay and diffraction based overlay

    NASA Astrophysics Data System (ADS)

    Ducoté, Julien; Dettoni, Florent; Bouyssou, Régis; Le-Gratiet, Bertrand; Carau, Damien; Dezauzier, Christophe

    2015-03-01

    Patterning process control of advanced nodes has required major changes over the last few years. Process control needs of critical patterning levels since 28nm technology node is extremely aggressive showing that metrology accuracy/sensitivity must be finely tuned. The introduction of pitch splitting (Litho-Etch-Litho-Etch) at 14FDSOInm node requires the development of specific metrologies to adopt advanced process control (for CD, overlay and focus corrections). The pitch splitting process leads to final line CD uniformities that are a combination of the CD uniformities of the two exposures, while the space CD uniformities are depending on both CD and OVL variability. In this paper, investigations of CD and OVL process control of 64nm minimum pitch at Metal1 level of 14FDSOI technology, within the double patterning process flow (Litho, hard mask etch, line etch) are presented. Various measurements with SEMCD tools (Hitachi), and overlay tools (KT for Image Based Overlay - IBO, and ASML for Diffraction Based Overlay - DBO) are compared. Metrology targets are embedded within a block instanced several times within the field to perform intra-field process variations characterizations. Specific SEMCD targets were designed for independent measurement of both line CD (A and B) and space CD (A to B and B to A) for each exposure within a single measurement during the DP flow. Based on those measurements correlation between overlay determined with SEMCD and with standard overlay tools can be evaluated. Such correlation at different steps through the DP flow is investigated regarding the metrology type. Process correction models are evaluated with respect to the measurement type and the intra-field sampling.

  18. Private sector involvement in civil space remote sensing. Volume 1: Report

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.

  19. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    SciTech Connect

    Beushausen, Hans Chilwesa, Masuzyo

    2013-11-15

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking.

  20. Strain Response of Hot-Mix Asphalt Overlays for Bottom-Up Reflective Cracking

    E-print Network

    Ziad G. Ghauch; Grace G. Abou Jaoude

    2012-03-30

    This paper examines the strain response of typical HMA overlays above jointed PCC slabs prone to bottom-up reflective cracking. The occurrence of reflective cracking under the combined effect of traffic and environmental loading significantly reduces the design life of the HMA overlays and can lead to its premature failure. In this context, viscoelastic material properties combined with cyclic vehicle loadings and pavement temperature distribution were implemented in a series of FE models in order to study the evolution of horizontal tensile and shear strains at the bottom of the HMA overlay. The effect of several design parameters, such as subbase and subgrade moduli, vehicle speed, overlay thickness, and temperature condition, on the horizontal and shear strain response was investigated. Results obtained show that the rate of horizontal and shear strain increase at the bottom of the HMA overlay drop with higher vehicle speed, higher subgrade modulus, and higher subbase modulus. Moreover, the rate of horizontal strain accumulation increases with higher overlay thickness. Although initial strain values were higher at positive pavement temperature distributions, the corresponding rate of strain increase were higher at negative pavement temperatures. Finally, an extrapolation of the strain history curve for various pavement design parameters was used to estimate the number of cycles for bottom-up crack initiation.

  1. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    PubMed

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  2. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast

    PubMed Central

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member’s departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  3. 78 FR 41959 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory... discuss the matters relating to the Classified National Security Information Program for State, Local... telephone number of individuals planning to attend must be submitted to the Information Security...

  4. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  5. Ultrasonic Evaluation of Two Dissimilar Metal Weld Overlay Specimens

    SciTech Connect

    Crawford, Susan L.; Cinson, Anthony D.; Prowant, Matthew S.; Moran, Traci L.; Anderson, Michael T.

    2012-06-30

    Two dissimilar metal weld (DMW) pipe-to-nozzle specimens were implanted with thermal fatigue cracks in the 13% to 90% through-wall depth range. The specimens were ultrasonically evaluated with phased-array probes having center frequencies of 0.8, 1.0, 1.5, and 2.0 megahertz (MHz). An Alloy 82/182 weld overlay (WOL) was applied and the specimens were ultrasonically re-evaluated for flaw detection and characterization. The Post-WOL flaw depths were approximately 10% to 56% through-wall. This study has shown the effectiveness of ultrasonic examinations of Alloy 82/182 overlaid DMW specimens. Phased-array probes with center frequency in the 0.8- to 1.0-MHz range provide a strong coherent signal but the greater ultrasonic wavelength and larger beam spot size prevent the reliable detection of small flaws. These small flaws had nominal through-wall depths of less than 15% and length in the 50-60 mm (2-2.4 in.) range. Flaws in the 19% and greater through-wall depth range were readily detected with all four probes. At the higher frequencies, the reflected signals are less coherent but still provide adequate signal for flaw detection and characterization. A single inspection at 2.0 MHz could provide adequate detection and sizing information but a supplemental inspection at 1.0 or 1.5 MHz is recommended.

  6. Support surfaces: beds, mattresses, overlays-oh my!

    PubMed

    Mackey, Dianne

    2005-06-01

    The prevention and treatment of pressure ulcers are major concerns for health care providers across the care continuum. The selection of a support surface is an important component of a comprehensive pressure ulcer prevention program. The accepted standard in clinical practice for pre-venting pressure ulcers and other complications of immobility is to either turn patients manually at frequent intervals or to use a pressure-reducing device. The longer a patient is immobilized, the more profound will be the systemic complications. The costs associated with the complications of immobility are staggering in terms of human suffering, physiologic damage,and real dollars. A variety of specialty beds, mattresses, and overlays have been designed to address pressure, shear, friction, and moisture. Limited data exist regarding the efficacy of these products. Clinicians want to choose a support surface for their patients on the basis of product performance. With the push toward establishing standards for testing methods and reporting information, clinicians can look forward to making support surface decisions based on the evidence and outcome data resulting from controlled clinical studies and expert opinion and consensus. PMID:15924893

  7. Design of a synthetic vision overlay for UAV autoland monitoring

    NASA Astrophysics Data System (ADS)

    Tadema, Jochum; Theunissen, Eric

    2008-04-01

    For Unmanned Aerial Vehicles (UAVs), autonomous forms of autoland are being pursued that do not depend on special, deployability restraining, ground-based equipment for the generation of the reference path to the runway. Typically, these forms of autoland use runway location data from an onboard database to generate the reference path to the desired location. Synthetic Vision (SV) technology provides the opportunity to use conformally integrated guidance reference data to 'anchor' the goals of such an autoland system into the imagery of the nose-mounted camera. A potential use of this is to support the operator in determining whether the vehicle is flying towards the right location in the real world, e.g., the desired touchdown position on the runway. Standard conformally integrated symbology, representing e.g., the future pathway and runway boundaries, supports conformance monitoring and detection of latent positioning errors. Additional integration of landing performance criteria into the symbology supports assessment of the severity of these errors, further aiding the operator in the decision whether the automated landing should be allowed to continue or not. This paper presents the design and implementation of an SV overlay for UAV autoland procedures that is intended for conformance and integrity monitoring during final approach. It provides preview of mode changes and decision points and it supports the operator in assessing the integrity of the used guidance solution.

  8. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  9. 76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory... to discuss the matters relating to the Classified National Security Information Program for State... INFORMATION: This meeting will be open to the public. However, due to space limitations and access...

  10. 78 FR 45059 - Safety Zone; Sherman Private Party Fireworks, Lake Michigan, Winnetka, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    .... SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Sherman Private Party Fireworks, Lake... establishing a temporary safety zone on Lake Michigan near Winnetka, IL. This safety zone is intended...

  11. Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin

    E-print Network

    International Association for Cryptologic Research (IACR)

    Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management and practical operational security in bitcoin digital currency storage systems. We study the security two most used bitcoin HD Wallet key management solutions (e.g. in BIP032 and in earlier systems). These systems

  12. 76 FR 74040 - Emerging Technology and Research Advisory Committee (ETRAC): Notice of Recruitment of Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-30

    ... From the Federal Register Online via the Government Printing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Emerging Technology and Research Advisory Committee (ETRAC): Notice of Recruitment of Private-Sector Members The Bureau of Industry and Security (BIS) is announcing a recruitment for new candidates to serve on the...

  13. 78 FR 36429 - Safety Zone; Private Party Fireworks; Lake Michigan, Chicago, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-18

    ...-9826. SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Private Party Fireworks; Lake Michigan... restrict vessels from a portion of Chicago Harbor due to a fireworks display. This temporary safety zone...

  14. Asphalt overlay design methods for rigid pavements considering rutting, reflection cracking, and fatigue cracking. Research report September 1996--August 1997

    SciTech Connect

    Cho, Y.H.; Liu, C.; Dossey, T.; McCullough, B.F.

    1998-10-01

    An asphalt concrete pavement (ACP) overlay over a rigid pavement represents a viable rehabilitation strategy. It can provide good serviceability at an initial construction cost that is substantially less than that of a rigid overlay rehabilitation. In addition, ACP overlays require less construction time, which can reduce user costs during construction. However, it may not be the most economical solution for long-term rehabilitation. Because of their relatively short service life, ACP overlays may require maintenance sooner than rigid overlays. And one of the more critical distresses that effectively determine the life span of the structure is reflection cracking. This report investigates alternative strategies that seek to prevent reflection cracking on ACP overlays.

  15. Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Sun, Si-Jia; Wang, Yan

    2015-03-01

    Private information retrieval implies oblivious transfer in classical cryptography. Following this clue, we present a novel quantum one-out-of-two OT protocol based on a practical quantum symmetrically private information retrieval protocol Jakobi et al. (Phys. Rev. A 83, 022301 2011), with changes only in the classical postprocessing of the key. While unconditionally secure oblivious transfer is known to be impossible, we argue that an interesting degree of security can be achieved by means of quantum physical principles instead of unproven security assumptions in order to protect both the sender and the receiver. The proposed OT protocol is loss tolerant, practical and robust against quantum memory attack.

  16. Security sonar for water intakes

    SciTech Connect

    Rothenbuhler, D.E.

    1987-07-01

    The security of the water approaches to nuclear facilities has been largely neglected because of the lack of solutions to the intrusion problem. This paper reviews underwater scanning sonar in general, highlights a number of problems encountered in a threat detection system using sonar and suggests some procedures that can help make such a system workable. Information is drawn from recent experience with several security projects in the governmental and private sectors, one of which was a nuclear facility.

  17. Using the Overlay Assay to Qualitatively Measure Bacterial Production of and Sensitivity to Pneumococcal Bacteriocins

    PubMed Central

    Maricic, Natalie; Dawid, Suzanne

    2014-01-01

    Streptococcus pneumoniae colonizes the highly diverse polymicrobial community of the nasopharynx where it must compete with resident organisms. We have shown that bacterially produced antimicrobial peptides (bacteriocins) dictate the outcome of these competitive interactions. All fully-sequenced pneumococcal strains harbor a bacteriocin-like peptide (blp) locus. The blp locus encodes for a range of diverse bacteriocins and all of the highly conserved components needed for their regulation, processing, and secretion. The diversity of the bacteriocins found in the bacteriocin immunity region (BIR) of the locus is a major contributor of pneumococcal competition. Along with the bacteriocins, immunity genes are found in the BIR and are needed to protect the producer cell from the effects of its own bacteriocin. The overlay assay is a quick method for examining a large number of strains for competitive interactions mediated by bacteriocins. The overlay assay also allows for the characterization of bacteriocin-specific immunity, and detection of secreted quorum sensing peptides. The assay is performed by pre-inoculating an agar plate with a strain to be tested for bacteriocin production followed by application of a soft agar overlay containing a strain to be tested for bacteriocin sensitivity. A zone of clearance surrounding the stab indicates that the overlay strain is sensitive to the bacteriocins produced by the pre-inoculated strain. If no zone of clearance is observed, either the overlay strain is immune to the bacteriocins being produced or the pre-inoculated strain does not produce bacteriocins. To determine if the blp locus is functional in a given strain, the overlay assay can be adapted to evaluate for peptide pheromone secretion by the pre-inoculated strain. In this case, a series of four lacZ-reporter strains with different pheromone specificity are used in the overlay. PMID:25350516

  18. TWRS privatization bibliography

    SciTech Connect

    1996-02-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. The organization of this bibliography is by subject area. Some of the documents overlap subject areas, and may be presented in more than one. Additionally, assignment of a document to one subject area does not necessarily preclude that document from containing information relevant to other subject areas not identified. The subject areas include, in order of presentation:. Waste Characterization; Pre-treatment; High-level Waste Immobilization; Low-level Waste Immobilization; Low-level Waste Melter Test Program; Performance Assessment; and General Safety.

  19. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  20. The Law and Private Police.

    ERIC Educational Resources Information Center

    Kakalik, James S.; Wildhorn, Sorrel

    This report is one of a series of five describing a 16-month study of the nature and extent of the private police industry in the United States, its problems, its present regulation, and how the law impinges on it. A general discussion of the sources of legal limitations upon private police activities and personnel and sources of legal powers is…

  1. Michigan School Privatization Survey 2010

    ERIC Educational Resources Information Center

    Hohman, James M.; Anderson, Dustin D.

    2010-01-01

    Privatization of support services has been a method that Michigan school districts have used for several years to lower costs. More than ever before, Michigan school districts are privatizing the three main support services they offer--food, custodial and transportation. The annual survey finds that 48.8 percent of Michigan school districts are…

  2. Signed Soliloquy: Visible Private Speech

    ERIC Educational Resources Information Center

    Zimmermann, Kathrin; Brugger, Peter

    2013-01-01

    Talking to oneself can be silent (inner speech) or vocalized for others to hear (private speech, or soliloquy). We investigated these two types of self-communication in 28 deaf signers and 28 hearing adults. With a questionnaire specifically developed for this study, we established the visible analog of vocalized private speech in deaf signers.…

  3. Private Loans: Facts and Trends

    ERIC Educational Resources Information Center

    Institute for College Access & Success, 2014

    2014-01-01

    Private loans are one of the riskiest ways to finance a college education. Like credit cards, they typically have variable interest rates. Both variable and fixed rates are higher for those who can least afford them--as high as 13% in June 2014. Private loans are not eligible for the important deferment, income-based repayment, or loan forgiveness…

  4. Design and development of a mobile image overlay system for needle interventions

    PubMed Central

    Anand, M.; King, F.; Ungi, T.; Lasso, A.; Rudan, J.; Jayender, J.; Fritz, J.; Carrino, J. A.; Jolesz, F. A.; Fichtinger, G.

    2015-01-01

    Previously, a static and adjustable image overlay systems were proposed for aiding needle interventions. The system was either fixed to a scanner or mounted over a large articulated counterbalanced arm. Certain drawbacks associated with these systems limited the clinical translation. In order to minimize these limitations, we present the mobile image overlay system with the objective of reduced system weight, smaller dimension, and increased tracking accuracy. The design study includes optimal workspace definition, selection of display device, mirror, and laser source. The laser plane alignment, phantom design, image overlay plane calibration, and system accuracy validation methods are discussed. The virtual image is generated by a tablet device and projected into the patient by using a beamsplitter mirror. The viewbox weight (1.0kg) was reduced by 8.2 times and image overlay plane tracking precision (0.21mm, STD=0.05) was improved by 5 times compared to previous system. The automatic self-calibration of the image overlay plane was achieved in two simple steps and can be done away from patient table. The fiducial registration error of the physical phantom to scanned image volume registration was 1.35mm (STD=0.11). The reduced system weight and increased accuracy of optical tracking should enable the system to be hand held by the physician and explore the image volume over the patient for needle interventions. PMID:25571403

  5. US Government Outsourcing, the Private Military Industry, and Operation Iraqi Freedom: A Case Study in Conflict Contracting

    E-print Network

    Halpin, Allison Ann

    2011-12-31

    This thesis analyzes state utilization of private military and security companies (PMSC), using United States Government (USG) outsourcing during Operation Iraqi Freedom (OIF) as a case study to investigate how PMSCs influence interstate conflicts...

  6. Cloud Security by Max Garvey

    E-print Network

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

  7. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  8. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ...Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October...Cyber Security mission to Riyadh, Saudi Arabia and Kuwait City, Kuwait, from...local) and private entities in Saudi Arabia and Kuwait. The mission will...

  9. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  10. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  11. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  12. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  13. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12... COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than...

  14. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  15. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  16. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  17. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  18. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  19. Anonymity and Censorship Resistance in Unstructured Overlay Networks

    E-print Network

    Tryfonopoulos, Christos

    University {maffei,mhamerli}@cs.uni-sb.de 2 Oxford Brookes University & Nominet UK alessandro@nominet.org.uk previously shared se- crets, avoiding centralised infrastructures, like trusted servers or gateways of the German federal government and by Miur project SOFT: "Security Oriented Formal Techniques". R. Meersman, T

  20. Managing the risks of a more private hydro market

    SciTech Connect

    Hurst, P.A.D.

    1995-12-31

    The trend toward increasing private involvement in hydropower ownership and finance is changing the balance of critical issues for successful projects. The completion and long-term viability of a project now can depend as much on issues of risk management and legal security as on engineering and mechanical design. A prudent project owner can minimize the new uncertainties by identifying potential issues early in the planning process and developing sound management strategies.

  1. 75 FR 49932 - Private Transfer Fee Covenants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... Private Transfer Fee Covenants AGENCY: Federal Housing Finance Agency. ACTION: Notice of proposed guidance..., ``Guidance on Private Transfer Fee Covenants,'' to the Federal National Mortgage Association (Fannie Mae... properties encumbered by private transfer fee covenants. Such covenants appear adverse to...

  2. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  3. A private power plan

    SciTech Connect

    Ganguli, B.

    1995-01-01

    The involvement of independent power producers in the development of the Indian power sector is a result of the fiscal crisis which overwhelmed the Indian state about 1990. Until then the power sector had been almost exclusively a public sector monopoly. The power ministry estimates energy and peaking shortages of 11 percent and 32 percent in fiscal year 1993 to 1994. These are well above worst case scenarios projected by the Central Electricity Authority. Though it has received more attention, generation is not the only area in India`s power sector where independents will find opportunities. Upgrading, modernization, and transmission and distribution are also open to the private sector. State Electricity Boards (SEBs) currently lose 22 percent of power generated during transmission and distribution, a large part of this due to theft. Ultimately, success in attracting foreign investments will depend on the government`s ability to reform SEBs. This in turn will mean that the state governments will have to muster up the political will to raise tariffs.

  4. Weld overlay coatings for erosion control. Task A: Literature review, progress report

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  5. Residual stress determination in an overlay dissimilar welded pipe by neutron diffraction

    SciTech Connect

    Woo, Wan Chuck; Em, Vyacheslav; Hubbard, Camden R; Lee, Ho-Jin; Park, Kwang Soo

    2011-01-01

    Residual stresses were determined through the thickness of a dissimilar weld overlay pipe using neutron diffraction. The specimen has a complex joining structure consisting of a ferritic steel (SA508), austenitic steel (F316L), Ni-based consumable (Alloy 182), and overlay of Ni-base superalloy (Alloy 52M). It simulates pressurized nozzle components, which have been a critical issue under the severe crack condition of nuclear power reactors. Two neutron diffractometers with different spatial resolutions have been utilized on the identical specimen for comparison. The macroscopic 'stress-free' lattice spacing (d{sub o}) was also obtained from both using a 2-mm width comb-like coupon. The results show significant changes in residual stresses from tension (300-400 MPa) to compression (-600 MPa) through the thickness of the dissimilar weld overlay pipe specimen.

  6. Impact of CD and overlay errors on double-patterning processes

    NASA Astrophysics Data System (ADS)

    Lapeyre, Céline; Barnola, Sébastien; Servin, Isabelle; Gaugirana, Stéphanie; Salvetat, Vincent; Magome, Nobutaka; Hazelton, Andrew J.; McCallum, Martin

    2009-03-01

    Double patterning (DP) is today the main solution to extend immersion lithography to the 32 nm node and beyond. Pitch splitting process with hardmask transfer and spacer process have been developed at CEA-LETI-Minatec. This paper focuses on experimental data using dry ArF lithography with a k1 factor of 0.20 ; the relative impact of each DP step on overlay and CD uniformity budgets is analyzed. In addition, topography issues related to the presence of the patterned hard mask layer during the second imaging step is also investigated. Tool-to-itself overlay, image placement on the reticle and wafer deformation induced by this DP process are evaluated experimentally and resulting errors on CD budget have been determined. CD uniformity error model developed by Nikon describing the relationship between CD and overlay in different DP processes is validated experimentally.

  7. Heavy duty membranes for the reduction of reflective cracking in bituminous concrete overlays

    NASA Astrophysics Data System (ADS)

    Knight, N. E.; Hoffman, G. L.

    1981-10-01

    The prevalence of reflective cracking in asphaltic concrete overlays is a major factor contributing to the premature failure of the pavement system. This reflective cracking is caused by cyclic stresses induced in the overlay by movements in the underlying pavement. Seven different types of heavy-duty membranes were placed over Portland cement concrete pavement joints at one site in Pennsylvania before the roadway was overlayed with asphaltic concrete in order to evaluate the ability of these membranes to reduce the occurrence of reflective cracking over transverse and longitudinal joints and to function as a waterstop once cracking has occurred. Control joints without any membranes were also built into the project for comparison purposes.

  8. Private Information and Insurance Rejections

    PubMed Central

    Hendren, Nathaniel

    2013-01-01

    Across a wide set of non-group insurance markets, applicants are rejected based on observable, often high-risk, characteristics. This paper argues that private information, held by the potential applicant pool, explains rejections. I formulate this argument by developing and testing a model in which agents may have private information about their risk. I first derive a new no-trade result that theoretically explains how private information could cause rejections. I then develop a new empirical methodology to test whether this no-trade condition can explain rejections. The methodology uses subjective probability elicitations as noisy measures of agents beliefs. I apply this approach to three non-group markets: long-term care, disability, and life insurance. Consistent with the predictions of the theory, in all three settings I find significant amounts of private information held by those who would be rejected; I find generally more private information for those who would be rejected relative to those who can purchase insurance; and I show it is enough private information to explain a complete absence of trade for those who would be rejected. The results suggest private information prevents the existence of large segments of these three major insurance markets. PMID:24187381

  9. Intermittent-contact scanning capacitance microscopy imaging and modeling for overlay metrology

    SciTech Connect

    Mayo, S.; Kopanski, J. J.; Guthrie, W. F.

    1998-11-24

    Overlay measurements of the relative alignment between sequential layers are one of the most critical issues for integrated circuit (IC) lithography. We have implemented on an AFM platform a new intermittent-contact scanning capacitance microscopy (IC-SCM) mode that is sensitive to the tip proximity to an IC interconnect, thus making it possible to image conductive structures buried under planarized dielectric layers. Such measurements can be used to measure IC metal-to-resist lithography overlay. The AFM conductive cantilever probe oscillating in a vertical plane was driven at frequency {omega}, below resonance. By measuring the tip-to-sample capacitance, the SCM signal is obtained as the difference in capacitance, {delta}C({omega}), at the amplitude extremes. Imaging of metallization structures was obtained with a bars-in-bars aluminum structure embedded in a planarized dielectric layer 1 {mu}m thick. We have also modeled, with a two-dimensional (2D) electrostatic field simulator, IC-SCM overlay data of a metallization structure buried under a planarized dielectric having a patterned photoresist layer deposited on it. This structure, which simulates the metal-to-resist overlay between sequential IC levels, allows characterization of the technique sensitivity. The capacitance profile across identical size electrically isolated or grounded metal lines embedded in a dielectric was shown to be different. The floating line shows capacitance enhancement at the line edges, with a minimum at the line center. The grounded line shows a single capacitance maximum located at the line center, with no edge enhancement. For identical line dimensions, the capacitance is significantly larger for grounded lines making them easier to image. A nonlinear regression algorithm was developed to extract line center and overlay parameters with approximately 3 nm resolution at the 95% confidence level, showing the potential of this technique for sub-micrometer critical dimension metrology. Symmetric test structures contribute to facilitate overlay data extraction.

  10. Lemnos Interoperable Security Program

    SciTech Connect

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  11. Private pensions. A less taxing alternative.

    PubMed

    Schalkle, B L; Dyrhaug, K J

    1992-07-01

    The results of the Joneses' coordinated retirement income and estate planning strategies are as follows: 1. The Joneses maximized their estate assets by converting an inefficient estate asset (the qualified retirement plan) into an efficient estate asset (the income-tax-free death benefit) without jeopardizing their current or future standard of living or the value passed on to their heirs. This allows them to satisfy their conflicting objectives. 2. They added flexibility to their future family gifting plans by providing themselves a secure income for the rest of their lives. 3. They fulfilled their desire to protect their family against government confiscation of retirement plan assets in the event they both die before using all their qualified retirement assets. This private pension plan strategy is obviously not available to everyone, nor is it appropriate for everyone. This solution worked well for this client, but everyone's situation is unique. Before creating such a plan, it is important to review all the factors in an individual's financial picture, including financial and retirement objectives and investment risk tolerance. Although this is an innovative idea that may solve a pension dilemma, it should not be used in place of qualified retirement plans but, rather, used in conjunction with such a plan. The private pension plan does not work with all insurance products or all insurance companies. Choosing the right company and product for each client requires care and expertise. PMID:1406518

  12. Peru turnaround tied to privatization

    SciTech Connect

    Not Available

    1993-04-19

    Petroleos del Peru predicts a 10% increase in Peru's oil production this year and a further increase in 1994. Petroperu also forecasts a sharp increase in drilling in Peru this year. After several years of declining oil production, a gradual turnaround in the cash strapped country's petroleum industry is largely tied to its progress in privatization. The government last year began a campaign to privatize all state owned companies by the end of July 1995. The paper discusses forecasts by Petroperu; the contract of Occidental del Amazonas Inc.; the Petromar privatization; Great Western's contract; development of the Aguaytia gas field; and refinery contracts.

  13. A Spatial Overlay Ranking Method for a Geospatial Search of Text Objects

    USGS Publications Warehouse

    Lanfear, Kenneth J.

    2006-01-01

    Earth-science researchers need the capability to find relevant information by location and topic. Conventional geographic techniques that simply check whether polygons intersect can efficiently achieve a high recall on location, but can not achieve precision for ranking results in likely order of importance to the reader. A spatial overlay ranking based upon how well an object's footprint matches the search area provides a more effective way to spatially search a collection of reports, and avoids many of the problems associated with an 'in/out' (True/False) boolean search. Moreover, spatial overlay ranking appears to work well even when spatial extent is defined only by a simple bounding box.

  14. A safety evaluation for overlay disbonding of high-temperature and pressure vessels

    SciTech Connect

    Horita, Ryuichi; Nakajima; Hiroyuki; Tanaka, Kazunori; Murakami, Shunzo; Fujii, Tadaomi

    1995-11-01

    Hydrogen induced disbonding test (autoclave test) of stainless weld-overlaid 2-1/4Cr-1Mo and 2-1/4Cr-1Mo-1/4V steel, and the calculations of residual hydrogen contents at the fusion boundary in the specimens and actual vessels, were performed. The effects of microstructure of weld overlay near the fusion boundary and postweld heat treatment on disbonding resistance were clarified, and critical hydrogen content values in weld overlay to prevent disbonding were obtained. A simple evaluation method for disbonding in actual vessels using Tempering Parameter was established.

  15. Relative humidity sensor based on an optical microfiber knot resonator with a polyvinyl alcohol overlay

    NASA Astrophysics Data System (ADS)

    Yoon, Min-Seok; Yoo, Kwang Wook; Han, Young-Geun

    2015-09-01

    A highly sensitive RH sensor based on the MKR with the PVA overlay is investigated. After making a tie using the microfiber with a diameter of 2 ?m, the MRK with a loop diameter of 90 ?m is fabricated and coated by using a PVA which can absorb humidity. The optical spectra of the MRK with the PVA overlay are converted to the spatial frequency spectra by using the FFT for precise measurement. The absorption of humidity in the proposed MKR-based sensing probe effectively changes the spatial frequency of the MKR. The RH sensitivities of the proposed MKR-based RH sensing prober with higher order modes can be dramatically improved.

  16. Wireless Overlay Backhauling over Bidirectional Colorless WDM-PONs: the Impact of the Baseband Channel

    NASA Astrophysics Data System (ADS)

    Avó, Ricardo; Medeiros, Maria C. R.

    2013-12-01

    Next generation wavelength division multiplexed passive optical access networks (WDM-PON), employing reflective semiconductor optical amplifiers (RSOAs), can provide a cost effective solution to jointly support both, classic PON services and transparent overlay wireless backhauling. In this approach, the wireless signals are transparently transmitted over the WDMPON, thus creating a virtual dedicated network without incurring into additional network installation and maintenance costs. In this paper, the performance of a WDM-PON transmitting an overlay orthogonal frequency-division multiplexing (OFDM) wireless signal is assessed analytically and experimentally, with relevant system impairments being identified and system design guidelines are provided.

  17. Description of the signal and background event mixing as implemented in the Marlin processor OverlayTiming

    E-print Network

    Schade, P

    2011-01-01

    This note documents OverlayTiming, a processor in the Marlin software frame- work. OverlayTiming can model the timing structure of a linear collider bunch train and offers the possibility to merge simulated physics events with beam-beam background events. In addition, a realistic structure of the detector readout can be imitated by defining readout time windows for each subdetector.

  18. Improving the Fault Resilience of Overlay Multicast for Media Streaming Guang Tan, Stephen A. Jarvis and Daniel P. Spooner

    E-print Network

    Jarvis, Stephen

    Improving the Fault Resilience of Overlay Multicast for Media Streaming Guang Tan, Stephen A resilience of overlay-based live media streaming from two aspects: (1) how to construct a stable multicast. This paper considers this issue in the context of live media streaming, where the data is streamed from

  19. Delegating Private Quantum Computations

    E-print Network

    Anne Broadbent

    2015-06-03

    We give a protocol for the delegation of quantum computation on encrypted data. More specifically, we show that in a client-server scenario, where the client holds the encryption key for an encrypted quantum register held by the server, it is possible for the server to perform a universal set of quantum gates on the quantum data. All Clifford group gates are non-interactive, while the remaining non-Clifford group gate that we implement (the p/8 gate) requires the client to prepare and send a single random auxiliary qubit (chosen among four possibilities), and exchange classical communication. This construction improves on previous work, which requires either multiple auxiliary qubits or two-way quantum communication. Using a reduction to an entanglement-based protocol, we show privacy against any adversarial server according to a simulation-based security definition.

  20. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    SciTech Connect

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-21

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of synchronization on the printing registration was verified experimentally using gravure offset printing. The variations in synchronization result in the differences in the MD scale, and the measured MD scale matches exactly with the modeled MD scale.

  1. RFID Security: Tradeoffs between Security and Ivan Damgard and Michael stergaard Pedersen

    E-print Network

    International Association for Cryptologic Research (IACR)

    RFID Security: Tradeoffs between Security and Efficiency Ivan Damg°ard and Michael �stergaard privacy for RFID tags. We add to this definition a completeness and a soundness require- ment, i prove a conjecture by Juels and Weis, namely in a strongly private and sound RFID system using only

  2. State Regulation of Private Education.

    ERIC Educational Resources Information Center

    Lines, Patricia M.

    1982-01-01

    Examines state laws and the actions of various courts on home instruction and unauthorized educational programs. Suggests reforming the regulation of private education through legislative action that requires periodic testing as an alternative to compulsory school attendance. (Author/MLF)

  3. What Future for Private Schools?

    ERIC Educational Resources Information Center

    Cath Sch J, 1970

    1970-01-01

    After examining a small private school (Norwood Academy, Chestnut Hill, Philadelphia) a group of leading educators give their answers to questions about its future and the future of such schools in general. (Editor)

  4. Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party

    NASA Astrophysics Data System (ADS)

    Zhang, Bo; Liu, Xingtong; Wang, Jian; Tang, Chaojing

    2015-10-01

    Recently, Lin et al. proposed a novel quantum private comparison protocol without a third party (Quantum Inf. Process. 13:239-247, 2014). This paper points out two security loopholes in Lin et al.'s protocol, in which one dishonest party can disclose the other's private information without being detected and the comparison result can be manipulated completely by either party. In addition, improvements are proposed to avoid these loopholes.

  5. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  6. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  7. Behavioral Overlays for NonVerbal Communication Expression on a Humanoid Robot

    E-print Network

    Behavioral Overlays for Non­Verbal Communication Expression on a Humanoid Robot Andrew G. Brooks of non­verbal communication display behaviors to an autonomous humanoid robot, including the use the robot to communicate information non­verbally while simultaneously fulfilling its existing instrumental

  8. Estimation and Simulation of Network Delay Traces for VoIP in Service Overlay Network

    E-print Network

    for long distance phone calls in peak hours. In our research, we focus on the study of the end to endEstimation and Simulation of Network Delay Traces for VoIP in Service Overlay Network Hong Li of minimizing sampling cost and also minimizing the error in the estimation of the actual delay traces. We also

  9. Semantic Overlays in Educational Content Networks--The hylOs Approach

    ERIC Educational Resources Information Center

    Engelhardt, Michael; Hildebrand, Arne; Lange, Dagmar; Schmidt, Thomas C.

    2006-01-01

    Purpose: The paper aims to introduce an educational content management system, Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.…

  10. Fluorogenic membrane overlays to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and seawater

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Three assays were developed to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and other foods and in seawater and other environmental samples. Assays involve membrane overlays of overnight colonies on non-selective agar plates to detect ß-glucuronidase and lysyl am...

  11. Robotic weld overlay coatings for erosion control. Final technical progress report, July 1992--July 1995

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1995-10-15

    The erosion behavior of weld overlay coatings has been studied. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400{degrees}C at 90{degrees} and 30{degrees} particle impact angles. The microstructure of each coating was characterized before erosion testing. A relative ranking of the coatings erosion resistance was developed by determining the steady state erosion rates. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at both impact angles. It was found that weld overlays that exhibit good abrasion resistance did not show good erosion resistance. Erosion tests were also performed for selected wrought materials with chemical composition similar to weld overlays. Eroded surfaces of the wrought and weld alloys were examined by Scanning Electron Microscopy (SEM). Microhardness tests were performed on the eroded samples below the erosion surface to determine size of the plastically deformed region. It was found that one group of coatings experienced significant plastic deformation as a result of erosion while the other did not. It was also established that, in the steady state erosion regime, the size of the plastically deformed region is constant.

  12. Novel Water Overlayer Growth on Pd(111) Characterized with Scanning Tunneling Microscopy and Density Functional Theory

    E-print Network

    Alavi, Ali

    It is hard to overstate the importance of water-solid interactions. They play a key role in many areasNovel Water Overlayer Growth on Pd(111) Characterized with Scanning Tunneling Microscopy (STM) images of water submonolayers on Pd(111) reveal quasiperi- odic and isolated adclusters

  13. Assessing the Crossdisciplinarity of Technology-Enhanced Learning with Science Overlay Maps and Diversity Measures

    ERIC Educational Resources Information Center

    Kalz, Marco; Specht, Marcus

    2014-01-01

    This paper deals with the assessment of the crossdisciplinarity of technology-enhanced learning (TEL). Based on a general discussion of the concept interdisciplinarity and a summary of the discussion in the field, two empirical methods from scientometrics are introduced and applied. Science overlay maps and the Rao-Stirling diversity index are…

  14. Impact of the back side flatness of a mask on the panel overlay

    NASA Astrophysics Data System (ADS)

    Kemmochi, Daisuke; Yoshikawa, Yutaka; Iwanaga, Yoshinori; Hirano, Termusa; Kinoshita, Hiroshi

    2015-07-01

    Recently, the annual increase in the definition of high-function panels for mobile devices such as smartphones or tablets has led to TFT-LCD and TFT-OLED (Organic Light Emitting Diode) circuits becoming increasingly miniaturized and densified. TFT circuits are comprised of a superposition of layers such as gates, acts and contact holes, with a certain amount of allowance between each layer. However, that allowance has now disappeared due to the high density of the circuit. Therefore, a high-precision mask overlay is essential in order to realize circuits with even higher density. In the mask manufacturing process, the mask is placed on a writer tool, during which the back side surface of the mask makes contact with the stage. This contact alters the front side flatness of the mask. Moreover, once the circuit pattern has been drawn on the mask, it is removed from the writer tool, thus altering the front side flatness and coordinates of the mask. In this paper, we evaluated the overlay of a panel that underwent exposure using a number of masks with different back side flatness. As a result, we confirmed that deviations in the back side flatness of each mask manifest themselves in the panel overlay. Therefore, we need to improve the flatness of the back side of masks hereafter in order to further enhance the panel overlay.

  15. Angels: In-Network Support for Minimum Distribution Time in P2P Overlays

    E-print Network

    peers with concurrent upload to other requesting peers, as one of the most efficient methods in the P2P overlay: (1) the upload capacity of the seeder, (2) the download capacity of the slowest leecher, or (3) the aggregate network upload capacity of all the nodes in the swarm. We note that the third

  16. Angels: InNetwork Support for Minimum Distribution Time in P2P Overlays

    E-print Network

    peers with concurrent upload to other requesting peers, as one of the most e#cient methods in the P2P overlay: (1) the upload capacity of the seeder, (2) the download capacity of the slowest leecher, or (3) the aggregate network upload capacity of all the nodes in the swarm. We note that the third

  17. Thermomechanical criteria for overlay alignment in flexible thin-film electronic circuits

    E-print Network

    Suo, Zhigang

    of amorphous silicon thin-film transistors TFTs on free- standing Kapton polyimide foils. This change affectsThermomechanical criteria for overlay alignment in flexible thin-film electronic circuits Helena for a deposited film/substrate couple is presented to describe how film deposition at an elevated temperature

  18. Touchplates: Low-Cost Tactile Overlays for Visually Impaired Touch Screen Users

    E-print Network

    Wobbrock, Jacob O.

    Touchplates: Low-Cost Tactile Overlays for Visually Impaired Touch Screen Users Shaun K. Kane Adding tactile feedback to touch screens can improve their accessibility to blind users, but prior approaches to integrating tactile feedback with touch screens have either offered limited functionality

  19. Touchplates: Low-Cost Tactile Overlays for Visually Impaired Touch Screen Users

    E-print Network

    Kane, Shaun K.

    Touchplates: Low-Cost Tactile Overlays for Visually Impaired Touch Screen Users Shaun K. Kane UMBC feedback to touch screens can improve their accessibility to blind users, but prior approaches to integrating tactile feedback with touch screens have either offered limited functionality or required

  20. Building a Scalable Bipartite P2P Overlay Network Yunhao Liu, Li Xiao

    E-print Network

    Xiao, Li

    Establishment (ACE) [13] and Loca- tion-aware topology matching (LTM) [12]. In ACE, every single peer builds the search scope. In LTM, each peer issues a detector in a small region so that the peers receiving neighbors. Both ACE and LTM can optimize the overlay without shrink search scope. However, ACE has a very

  1. Dynamic Topology Configuration in Service Overlay Networks: A Study of Reconfiguration Policies

    E-print Network

    Ammar, Mostafa

    of the optimal reconfiguration policies through studies on small systems and find structures in the optimal-0280 {jlfan,ammar}@cc.gatech.edu Abstract-- The routing infrastructure of the Internet has be- come resistant to fundamental changes and the use of overlay networks has been proposed to provide additional flexibility

  2. A new approach to plane-sweep overlay: topological structuring and line-segment classification

    USGS Publications Warehouse

    van Roessel, Jan W.

    1991-01-01

    An integrated approach to spatial overlay was developed with the objective of creating a single function that can perform most of the tasks now assigned to discrete functions in current systems. Two important components of this system are a unique method for topological structuring, and a method for attribute propagation and line-segment classification. -Author

  3. PCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks

    E-print Network

    Goldberg, Ian

    . To evaluate our work, we focus on the Tor network, the most popular low-latency anonymity network, which provided by PCTCP in an isolated testbed and on the live Tor network. We ascertained that significantPCTCP: Per-Circuit TCP-over-IPsec Transport for Anonymous Communication Overlay Networks Mashael Al

  4. Use of fabrics and other measures for retarding reflective cracking of asphaltic concrete overlays

    NASA Astrophysics Data System (ADS)

    Jackson, R. D.

    1980-03-01

    Prevention or control of reflection cracks in asphaltic concrete overlays has been a problem from the inception of this type of construction. The many different treatments that have been tried in an effort to solve this problem are: (1) reinforcement within and below the overlay, (2) bond breakers, (3) stress relieving layers, (4) asphalt-mix additives, and (5) placement of fabrics between the existing pavement and the overlay. At the present time, no treatment has been tried that will completely prevent the formation of reflection cracks. Some treatments do delay the formation of cracks, while others do not appear to help at all. Indications are that fabrics do have some beneficial effects, such as a moisture barrier, even though the overlays develop reflection cracks. The fabrics that have been tried for the control of reflection cracks included: (1) Petromat, (2) Bidim, (3) Typar, (4) Cerex, (5) Mirafi, (6) Structofors, (7) Bituthene, (8) Protecto-Wrap, and (9) Fiberglass. Asphalt-rubber interlayers, as formulated by the Arizona Refining Company and the Sahuaro Petroleum Company, show promise in retarding reflection cracks.

  5. Early Experience with an Internet Broadcast System Based on Overlay Multicast

    E-print Network

    Ng, T. S. Eugene

    are able to report given our unique standpoint. 1 Introduction The vision of enabling live video broadcastEarly Experience with an Internet Broadcast System Based on Overlay Multicast Yang-hua Chu on experience in building and deploy- ing an operational Internet broadcast system based on Over- lay Multicast

  6. Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays

    E-print Network

    Nita-Rotaru, Cristina

    a lightweight, general solution to increase the resiliency of adaptive overlay net- works. By locally aggregating and correlating network topology with system performance metrics such as latency and bandwidth businesses are beginning to appear in the media [11]. In this paper, we propose a lightweight solution

  7. Resources to Manage a Private Practice.

    ERIC Educational Resources Information Center

    Aigner, John; Cheek, Fredricka; Donati, Georgia; Zuravicky, Dori

    1997-01-01

    Includes four theme articles: "The Digital Toolkit: Electronic Necessities for Private Practice" (John Aigner); "Organizing a Private Practice: Forms, Fees, and Physical Set-up (Fredricka Cheek); "Career Development Resources: Guidelines for Setting Up a Private Practice Library" (Georgia Donati); and "Books to Enhance Private Practice Management…

  8. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  9. From client-side encryption to secure web applications

    E-print Network

    Stark, Emily (Emily Margarete)

    2013-01-01

    This thesis presents an approach for designing secure web applications that use client-side encryption to keep user data private in the face of arbitrary web server compromises, as well as a set of tools, called CryptFrame, ...

  10. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  11. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  12. High order overlay modeling and APC simulation with Zernike-Legendre polynomials

    NASA Astrophysics Data System (ADS)

    Ju, JawWuk; Kim, MinGyu; Lee, JuHan; Sherwin, Stuart; Hoo, George; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Tien, David; Pierson, Bill; Robinson, John C.; Levy, Ady; Smith, Mark D.

    2015-03-01

    Feedback control of overlay errors to the scanner is a well-established technique in semiconductor manufacturing [1]. Typically, overlay errors are measured, and then modeled by least-squares fitting to an overlay model. Overlay models are typically Cartesian polynomial functions of position within the wafer (Xw, Yw), and of position within the field (Xf, Yf). The coefficients from the data fit can then be fed back to the scanner to reduce overlay errors in future wafer exposures, usually via a historically weighted moving average. In this study, rather than using the standard Cartesian formulation, we examine overlay models using Zernike polynomials to represent the wafer-level terms, and Legendre polynomials to represent the field-level terms. Zernike and Legendre polynomials can be selected to have the same fitting capability as standard polynomials (e.g., second order in X and Y, or third order in X and Y). However, Zernike polynomials have the additional property of being orthogonal over the unit disk, which makes them appropriate for the wafer-level model, and Legendre polynomials are orthogonal over the unit square, which makes them appropriate for the field-level model. We show several benefits of Zernike/Legendre-based models in this investigation in an Advanced Process Control (APC) simulation using highly-sampled fab data. First, the orthogonality property leads to less interaction between the terms, which makes the lot-to-lot variation in the fitted coefficients smaller than when standard polynomials are used. Second, the fitting process itself is less coupled - fitting to a lower-order model, and then fitting the residuals to a higher order model gives very similar results as fitting all of the terms at once. This property makes fitting techniques such as dual pass or cascading [2] unnecessary, and greatly simplifies the options available for the model recipe. The Zernike/Legendre basis gives overlay performance (mean plus 3 sigma of the residuals) that is the same as standard Cartesian polynomials, but with stability similar to the dual-pass recipe. Finally, we show that these properties are intimately tied to the sample plan on the wafer, and that the model type and sampling must be considered at the same time to demonstrate the benefits of an orthogonal set of functions.

  13. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  14. Conflicting interests in private hospital care.

    PubMed

    O'Loughlin, Mary Ann

    2002-01-01

    This article looks at key changes impacting on private hospital care: the increasing corporate ownership of private hospitals; the Commonwealth Government's support for private health; the significant increase in health fund membership; and the contracting arrangements between health funds and private hospitals. The changes highlight the often conflicting interests of hospitals, doctors, Government, health funds and patients in the provision of private hospital care. These conflicts surfaced in the debate around allegations of 'cherry picking' by private hospitals of more profitable patients. This is also a good illustration of the increasing entanglement of the Government in the fortunes of the private health industry. PMID:12474506

  15. 75 FR 22674 - U.S. Department of State Advisory Committee on Private International Law Study Group Notice of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... From the Federal Register Online via the Government Printing Office ] DEPARTMENT OF STATE U.S. Department of State Advisory Committee on Private International Law Study Group Notice of Meeting on the United Nations Commission on International Trade Law (UNCITRAL) Draft Legislative Guide on Secured Transactions and Its Treatment of Security...

  16. 75 FR 32834 - U.S. Department of State Advisory Committee on Private International Law Study Group Notice of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... From the Federal Register Online via the Government Printing Office DEPARTMENT OF STATE U.S. Department of State Advisory Committee on Private International Law Study Group Notice of Meeting on the United Nations Commission on International Trade Law (UNCITRAL) Draft Legislative Guide on Secured Transactions and Its Treatment of Security...

  17. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    NASA Astrophysics Data System (ADS)

    Faruq Ibn Ibrahimy, Abdullah; Rafiqul, Islam Md; Anwar, Farhat; Ibn Ibrahimy, Muhammad

    2013-12-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper.

  18. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-12-16

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. However, a thick Al{sub 2}O{sub 3} overlay was harmful for TBC by increasing compressive stress which causes crack and spalling of YSZ coating. As a result, a dense and thin Al{sub 2}O{sub 3} overlay is critical for simultaneously preventing YSZ from hot corrosion and spalling. In the next reporting period, we will measure or calculate the residue stress within Al{sub 2}O{sub 3} overlay and YSZ coating to study the mechanism of effect of Al{sub 2}O{sub 3} overlay on spalling of YSZ coating.

  19. TWRS privatization process technical baseline

    SciTech Connect

    Orme, R.M.

    1996-09-13

    The U.S. Department of Energy (DOE) is planning a two-phased program for the remediation of Hanford tank waste. Phase 1 is a pilot program to demonstrate the procurement of treatment services. The volume of waste treated during the Phase 1 is a small percentage of the tank waste. During Phase 2, DOE intends to procure treatment services for the balance of the waste. The TWRS Privatization Process Technical Baseline (PPTB) provides a summary level flowsheet/mass balance of tank waste treatment operations which is consistent with the tank inventory information, waste feed staging studies, and privatization guidelines currently available. The PPTB will be revised periodically as privatized processing concepts are crystallized.

  20. By Private Arrangement? Safeguarding the Welfare of Private Foster Children

    ERIC Educational Resources Information Center

    Bostock, Lisa

    2004-01-01

    A key characteristic of debates on caring for children has been the distinction made between the public and the private or formal and informal sector of care. In particular, the impact on adult relationships of the material, emotional and moral dimensions of this division has been highlighted. What are the implications for children, however, of…

  1. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  2. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  3. 75 FR 72965 - Federal Travel Regulation; Removal of Privately Owned Vehicle Rates; Privately Owned Automobile...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ...-AJ09 Federal Travel Regulation; Removal of Privately Owned Vehicle Rates; Privately Owned Automobile Mileage Reimbursement When Government Owned Automobiles Are Authorized; Miscellaneous Amendments AGENCY... is amending the Federal Travel Regulation (FTR) by removing the Privately Owned Vehicle (POV)...

  4. A novel approach for latent print identification using accurate overlays to prioritize reference prints.

    PubMed

    Gantz, Daniel T; Gantz, Donald T; Walch, Mark A; Roberts, Maria Antonia; Buscaglia, JoAnn

    2014-10-24

    A novel approach to automated fingerprint matching and scoring that produces accurate locally and nonlinearly adjusted overlays of a latent print onto each reference print in a corpus is described. The technology, which addresses challenges inherent to latent prints, provides the latent print examiner with a prioritized ranking of candidate reference prints based on the overlays of the latent onto each candidate print. In addition to supporting current latent print comparison practices, this approach can make it possible to return a greater number of AFIS candidate prints because the ranked overlays provide a substantial starting point for latent-to-reference print comparison. To provide the image information required to create an accurate overlay of a latent print onto a reference print, "Ridge-Specific Markers" (RSMs), which correspond to short continuous segments of a ridge or furrow, are introduced. RSMs are reliably associated with any specific local section of a ridge or a furrow using the geometric information available from the image. Latent prints are commonly fragmentary, with reduced clarity and limited minutiae (i.e., ridge endings and bifurcations). Even in the absence of traditional minutiae, latent prints contain very important information in their ridges that permit automated matching using RSMs. No print orientation or information beyond the RSMs is required to generate the overlays. This automated process is applied to the 88 good quality latent prints in the NIST Special Database (SD) 27. Nonlinear overlays of each latent were produced onto all of the 88 reference prints in the NIST SD27. With fully automated processing, the true mate reference prints were ranked in the first candidate position for 80.7% of the latents tested, and 89.8% of the true mate reference prints ranked in the top ten positions. After manual post-processing of those latents for which the true mate reference print was not ranked first, these frequencies increased to 90.9% (1st rank) and 96.6% (top ten), respectively. Because the computational process is highly parallelizable, it is feasible for this method to work with a reference corpus of several thousand prints. PMID:25447189

  5. How to Keep Your Health Information Private and Secure

    MedlinePLUS

    ... or on a mobile device, such as a smartphone or tablet. · Share over social media websites or ... a cell phone, and more than half are smartphone users. Source: Pew Research Center’s Internet and American ...

  6. Actively Secure Private Function Evaluation Payman Mohassel1,2

    E-print Network

    International Association for Cryptologic Research (IACR)

    in the literature are software diagnostic [4], medical applications [2], and intrusion detection systems [20 requirement is that all that should leak about the function to an adversary, who does not control P1

  7. Enabling Secure VM-vTPM Migration in Private Clouds

    E-print Network

    Capkun, Srdjan

    of their main component, the Trusted Platform Module (TPM) by means of virtual TPMs (vTPM). The challenge here hardware. This is typically achieved by virtual TPMs (vTPMs) that mimic the interface and functionality of the hardware TPM. One important challenge is to real- ize vTPMs that comply with TPM specifications while

  8. Private equity investments beyond Earth orbits: Can space exploration be the new frontier for private investments?

    NASA Astrophysics Data System (ADS)

    Mathurin, Jeph; Peter, Nicolas

    2006-07-01

    The year 2004 can be considered an important milestone for space activities. First, on January 14, 2004 President Bush announced a new vision for human and robotic space exploration named "A Renewed Spirit of Discovery". This new space exploration policy called for "a sustained and affordable human and robotic program to explore the solar system and beyond" and seeks also to "promote international and commercial participation in space exploration to further US scientific, security, and economic interests". Secondly, the satellite industry has experienced a trend of private investment fund acquisitions. Five of six major fixed and mobile satellite service providers in the world have been partly or entirely sold to conventional financial investors. These transactions have taken place despite the background noise of overcapacity, stagnant growth and declining operating margins satellite services sector. Over the last 18 months, we have seen a total of approximately US $12B dollars in private equity transactions in the satellite sector. Finally, the Ansari X prize has been won opening the possibility of the personal spaceflight revolution. This paper seeks to provide some insights into the nature, timing and a rationale for these investments in the space sector. Then, an attempt is made to analyze the potential that space exploration might present for traditional financial investors.

  9. The impact of privatization on access in Tanzania.

    PubMed

    Benson, J S

    2001-06-01

    In the late 1980s, many developing countries were forced to adopt structural adjustment policies as a condition for securing loans from the International Monetary Fund (IMF) and the World Bank. One of the World Bank's recommended policies was to change the mix of private and public health facilities. This study, based on fieldwork done in Tanzania in 1993, examines the impact of this policy on health-care accessibility in two northern Tanzanian districts, one rural and one urban. Accessibility was measured in terms of equality and equity of coverage. The placement of the very few government clinics opened during the years 1985-1993 did much more to improve coverage than the haphazard location of many new private clinics. Equity was not improved as very few clinics were placed in demographically needy areas. PMID:11352415

  10. Snore related signals processing in a private cloud computing system.

    PubMed

    Qian, Kun; Guo, Jian; Xu, Huijie; Zhu, Zhaomeng; Zhang, Gongxuan

    2014-09-01

    Snore related signals (SRS) have been demonstrated to carry important information about the obstruction site and degree in the upper airway of Obstructive Sleep Apnea-Hypopnea Syndrome (OSAHS) patients in recent years. To make this acoustic signal analysis method more accurate and robust, big SRS data processing is inevitable. As an emerging concept and technology, cloud computing has motivated numerous researchers and engineers to exploit applications both in academic and industry field, which could have an ability to implement a huge blue print in biomedical engineering. Considering the security and transferring requirement of biomedical data, we designed a system based on private cloud computing to process SRS. Then we set the comparable experiments of processing a 5-hour audio recording of an OSAHS patient by a personal computer, a server and a private cloud computing system to demonstrate the efficiency of the infrastructure we proposed. PMID:25205499

  11. Private Dollar$ for Public Libraries.

    ERIC Educational Resources Information Center

    Krull, Jeffrey R.

    1991-01-01

    Proposes targeting individuals, corporations, and charitable foundations and trusts as a means of supplementing library fund-raising campaigns. The basics of establishing and maintaining a private funds foundation are addressed, including goal setting, personnel required, and nurturing the library's relationship with the community. A sidebar by…

  12. Privatization and the Public Good

    ERIC Educational Resources Information Center

    Lambert, Matthew T.

    2015-01-01

    After two centuries of public higher education in the United States, the covenant between public colleges and universities and the public that created and funded them is under strain. In a time of scarce resources and changing policy in many corners of the country and around the globe, privatization has emerged as a possible replacement for the…

  13. Financing of Private Outdoor Recreation.

    ERIC Educational Resources Information Center

    Bureau of Outdoor Recreation (Dept. of Interior), Washington, DC.

    A survey of financial institutions was undertaken by the Bureau of Outdoor Recreation to evaluate the demand and availability of private credit for enterprises that provide outdoor recreation. The survey provided basic information for (1) evaluating legislative proposals for loan guarantee programs, (2) nationwide planning, and (3) assessing the…

  14. External Funding: Federal and Private.

    ERIC Educational Resources Information Center

    Sharron, W. Harvey

    This paper, designed as a guideline for administrators, considers the relationships between local community colleges and external funding sources, both governmental and private. Descriptive examples of how to obtain funds from such agencies are given as well as working outlines for preparing the requisite grant applications. To clarify the matter…

  15. Public vs. Private (and beyond)

    ERIC Educational Resources Information Center

    Poliniak, Susan

    2012-01-01

    Different types of schools make for different experiences. Pros and cons abound, whether one teaches at a public, private, magnet, or charter school. Although it's certainly true that some individual schools may offer better environments for music education than others, no type of school is categorically the "best." Still, it can be instructive to…

  16. Ins and Outs of Privatization.

    ERIC Educational Resources Information Center

    Daneman, Kathy

    1998-01-01

    Discusses the pros and cons of privatization as a way of saving money while improving non-educational operations. Questions about why some services should be kept in-house are addressed, as well as what to look for when considering outsourcing. One school's experience with outsourcing health-care services is highlighted. (GR)

  17. Financing a Private School Education

    ERIC Educational Resources Information Center

    Torres, Amanda

    2014-01-01

    A recent National Association of Independent Schools (NAIS) survey of more than 1,200 individuals who filed financial aid forms underscores the central role financial aid plays in their ability to pursue a private education for their children. This article highlights the survey findings, demonstrating why school leaders need to thoroughly analyze…

  18. Private Public Choice Felix Brandt

    E-print Network

    Cengarle, María Victoria

    Private Public Choice Felix Brandt Computer Science Department Technical University of Munich of conflicting preferences in a group of agents is one of the cen- tral topics of economics and multiagent choice problem 1 The problem is to find a function that "fairly" aggre- gates conflicting preferences

  19. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  20. A comparison of the fracture properties of conventional and polymer-modified two-layer asphalt concrete overlay systems 

    E-print Network

    Reddy, Praveena Gutha

    1996-01-01

    The problem of reflection cracking through the conventional asphalt concrete overlays has increased the need to find new materials which could resist cracking or fracture more effectively. It is for this reason that polymers (Styrelo are added...

  1. Intra-field on-product overlay improvement by application of RegC and TWINSCAN corrections

    NASA Astrophysics Data System (ADS)

    Sharoni, Ofir; Dmitriev, Vladimir; Graitzer, Erez; Perets, Yuval; Gorhad, Kujan; van Haren, Richard; Cekli, Hakki E.; Mulkens, Jan

    2015-03-01

    The on product overlay specification and Advanced Process Control (APC) is getting extremely challenging particularly after the introduction of multi-patterning applications like Spacer Assisted Double Patterning (SADP) and multipatterning techniques like N-repetitive Litho-Etch steps (LEN, N >= 2). When the latter is considered, most of the intrafield overlay contributors drop out of the overlay budget. This is a direct consequence of the fact that the scanner settings (like dose, illumination settings, etc.) as well as the subsequent processing steps can be made very similar for two consecutive Litho-Etch layers. The major overlay contributor that may require additional attention is the Image Placement Error (IPE). When the inter-layer overlay is considered, controlling the intra-field overlay contribution gets more complicated. In addition to the IPE contribution, the TWINSCANTM lens fingerprint in combination with the exposure settings is going to play a role as well. Generally speaking, two subsequent functional layers have different exposure settings. This results in a (non-reticle) additional overlay contribution. In this paper, we have studied the wafer overlay correction capability by RegC® in addition to the TWINSCANTM intrafield corrections to improve the on product overlay performance. RegC® is a reticle intra-volume laser writing technique that causes a predictable deformation element (RegC® deformation element) inside the quartz (Qz) material of a reticle. This technique enables to post-process an existing reticle to correct for instance for IPE. Alternatively, a pre-determined intra-field fingerprint can be added to the reticle such that it results in a straight field after exposure. This second application might be very powerful to correct for instance for (cold) lens fingerprints that cannot be corrected by the scanner itself. Another possible application is the intra-field processing fingerprint. One should realize that a RegC® treatment of a reticle generally results in global distortion of the reticle. This is not a problem as long as these global distortions can be corrected by the TWINSCANTM system (currently up to the third order). It is anticipated that the combination of the RegC® and the TWINSCANTM corrections act as complementary solutions. These solutions perfectly fit into the ASML Litho InSight (LIS) product in which feedforward and feedback corrections based on YieldStar overlay measurements are used to improve the on product overlay.

  2. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. Irwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, mobile network operators’ spectral capacity will be overwhelmed by the demand brought on by new devices and applications. To augment capacity and meet this demand, operators may choose to deploy a Dynamic Spectrum Access (DSA) overlay. The signaling and functionality required by such an overlay have not yet been fully considered in the architecture of the planned Long Term Evolution Advanced (LTE+) networks. This paper presents a Spectrum Accountability framework to be integrated into LTE+ architectures, defining specific element functionality, protocol interfaces, and signaling flow diagrams required to enforce the rights and responsibilities of primary and secondary users. We also quantify, through integer programs, the benefits of using DSA channels to augment capacity under a scenario in which LTE+ network can opportunistically use TV and GSM spectrum. The framework proposed here may serve as a guide in the development of future LTE+ network standards that account for DSA.

  3. Automatic Generation of Overlays and Offset Values Based on Visiting Vehicle Telemetry and RWS Visuals

    NASA Technical Reports Server (NTRS)

    Dunne, Matthew J.

    2011-01-01

    The development of computer software as a tool to generate visual displays has led to an overall expansion of automated computer generated images in the aerospace industry. These visual overlays are generated by combining raw data with pre-existing data on the object or objects being analyzed on the screen. The National Aeronautics and Space Administration (NASA) uses this computer software to generate on-screen overlays when a Visiting Vehicle (VV) is berthing with the International Space Station (ISS). In order for Mission Control Center personnel to be a contributing factor in the VV berthing process, computer software similar to that on the ISS must be readily available on the ground to be used for analysis. In addition, this software must perform engineering calculations and save data for further analysis.

  4. Combined Conjunctival Autograft and Overlay Amniotic Membrane Transplantation; a Novel Surgical Treatment for Pterygium

    PubMed Central

    Ghanavati, Siamak Zarei; Shousha, Mohamed Abou; Betancurt, Carolina; Perez, Victor L.

    2014-01-01

    The authors report the long-term results of combined conjunctival autograft and overlay amniotic membrane transplantation (AMT) for treatment of pterygium as a new surgical technique. Nineteen patients including 12 male and 7 female subjects with pterygium (primary, 14 cases; recurrent, 5 cases) underwent combined conjunctival autograft and overlay AMT and were followed from 10 to 26 months. Mean age was 44.21±12.49 (range, 29.0-73.0) years. In one patient with grade T3 primary pterygium, the lesion recurred (5.2%, recurrence rate). No intra-and postoperative complication developed. This procedure seems a safe and effective surgical technique for pterygium treatment. Protection of the ocular surface during the early postoperative period reduces the friction-induced inflammation and might be helpful to prevent the recurrence. PMID:25667744

  5. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-03-10

    In order to improve the hot corrosion resistance of conventional YSZ TBC system, a thin and dense {alpha}-Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). The YSZ substrates were dipped with boehmite sol containing calcined {alpha}-Al{sub 2}O{sub 3} particles, dried to form a gel film and calcined at 1200 C to form {alpha}-Al{sub 2}O{sub 3} overlay. Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5% V{sub 2}O{sub 5}) at 950 C for 10 hours. The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor. As a result, the Al{sub 2}O{sub 3} overlay remarkably refrained the infiltration of the molten salt into the YSZ coating. The amount of M-phase in the TBC coating with Al{sub 2}O{sub 3} overlay was substantially reduced comparing to that without alumina overlay. In the next reporting period, we will prepare the alumina overlay by CSG route with different thickness and study the hot corrosion mechanism of YSZ TBC with thin Al{sub 2}O{sub 3} overlay coating produced by CSG.

  6. Microeconomics-based resource allocation in overlay networks by using non-strategic behavior modeling

    NASA Astrophysics Data System (ADS)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    2011-01-01

    Behavior modeling has recently been investigated for designing self-organizing mechanisms in the context of communication networks in order to exploit the natural selfishness of the users with the goal of maximizing the overall utility. In strategic behavior modeling, the users of the network are assumed to be game players who seek to maximize their utility with taking into account the decisions that the other players might make. The essential difference between the aforementioned researches and this work is that it incorporates the non-strategic decisions in order to design the mechanism for the overlay network. In this solution concept, the decisions that a peer might make does not affect the actions of the other peers at all. The theory of consumer-firm developed in microeconomics is a model of the non-strategic behavior that we have adopted in our research. Based on it, we have presented distributed algorithms for peers' "joining" and "leaving" operations. We have modeled the overlay network as a competitive economy in which the content provided by an origin server can be viewed as commodity and the origin server and the peers who multicast the content to their downside are considered as the firms. On the other hand, due to the dual role of the peers in the overlay network, they can be considered as the consumers as well. On joining to the overlay economy, each peer is provided with an income and tries to get hold of the service regardless to the behavior of the other peers. We have designed the scalable algorithms in such a way that the existence of equilibrium price (known as Walrasian equilibrium price) is guaranteed.

  7. RESTORING A DAMAGED 16-YEAR -OLD INSULATING POLYMER CONCRETE DIKE OVERLAY: REPAIR MATERIALS AND TECHNOLOGIES.

    SciTech Connect

    SUGAMA,T.

    2007-01-01

    The objective of this program was to design and formulate organic polymer-based material systems suitable for repairing and restoring the overlay panels of insulating lightweight polymer concrete (ILPC) from the concrete floor and slope wall of a dike at KeySpan liquefied natural gas (LNG) facility in Greenpoint, Brooklyn, NY, just over sixteen years ago. It also included undertaking a small-scale field demonstration to ensure that the commercial repairing technologies were applicable to the designed and formulated materials.

  8. 44 CFR 5.84 - Production of documents in private litigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Production of documents in private litigation. 5.84 Section 5.84 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or Other Legal Demands for Testimony or...

  9. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Testimony of FEMA employees in private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or Other Legal Demands for Testimony or...

  10. 78 FR 44536 - Proposed Information Collection; Comment Request; Licensing of Private Remote-Sensing Space Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-24

    ... of Private Remote-Sensing Space Systems AGENCY: National Oceanic and Atmospheric Administration (NOAA... of remote-sensing space systems. The information in applications and subsequent reports is needed to ensure compliance with the Land Remote- Sensing Policy Act of 1992 and with the national security...

  11. WeaklyPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2

    E-print Network

    Beimel, Amos

    Weakly­Private Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2 1 Department. Abstract. Secret­sharing schemes are an important tool in cryptogra­ phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret­sharing schemes realizing gen

  12. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    SciTech Connect

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  13. A Survey of Private Ohio Academic Libraries' Physical Processing Practices for Circulating Books.

    ERIC Educational Resources Information Center

    Factor, Olivia Spaid

    Little guidance is given in today's general technical services or cataloging textbooks to assist librarians in making decisions on procedures for the physical preparation of materials prior to placement on the shelves for public access. As small, private academic libraries face automation of circulation, addition of security systems, and debates…

  14. 75 FR 34641 - Safety Zone; Private Fireworks, Wilson Creek, Gloucester, VA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-18

    ... Federal Register (75 FR 22545). We received no comments on the proposed rule. No public meeting was... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Private Fireworks, Wilson Creek, Gloucester... fireworks event. This action is intended to restrict vessel traffic movement on Wilson Creek to...

  15. Pattern recognition and data mining techniques to identify factors in wafer processing and control determining overlay error

    NASA Astrophysics Data System (ADS)

    Lam, Auguste; Ypma, Alexander; Gatefait, Maxime; Deckers, David; Koopman, Arne; van Haren, Richard; Beltman, Jan

    2015-03-01

    On-product overlay can be improved through the use of context data from the fab and the scanner. Continuous improvements in lithography and processing performance over the past years have resulted in consequent overlay performance improvement for critical layers. Identification of the remaining factors causing systematic disturbances and inefficiencies will further reduce overlay. By building a context database, mappings between context, fingerprints and alignment & overlay metrology can be learned through techniques from pattern recognition and data mining. We relate structure (`patterns') in the metrology data to relevant contextual factors. Once understood, these factors could be moved to the known effects (e.g. the presence of systematic fingerprints from reticle writing error or lens and reticle heating). Hence, we build up a knowledge base of known effects based on data. Outcomes from such an integral (`holistic') approach to lithography data analysis may be exploited in a model-based predictive overlay controller that combines feedback and feedforward control [1]. Hence, the available measurements from scanner, fab and metrology equipment are combined to reveal opportunities for further overlay improvement which would otherwise go unnoticed.

  16. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 2011-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Preschool, Elementary, Secondary, Adult, and Extension Education § 15b.28 Private education. (a) A recipient that provides...

  17. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 2014-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Preschool, Elementary, Secondary, Adult, and Extension Education § 15b.28 Private education. (a) A recipient that provides...

  18. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 2012-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Preschool, Elementary, Secondary, Adult, and Extension Education § 15b.28 Private education. (a) A recipient that provides...

  19. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 2010-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Preschool, Elementary, Secondary, Adult, and Extension Education § 15b.28 Private education. (a) A recipient that provides...

  20. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 2013-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Preschool, Elementary, Secondary, Adult, and Extension Education § 15b.28 Private education. (a) A recipient that provides...

  1. Education and the Private Finance Initiative

    ERIC Educational Resources Information Center

    Griggs, Clive

    2010-01-01

    This article reviews the development of Private Finance Initiative schemes in the United Kingdom, and reflects on how profitable opportunities for private financiers and construction companies were created at the expense of the public sector. (Contains 72 notes.)

  2. Privatization and the Globalization of Energy Markets

    EIA Publications

    1996-01-01

    Discusses recent efforts at privatization in petroleum, electricity, and coal, as well as the impetus that privatization has provided in fostering the evolution of the multinational and multidimensional energy company.

  3. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...2010-10-01 false Private education. 605.39 Section 605...Welfare (Continued) NATIONAL SCIENCE FOUNDATION NONDISCRIMINATION...Elementary, and Secondary Education § 605.39 Private education. (a) A recipient...

  4. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...2012-10-01 false Private education. 605.39 Section 605...Welfare (Continued) NATIONAL SCIENCE FOUNDATION NONDISCRIMINATION...Elementary, and Secondary Education § 605.39 Private education. (a) A recipient...

  5. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...2014-10-01 false Private education. 605.39 Section 605...Welfare (Continued) NATIONAL SCIENCE FOUNDATION NONDISCRIMINATION...Elementary, and Secondary Education § 605.39 Private education. (a) A recipient...

  6. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...2013-10-01 false Private education. 605.39 Section 605...Welfare (Continued) NATIONAL SCIENCE FOUNDATION NONDISCRIMINATION...Elementary, and Secondary Education § 605.39 Private education. (a) A recipient...

  7. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...2011-10-01 false Private education. 605.39 Section 605...Welfare (Continued) NATIONAL SCIENCE FOUNDATION NONDISCRIMINATION...Elementary, and Secondary Education § 605.39 Private education. (a) A recipient...

  8. NASA and Public-Private Partnerships

    NASA Technical Reports Server (NTRS)

    Martin, Gary L.

    2010-01-01

    This slide presentation reviews ways to build public-private partnerships with NASA, and the many efforts that Ames Research Center is engaged in in building partnerships with private businesses, not profit organizations and universities.

  9. IMPERMEABLE THIN Al{sub 2}O{sub 3} OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2004-06-30

    In order to further improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay of 58 {micro}m thick was deposited on the surface of YSZ by electron-beam physical vapor deposition. Hot corrosion tests were performed on the YSZ coatings with {gamma}-Al{sub 2}O{sub 3} overlay and {alpha}-Al{sub 2}O{sub 3} overlay in molten salt mixture (Na2SO4 + 5wt%V2O5) at 950 C. The {alpha}-Al{sub 2}O{sub 3} overlay was obtained by the post-annealing of g-Al{sub 2}O{sub 3} overlay at 1200 C for 1h. The results showed that compared with the hot corrosion resistance of YSZ coating with 25 {micro}m thick {gamma}-Al{sub 2}O{sub 3} overlay, either thickening {gamma}-Al{sub 2}O{sub 3} overlay or employing {alpha}-Al{sub 2}O{sub 3} overlay could impair the hot corrosion resistance of YSZ coating, because the tensile stresses developed in the alumina overlay in both cases due to the mismatch in thermal expansion coefficient (TEC) between alumina and zirconia resulted in cracking of Al{sub 2}O{sub 3} overlay. The formation of cracks increased contact area between molten salt and Al{sub 2}O{sub 3} overlay, and also the penetration rate of molten salt into Al{sub 2}O{sub 3} overlay and YSZ coating, leading a faster and greater degradation of YSZ coating upon exposure. In the next reporting period, we will study the effect of Al{sub 2}O{sub 3} overlay thickness on hot corrosion and spalling of YSZ coatings.

  10. Secure sequential transmission of quantum information

    NASA Astrophysics Data System (ADS)

    Jeong, Kabgyun; Kim, Jaewan

    2015-09-01

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of n-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission protocol in depth.

  11. Implementing a secure client/server application

    SciTech Connect

    Kissinger, B.A.

    1994-08-01

    There is an increasing rise in attacks and security breaches on computer systems. Particularly vulnerable are systems that exchange user names and passwords directly across a network without encryption. These kinds of systems include many commercial-off-the-shelf client/server applications. A secure technique for authenticating computer users and transmitting passwords through the use of a trusted {open_quotes}broker{close_quotes} and public/private keys is described in this paper.

  12. Structural evolution of the Pb/Si(111) interface with metal overlayer thickness

    NASA Astrophysics Data System (ADS)

    Souto-Casares, Jaime; Chan, Tzu-Liang; Chelikowsky, James R.; Ho, Kai-Ming; Wang, Cai-Zhuang; Zhang, S. B.

    2015-09-01

    We employ a real-space pseudopotential method to compute the structural energies of a prototypical metal-semiconductor interface. Specifically, we examine a Pb(111) film overlaid on a Si(111) substrate as a function of the metal thickness. For each layer of Pb, we fully relax the atomic coordinates and determine the lowest-energy structure. Owing to the lattice mismatch between the Pb and Si crystal structures, we consider a large supercell containing up to 1505 atoms for the largest system. Systems of this size remain challenging for most current computational approaches and require algorithms specifically designed for highly parallel computational platforms. We examine the structural properties of the interface with respect to the thickness of the metal overlayer, e.g., the corrugation of the profile of the Pb overlayer. The combined influence of the Si substrate and quantum confinement results in a rich profile for a transition between a thin overlayer (less than a few monolayers), where the corrugation is strong, and the bulk region (more than a half-dozen layers), where the overlaid Pb film is atomically flat. This work proves the feasibility of handling systems with such a level of complexity.

  13. Image overlay solution based on threshold detection for a compact near infrared fluorescence goggle system

    NASA Astrophysics Data System (ADS)

    Gao, Shengkui; Mondal, Suman B.; Zhu, Nan; Liang, RongGuang; Achilefu, Samuel; Gruev, Viktor

    2015-01-01

    Near infrared (NIR) fluorescence imaging has shown great potential for various clinical procedures, including intraoperative image guidance. However, existing NIR fluorescence imaging systems either have a large footprint or are handheld, which limits their usage in intraoperative applications. We present a compact NIR fluorescence imaging system (NFIS) with an image overlay solution based on threshold detection, which can be easily integrated with a goggle display system for intraoperative guidance. The proposed NFIS achieves compactness, light weight, hands-free operation, high-precision superimposition, and a real-time frame rate. In addition, the miniature and ultra-lightweight light-emitting diode tracking pod is easy to incorporate with NIR fluorescence imaging. Based on experimental evaluation, the proposed NFIS solution has a lower detection limit of 25 nM of indocyanine green at 27 fps and realizes a highly precise image overlay of NIR and visible images of mice in vivo. The overlay error is limited within a 2-mm scale at a 65-cm working distance, which is highly reliable for clinical study and surgical use.

  14. A new effective method for thermal annealing of magnetic tunnel junctions in air with protective overlayers

    NASA Astrophysics Data System (ADS)

    Pong, Philip W. T.; Schmoueli, Moshe; Li, Feifei; Egelhoff, William F.

    2008-04-01

    Thermal annealing is an important process to enhance greatly the tunneling magnetoresistance (TMR) of magnetic tunnel junctions (MTJs). MTJ annealing is conventionally carried out in vacuum below 10-5Torr. However, this method involves the cost and complications of using a vacuum furnace. Pumping and venting a chamber are time-consuming; moreover, the sample temperature is difficult to measure accurately and therefore not easy to control. We have developed a method and an instrument to perform thermal annealing of MTJs in air. The method is based on protective overlayers, and the instrument has a simple structure composed of an air heat gun, thermocouple with feedback control, permanent magnets for magnetic field, and a sample holder. The influence of thermal annealing in air on MTJs properties was studied systematically on Al2O3 MTJ samples. The samples are successfully protected from oxidation by using Au /Ru, or Al2O3 films as protective overlayers. The Al2O3 overlayer can be removed easily with NaOH solution. A MgO MTJ sample was annealed with this technique and its TMR increased from 17.5% to 141.3%.

  15. Secure authenticated video equipment

    SciTech Connect

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  16. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 3 2014-10-01 2014-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  17. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 7 Agriculture 1 2014-01-01 2014-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Education § 15b.28 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  18. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2014-07-01 2014-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  19. 45 CFR 84.39 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 1 2013-10-01 2013-10-01 false Private education. 84.39 Section 84.39 Public... Secondary Education § 84.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  20. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2012-07-01 2012-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  1. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 7 Agriculture 1 2013-01-01 2013-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Education § 15b.28 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  2. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 3 2012-10-01 2012-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  3. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2013-07-01 2013-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  4. 45 CFR 84.39 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 45 Public Welfare 1 2012-10-01 2012-10-01 false Private education. 84.39 Section 84.39 Public... Secondary Education § 84.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  5. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 3 2013-10-01 2013-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  6. 45 CFR 84.39 - Private education.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Private education. 84.39 Section 84.39 Public... Secondary Education § 84.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  7. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 7 Agriculture 1 2012-01-01 2012-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Education § 15b.28 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  8. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  9. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  10. 77 FR 15566 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-16

    ... any private transfer fee covenants. (75 FR 49932). As described in the proposed guidance, private... (76 FR 6702) inviting comments on a proposal that incorporated a number of changes to the substance of... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance...

  11. Does Privatization Affect Access to Government Information?

    ERIC Educational Resources Information Center

    Caponio, Joseph F.; Geffner, Janet

    This paper begins by pointing out that privatization, or relying on the private sector to provide commercial goods and services for government departments and agencies, is a tool that has been used effectively by the federal government for several decades. It then presents the theoretical basis for privatization, describes a number of methods used…

  12. Private Higher Education and Economic Development

    ERIC Educational Resources Information Center

    Reisz, Robert D.; Stock, Manfred

    2012-01-01

    In Western Europe, especially in Germany, private higher education is generally perceived as an alternative to public higher education for students from relatively affluent families; more broadly, there is a general perception that attending a private higher education institution is correlated to wealth. This perception is influenced by private

  13. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 7 Agriculture 1 2011-01-01 2011-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Education § 15b.28 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  14. 38 CFR 18.439 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2011-07-01 2011-07-01 false Private education. 18.439... Adult Education § 18.439 Private education. (a) A recipient that provides private elementary or secondary education may not on the basis of handicap, exclude a qualified handicapped person if the...

  15. 45 CFR 84.39 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Private education. 84.39 Section 84.39 Public... Secondary Education § 84.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  16. 7 CFR 15b.28 - Private education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Private education. 15b.28 Section 15b.28 Agriculture... Education § 15b.28 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  17. 45 CFR 605.39 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 3 2011-10-01 2011-10-01 false Private education. 605.39 Section 605.39 Public..., Elementary, and Secondary Education § 605.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped...

  18. 45 CFR 84.39 - Private education.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Private education. 84.39 Section 84.39 Public... Secondary Education § 84.39 Private education. (a) A recipient that provides private elementary or secondary education may not, on the basis of handicap, exclude a qualified handicapped person if the person can,...

  19. Private Fingerprint Matching Siamak F. Shahandashti1

    E-print Network

    International Association for Cryptologic Research (IACR)

    Private Fingerprint Matching Siamak F. Shahandashti1 , Reihaneh Safavi-Naini2 , and Philip Ogunbona private fingerprint matching protocol that compares two fin- gerprints based on the most widely-used minutia-based fingerprint matching algorithm. The protocol enables two parties, each holding a private

  20. Private vs. Public Higher Education Budgeting

    ERIC Educational Resources Information Center

    Beamer, Sarah A.

    2011-01-01

    Private higher education institutions are those entities owned and operated by the private sector, while public institutions are those established, supported, and controlled by a governmental agency, most often a state. Key differences exist between private and public institutions that affect budgeting in critical ways. Such differences include…

  1. Mathematic Achievement of Canadian Private School Students

    ERIC Educational Resources Information Center

    Cadigan, Francoise Jane; Wei, Yichun; Clifton, Rodney A.

    2013-01-01

    Very little Canadian research has examined the academic achievement of private school students. Data from The Programme for International Student Assessment (PISA) 2003 were used to examine the achievement of private school students. The study found that private school students outperformed their public school peers. In addition, the…

  2. Building and Managing Your Private Practice.

    ERIC Educational Resources Information Center

    Richards, Daniel L.

    The number of clinicians entering private practice is growing each day. This book presents a step-by-step process for prospective entrepreneurs who wish to become a private practitioner. The text is divided into eight sections. Section 1 looks at the rationale for private practice and addresses the personal questions involving clinical skills,…

  3. Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency

    E-print Network

    International Association for Cryptologic Research (IACR)

    Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency Kwangsu (PKBE) scheme with sub- linear size of public keys, private keys, and ciphertexts and prove its adaptive) that provides adaptive security under standard assumptions and sub-linear size of various parameters

  4. Harden Security of High-Risk and Critical Supply Chains

    SciTech Connect

    Harrison, Glen

    2009-01-01

    This article focuses on the security risk in the container supply chain. It provides an overview of the technical and policy initiatives that are being implemented by international organizations, governments, and the private sector to enhance security in the container supply chain.

  5. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  6. Embedding and retrieving private metadata in electrocardiograms.

    PubMed

    Kozat, Suleyman S; Vlachos, Michail; Lucchese, Claudio; Van Herle, Helga; Yu, Philip S

    2009-08-01

    Due to the recent explosion of 'identity theft' cases, the safeguarding of private data has been the focus of many scientific efforts. Medical data contain a number of sensitive attributes, whose access the rightful owner would ideally like to disclose only to authorized personnel. One way of providing limited access to sensitive data is through means of encryption. In this work we follow a different path, by proposing the fusion of the sensitive metadata within the medical data. Our work is focused on medical time-series signals and in particular on Electrocardiograms (ECG). We present techniques that allow the embedding and retrieval of sensitive numerical data, such as the patient's social security number or birth date, within the medical signal. The proposed technique not only allows the effective hiding of the sensitive metadata within the signal itself, but it additionally provides a way of authenticating the data ownership or providing assurances about the origin of the data. Our methodology builds upon watermarking notions, and presents the following desirable characteristics: (a) it does not distort important ECG characteristics, which are essential for proper medical diagnosis, (b) it allows not only the embedding but also the efficient retrieval of the embedded data, (c) it provides resilience and fault tolerance by employing multistage watermarks (both robust and fragile). Our experiments on real ECG data indicate the viability of the proposed scheme. PMID:19697691

  7. India's petroleum privatization gathering speed

    SciTech Connect

    Not Available

    1994-03-14

    Privatization of India's petroleum industry is seen as inevitable, even by the staunchest supporters of the state owned sector there. What has become clear is that the huge investments required for Indian exploration, refining, and marketing are beyond the scope of even the biggest state owned firms, such as Oil and Natural Gas Commission (ONGC) and Indian Oil Corp. (IOC). A proposal was put forth last fall to offer Bombay High offshore oil fields to leading multinationals for redevelopment to stem the production slide in India's mainstay producing area. Some of those projects could entail capital outlays of as much as $1 billion. In another step to attract foreign investment to the petroleum sector, India last month decided to take steps for phased decontrol of domestic crude oil prices to bring them in line with world market levels and help set the stage for privatization of ONGC. The paper describes major projects, the slide in oil production, price changes, the need for privatization, and the lukewarm interest in exploration.

  8. An extended abstract version of this work appears in Australasian Information Security Conference 2010, CPRIT volume 105, pp. 5666. Australian Computer Society, 2010. http://crpit.com/Vol105.html

    E-print Network

    International Association for Cryptologic Research (IACR)

    in higher-security scenarios such as online banking, virtual private network access, and physical access cryptographic devices that can store private keys and perform cryptographic operations, but such devices

  9. Symmetrically private information retrieval based on blind quantum computing

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling

    2015-05-01

    Universal blind quantum computation (UBQC) is a new secure quantum computing protocol which allows a user Alice who does not have any sophisticated quantum technology to delegate her computing to a server Bob without leaking any privacy. Using the features of UBQC, we propose a protocol to achieve symmetrically private information retrieval, which allows a quantum limited Alice to query an item from Bob with a fully fledged quantum computer; meanwhile, the privacy of both parties is preserved. The security of our protocol is based on the assumption that malicious Alice has no quantum computer, which avoids the impossibility proof of Lo. For the honest Alice, she is almost classical and only requires minimal quantum resources to carry out the proposed protocol. Therefore, she does not need any expensive laboratory which can maintain the coherence of complicated quantum experimental setups.

  10. TWRS privatization phase 1 master site plan

    SciTech Connect

    Parazin, R.J.

    1996-09-30

    The DOE-RL is pursuing a new business strategy of hiring private contractors for treatment of Hanford Site tank wastes. This strategy is called `privatization` and includes design, permitting, construction, operation and deactivation of facilities for tank waste treatment. The TWRS Privatization Infrastructure Project consists of several sub-projects which will provide key services needed to support the privatization mission. This master site plan presently describes all pertinent aspects of the site and identifies all planned provisions for site development, utilities and other site services. It is a baseline document which will be revised as privatization proceeds through design, construction and start-up.

  11. Technical means for securing health information.

    PubMed

    de Roulet, D; Scherrer, J R

    1996-10-01

    Securing health information is an application domain which can learn more from other environments like airlines and banking than from military formalism or academic freedom. The techniques of the 80s using clear separation between public and private areas have to be upgraded. Propositions are made. Costs are evaluated. PMID:8960920

  12. Combining Differential Privacy and Secure Multiparty Computation

    E-print Network

    International Association for Cryptologic Research (IACR)

    of the data providers (the tax office) was worried about the leaks through the results of the study. Secure privacy-preserving analyses on private data from different data providers and containing personal in system to protect the privacy of both the data providers and the individuals. We have implemented

  13. Privatization and the globalization of energy markets

    SciTech Connect

    1996-10-01

    This report reviews recent global efforts to privatize energy resources and outlines the opportunities and challenges privatization has presented to U.S. and foreign multinational energy companies. The group of energy companies studied in this report includes the major U.S. petroleum companies and many foreign companies. The foreign companies reviewed include state-run energy enterprises, recently privatized energy enterprises, and foreign multinationals that have been privately held. The privatization of non-petroleum energy industries, such as electricity generation and transmission, natural gas transmission, and coal mining, are also discussed. Overseas investments made by electric companies, natural gas companies, and coal companies are included. The report is organized into six chapters: (1) economics of privatization; (2) petroleum privatization efforts among non-U.S. Organization for Economic Cooperation and Development nations; (3) petroleum privatization efforts in Latin America; (4) privatization in socialist and former socialist regimes; (5) privatization efforts in global electric power generation, transmission, and distribution industries; and (6) privatization and globalization of world coal.

  14. Health care privatization in Latin America: comparing divergent privatization approaches in Chile, Colombia, and Mexico.

    PubMed

    Bustamante, Arturo Vargas; Méndez, Claudio A

    2014-08-01

    The public-private mix in Chile, Colombia, and Mexico was very similar until the early 1980s when Chile undertook health care privatization as part of comprehensive health care reform. Since then, health care privatization policies have diverged in these countries. In this study we characterize health care privatization in Latin America and identify the main factors that promoted and hindered privatization by comparing the experiences of these countries. We argue that policy elites took advantage of specific policy environments and the diffusion of privatization policies to promote health care privatization while political mobilization against privatization, competing policy priorities, weak market and government institutions, and efforts to reach universal health insurance hindered privatization. The privatization approaches of Chile and Colombia were classified as "big-bang," since these countries implemented health care privatization more rapidly and with a wider scope compared with the case of Mexico, which was classified as gradualist, since the privatization path followed by this country adopted a slower pace and became more limited and focalized over time. We conclude that the emphasis on policy-driven privatization diminished in the 1990s and 2000s because of increased public health care financing and a shift in health care reform priorities. Health care privatization in the region, however, continued as a consequence of demand-driven privatization. PMID:24842976

  15. Master of Science in Information SecurityFlexible, Applied, Master's Degrees.

    E-print Network

    Snider, Barry B.

    GPS ONLINE Master of Science in Information SecurityFlexible, Applied, Master's Degrees. Join our professionals in both the private and public sectors. The Master of Science in Information Security provides its risks to the security of proprietary information in an organization. Understand the technical

  16. Effects of layering technique on the shade of resin overlays and the microhardness of dual cure resin cement.

    PubMed

    Chang, Hoon-Sang; Hong, Sung-Ok

    2014-01-01

    The purpose of this study was to assess the color of layered resin overlays and to test the early microhardness of dual cure resin cement (DCRC) light cured through the layered resin overlays. Resin overlays of 1.5 mm thickness were fabricated with the A3 shade of Z350 (Group 1L), the A3B and A3E shades of Supreme XT (Group 2L), and the A3, E3, and T1 shades of Sinfony (Group 3L) using one, two, and three layers, respectively (n=7). Each layer of the resin overlays was set in equal thickness. The color of the resin overlays was measured with a colorimeter and compared with an A3 shade resin denture tooth. DCRC was light cured through the resin overlays, and the early microhardness of the DCRC was measured. The ?E value between the denture tooth and the resin overlays and the Vickers hardness number (VHN) of the DCRC were analyzed with one-way ANOVA and Tukey's HSD test. The color differences were 8.9±0.5, 5.3±1.0, and 7.3±0.5 and the VHNs were 19.4±1.1, 21.1±0.9, and 29.3±0.6 for Groups 1L, 2L, and 3L, respectively. Therefore, to match the designated tooth color of resin inlays and to increase the early microhardness of DCRC, layered resin inlays are more appropriate than single-dentin-layer resin inlays. However, the translucent layer should be used cautiously because the color difference of resin inlays with a translucent layer was affected more than those without a translucent layer. PMID:24918368

  17. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  18. Hydrogen on and in Selected Overlayer Near-Surface Alloys and the Effect of Subsurface Hydrogen on the Reactivity of Alloy Surfaces

    SciTech Connect

    Kandoi, Shampa; Ferrin, Peter A.; Mavrikakis, Manos

    2010-05-01

    The interaction of hydrogen with the closepacked facets of seventeen transition metals overlaid with 1 ML of five transition metals (Au, Ag, Cu, Pt, and Pd) has been studied using periodic self-consistent (GGA-PW91) density functional theory (DFT) calculations. For noble metal overlayers (Au, Ag, and Cu), hydrogen at the hostmetal/ overlayer interface (subsurface hydrogen) is more stable than subsurface hydrogen in the pure host. For certain Au and Ag overlayers, subsurface hydrogen is more stable than surface hydrogen in the same system. The presence of subsurface hydrogen was found to have a significant effect on the electronic structure of the overlayer, resulting in its modified surface reactivity.

  19. TWRS privatization bibliography. Revision 2

    SciTech Connect

    1996-04-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. This bibliography is not, nor is it intended to be, exhaustive or complete. It was prepared with the intent of providing a sampling of representative documents potentially helpful to Offerors. This bibliography is organized by subject area. The subjects covered are: waste characterization; pre-treatment; high-level waste immobilization; low-level waste immobilization; low-level waste melter test program; performance assessment; general; and safety.

  20. Assessment of Potential Location of High Arsenic Contamination Using Fuzzy Overlay and Spatial Anisotropy Approach in Iron Mine Surrounding Area

    PubMed Central

    Wirojanagud, Wanpen; Srisatit, Thares

    2014-01-01

    Fuzzy overlay approach on three raster maps including land slope, soil type, and distance to stream can be used to identify the most potential locations of high arsenic contamination in soils. Verification of high arsenic contamination was made by collection samples and analysis of arsenic content and interpolation surface by spatial anisotropic method. A total of 51 soil samples were collected at the potential contaminated location clarified by fuzzy overlay approach. At each location, soil samples were taken at the depth of 0.00-1.00?m from the surface ground level. Interpolation surface of the analysed arsenic content using spatial anisotropic would verify the potential arsenic contamination location obtained from fuzzy overlay outputs. Both outputs of the spatial surface anisotropic and the fuzzy overlay mapping were significantly spatially conformed. Three contaminated areas with arsenic concentrations of 7.19 ± 2.86, 6.60 ± 3.04, and 4.90 ± 2.67?mg/kg exceeded the arsenic content of 3.9?mg/kg, the maximum concentration level (MCL) for agricultural soils as designated by Office of National Environment Board of Thailand. It is concluded that fuzzy overlay mapping could be employed for identification of potential contamination area with the verification by surface anisotropic approach including intensive sampling and analysis of the substances of interest. PMID:25110751

  1. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-06-10

    In order to improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay has been deposited on the surface of YSZ by electron-beam physical vapor deposition. Currently, hot corrosion tests were performed on the YSZ coatings with and without Al{sub 2}O{sub 3} overlay in molten salt mixture (Na{sub 2}SO{sub 4} + 0 {approx} 15wt%V{sub 2}O{sub 5}) at 950 C in order to investigate the effect of amount of vanadate on the hot corrosion behaviors. The results showed that the presence of in V{sub 2}O{sub 5} the molten salt exacerbates the degradation of both the monolithic YSZ coating and the composite YSZ/Al{sub 2}O{sub 3} system. The formation of low-melting Na{sub 2}O-V{sub 2}O{sub 5}-Al{sub 2}O{sub 3} liquid phase is responsible for degradation of the Al{sub 2}O{sub 3} overlay. The Al{sub 2}O{sub 3} overlay acts as a barrier against the infiltration of the molten salt into the YSZ coating during exposure to the molten salt mixture with <5wt% vanadate. In the next reporting period, we will use XPS and SIMS to study the interactions between alumina overlay and molten salt containing vanadate.

  2. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  3. Microgel-based etalon coated quartz crystal microbalances for detecting solution pH: The effect of Au overlayer thickness.

    PubMed

    Islam, Molla R; Johnson, Kai C C; Serpe, Michael J

    2013-08-20

    Poly (N-isopropylacrylamide)-co-acrylic acid (pNIPAm-co-AAc) microgels were "painted" on the Au electrode of a quartz crystal microbalance (QCM). Another Au layer (overlayer) was subsequently deposited on the microgel layer. This structure is known as a microgel-based etalon. These devices have been shown to exhibit optical properties (i.e., color) that depend on solution pH and temperature, among other things. Previously, we measured QCM frequency shifts that are a result of solution pH changes; the frequency shifts are a direct result of the pH dependent solvation state of the microgels that make up the etalon. In fact, the shifts observed for the etalons were much greater in magnitude than just a microgel layer immobilized on the QCM crystal without the Au overlayer. We reasoned that the Au overlayer lead to an enhancement of the observed frequency change due to its mass. In this submission we investigate how the Au overlayer thickness (mass) affects the observed sensitivity to solution pH. We found that the change in QCM resonant frequency depended dramatically on the mass of the Au overlayer. PMID:23910975

  4. Modeling degradation and failure of Ni-Cr-Al overlay coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, J. A.; Heckel, R. W.

    1984-01-01

    Degradation of a Ni-16Cr-25Al-0.06Zr overlay coating on a Ni-22Cr substrate was examined after oxidation accompanied by thermal cycling. Concentration/distance profiles were measured in the coating and substrate after various one-hour cycles at 1150 C. A numerical model was developed to simulate coating degradation by simultaneous oxidation and coating/substrate interdiffusion. The validity of the model was confirmed by comparison of predicted and measured concentration/distance profiles. The ability of the model to identify critical system parameters was demonstrated for the case of the initial Al and Cr content of the coating and substrate.

  5. Suppression of ferromagnetic order of Fe overlayers on the Rh(001) surface

    SciTech Connect

    Hwang, Chanyong; Solid State Division, Oak Ridge National Laboratory, Oak Ridge, Tennessee 37831 ; Swan, A. K.; Hong, S. C.

    1999-11-15

    The magnetic phase of thin Fe overlayers on top of a Rh(001) surface has been probed using the surface magneto-optical Kerr effect. Quite surprisingly, we have found a suppression of ferromagnetic order up to six atomic layers of Fe. Not until Fe coverage reaches above seven layers does a ferromagnetic order start to develop. The suppression of ferromagnetic order is attributed to the tetragonally distorted cubic structure, which has been predicted to favor anitiferromagnetic ordering from our first-principles calculation using the full potential linearized augmented plane-wave method. (c) 1999 The American Physical Society.

  6. 17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... issuers on Form 6-K . 240.15d-16 Section 240.15d-16 Commodity and Securities Exchanges SECURITIES AND... issuers on Form 6-K . (a) Every foreign private issuer which is subject to Rule 15d-1 shall make reports on Form 6-K, except that this rule shall not apply to: (1) Investment companies required to...

  7. Setting Up Private Practice in Psychiatry*

    PubMed Central

    De Sousa, Alan; De Sousa, Avinash

    2015-01-01

    Setting up a private practice in Mumbai is an onerous task. The present paper looks at the difficulties face by young psychiatrists when starting a private practice in psychiatry. It suggests certain guidelines to be followed to ensure the development of a successful practice. It also suggests methods to gain popularity among patients and society along with the ethics to be followed, knowledge base to be garnered, and the role of using multiple therapies and versatility in private practice. PMID:25838718

  8. Weldability of Fe-Al-Cr Overlay Coatings for CorrosionProtection in Oxidizing/Sulfidizing Environments

    SciTech Connect

    Regina, JR

    2003-03-04

    The effect of chromium additions to the weldability of Fe-Al based overlay claddings are currently being investigated for the corrosion protection of boiler tubes in Low NOx furnaces. The primary objective of this research is to identify weldable (crack-free) Fe-Al-Cr weld overlay coating compositions that provide corrosion resistance over long exposure times. During the current project phase, preliminary corrosion testing was conducted on several ternary Fe-Al-Cr alloys in two types of gaseous corrosion environments. These long-term corrosion tests were used to develop a target weld composition matrix and serve as a base line for future corrosion tests. Preliminary Fe-Al based welds with various aluminum concentrations and one ternary Fe-Al-Cr weld overlay were successfully deposited using a Gas Tungsten Arc Welding (GTAW) process and cracking susceptibility was evaluated on these coatings.

  9. Improving full-wafer on-product overlay using computationally designed process-robust and device-like metrology targets

    NASA Astrophysics Data System (ADS)

    Kim, Young-Sik; Hwang, Young-Sun; Jung, Mi-Rim; Yoo, Ji-Hwan; Kwon, Won-Taik; Ryan, Kevin; Tuffy, Paul; Zhang, Youping; Park, Sean; Oh, Nang-Lyeom; Park, Chris; Shahrjerdy, Mir; Werkman, Roy; Sun, Kyu-Tae; Byun, Jin-Moo

    2015-03-01

    In order to handle the upcoming 1x DRAM overlay and yield requirements, metrology needs to evolve to more accurately represent product device patterns while being robust to process effects. One way to address this is to optimize the metrology target design. A viable solution needs to address multiple challenges. The target needs to be resistant to process damage. A single target needs to measure overlay between two or more layers. Targets need to meet design rule and depth of focus requirements under extreme illumination conditions. These must be achieved while maintaining good precision and throughput with an ultra-small target. In this publication, a holistic approach is used to address these challenges, using computationally optimized metrology targets with an advanced overlay control loop.

  10. 75 FR 72965 - Federal Travel Regulation; Removal of Privately Owned Vehicle Rates; Privately Owned Automobile...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ...Sequence 1] RIN 3090-AJ09 Federal Travel Regulation; Removal of Privately Owned...SUMMARY: GSA is amending the Federal Travel Regulation (FTR) by removing the Privately...Governmentwide Policy, Office of Travel, Transportation and Asset...

  11. Overlay coating degradation by simultaneous oxidation and coating/substrate interdiffusion. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Nesbitt, J. A.

    1983-01-01

    Degradation of NiCrAlZr overlay coatings on various NiCrAl substrates was examined after cyclic oxidation. Concentration/distance profiles were measured in the coating and substrate after various oxidation exposures at 1150 C. For each stubstrate, the Al content in the coating decreased rapidly. The concentration/distance profiles, and particularly that for Al, reflected the oxide spalling resistance of each coated substrate. A numerical model was developed to simulate diffusion associated with overlay-coating degradation by oxidation and coating/substrate interdiffusion. Input to the numerical model consisted of the Cr and Al content of the coating and substrate, ternary diffusivities, and various oxide spalling parameters. The model predicts the Cr and Al concentrations in the coating and substrate after any number of oxidation/thermal cycles. The numerical model also predicts coating failure based on the ability of the coating to supply sufficient Al to the oxide scale. The validity of the model was confirmed by comparison of the predicted and measured concentration/distance profiles. The model was subsequently used to identify the most critical system parameters affecting coating life.

  12. Automated overlay recipe setup in high-volume manufacturing: improving performance, efficiency, and robustness

    NASA Astrophysics Data System (ADS)

    Sparka, Christian; Golotsvan, Anna; Avrahamov, Yosef; Sitzmann, Wolfgang; Tien, David

    2009-03-01

    As the semiconductor industry continues to drive toward smaller design nodes, overlay error budgets will continue to shrink making metrology ever more challenging. Moreover, this challenge is compounded by the need to continue to drive down costs and increase productivity, especially given the competitive and macro-economic landscape going forward. In order to satisfy these two contradicting requirements, new ways of maintaining metrology tools and recipes are needed. Traditionally, recipes are generated manually by operators or even metrology engineers, involving both tool time and engineering resources. Furthermore, the influence of individual skill levels can lead to undesirable variations and is a potential source of errors that could result in yield loss. By means of automatic recipe generation both engineering and capital equipment resources can be minimized. Implementation of an automated recipe creation process will also result in improved recipe integrity. In this study, we show a methodology of a highly automated recipe generation for overlay measurements. We will outline the benefits of such an implementation and comment on the value for all segments of the semiconductor industry as well as provide data from production fabs demonstrating these capabilities and benefits.

  13. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  14. Hot Corrosion of Inconel 625 Overlay Weld Cladding in Smelting Off-Gas Environment

    NASA Astrophysics Data System (ADS)

    Mohammadi Zahrani, E.; Alfantazi, A. M.

    2013-10-01

    Degradation mechanisms and hot corrosion behavior of weld overlay alloy 625 were studied. Phase structure, morphology, thermal behavior, and chemical composition of deposited salt mixture on the weld overlay were characterized utilizing XRD, SEM/EDX, DTA, and ICP/OES, respectively. Dilution level of Fe in the weldment, dendritic structure, and degradation mechanisms of the weld were investigated. A molten phase formed on the weld layer at the operating temperature range of the boiler, which led to the hot corrosion attack in the water wall and the ultimate failure. Open circuit potential and weight-loss measurements and potentiodynamic polarization were carried out to study the hot corrosion behavior of the weld in the simulated molten salt medium at 873 K, 973 K, and 1073 K (600 °C, 700 °C, and 800 °C). Internal oxidation and sulfidation plus pitting corrosion were identified as the main hot corrosion mechanisms in the weld and boiler tubes. The presence of a significant amount of Fe made the dendritic structure of the weld susceptible to preferential corrosion. Preferentially corroded (Mo, Nb)-depleted dendrite cores acted as potential sites for crack initiation from the surface layer. The penetration of the molten phase into the cracks accelerated the cracks' propagation mainly through the dendrite cores and further crack branching/widening.

  15. An efficient mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks

    NASA Astrophysics Data System (ADS)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2014-08-01

    This paper proposes an efficient overlay multicast provisioning (OMP) mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks. To facilitate request provisioning, OMP jointly utilizes a data learning (DL) scheme on the IP/MPLS layer for logical link cost estimation, and a lightpath fragmentation (LPF) based method on the WDM layer for improving resource sharing in grooming process. Extensive simulations are carried out to evaluate the performance of OMP mechanism under different traffic loads, with either limited or unlimited port resources. Simulation results demonstrate that OMP significantly outperforms the existing methods. To evaluate the respective influences of the DL scheme and the LPF method on OMP performance, provisioning mechanisms only utilizing either the IP/MPLS layer DL scheme or the WDM layer LPF method are also devised. Comparison results show that both DL and LPF methods help improve OMP blocking performance, and contribution from the DL scheme is more significant when the fixed routing and first-fit wavelength assignment (RWA) strategy is adopted on the WDM layer. Effects of a few other factors, including definition of connection cost to be reported by the WDM layer to the IP/MPLS layer and WDM-layer routing method, on OMP performance are also evaluated.

  16. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Rańa, Pablo; González-Castańo, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  17. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  18. Minus Piggyback Lens Overlaying ReSTOR® Multifocal Lens in High Myopia

    PubMed Central

    Gupta, Isha; Oakey, Zack; Stagg, Brian C.; Ambati, Balamurali K.

    2013-01-01

    Background We report the case of a 40-year-old female patient treated with implantation of the Acrysof® IQ ReSTOR® lens (Alcon, Fort Worth, Tex., USA) with overlaying Acrysof EXpand® minus piggyback lens (Alcon). Methods The patient had high myopia and was diagnosed with presbyopia and bilateral posterior subcapsular cataract. She desired to be spectacle-free and opted to undergo bilateral placement of the ReSTOR multifocal lens. The necessary intraocular lens (IOL) power was +3.5 in the right eye and +4.0 in the left eye, though the range of commercially available ReSTOR lenses is +6.0 to +34.0 D. In order to achieve emmetropia in this case of high myopia, it was determined that an EXpand minus piggyback lens would be necessary. Results Implantation of the ReSTOR lens with overlaying EXpand minus piggyback lens was performed successfully and without complication. At 5 months postoperatively, the patient had 20/20 uncorrected visual acuity in both eyes. She reported a high level of satisfaction and was able to return to her daily activities including reading and driving without spectacles. Conclusion We report successful primary implantation of AcrySof EXpand minus piggyback lenses overlying the AcrySof IQ ReSTOR lens in a patient with high myopia. Long-term follow-up and further evaluation is necessary to establish piggyback IOL implantation with multifocal IOL as an accepted treatment for high myopia with presbyopia. PMID:23898294

  19. Citrate-stabilized large Au nanoparticles: Seed-mediated synthesis and their size-optimized enhanced Raman at Pd overlayers

    NASA Astrophysics Data System (ADS)

    Zhou, Jinli; Zhang, Ting; Li, Huanhuan; Cui, Ying; Hu, Jiawen

    2015-05-01

    We report seed-mediated synthesis of large (up to 180 nm) Au nanoparticles (NPs) for size-optimized surface-enhanced Raman scattering (SERS) at Pd overlayers. Our results reveal that overmuch produced electrolyte during synthesis may destabilize the growing particles, making them failure to grow freely. This understanding guides the synthesis of large Au NPs with a large range of sizes, thereby allowing exploiting their size-optimized properties, including borrowed SERS achieved at ultrathin, pinhole-free Pd overlayers. The high quality borrowed SERS achieved is important for in situ extracting of vibrational information for species on catalytic Pd surfaces.

  20. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2002-01-31

    In order to improve the hot corrosion resistance of conventional YSZ TBC system, the overlay of Al{sub 2}O{sub 3} coating was deposited on the TBC by EB-PVD techniques. Hot corrosion tests were carried out on the TBC with and without Al{sub 2}O{sub 3} coating in molten salts mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}) at 950 C for 10h. The microstructures of TBC and overlay before and after exposure were examined by means of scanning electron microscopy (SEM), energy-dispersive X-ray spectrometer (EDX) and X-ray diffraction (XRD). It has been found that TBC will react with V{sub 2}O{sub 5} to form YVO{sub 4}. A substantial amount of M-phase was formed due to the leaching of Y{sub 2}O{sub 3} from YSZ. Al{sub 2}O{sub 3} overlay coating deposited by EB-PVD was dense, continues and adherent to the TBC. As a result, overlay Al{sub 2}O{sub 3} coating can prevent the YSZ from the attack by molten salts containing vanadium and arrest the penetration of salts into the YSZ along porous and cracks in the YSZ TBC, although there were some cracks in overlay Al{sub 2}O{sub 3} coating and at the interface between alumina and zirconia formed during hot corrosion tests due to the presence of tensile stress in the alumina coating. In the next reporting period, we will study the mechanisms of cracking of the overlay Al{sub 2}O{sub 3} layer and finish the hot corrosion tests of TBC with Al{sub 2}O{sub 3} coating deposited by high velocity oxy-fuel (HVOF) technique. The hot corrosion test of TBC with EB-PVD deposited Al{sub 2}O{sub 3} coating will be again performed. However before hot corrosion tests, a post-annealing will be carried out in vacuum (residual pressure 10{sup -3} Pa) at 1273K for 1h in order to transform the as-sputtered Al{sub 2}O{sub 3} overlay to crystalline {alpha}-Al{sub 2}O{sub 3} overlay.