Science.gov

Sample records for private overlays secure

  1. Using overlays to improve network security

    NASA Astrophysics Data System (ADS)

    Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel

    2002-07-01

    As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.

  2. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  3. Private Security Training. Phase 3: Private Investigator. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This curriculum guide provides instructional materials for the private investigator phase of a private security training course of study. Five units cover the following topics: understanding responsibilities to clients; interpreting laws of private investigations; complying with the Fair Credit Reporting Act; conducting investigations and…

  4. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    NASA Astrophysics Data System (ADS)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  5. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  6. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  7. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  8. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  9. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  10. Private Security Training. Phase 2: Security Guard. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This module on private security guard training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains four instructional units that cover the following topics: (1) public relations; (2) performing fixed post…

  11. Security of practical private randomness generation

    NASA Astrophysics Data System (ADS)

    Pironio, Stefano; Massar, Serge

    2013-01-01

    Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness in a device-independent way, i.e., without making detailed assumptions about the internal working of the quantum devices used to generate the random numbers. Furthermore these numbers are also private; i.e., they appear random not only to the user but also to any adversary that might possess a perfect description of the devices. Since this process requires a small initial random seed to sample the behavior of the quantum devices and to extract uniform randomness from the raw outputs of the devices, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold. First, we point out that in most real, practical situations, where the concept of device independence is used as a protection against unintentional flaws or failures of the quantum apparatuses, it is sufficient to show that the generated string is random with respect to an adversary that holds only classical side information; i.e., proving randomness against quantum side information is not necessary. Furthermore, the initial random seed does not need to be private with respect to the adversary, provided that it is generated in a way that is independent from the measured systems. The devices, however, will generate cryptographically secure randomness that cannot be predicted by the adversary, and thus one can, given access to free public randomness, talk about private randomness generation. The theoretical tools to quantify the generated randomness according to these criteria were already introduced in S. Pironio [Nature (London)NATUAS0028-083610.1038/nature09008 464, 1021 (2010)], but the final results were improperly formulated. The second aim of this paper is to correct this inaccurate formulation and therefore lay out a precise theoretical framework for practical device

  12. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  13. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  14. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  15. How to Keep Your Health Information Private and Secure

    MedlinePlus

    ... communities, such as message boards. · Store in a personal health record (PHR) that is not offered through ... information. Here are some tips to ensure your personal health information is private and secure when accessing ...

  16. Private Security Training. Phase 1: Basic. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…

  17. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  18. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  19. Private Security Training. Phase 4: Firearms Training. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This curriculum guide provides instructional materials for the firearms training phase of a private security training course of study. The seven units in the course cover the following topics: safety; revolver nomenclature and maintenance; inspecting revolvers and holsters; fundamentals of revolver shooting; legal issues and deadly force; range…

  20. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System... security functions. As prescribed in 225.370-6, insert the following clause: CONTRACTORS PERFORMING PRIVATE SECURITY FUNCTIONS (AUG 2011) (a) Definition. Private security functions means activities engaged in by...

  1. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  2. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  3. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Private resales of securities... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.144A Private resales of... Security Act of 1974; (F) Any trust fund whose trustee is a bank or trust company and whose...

  4. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight...

  5. New holographic overlays

    NASA Astrophysics Data System (ADS)

    Hopwood, Anthony I.

    1991-10-01

    This paper discusses a new type of holographic overlay, FLASHPRINT, which may be used in both security and packaging applications. Unlike the more common embossed holograms currently used, FLASHPRINT leads to reduced set-up costs and offers a simpler process. This reduces the long lead times characteristic of the existing technology and requires the customer to provide only two-dimensional artwork. The overlay material contains a covert 2-D image. The image may be switched on or off by simply tilting the overlay in a light source. The overlay is replayed in the 'on' position to reveal the encoded security message as a highly saturated gold colored image. This effect is operable for a wide range of lighting conditions and viewing geometries. In the 'off' position the overlay is substantially transparent. These features make the visual effect of the overlay attractive to incorporate into product design. They may be laminated over complex printed artwork such as labels and security passes without masking the printed message. When switched 'on' the image appears both sharp and more than seven times brighter than white paper. The image remains sharp and clear even in less favorable lighting conditions. Although the technique offers a low set-up cost for the customer, through its simplicity, it remains as technically demanding and difficult to counterfeit as any holographic process.

  6. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  7. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  8. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  9. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  10. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  11. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... background checks), and security requirements established by 32 CFR part 159, Private Security Contractors... contract comply with 32 CFR part 159, and with any orders, directives, and instructions to Contractors... CFR part 159. Such action may be taken at the Government's discretion without prejudice to its...

  12. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  13. A New Method for Creating Efficient Security Policies in Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  14. "i3" Recipients Dash to Secure Private Match

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2010-01-01

    Winners of the Investing in Innovation (i3) competition scrambled to make a deadline to find private-sector matches for their multimillion-dollar federal awards, meeting the challenge through a mix of cash grants and donations of pricey equipment and services, and by rechanneling previous grants to new purposes. The 49 organizations selected to…

  15. A Needs Assessment Study and Curriculum Development for a Public and Private Security Program at Alvin Community College.

    ERIC Educational Resources Information Center

    Bethscheider, John

    A needs assessment for a community college curriculum in public and private security was conducted by surveying 50 high schools, four-year colleges, and private security agencies in the Alvin Community College area; 36 institutions responded. Findings revealed: most have a designated director of their security program; most would rather hire the…

  16. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms...

  17. Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication

    NASA Astrophysics Data System (ADS)

    Gong, Li-Hua; Liu, Ye; Zhou, Nan-Run

    2013-09-01

    Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.

  18. Selection, training and retention of an armed private security department.

    PubMed

    Hollar, David B

    2009-01-01

    To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step. PMID:19711796

  19. Generic Overlay Framework

    Energy Science and Technology Software Center (ESTSC)

    2005-09-01

    This software provides a framework for building application layter overlay networks. It includes example overlays that can be used without modification. Also provided are example multicast and routing protocols that can be used with the overlays.

  20. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  1. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Contractors Performing Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  2. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ...The DoD, GSA, and NASA are proposing to amend the Federal Acquisition Regulation (FAR) to implement Governmentwide requirements in National Defense Authorization Acts that establish minimum processes and requirements for the selection, accountability, training, equipping, and conduct of personnel performing private security functions outside the United...

  3. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  4. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ...This Rule establishes policy, assigns responsibilities and provides procedures for the regulation of the selection, accountability, training, equipping, and conduct of personnel performing private security functions under a covered contract during contingency operations, combat operations or other significant military operations. It also assigns responsibilities and establishes procedures for......

  5. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...://www.bpn.gov/iuid/); and (iv) Reporting incidents in which— (A) A weapon is discharged by personnel... contractor personnel; (D) A weapon is discharged against personnel performing private security functions...

  6. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Contractors performing private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  7. Overlay accuracy fundamentals

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Levinski, Vladimir; Sapiens, Noam; Cohen, Guy; Amit, Eran; Klein, Dana; Vakshtein, Irina

    2012-03-01

    Currently, the performance of overlay metrology is evaluated mainly based on random error contributions such as precision and TIS variability. With the expected shrinkage of the overlay metrology budget to < 0.5nm, it becomes crucial to include also systematic error contributions which affect the accuracy of the metrology. Here we discuss fundamental aspects of overlay accuracy and a methodology to improve accuracy significantly. We identify overlay mark imperfections and their interaction with the metrology technology, as the main source of overlay inaccuracy. The most important type of mark imperfection is mark asymmetry. Overlay mark asymmetry leads to a geometrical ambiguity in the definition of overlay, which can be ~1nm or less. It is shown theoretically and in simulations that the metrology may enhance the effect of overlay mark asymmetry significantly and lead to metrology inaccuracy ~10nm, much larger than the geometrical ambiguity. The analysis is carried out for two different overlay metrology technologies: Imaging overlay and DBO (1st order diffraction based overlay). It is demonstrated that the sensitivity of DBO to overlay mark asymmetry is larger than the sensitivity of imaging overlay. Finally, we show that a recently developed measurement quality metric serves as a valuable tool for improving overlay metrology accuracy. Simulation results demonstrate that the accuracy of imaging overlay can be improved significantly by recipe setup optimized using the quality metric. We conclude that imaging overlay metrology, complemented by appropriate use of measurement quality metric, results in optimal overlay accuracy.

  8. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. PMID:21631459

  9. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD. PMID:26453195

  10. Security analysis of multi-party quantum private comparison protocol by model checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie; Luo, Qingbin; Wang, Yuqi

    2015-06-01

    This paper presents an analysis method for quantum information protocols based on model checking, with special focus on the quantum privacy comparison (QPC). The security properties of these protocols can be proved but in ways with much difficulty. Here we will discuss a probabilistic model checking tool — PRISM to verify specific properties of QPC protocol with multi-body and PRISM to verify specific properties of quantum private comparison (QPC) protocol with multi-party and d-dimensional entangled states.

  11. Enhacement of intrafield overlay using a design based metrology system

    NASA Astrophysics Data System (ADS)

    Jo, Gyoyeon; Ji, Sunkeun; Kim, Shinyoung; Kang, Hyunwoo; Park, Minwoo; Kim, Sangwoo; Kim, Jungchan; Park, Chanha; Yang, Hyunjo; Maruyama, Kotaro; Park, Byungjun

    2016-03-01

    As the scales of the semiconductor devices continue to shrink, accurate measurement and control of the overlay have been emphasized for securing more overlay margin. Conventional overlay analysis methods are based on the optical measurement of the overlay mark. However, the overlay data obtained from these optical methods cannot represent the exact misregistration between two layers at the circuit level. The overlay mismatch may arise from the size or pitch difference between the overlay mark and the real pattern. Pattern distortion, caused by CMP or etching, could be a source of the overlay mismatch as well. Another issue is the overlay variation in the real circuit pattern which varies depending on its location. The optical overlay measurement methods, such as IBO and DBO that use overlay mark on the scribeline, are not capable of defining the exact overlay values of the real circuit. Therefore, the overlay values of the real circuit need to be extracted to integrate the semiconductor device properly. The circuit level overlay measurement using CDSEM is time-consuming in extracting enough data to indicate overall trend of the chip. However DBM tool is able to derive sufficient data to display overlay tendency of the real circuit region with high repeatability. An E-beam based DBM(Design Based Metrology) tool can be an alternative overlay measurement method. In this paper, we are going to certify that the overlay values extracted from optical measurement cannot represent the circuit level overlay values. We will also demonstrate the possibility to correct misregistration between two layers using the overlay data obtained from the DBM system.

  12. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  13. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and on... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  14. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  15. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  16. The effectiveness of an electronic security management system in a privately owned apartment complex.

    PubMed

    Greenberg, David F; Roush, Jeffrey B

    2009-02-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment buildings in New York City. Crime rates in a control apartment complex under the same ownership, and in the police precinct in which the 2 complexes are located, serve as controls. PMID:19001121

  17. Borrowing to save: a critique of recent proposals to partially privatize Social Security.

    PubMed

    Dattalo, Patrick

    2007-07-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance. PMID:17850031

  18. SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage

    PubMed Central

    Toth, Csaba; Durham, Elizabeth; Kantarcioglu, Murat; Xue, Yuan; Malin, Bradley

    2014-01-01

    To mitigate bias in multi-institutional research studies, healthcare organizations need to integrate patient records. However, this process must be accomplished without disclosing the identities of the corresponding patients. Various private record linkage (PRL) techniques have been proposed, but there is a lack of translation into practice because no software suite supports the entire PRL lifecycle. This paper addresses this issue with the introduction of the Secure Open Enterprise Master Patient Index (SOEMPI). We show how SOEMPI covers the PRL lifecycle, illustrate the implementation of several PRL protocols, and provide a runtime analysis for the integration of two datasets consisting of 10,000 records. While the PRL process is slower than a non-secure setting, our analysis shows the majority of processes in a PRL protocol require several seconds or less and that SOEMPI completes the process in approximately two minutes, which is a practical amount of time for integration. PMID:25954421

  19. Secure Quantum Private Comparison of Equality Based on Asymmetric W State

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Liu, Chao; Wang, Hai-bin; Liu, Jing-Fa; Wang, Fang; Yuan, Xiao-Min

    2014-06-01

    Recently, Liu et al. (Opt. Commun. 284:3160, 2011) proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric W state. However, Li et al. (Eur. Phys. J. D 66:110, 2012) pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric W state, a secure QPCE protocol based on this asymmetric W state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.

  20. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  1. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  2. Enabling distributed simulation multilevel security using virtual machine and virtual private network technology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2007-04-01

    Increasing the accuracy of the portrayal of all of the elements of a simulation environment has long been a prime goal of the modeling and simulation community; a goal that has remained far out of reach for many reasons. One of the greatest hurdles facing simulation developers in the effort to increase simulation accuracy is the need to segregate information across the entire simulation environment according to access restrictions in order to insure the integrity, security, and reliability requirements imposed on the data. However, this need for segregation does not mean that those with the highest access permissions should be forced to use multiple computers and displays to integrate the information that they need or that intelligent agents should be restricted in their access to the information that they need in order to adequately assist their human operators. In this paper, we present a potential solution to the problem of integrating and segregating data, which is the use of virtual machine and virtual private network technology in order to maintain segregation of data, control access, and control intercommunication.

  3. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  4. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  5. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  6. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  7. Campus Public Safety and Security, with Guidance as Well for High Schools and Private Secondary Schools.

    ERIC Educational Resources Information Center

    Wensyel, James W.

    Intended for school administrators from the middle school to the university level, the development and maintenance of an effective campus security program are discussed. The leadership role of the school's administrator is stressed and the use of security and safety teams, traffic studies and other measures, to identify security risks and evaluate…

  8. The business of medicine: how to overcome financial obstacles and secure financing for your private practice and ancillary services business.

    PubMed

    Nayor, David

    2012-01-01

    Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms. PMID:22920034

  9. Accuracy in optical overlay metrology

    NASA Astrophysics Data System (ADS)

    Bringoltz, Barak; Marciano, Tal; Yaziv, Tal; DeLeeuw, Yaron; Klein, Dana; Feler, Yoel; Adam, Ido; Gurevich, Evgeni; Sella, Noga; Lindenfeld, Ze'ev; Leviant, Tom; Saltoun, Lilach; Ashwal, Eltsafon; Alumot, Dror; Lamhot, Yuval; Gao, Xindong; Manka, James; Chen, Bryan; Wagner, Mark

    2016-03-01

    In this paper we discuss the mechanism by which process variations determine the overlay accuracy of optical metrology. We start by focusing on scatterometry, and showing that the underlying physics of this mechanism involves interference effects between cavity modes that travel between the upper and lower gratings in the scatterometry target. A direct result is the behavior of accuracy as a function of wavelength, and the existence of relatively well defined spectral regimes in which the overlay accuracy and process robustness degrades (`resonant regimes'). These resonances are separated by wavelength regions in which the overlay accuracy is better and independent of wavelength (we term these `flat regions'). The combination of flat and resonant regions forms a spectral signature which is unique to each overlay alignment and carries certain universal features with respect to different types of process variations. We term this signature the `landscape', and discuss its universality. Next, we show how to characterize overlay performance with a finite set of metrics that are available on the fly, and that are derived from the angular behavior of the signal and the way it flags resonances. These metrics are used to guarantee the selection of accurate recipes and targets for the metrology tool, and for process control with the overlay tool. We end with comments on the similarity of imaging overlay to scatterometry overlay, and on the way that pupil overlay scatterometry and field overlay scatterometry differ from an accuracy perspective.

  10. Characterization of overlay mark fidelity

    NASA Astrophysics Data System (ADS)

    Adel, Mike; Ghinovker, Mark; Poplawski, Jorge M.; Kassel, Elyakim; Izikson, Pavel; Pollentier, Ivan K.; Leray, Philippe; Laidler, David W.

    2003-05-01

    In this publication we introduce a new metric for process robustness of overlay metrology in microelectronic manufacturing. By straightforward statistical analysis of overlay metrology measurements on an array of adjacent, nominally identical overlay targets the Overlay Mark Fidelity (OMF) can be estimated. We present the results of such measurements and analysis on various marks, which were patterned using a DUV scanner. The same reticle set was used to pattern wafers on different process layers and process conditions. By appropriate statistical analysis, the breakdown of the total OMF into a reticle-induced OMF component and a process induced OMF component was facilitated. We compare the OMF of traditional box-in-box overlay marks with that of new gratingbased overlay marks and show that in all cases the grating marks are superior. The reticle related OMF showed an improvement of 30 % when using the new grating-based overlay mark. Furthermore, in a series of wafers run through an STI-process with different Chemical Mechanical Polish (CMP) times, the random component of the OMF of the new grating-based overlay mark was observed to be 40% lower and 50% less sensitive to process variation compared with Box in Box marks. These two observations are interpreted as improved process robustness of the grating mark over box in box, specifically in terms of reduced site by site variations and reduced wafer to wafer variations as process conditions change over time. Overlay Mark Fidelity, as defined in this publication, is a source of overlay metrology uncertainty, which is statistically independent of the standard error contributors, i.e. precision, TIS variability, and tool to tool matching. Current overlay metrology budgeting practices do not take this into consideration when calculating total measurement uncertainty (TMU). It is proposed that this be reconsidered, given the tightness of overlay and overlay metrology budgets at the 70 nm design rule node and below.

  11. Electrically conductive polymer concrete overlays

    NASA Astrophysics Data System (ADS)

    Fontana, J. J.; Webster, R. P.

    1984-08-01

    The use of cathodic protection to prevent the corrosion of reinforcing steel in concrete structures has been well established. Application of a durable, skid-resistant electrically conductive polymer concrete overlay would advance the use of cathodic protection for the highway industry. Laboratory studies indicate that electrically conductive polymer concrete overlays using conductive fillers, such as calcined coke breeze, in conjunction with polyester or vinyl ester resins have resistivities of 1 to 10 ohm-cm. Both multiple-layer and premixed mortar-type overlays were made. Shear bond strengths of the conductive overlays to concrete substrates vary from 600 to 1300 psi, with the premixed overlays having bond strengths 50 to 100% higher than the multiple-layer overlays.

  12. Media delivery and media service overlays

    NASA Astrophysics Data System (ADS)

    Wee, Susie

    2005-03-01

    Multimedia communication and streaming media services will become mainstream network infrastructure applications in the coming decade. However, there are many challenges that must be overcome. These challenges include the Internet"s limited ability to handle real-time, low-latency media streams, the need for media security, and an uncertainty of the killer app. The nature of these challenges lends itself to enabling technology innovations in the media delivery and media processing space. Specifically, we envision an overlay infrastructure that supports networked media services that couple media delivery with in-network media processing. The media overlay should be programmable to allow rapid deployment of new applications and services and manageable so as to support the evolving requirements of the resulting usage models. Furthermore, the media overlay should allow for the delivery of protected media content for applications that have security requirements. A properly architected infrastructure can enable real-time multimedia communication and streaming media services in light of the inherent challenges.

  13. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV. PMID:20377597

  14. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects. PMID:23823398

  15. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ..., August 18, 2010. [FR Doc. 2010-21016 Filed 8-20-10; 8:45 am] Billing code 3195-W0-P ... Documents#0;#0; #0; #0;Title 3-- #0;The President ] Executive Order 13549 of August 18, 2010 Classified... with Executive Order 13526 of December 29, 2009 (``Classified National Security...

  16. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  17. Overlay similarity: a new overlay index for metrology tool and scanner overlay fingerprint methodology

    NASA Astrophysics Data System (ADS)

    Ke, Chih-Ming; Kao, Ching-Pin; Wang, Yu-Hsi; Hu, Jimmy; Chang, Chen-Yu; Tsai, Ya-Jung; Yen, Anthony; Lin, Burn J.

    2009-03-01

    For different CD metrologies like average CD from CD SEM and optical CD (OCD) from scatterometry, CD point-to-point R2 has been well adopted as the CD correlation index. For different overlay metrologies like image-based box-in-box overlay and scatterometry-based overlay, we propose the cosine similarity as the correlation index of overlay. The cosine similarity is a measure of similarity between two vectors of n dimensions by finding the cosine of the angle between them, often used to compare documents in text mining. It has been widely used in web and document search engines and can be used as the similarity index of overlay tool-to-tool matching and scanner tool-to-tool or day-to-day fingerprint. In this paper, we demonstrate that the cosine similarity has a very high sensitivity to the overly tool performance. We compared the similarities of three generations (A1, A2, A3) of the overlay tools of venders A and B and found that after target re-training and TIS correction on each tool A1 similarity to A3 can be improved from 0.9837 to 0.9951. Overlay point-to-point matching with A3 vs. A1 can be reduced from 4.8 to 2.1 nm. The tool precision similarities, i.e. tool self best similarity, for A1, A2, A3 and B are 0.9986, 0.9990, 0.9995, and 0.9994 respectively. From this table, we demonstrate that we can use old-generation overlay tool with suitable hardware maintenance, to match to the latest-generation overlay tool.

  18. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Li, Jian; Jia, Lu; Zhou, Hong-Fu; Zhang, Ting-Ting

    2016-03-01

    We propose a new quantum private comparison protocol with the help of a semi-honest third party (TP), enabling two participants to compare the equality of their private inputs without exposing any information about their respective private inputs. Different from previous protocols, our protocol utilizes the properties of entanglement swapping between three-particle W-Class state and Bell state. The presented protocol can ensure correctness, fairness and security. Meanwhile, all the quantum particles undergo a one-way transmission, and all the participants including TP are just required having the ability to perform Bell-state measurement and exclusive-or operation which make our protocol more feasible and efficient. At last, the security of this protocol with respect to various kinds of attacks is analyzed in detail.

  19. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  20. Implementing a Trust Overlay Framework for Digital Ecosystems

    NASA Astrophysics Data System (ADS)

    Malone, Paul; McGibney, Jimmy; Botvich, Dmitri; McLaughlin, Mark

    Digital Ecosystems, being decentralised in nature, are inherently untrustworthy environments. This is due to the fact that these environments lack a centralised gatekeeper and identity provider. In order for businesses to operate in these environments there is a need for security measures to support accountability and traceability. This paper describes a trust overlay network developed in the OPAALS project to allow entities participating in digital ecosystems to share experience through the exchange of trust values and to leverage on this network to determine reputation based trustworthiness of unknown and initially untrusted entities. An overlay network is described together with sample algorithms and a discussion on implementation.

  1. New analytical algorithm for overlay accuracy

    NASA Astrophysics Data System (ADS)

    Ham, Boo-Hyun; Yun, Sangho; Kwak, Min-Cheol; Ha, Soon Mok; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    The extension of optical lithography to 2Xnm and beyond is often challenged by overlay control. With reduced overlay measurement error budget in the sub-nm range, conventional Total Measurement Uncertainty (TMU) data is no longer sufficient. Also there is no sufficient criterion in overlay accuracy. In recent years, numerous authors have reported new method of the accuracy of the overlay metrology: Through focus and through color. Still quantifying uncertainty in overlay measurement is most difficult work in overlay metrology. According to the ITRS roadmap, total overlay budget is getting tighter than former device node as a design rule shrink on each device node. Conventionally, the total overlay budget is defined as the square root of square sum of the following contributions: the scanner overlay performance, wafer process, metrology and mask registration. All components have been supplying sufficiently performance tool to each device nodes, delivering new scanner, new metrology tools, and new mask e-beam writers. Especially the scanner overlay performance was drastically decreased from 9nm in 8x node to 2.5nm in 3x node. The scanner overlay seems to reach the limitation the overlay performance after 3x nod. The importance of the wafer process overlay as a contribution of total wafer overlay became more important. In fact, the wafer process overlay was decreased by 3nm between DRAM 8x node and DRAM 3x node. We develop an analytical algorithm for overlay accuracy. And a concept of nondestructive method is proposed in this paper. For on product layer we discovered the layer has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. In this paper, authors suggest an analytical algorithm for overlay accuracy. And a concept of non-destructive method is proposed in this paper. For on product layers, we discovered it has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. Furthermore

  2. Fabrication of magnetic bubble memory overlay

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Self-contained magnetic bubble memory overlay is fabricated by process that employs epitaxial deposition to form multi-layered complex of magnetically active components on single chip. Overlay fabrication comprises three metal deposition steps followed by subtractive etch.

  3. Meeting overlay requirements for future technology nodes with in-die overlay metrology

    NASA Astrophysics Data System (ADS)

    Schulz, Bernd; Seltmann, Rolf; Busch, Jens; Hempel, Fritjof; Cotte, Eric; Alles, Benjamin

    2007-03-01

    As a consequence of the shrinking sizes of the integrated circuit structures, the overlay budget shrinks as well. Overlay is traditionally measured with relatively large test structures which are located in the scribe line of the exposure field, in the four corners. Although the performance of the overlay metrology tools has improved significantly over time it is questionable if this traditional method of overlay control will be sufficient for future technology nodes. For advanced lithography techniques like double exposure or double patterning, in-die overlay is critical and it is important to know how much of the total overlay budget is consumed by in-die components. We reported earlier that small overlay targets were included directly inside die areas and good performance was achieved. This new methodology enables a wide range of investigations. This provides insight into processes which were less important in the past or not accessible for metrology. The present work provides actual data from productive designs, instead of estimates, illustrating the differences between the scribe line and in-die registration and overlay. The influence of the pellicle on pattern placement on mask and wafer overlay is studied. Furthermore the registration overlay error of the reticles is correlated to wafer overlay residuals. The influence of scanner-induced distortions (tool to tool differences) on in-die overlay is shown. Finally, the individual contributors to in-die-overlay are discussed in the context of other overlay contributors. It is proposed to use in-die overlay and registration results to derive guidelines for future overlay and registration specifications. It will be shown that new overlay correction schemes which take advantage of the additional in-die overlay information need to be considered for production.

  4. TES overlayed on MOLA DEM

    NASA Technical Reports Server (NTRS)

    1999-01-01

    This image is TES thermal data (Orbit 222) overlayed on the MOLA DEM. The color scale is TES T18-T25, which is a cold spot index. The grey scale is MOLA elevation in kilometers. Most cold spots can be attributed to surface spectral emissivity effects. Regions that are colored black-violet-blue have near unity emissivity and are coarse grained CO2. Regions that are yellow-red are fined grained CO2. The red-white spot located approximately 300W85N is our most likely candidate for a CO2 snow storm.

  5. Overlays for classroom and optometric use.

    PubMed

    Wilkins, A

    1994-01-01

    Perceptual distortion of printed text can sometimes be reduced by placing upon the page a sheet of coloured plastic (overlay). The colour that best reduces the distortion differs from one individual to another and may need to be selected with precision. A set of overlays has been developed that samples the CIE UCS diagram systematically. The overlays are robust and have a matte finish. They can be combined in an intuitive way to provide a wide range of chromaticities. PMID:7512256

  6. Total overlay analysis for designing future aligner

    NASA Astrophysics Data System (ADS)

    Magome, Nobutaka; Kawai, Hidemi

    1995-05-01

    We found total overlay with respect to optical lithography using an approach similar to quality control technique employed at a semiconductor factory. This approach involves an aligner performance, process quality, reticle error and overlay measurement. This paper further describes new ides for the number of machines to be used for matching and data collection period. Lastly, improvement on total overlay and a prospective view for a future aligner and its usage are also described.

  7. Flutter Analysis of the Shuttle Tile Overlay Repair Concept

    NASA Technical Reports Server (NTRS)

    Bey, Kim S.; Scott, Robert C.; Bartels, Robert E.; Waters, William A.; Chen, Roger

    2007-01-01

    The Space Shuttle tile overlay repair concept, developed at the NASA Johnson Space Center, is designed for on-orbit installation over an area of damaged tile to permit safe re-entry. The thin flexible plate is placed over the damaged area and secured to tile at discreet points around its perimeter. A series of flutter analyses were performed to determine if the onset of flutter met the required safety margins. Normal vibration modes of the panel, obtained from a simplified structural analysis of the installed concept, were combined with a series of aerodynamic analyses of increasing levels of fidelity in terms of modeling the flow physics to determine the onset of flutter. Results from these analyses indicate that it is unlikely that the overlay installed at body point 1800 will flutter during re-entry.

  8. On-demand Overlay Networks for Large Scientific Data Transfers

    SciTech Connect

    Ramakrishnan, Lavanya; Guok, Chin; Jackson, Keith; Kissel, Ezra; Swany, D. Martin; Agarwal, Deborah

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  9. Analysis Of Overlay Distortion Patterns

    NASA Astrophysics Data System (ADS)

    Armitage, John D.; Kirk, Joseph P.

    1988-01-01

    A comprehensive geometrical approach is presented for the least-squares analysis of overlay distortion patterns into useful, physically meaningful systematic distortion subpatterns and an essentially non-systematic residue. A scheme of generally useful distortion sub-patterns is presented in graphic and algorithmic form; some of these sub-patterns are additions to those already in widespread use. A graphic and geometric approach is emphasized rather than an algebraic or statistical approach, and an example illustrates the value in utilizing the pattern-detecting ability of the eye-brain system. The conditions are described under which different distortion sub-patterns may interact, possibly leading to misleading or erroneous conclusions about the types and amounts of different distortions present. Examples of typical interaction situations are given, and recommendations are made for analytic procedures to avoid misinterpretation. It is noted that the lower-order distortion patterns preserve straight-line linearity, but that higher-order distortion may result in straight lines becoming curved. The principle of least-squares analysis is outlined and a simple polynomial data-fitting example is used to illustrate the method. Algorithms are presented for least-squares distortion analysis of overlay patterns, and an APL2 program is given to show how this may easily be implemented on a digital computer. The appendix extends the treatment to cases where small-angle approximation is not permissible.

  10. Women and Private Pensions.

    ERIC Educational Resources Information Center

    Benson, Helene A.

    This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…

  11. CFDP for Interplanetary Overlay Network

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol for Interplanetary Overlay Network (CFDP-ION) is an implementation of CFDP that uses IO' s DTN (delay tolerant networking) implementation as its UT (unit-data transfer) layer. Because the DTN protocols effect automatic, reliable transmission via multiple relays, CFDP-ION need only satisfy the requirements for Class 1 ("unacknowledged") CFDP. This keeps the implementation small, but without loss of capability. This innovation minimizes processing resources by using zero-copy objects for file data transmission. It runs without modification in VxWorks, Linux, Solaris, and OS/X. As such, this innovation can be used without modification in both flight and ground systems. Integration with DTN enables the CFDP implementation itself to be very simple; therefore, very small. Use of ION infrastructure minimizes consumption of storage and processing resources while maximizing safety.

  12. Device overlay method for high volume manufacturing

    NASA Astrophysics Data System (ADS)

    Lee, Honggoo; Han, Sangjun; Kim, Youngsik; Kim, Myoungsoo; Heo, Hoyoung; Jeon, Sanghuck; Choi, DongSub; Nabeth, Jeremy; Brinster, Irina; Pierson, Bill; Robinson, John C.

    2016-03-01

    Advancing technology nodes with smaller process margins require improved photolithography overlay control. Overlay control at develop inspection (DI) based on optical metrology targets is well established in semiconductor manufacturing. Advances in target design and metrology technology have enabled significant improvements in overlay precision and accuracy. One approach to represent in-die on-device as-etched overlay is to measure at final inspection (FI) with a scanning electron microscope (SEM). Disadvantages to this approach include inability to rework, limited layer coverage due to lack of transparency, and higher cost of ownership (CoO). A hybrid approach is investigated in this report whereby infrequent DI/FI bias is characterized and the results are used to compensate the frequent DI overlay results. The bias characterization is done on an infrequent basis, either based on time or triggered from change points. On a per-device and per-layer basis, the optical target overlay at DI is compared with SEM on-device overlay at FI. The bias characterization results are validated and tracked for use in compensating the DI APC controller. Results of the DI/FI bias characterization and sources of variation are presented, as well as the impact on the DI correctables feeding the APC system. Implementation details in a high volume manufacturing (HVM) wafer fab will be reviewed. Finally future directions of the investigation will be discussed.

  13. Interacting epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Funk, Sebastian; Jansen, Vincent A. A.

    2010-03-01

    The interaction between multiple pathogens spreading on networks connecting a given set of nodes presents an ongoing theoretical challenge. Here, we aim to understand such interactions by studying bond percolation of two different processes on overlay networks of arbitrary joint degree distribution. We find that an outbreak of a first pathogen providing immunity to another one spreading subsequently on a second network connecting the same set of nodes does so most effectively if the degrees on the two networks are positively correlated. In that case, the protection is stronger the more heterogeneous the degree distributions of the two networks are. If, on the other hand, the degrees are uncorrelated or negatively correlated, increasing heterogeneity reduces the potential of the first process to prevent the second one from reaching epidemic proportions. We generalize these results to cases where the edges of the two networks overlap to arbitrary amount, or where the immunity granted is only partial. If both processes grant immunity to each other, we find a wide range of possible situations of coexistence or mutual exclusion, depending on the joint degree distribution of the underlying networks and the amount of immunity granted mutually. These results generalize the concept of a coexistence threshold and illustrate the impact of large-scale network structure on the interaction between multiple spreading agents.

  14. 26 CFR 1.141-2 - Private activity bond tests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... test and private security or payment test of section 141(b) or the private loan financing test of section 141(c). The private business use and private security or payment tests are described in §§ 1.141-3... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Private activity bond tests. 1.141-2 Section...

  15. 26 CFR 1.141-2 - Private activity bond tests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... test and private security or payment test of section 141(b) or the private loan financing test of section 141(c). The private business use and private security or payment tests are described in §§ 1.141-3... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Private activity bond tests. 1.141-2 Section...

  16. A moving overlay shrinks the attentional blink.

    PubMed

    Chua, Fook K

    2015-01-01

    This report describes a study examining the effects of overlaying a veil of spots on the letters in a central rapid serial visual presentation stream. Observers identified two target letters (T1 and T2, respectively) embedded in a stream of distractor letters printed in a different color. In Experiment 1, the attentional blink (AB) diminished when a different overlay veiled each letter, such that the spots appeared to move as the letters changed. Experiment 2 concerned whether the performance enhancement occurred because the overlay hampered processing of the lag 1 distractor, thus weakening the distractor's interference with T1. Experiment 3 focused on how changing the overlay at or around T1 affected the AB. The attention disengagement hypothesis was proposed to explain the common theme in the results-that performance was only enhanced when different overlays were applied to the T1 and lag 1 frames. The claim is that the AB reflects a failure of prompt attentional disengagement from T1, which, in turn, delays reengagement when T2 appears shortly thereafter. When T1's disappearance is accompanied by an overlay change, the perceptual system gets an additional cue signaling that the visual scene has changed, thereby inducing attentional disengagement. Apart from facilitating prompt reengagement at the next target, earlier disengagement also improves target recovery by excluding features of the trailing item, likely to be a distractor, from working memory. PMID:25245077

  17. Scatterometry or imaging overlay: a comparative study

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that

  18. Polymer concrete overlay on SH-51, bridge deck

    NASA Astrophysics Data System (ADS)

    Borg, T. M.

    1982-06-01

    A thin resinous overlay was placed on a sound bridge deck in Oklahoma to evaluate its performance over one year using various physical tests. The evaluation shows how well the overlay protects the reinforcing steel from corrosion due to deicing salts. The steps leading to the construction of the overlay are detailed as well as the actual placing of the overlay. The results of various physical tests are reported for both before and after the overlay.

  19. Epitaxial interactions between molecular overlayers and ordered substrates

    NASA Astrophysics Data System (ADS)

    Hillier, Andrew C.; Ward, Michael D.

    1996-11-01

    A framework for evaluating the epitaxy of crystalline organic overlayers of generic symmetry on ordered substrates is described, which combines a computationally efficient analytical method for explicit determination of the type of epitaxy (i.e., commensurism, coincidence, or incommensurism) and overlayer azimuthal orientation with an analysis of the elastic properties of the overlayer and the overlayer-substrate interface. The azimuthal orientations predicted by the analytical method agree with values predicted by semiempirical potential-energy calculations and observed experimentally for previously reported organic overlayers which are demonstrated here to be coincident. Calculations based on this analytical approach are much less computationally intensive than potential-energy calculations, as the number of computational operations is independent of the overlayer size chosen for analysis. This enables analyses to be performed for the large overlayer basis sets common for molecular overlayers. Furthermore, this facilitates the analysis of coincident overlayers, for which the overlayer size needs to be large enough to establish a phasing relationship between a substrate and a large nonprimitive overlayer supercell so that the global minimum with respect to azimuthal angle can be determined. The computational efficiency of this method also enables a convenient examination of numerous possible reconstructed overlayer configurations in which the lattice parameters are bracketed around those of the native overlayer, thereby allowing examination of possible epitaxy-driven overlayer reconstructions. When combined with calculated intralayer- and overlayer-substrate elastic constants, this method provides a strategy for the design of heteroepitaxial molecular films.

  20. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Not Available

    1994-11-01

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB`s.

  1. Solidification of an alloy 625 weld overlay

    SciTech Connect

    DuPont, J.N.

    1996-11-01

    The solidification behavior (microsegregation, secondary phase formation, and solidification temperature range) of an Alloy 625 weld overlay deposited on 2.25Cr-1Mo steel by gas metal arc welding was investigated by light and electron optical microscopy, electron microprobe, and differential thermal analysis techniques. The overlay deposit was found to terminate solidification at {approx}1,216 C by a {gamma}/Laves eutectic-type reaction. The Laves phase was highly enriched in Nb, Mo, and Si. The solidification reaction and microsegregation potential of major alloying elements in the overlay deposit are compared to other Nb-bearing Ni base alloys and found to be very similar to those for Alloy 718. Solidification cracks observed in the overlay were attributed to the wide solidification temperature range ({approx}170 C) and formation of interdendritic ({gamma} + Laves) constituent. Reasonable agreement is obtained between the calculated and measured volume percent ({gamma} + Laves) constituent with the Scheil equation by treating the overlay system as a simple {gamma}-Nb binary and using an experimentally determined k{sub Nb} value from electron microprobe data.

  2. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  3. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  4. Weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  5. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  6. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  7. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-04-18

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based on a literature review These alloys have been separated into three major groups: (1) Cobalt containing alloys, (2) Nickel-base alloys, (3) Iron base alloys. These alloys are being applied to carbon steel substrates and will undergo preliminary erosion testing to identify candidates weld overlay alloys for erosion control in CFB boilers. The candidate alloys selected from the preliminary erosion tests will then undergo more detailed evaluations in future research.

  8. KML Super Overlay to WMS Translator

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  9. Hybrid overlay metrology for high order correction by using CDSEM

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Halder, Sandip; Lorusso, Gian; Baudemprez, Bart; Inoue, Osamu; Okagawa, Yutaka

    2016-03-01

    Overlay control has become one of the most critical issues for semiconductor manufacturing. Advanced lithographic scanners use high-order corrections or correction per exposure to reduce the residual overlay. It is not enough in traditional feedback of overlay measurement by using ADI wafer because overlay error depends on other process (etching process and film stress, etc.). It needs high accuracy overlay measurement by using AEI wafer. WIS (Wafer Induced Shift) is the main issue for optical overlay, IBO (Image Based Overlay) and DBO (Diffraction Based Overlay). We design dedicated SEM overlay targets for dual damascene process of N10 by i-ArF multi-patterning. The pattern is same as device-pattern locally. Optical overlay tools select segmented pattern to reduce the WIS. However segmentation has limit, especially the via-pattern, for keeping the sensitivity and accuracy. We evaluate difference between the viapattern and relaxed pitch gratings which are similar to optical overlay target at AEI. CDSEM can estimate asymmetry property of target from image of pattern edge. CDSEM can estimate asymmetry property of target from image of pattern edge. We will compare full map of SEM overlay to full map of optical overlay for high order correction ( correctables and residual fingerprints).

  10. Differential signal scatterometry overlay metrology: an accuracy investigation

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Adel, Mike; Dinu, Berta; Golovanevsky, Boris; Izikson, Pavel; Levinski, Vladimir; Vakshtein, Irina; Leray, Philippe; Vasconi, Mauro; Salski, Bartlomiej

    2007-06-01

    The overlay control budget for the 32nm technology node will be 5.7nm according to the ITRS. The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty (TMU) requirements of 0.57nm for the most challenging use cases of the 32nm node. The current state of the art imaging overlay metrology technology does not meet this strict requirement, and further technology development is required to bring it to this level. In this work we present results of a study of an alternative technology for overlay metrology - Differential signal scatterometry overlay (SCOL). Theoretical considerations show that overlay technology based on differential signal scatterometry has inherent advantages, which will allow it to achieve the 32nm technology node requirements and go beyond it. We present results of simulations of the expected accuracy associated with a variety of scatterometry overlay target designs. We also present our first experimental results of scatterometry overlay measurements, comparing this technology with the standard imaging overlay metrology technology. In particular, we present performance results (precision and tool induced shift) and address the issue of accuracy of scatterometry overlay. We show that with the appropriate target design and algorithms scatterometry overlay achieves the accuracy required for future technology nodes.

  11. Colors, colored overlays, and reading skills

    PubMed Central

    Uccula, Arcangelo; Enna, Mauro; Mulatti, Claudio

    2014-01-01

    In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e., who experience eyestrain and/or visual distortions – e.g., color, shape, or movement illusions – while reading. This condition would interest the 12–14% of the general population and up to the 46% of the dyslexic population. Thus, colored overlays have been largely employed as a remedy for some aspects of the difficulties in reading experienced by dyslexic individuals, as fluency and speed. Despite the wide use of colored overlays, how they exert their effects has not been made clear yet. Also, according to some researchers, the results supporting the efficacy of colored overlays as a tool for helping readers are at least controversial. Furthermore, the very nature of the Meares-Irlen syndrome has been questioned. Here we provide a concise, critical review of the literature. PMID:25120525

  12. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    Levin, B. F.; Dupont, J. N.; Marder, A. R.

    1994-01-01

    Research is being conducted to develop criteria for selecting weld overlay coatings for erosion mitigation in circulated fluidized beds. Twelve weld overlay alloys were deposited on 1018 steel substrates using plasma arc welding. Ten samples from each coating were prepared for erosion testing. All selected coatings were erosion tested at 400C and their erosion resistance and microstructure evaluated. Steady state erosion rates were similar for several weld overlay coatings (Ultimet, Inconel-625, Iron-Aluminide, 316L SS, and High Chromium Cast Iron) and were considerably lower than the remaining coating evaluated. These coatings had different base (Co, Fe, Ni-base). No correlations were found between room temperature microhardness of the weld overlay coatings and their erosion resistance at elevated temperature, although this criteria is often thought to be an indicator of erosion resistance. It was suggested that the coatings that showed similar erosion rates may have similar mechanical properties such as fracture strength, toughness and work hardening rates at this temperature. During the past quarter, Iron-Aluminide, Inconel-625, and 316L SS coatings were selected for more detailed investigations based upon the preliminary erosion test results. Microhardness tests were performed on eroded samples to determine the size of the work hardened zone and change in coatings hardness due to erosion. The work hardened zone was correlated with erosion resistance of the coatings. Additional Iron-Aluminide, Inconel-625, and 316L SS coatings were deposited on 1018 steel substrates.

  13. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California legislation…

  14. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  15. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  16. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  17. Overlay Tolerances For VLSI Using Wafer Steppers

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Rice, Rory

    1988-01-01

    In order for VLSI circuits to function properly, the masking layers used in the fabrication of those devices must overlay each other to within the manufacturing tolerance incorporated in the circuit design. The capabilities of the alignment tools used in the masking process determine the overlay tolerances to which circuits can be designed. It is therefore of considerable importance that these capabilities be well characterized. Underestimation of the overlay accuracy results in unnecessarily large devices, resulting in poor utilization of wafer area and possible degradation of device performance. Overestimation will result in significant yield loss because of the failure to conform to the tolerances of the design rules. The proper methodology for determining the overlay capabilities of wafer steppers, the most commonly used alignment tool for the production of VLSI circuits, is the subject of this paper. Because cost-effective manufacturing process technology has been the driving force of VLSI, the impact on productivity is a primary consideration in all discussions. Manufacturers of alignment tools advertise the capabilities of their equipment. It is notable that no manufacturer currently characterizes his aligners in a manner consistent with the requirements of producing very large integrated circuits, as will be discussed. This has resulted in the situation in which the evaluation and comparison of the capabilities of alignment tools require the attention of a lithography specialist. Unfortunately, lithographic capabilities must be known by many other people, particularly the circuit designers and the managers responsible for the financial consequences of the high prices of modern alignment tools. All too frequently, the designer or manager is confronted with contradictory data, one set coming from his lithography specialist, and the other coming from a sales representative of an equipment manufacturer. Since the latter generally attempts to make his

  18. Overlay improvement by ASML HOWA 5th alignment strategy

    NASA Astrophysics Data System (ADS)

    Wang, Raf; Chiang, CY; Hsu, Wilson; Yang, Richer; Shih, Todd; Chen, Jackie; Chiu, Jonathan; Lin, Wythe

    2009-12-01

    Overlay control is more challenging when DRAM volume production continues to shrink its critical dimention (CD) to 70nm and beyond. Effected by process, the overlay behavior at wafer edge is quite different from wafer center. The big contribution to worse overlay at wafer edge which causes yield loss is misalignment. The analysis in wafer edge suggests that high order uncorrectable overlay residuals are often observed by certain process impact. Therefore, the basic linear model used for alignment correction is not sufficient and it is necessary to introduce an advanced alignment correction model for wafer edge overlay improvement. In this study, we demonstrated the achievement of moderating the poor overlay at wafer edge area by using a high order wafer alignment strategy. The mechanism is to use non-linear correction methods of high order models ( up to 5th order), with support by the function High Order Wafer Alignment (known as HOWA) in scanner. Instead of linear model for the 6 overlay parameters which come from average result, HOWA alignment strategy can do high order fitting through the wafer to get more accurate overlay parameters which represent the local wafer grid distortion better. As a result, the overlay improvement for wafer edge is achieved. Since alignment is a wafer dependent correction, with HOWA the wafer to wafer overlay variation can be improved dynamically as well. In addition, the effects of different mark quantity and sampling distribution from HOWA are also introduced in this paper. The results of this study indicate that HOWA can reduce uncorrectable overlay residual by 30~40% and improve wafer-to-wafer overlay variation significantly. We conclude that HOWA is a noteworthy strategy for overlay improvement. Moreover, optimized alignment mark numbers and distribution layout are also key factors to make HOWA successful.

  19. Privatizing Australia

    SciTech Connect

    Burr, M.T.

    1995-07-01

    The sun is setting on Australia`s long tradition of state involvement in business. As part of efforts begun in the late-1980`s to stem the tide of debt rising within Australian federal and state treasuries, government-owned entities are being corporatized and privatized, and private companies are sponsoring a large share of the country`s new infrastructure projects.

  20. Privatizing Maintenance.

    ERIC Educational Resources Information Center

    Hounsell, Dan

    1996-01-01

    Schools and other government facilities want to see whether privatization of maintenance can provide services as efficiently and at less cost than inhouse workers. Privatization proponents say that everyone will benefit the most if the bidding process involves competition. Offers examples from the Memphis City Schools and the Union Public Schools…

  1. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  2. Experimental AC (Asphalt Concrete) overlays of PCC pavement

    NASA Astrophysics Data System (ADS)

    Smith, R. D.

    1983-11-01

    A series of experimental asphalt concrete (AC) overlays was constructed over an existing distressed portland cement concrete pavement on Interstate 80 near Boca, California. The experimental overlays included rubberized dense-graded AC, rubberized open-graded AC, a rubber flush coat interlayer, dense-graded AC with short polyester fibers and Bituthene interlayer strips. The report presents a description and discussion of AC mix batching, construction observations, laboratory testing, overlay covering, and initial performance evaluation.

  3. Highly corrosion resistant weld overlay for oil patch applications

    SciTech Connect

    Hibner, E.L.; Maligas, M.N.; Vicic, J.C.

    1994-12-31

    Petroleum equipment companies currently sell 4130 and 4140 steel pipe with alloy 625 (UNS N06625) weld overlay for Oil Patch applications. Alloy 686 (UNS N06686), because of it`s superior corrosion resistance, is currently being evaluated as a replacement material for alloy 625. Mechanical properties and Slow Strain Rate test results for the alloy 686 weld overlay are discussed relative to the alloy 625 weld overlay.

  4. Sampling for advanced overlay process control

    NASA Astrophysics Data System (ADS)

    Choi, DongSub; Izikson, Pavel; Sutherland, Doug; Sherman, Kara; Manka, Jim; Robinson, John C.

    2008-03-01

    Overlay metrology and control have been critical for successful advanced microlithography for many years, and are taking on an even more important role as time goes on. Due to throughput constraints it is necessary to sample only a small subset of overlay metrology marks, and typical sample plans are static over time. Standard production monitoring and control involves measuring sufficient samples to calculate up to 6 linear correctables. As design rules shrink and processing becomes more complex, however, it is necessary to consider higher order modeled terms for control, fault detection, and disposition. This in turn, requires a higher level of sampling. Due to throughput concerns, however, careful consideration is needed to establish a base-line sampling, and higher levels of sampling can be considered on an exception-basis based on automated trigger mechanisms. The goal is improved scanner control and lithographic cost of ownership. This study addresses tools for establishing baseline sampling as well as motivation and initial results for dynamic sampling for application to higher order modeling.

  5. Sampling for advanced overlay process control

    NASA Astrophysics Data System (ADS)

    Kato, Cindy; Kurita, Hiroyuki; Izikson, Pavel; Robinson, John C.

    2009-03-01

    Overlay metrology and control have been critical for successful advanced microlithography for many years, and are taking on an even more important role as time goes on. Due to throughput constraints it is necessary to sample only a small subset of overlay metrology marks, and typical sample plans are static over time. Standard production monitoring and control involves measuring sufficient samples to calculate up to 6 linear correctables. As design rules shrink and processing becomes more complex, however, it is necessary to consider higher order models with additional degrees of freedom for control, fault detection, and disposition. This in turn, requires a higher level of sampling and a careful consideration of flyer removal. Due to throughput concerns, however, careful consideration is needed to establish a baseline sampling plan using rigorous statistical methods. This study focuses on establishing a 3x nm node immersion lithography production-worthy sampling plan for 3rd order modeling, verification of the accuracy, and proof of robustness of the sampling. In addition we discuss motivation for dynamic sampling for application to higher order modeling.

  6. Investigation of Iron Aluminide Weld Overlays

    SciTech Connect

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  7. Pragmatic privatization

    SciTech Connect

    Bernstein, S.

    1995-10-01

    Chile was probably the first country in the world to privatize under a decentralized and competitive framework a former state-owned power sector. Power sector privatization was conducted with pragmatism, particularly in terms of the speed with which the changes occurred. In fact, the earliest privatization did not occur until 1980 and the process was not completed until early 1990. The privatized Chilean electric industry has performed fairly well in terms of the investments carried out not only in the power sector, but also in other economic activities and in foreign countries. The diversification of ownership and the competitive framework have been an incentive to reach efficiency and a guaranty for the stability of the rules of the game in the long run.

  8. Real cell overlay measurement through design based metrology

    NASA Astrophysics Data System (ADS)

    Yoo, Gyun; Kim, Jungchan; Park, Chanha; Lee, Taehyeong; Ji, Sunkeun; Jo, Gyoyeon; Yang, Hyunjo; Yim, Donggyu; Yamamoto, Masahiro; Maruyama, Kotaro; Park, Byungjun

    2014-04-01

    Until recent device nodes, lithography has been struggling to improve its resolution limit. Even though next generation lithography technology is now facing various difficulties, several innovative resolution enhancement technologies, based on 193nm wavelength, were introduced and implemented to keep the trend of device scaling. Scanner makers keep developing state-of-the-art exposure system which guarantees higher productivity and meets a more aggressive overlay specification. "The scaling reduction of the overlay error has been a simple matter of the capability of exposure tools. However, it is clear that the scanner contributions may no longer be the majority component in total overlay performance. The ability to control correctable overlay components is paramount to achieve the desired performance.(2)" In a manufacturing fab, the overlay error, determined by a conventional overlay measurement: by using an overlay mark based on IBO and DBO, often does not represent the physical placement error in the cell area of a memory device. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion, caused by etching or CMP, also can be a source of the mismatch. Therefore, the requirement of a direct overlay measurement in the cell pattern gradually increases in the manufacturing field, and also in the development level. In order to overcome the mismatch between conventional overlay measurement and the real placement error of layer to layer in the cell area of a memory device, we suggest an alternative overlay measurement method utilizing by design, based metrology tool. A basic concept of this method is shown in figure1. A CD-SEM measurement of the overlay error between layer 1 and 2 could be the ideal method but it takes too long time to extract a lot of data from wafer level. An E-beam based DBM tool provides high speed to cover the whole wafer with high repeatability. It is enabled by using the design as a

  9. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  10. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  11. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  12. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  13. Overlay measurement accuracy enhancement by design and algorithm

    NASA Astrophysics Data System (ADS)

    Lee, Honggoo; Lee, Byongseog; Han, Sangjun; Kim, Myoungsoo; Kwon, Wontaik; Park, Sungki; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Itzkovich, Tal; Amir, Nuriel; Volkovich, Roie; Herzel, Eitan; Wagner, Mark; El Kodadi, Mohamed

    2015-03-01

    Advanced design nodes require more complex lithography techniques, such as double patterning, as well as advanced materials like hard masks. This poses new challenge for overlay metrology and process control. In this publication several step are taken to face these challenges. Accurate overlay metrology solutions are demonstrated for advanced memory devices.

  14. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1995-08-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions have limited their use in applications where good weldability is required. Using hot crack testing techniques invented at ORNL, and experimental determinations of preheat and postweld heat treatment needed to avoid cold cracking, we have developed iron aluminide filler metal compositions which can be successfully used to weld overlay clad various substrate materials, including 9Cr-1Mo steel, 2-1/4Cr-1Mo steel, and 300-series austenitic stainless steels. Dilution must be carefully controlled to avoid crack-sensitive deposit compositions. The technique used to produce the current filler metal compositions is aspiration-casting, i.e. drawing the liquid from the melt into glass rods. Future development efforts will involve fabrication of composite wires of similar compositions to permit mechanized gas tungsten arc (GTA) and/or gas metal arc (GMA) welding.

  15. Improving text recognition by distinguishing scene and overlay text

    NASA Astrophysics Data System (ADS)

    Quehl, Bernhard; Yang, Haojin; Sack, Harald

    2015-02-01

    Video texts are closely related to the content of a video. They provide a valuable source for indexing and interpretation of video data. Text detection and recognition task in images or videos typically distinguished between overlay and scene text. Overlay text is artificially superimposed on the image at the time of editing and scene text is text captured by the recording system. Typically, OCR systems are specialized on one kind of text type. However, in video images both types of text can be found. In this paper, we propose a method to automatically distinguish between overlay and scene text to dynamically control and optimize post processing steps following text detection. Based on a feature combination a Support Vector Machine (SVM) is trained to classify scene and overlay text. We show how this distinction in overlay and scene text improves the word recognition rate. Accuracy of the proposed methods has been evaluated by using publicly available test data sets.

  16. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1996-11-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions limited their use to applications where good weldability was not required. Considerable progress has been made toward improving this situation. Using hot crack testing techniques developed at ORNL and a systematic study of alloy compositional effects, we have established a range of compositions within which hot cracking resistance is very good, essentially equivalent to stainless steel. Cold cracking, however, remains an issue, and extensive efforts are continuing to optimize composition and welding parameters, especially preheat and postweld heat treatment, to minimize its occurrence. In terms of filler metal and process development, we have progressed from sheared strip through aspiration cast rod and shielded metal arc electrodes to the point where we can now produce composite wire with a steel sheath and aluminum core in coil form, which permits the use of both the gas tungsten arc and gas metal arc processes. This is a significant advancement in that the gas metal arc process lends itself well to automated welding, and is the process of choice for commercial weld overlay applications. Using the newly developed filler metals, we have prepared clad specimens for testing in a variety of environments both in-house and outside ORNL, including laboratory and commercial organizations. As a means of assessing the field performance of this new type of material, we have modified several non-pressure boundary boiler components, including fuel nozzles and port shrouds, by introducing areas of weld overlay in strategic locations, and have placed these components in service in operating boilers for a side-by-side comparison with conventional corrosion-resistant materials.

  17. Prolonged use of coloured overlays for classroom reading.

    PubMed

    Jeanes, R; Busby, A; Martin, J; Lewis, E; Stevenson, N; Pointon, D; Wilkins, A

    1997-11-01

    Ninety-three children in a primary school and 59 children in two first-year classes of a secondary school were asked individually to observe a paragraph of random letters arranged to resemble text, and to compare the perceptual effects on its clarity of coloured plastic sheets overlaid on the text. A total of 29 colours were compared using 10 coloured plastic sheets and 19 pairwise combinations of sheets, one superimposed on another. The resulting colours sampled CIE 1976 hue angle (huv) and saturation (suv) systematically and efficiently. All the children who reported beneficial perceptual effects (53 per cent) were given their preferred overlay or combination of overlays to use as and when they wished. When the children were examined three months later the children tended to choose a colour similar to one they had chosen previously. Ten months later, 22 per cent of those offered the overlaps were still using them of their own volition. These children, but not those who had ceased to use their overlay(s), read randomly ordered simple words more quickly with their overlay than without. In a second independent group of children referred to the Norfolk Sensory Support Service, who used overlays routinely, the reading speed was similar with a grey or clear overlay; and slower than with the chosen coloured overlay, suggesting that reduction of contrast was not the critical factor. In a third independent group of children in a primary school in Kent, the increase in reading speed with the chosen overlay predicted the children who continued to use their overlay during the ensuing eight weeks. PMID:9415962

  18. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... Infrastructure Private Sector Clearance Program (PSCP). DHS previously published this ICR in the Federal...

  19. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance...

  20. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false No private right of action. 205.7 Section 205.7 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARDS OF PROFESSIONAL CONDUCT FOR ATTORNEYS APPEARING AND PRACTICING BEFORE THE COMMISSION IN THE REPRESENTATION OF AN ISSUER § 205.7 No private right...

  1. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service to obtain debt collection...

  2. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service to obtain debt collection...

  3. Private advantage

    SciTech Connect

    Marier, D.; Stoiaken, L.

    1988-03-01

    At least a half dozen independent power producers put out initial public offerings in 1985-86 and the experts were projecting more to come. Most executives of private development companies admitted that they had at least taken a hard look at going public. Several quarters worth of disappointing earnings and the October market crash have brought attention back to the activities of private companies. Fortunately for the industry, at about the same time public-equity markets were closing down, new sources of debt and equity were entering the field in a big way-including insurance companies, pension funds, and utilities. While the development should be good news for all companies in the field (private equity is not necessarily earmarked for private companies), the impact of the crash has made it more difficult for public companies to make their case to the new equity players. The newest players, the unregulated utility subsidiaries, the fastest growing segment in the industry, are probably in a position to put a major dent in the business.

  4. Envelopment technique and topographic overlays in bite mark analysis

    PubMed Central

    Djeapragassam, Parimala; Daniel, Mariappan Jonathan; Srinivasan, Subramanian Vasudevan; Ramadoss, Koliyan; Jimsha, Vannathan Kumaran

    2015-01-01

    Aims and Objectives: The aims and objectives of our study were to compare four sequential overlays generated using the envelopment technique and to evaluate inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Materials and Methods: Dental stone models were prepared from impressions made from healthy individuals; photographs were taken and computer-assisted overlays were generated. The models were then enveloped in a different-color dental stone. After this, four sequential cuts were made at a thickness of 1mm each. Each sectional cut was photographed and overlays were generated. Thus, 125 overlays were generated and compared. Results: The scoring was done based on matching accuracy and the data were analyzed. The Kruskal-Wallis one-way analysis of variance (ANOVA) test was used to compare four sequential overlays and Spearman's rank correlation tests were used to evaluate the inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Conclusion: Through our study, we conclude that the third and fourth cuts were the best among the four cuts and inter- and intraoperator reliability were found to be statistically significant at 5% level that is 95% confidence interval (P < 0.05). PMID:26816458

  5. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration of... pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240... and transition reports pursuant to sections 13 and 15(d), and shell company reports required...

  6. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1997-12-01

    The author has established a range of compositions for these alloys within which hot cracking resistance is very good, and within which cold cracking can be avoided in many instances by careful control of welding conditions, particularly preheat and postweld heat treatment. For example, crack-free butt welds have been produced for the first time in 12-mm thick wrought Fe{sub 3}Al plate. Cold cracking, however, still remains an issue in many cases. The author has developed a commercial source for composite weld filler metals spanning a wide range of achievable aluminum levels, and are pursuing the application of these filler metals in a variety of industrial environments. Welding techniques have been developed for both the gas tungsten arc and gas metal arc processes, and preliminary work has been done to utilize the wire arc process for coating of boiler tubes. Clad specimens have been prepared for environmental testing in-house, and a number of components have been modified and placed in service in operating kraft recovery boilers. In collaboration with a commercial producer of spiral weld overlay tubing, the author is attempting to utilize the new filler metals for this novel application.

  7. Lithography aware overlay metrology target design method

    NASA Astrophysics Data System (ADS)

    Lee, Myungjun; Smith, Mark D.; Lee, Joonseuk; Jung, Mirim; Lee, Honggoo; Kim, Youngsik; Han, Sangjun; Adel, Michael E.; Lee, Kangsan; Lee, Dohwa; Choi, Dongsub; Liu, Zephyr; Itzkovich, Tal; Levinski, Vladimir; Levy, Ady

    2016-03-01

    We present a metrology target design (MTD) framework based on co-optimizing lithography and metrology performance. The overlay metrology performance is strongly related to the target design and optimizing the target under different process variations in a high NA optical lithography tool and measurement conditions in a metrology tool becomes critical for sub-20nm nodes. The lithography performance can be quantified by device matching and printability metrics, while accuracy and precision metrics are used to quantify the metrology performance. Based on using these metrics, we demonstrate how the optimized target can improve target printability while maintaining the good metrology performance for rotated dipole illumination used for printing a sub-100nm diagonal feature in a memory active layer. The remaining challenges and the existing tradeoff between metrology and lithography performance are explored with the metrology target designer's perspective. The proposed target design framework is completely general and can be used to optimize targets for different lithography conditions. The results from our analysis are both physically sensible and in good agreement with experimental results.

  8. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  9. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  10. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  11. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  12. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  13. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  14. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  15. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  16. Diffraction based overlay metrology for α-carbon applications

    NASA Astrophysics Data System (ADS)

    Saravanan, Chandra Saru; Tan, Asher; Dasari, Prasad; Goelzer, Gary; Smith, Nigel; Woo, Seouk-Hoon; Shin, Jang Ho; Kang, Hyun Jae; Kim, Ho Chul

    2008-03-01

    Applications that require overlay measurement between layers separated by absorbing interlayer films (such as α- carbon) pose significant challenges for sub-50nm processes. In this paper scatterometry methods are investigated as an alternative to meet these stringent overlay metrology requirements. In this article, a spectroscopic Diffraction Based Overlay (DBO) measurement technique is used where registration errors are extracted from specially designed diffraction targets. DBO measurements are performed on detailed set of wafers with varying α-carbon (ACL) thicknesses. The correlation in overlay values between wafers with varying ACL thicknesses will be discussed. The total measurement uncertainty (TMU) requirements for these layers are discussed and the DBO TMU results from sub-50nm samples are reviewed.

  17. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  18. Augmenting reality in Direct View Optical (DVO) overlay applications

    NASA Astrophysics Data System (ADS)

    Hogan, Tim; Edwards, Tim

    2014-06-01

    The integration of overlay displays into rifle scopes can transform precision Direct View Optical (DVO) sights into intelligent interactive fire-control systems. Overlay displays can provide ballistic solutions within the sight for dramatically improved targeting, can fuse sensor video to extend targeting into nighttime or dirty battlefield conditions, and can overlay complex situational awareness information over the real-world scene. High brightness overlay solutions for dismounted soldier applications have previously been hindered by excessive power consumption, weight and bulk making them unsuitable for man-portable, battery powered applications. This paper describes the advancements and capabilities of a high brightness, ultra-low power text and graphics overlay display module developed specifically for integration into DVO weapon sight applications. Central to the overlay display module was the development of a new general purpose low power graphics controller and dual-path display driver electronics. The graphics controller interface is a simple 2-wire RS-232 serial interface compatible with existing weapon systems such as the IBEAM ballistic computer and the RULR and STORM laser rangefinders (LRF). The module features include multiple graphics layers, user configurable fonts and icons, and parameterized vector rendering, making it suitable for general purpose DVO overlay applications. The module is configured for graphics-only operation for daytime use and overlays graphics with video for nighttime applications. The miniature footprint and ultra-low power consumption of the module enables a new generation of intelligent DVO systems and has been implemented for resolutions from VGA to SXGA, in monochrome and color, and in graphics applications with and without sensor video.

  19. Coloured overlays and their effects on reading speed: a review.

    PubMed

    Wilkins, Arnold

    2002-09-01

    Coloured overlays can reduce symptoms of visual stress and improve reading speed. These benefits are reliable and are not attributable simply to placebo effects. Five percent of children in mainstream education read at least 25% more quickly with an overlay, provided they have chosen the colour. The suboptimal design of children's text and the high level of classroom lighting may be partly responsible. PMID:12358317

  20. Overlay improvements using a real time machine learning algorithm

    NASA Astrophysics Data System (ADS)

    Schmitt-Weaver, Emil; Kubis, Michael; Henke, Wolfgang; Slotboom, Daan; Hoogenboom, Tom; Mulkens, Jan; Coogans, Martyn; ten Berge, Peter; Verkleij, Dick; van de Mast, Frank

    2014-04-01

    While semiconductor manufacturing is moving towards the 14nm node using immersion lithography, the overlay requirements are tightened to below 5nm. Next to improvements in the immersion scanner platform, enhancements in the overlay optimization and process control are needed to enable these low overlay numbers. Whereas conventional overlay control methods address wafer and lot variation autonomously with wafer pre exposure alignment metrology and post exposure overlay metrology, we see a need to reduce these variations by correlating more of the TWINSCAN system's sensor data directly to the post exposure YieldStar metrology in time. In this paper we will present the results of a study on applying a real time control algorithm based on machine learning technology. Machine learning methods use context and TWINSCAN system sensor data paired with post exposure YieldStar metrology to recognize generic behavior and train the control system to anticipate on this generic behavior. Specific for this study, the data concerns immersion scanner context, sensor data and on-wafer measured overlay data. By making the link between the scanner data and the wafer data we are able to establish a real time relationship. The result is an inline controller that accounts for small changes in scanner hardware performance in time while picking up subtle lot to lot and wafer to wafer deviations introduced by wafer processing.

  1. Residual stresses in weld overlay tubes: A finite element study

    SciTech Connect

    Taljat, B.; Zacharia, T.; Wang, X.L.; Keiser, J.R.; Feng, Z.; Jirinec, M.J.

    1997-01-03

    Residual stresses and strains in a tube with circumferential weld overlay were analyzed by the finite element (FE) method. The objective of this work was to develop and verify a FE model, to determine the magnitude and distribution of residual stresses in the weld overlay tube, and to evaluate the significance of two contributing factors to residual stress: (1) difference in material properties between tube and weld material, and (2) thermal gradients in the weld. An axisymmetric FE model was developed to simulate the circumferential two-layer welding process of alloy 625 overlay on SA210 tube. The first layer was modeled as a gas metal arc welding process with filler metal, whereas the autogenous gas tungsten arc welding process was modeled for the second layer. Neutron diffraction technique was used to experimentally determine residual elastic strains in the weld overlay tube. Comparison with the FE results shows overall good agreement. Both the experimental and FE results show high compressive stresses at the inside tube surface and high tensile stresses in the weld overlay. This suggests that weld overlay may be used to relieve tensile or produce compressive stresses at the inside tube surface, which is significant for applications where crack initiation is found at the root pass of the joining weld.

  2. ``Electric growth`` of metal overlayers on semiconductor substrates

    SciTech Connect

    Zhang, Z.; Cho, J.H. |; Niu, Q.; Shih, C.K.; Suo, Z.

    1998-02-01

    In this article, the authors present the main results from their recent studies of metal overlayer growth on semiconductor substrates. They show that a variety of novel phenomena can exist in such systems, resulting from several competing interactions. The confined motion of the conduction electrons within the metal overlayer can mediate a surprisingly long-range repulsive force between the metal-semiconductor interface and the growth front, acting to stabilize the overlayer. Electron transfer from the overlayer to the substrate leads to an attractive force between the two interfaces, acting to destabilize the overlayer. Interface-induced Friedel oscillations in electron density can further impose an oscillatory modulation onto the two previous interactions. These three competing factors, of all electronic nature, can make a flat metal overlayer critically, marginally, or magically stable, or totally unstable against roughening. The authors further show that, for many systems, these electronic effects can easily win over the effect of stress. First-principles studies of a few representative systems support the main features of the present electronic growth concept.

  3. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  4. Peru privatizes

    SciTech Connect

    Suttil, K.R.

    1993-02-01

    Peru has been undergoing a revolution since the election of Alberto Fujimori as president in 1990. A revolution that is reversing many of the policies of the past 25 years and one which aims to bring Peru back into the mainstream of the world economy. All the enterprises nationalized in the heady days of the early 1970s are set up for privatization. The most important are the three mining companies: Hierro-Peru, Centromin, and Mineroo-Peru. It will not be easy to attract foreign investment after such a long period of political and economic instability but the rewards are there for the intrepid.

  5. Overlay progress in EUV lithography towards adoption for manufacturing

    NASA Astrophysics Data System (ADS)

    Hermans, Jan V.; Laidler, David; Pigneret, Charles; van Dijk, Andre; Voznyi, Oleg; Dusa, Mircea; Hendrickx, Eric

    2011-04-01

    Extreme Ultra-Violet (EUV) lithography is a candidate for semiconductor manufacturing for the 16nm technology node and beyond. Due to the very short wavelength of 13.5nm, EUV lithography provides the capability to continue single exposure scaling with improved resolution and higher pattern fidelity compared to 193nm immersion lithography. However, reducing the wavelength brings new equipment and process challenges. To enable EUV photon transmission through the optical system, the entire optical path of an EUV exposure tool operates under vacuum, and in addition reticle and optics are reflective. To obtain the required CD and overlay performance, both wafer and reticle front surfaces need to have near-perfect flatness, as non-flatness directly contributes to focus and image placement errors, in the case of the reticle due to non-telecentricity. Traditional vacuum chucks, both for reticle and wafer, cannot be used and are replaced by electrostatic chucks. Any contribution of this new clamping method on CD and overlay control therefore needs to be investigated, including avoidance of particle contamination over time. This work was performed on ASML's EUV Alpha Demo Tool (ADT). We investigated the different, non-conventional contributions to overlay control on the ADT, with particular attention to the wafer clamping performance of the exposure chuck. We demonstrate that we were able to improve the overlay performance by compensating for the wafer clamping error during the wafer alignment sequence. The impact of different wafer types on overlay was also evaluated. In addition to clamping effects, thermal effects have also been shown to impact overlay and were evaluated by monitoring the thermal behavior of a wafer during exposure on the ADT and correlating to the resulting overlay.

  6. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or noncompliance... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false No private right of...

  7. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or noncompliance... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false No private right of...

  8. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false No private right of action... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or...

  9. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false No private right of action... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or...

  10. Large dynamic range Atomic Force Microscope for overlay improvements

    NASA Astrophysics Data System (ADS)

    Kuiper, Stefan; Fritz, Erik; Crowcombe, Will; Liebig, Thomas; Kramer, Geerten; Witvoet, Gert; Duivenvoorde, Tom; Overtoom, Ton; Rijnbeek, Ramon; van Zwet, Erwin; van Dijsseldonk, Anton; den Boef, Arie; Beems, Marcel; Levasier, Leon

    2016-03-01

    Nowadays most overlay metrology tools assess the overlay performance based on marker features which are deposited next to the functional device features within each layer of the semiconductor device. However, correct overlay of the relatively coarse marker features does not directly guarantee correct overlay of the much smaller device features. This paper presents the development of a tool that allows to measure the relative distance between the marker and device features within each layer of the semiconductor device, which can be used to improve the overlay at device feature level. In order to be effective, the marker to device feature distance should be measured with sub-nanometer measurement uncertainty over several millimeters range. Furthermore, the tool should be capable of profiling the marker features to allows prediction of the location interpretation of the optical diffraction based alignment sensors, which are sensitive for potential asymmetry of the marker features. To enable this, a highly stable Atomic Force Microscope system is being developed. The probe is positioned relative to the wafer with a 6DOF controlled hexapod stage, which has a relatively large positioning range of 8x8mm. The position and orientation of this stage is measured relative to the wafer using 6 interferometers via a highly stable metrology frame. A tilted probe concept is utilized to allow profiling of the high aspect ratio marker and device features. Current activities are aimed at demonstrating the measurement capabilities of the developed AFM system.

  11. Overlay metrology solutions in a triple patterning scheme

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Mao, Ming; Baudemprez, Bart; Amir, Nuriel

    2015-03-01

    Overlay metrology tool suppliers are offering today several options to their customers: Different hardware (Image Based Overlay or Diffraction Based Overlay), different target designs (with or without segmentation) or different target sizes (from 5 um to 30 um). All these variations are proposed to resolve issues like robustness of the target towards process variations, be more representative of the design or increase the density of measurements. In the frame of the development of a triple patterning BEOL scheme of 10 nm node layer, we compare IBO targets (standard AIM, AIMid and multilayer AIMid). The metrology tools used for the study are KLA-Tencor's nextgeneration Archer 500 system (scatterometry- and imaging-based measurement technologies on the same tool). The overlay response and fingerprint of these targets will be compared using a very dense sampling (up to 51 pts per field). The benefit of indie measurements compared to the traditional scribes is discussed. The contribution of process effects to overlay values are compared to the contribution of the performance of the target. Different targets are combined in one measurement set to benefit from their different strengths (performance vs size). The results are summarized and possible strategies for a triple patterning schemes are proposed.

  12. Instructional geographic information science Map overlay and spatial abilities

    NASA Astrophysics Data System (ADS)

    Tricot, Thomas Alexander, II

    The fundamental goal of this study is to determine if the complex spatial concept of map overlay can be effectively learned by young adolescents through the utilization of an instructional technique based within the foundations of Instructional Geographic Information Science (InGIScience). Percent correct and reaction times were the measures used to analyze the ability of young adolescents to learn the intersect, erase, and union functions of map overlay. The ability to solve for missing inputs, output, or function was also analyzed. Young adolescents of the test group scored higher percent correct and recorded faster reaction times than those of the control group or adults of the expert group by the end of the experiment. The intersect function of map overlay was more difficult in terms of percent correct and reaction time than the erase or union functions. Solving for the first or second input consistently resulted in lower percent correct and higher reaction times throughout the experiment. No overall performance differences were shown to exist between males and females. Results of a subjective "real-world" test also indicated learning by young adolescents. This study has shown that the practice of repetitive instruction and testing has proven effective for enhancing spatial abilities with regard to the map overlay concept. This study found that with practice, young adolescents can learn the map overlay concept and perform at levels equal to or greater than adults. This study has helped to answer the question of whether this development of spatial abilities is possible.

  13. Private database queries using one quantum state

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Zhang, Ming-Ou; Yang, Rui

    2015-03-01

    A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

  14. Tensile Bond Strength of Latex-Modified Bonded Concrete Overlays

    NASA Astrophysics Data System (ADS)

    Dubois, Cameron; Ramseyer, Chris

    2010-10-01

    The tensile bond strength of bonded concrete overlays was tested using the in-situ pull-off method described in ASTM C 1583 with the goal of determining whether adding latex to the mix design increases bond strength. One slab of ductile concrete (f'c > 12,000 psi) was cast with one half tined, i.e. roughened, and one half steel-troweled, i.e. smooth. The slab surface was sectioned off and overlay mixtures containing different latex contents cast in each section. Partial cores were drilled perpendicular to the surface through the overlay into the substrate. A tensile loading device applied a direct tensile load to each specimen and the load was increased until failure occurred. The tensile bond strength was then calculated for comparison between the specimens.

  15. Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    NASA Astrophysics Data System (ADS)

    Nakano, Tadashi; Okaie, Yutaka

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

  16. Constructing Overlay Networks with Short Paths and Low Communication Cost

    NASA Astrophysics Data System (ADS)

    Makikawa, Fuminori; Tsuchiya, Tatsuhiro; Kikuno, Tohru

    A Peer-To-Peer (P2P) application uses an overlay network which is a virtual network constructed over the physical network. Traditional overlay construction methods do not take physical location of nodes into consideration, resulting in a large amount of redundant traffic. Some proximity-aware construction methods have been proposed to address this problem. These methods typically connect nearby nodes in the physical network. However, as the number of nodes increases, the path length of a route between two distant nodes rapidly increases. To alleviate this problem, we propose a technique which can be incorporated in existing overlay construction methods. The idea behind this technique is to employ long links to directly connect distant nodes. Through simulation experiments, we show that using our proposed technique, networks can achieve small path length and low communication cost while maintaining high resiliency to failures.

  17. Tuning carrier density at complex oxide interface with metallic overlayer

    NASA Astrophysics Data System (ADS)

    Zhou, Y.; Shi, Y. J.; Jiang, S. W.; Yue, F. J.; Wang, P.; Ding, H. F.; Wu, D.

    2016-06-01

    We have systematically investigated the electronic transport properties of the LaAlO3/SrTiO3 interfaces with several different metal capping layers. The sheet carrier density can be tuned in a wide range by the metallic overlayer without changing the carrier mobility. The sheet carrier density variation is found to be linearly dependent on the size of metal work function. This behavior is explained by the mechanism of the charge transfer between the oxide interface and the metal overlayer across the LaAlO3 layer. Our results confirm the existence of a built-in electric field in LaAlO3 film with an estimated value of 67.7 eV/Å. Since the metallic overlayer is essential for devices, the present phenomena must be considered for future applications.

  18. 76 FR 80971 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight...

  19. 75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... Information Security Oversight Office (ISOO) announces the inaugural meeting of the State, Local, Tribal,...

  20. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... discuss the matters relating to the Classified National Security Information Program for State,...

  1. High-frequency nonreciprocal reflection from magnetic films with overlayers

    SciTech Connect

    Wang, Ying; Nie, Yan; Camley, R. E.

    2013-11-14

    We perform a theoretical study of the nonreciprocal reflection of high-frequency microwave radiation from ferromagnetic films with thin overlayers. Reflection from metallic ferromagnetic films is always near unity and shows no nonreciprocity. In contrast, reflection from a structure which has a dielectric overlayer on top of a film composed of insulated ferromagnetic nanoparticles or nanostructures can show significant nonreciprocity in the 75–80 GHz frequency range, a very high value. This can be important for devices such as isolators or circulators.

  2. Flexible TWDM PON with WDM overlay for converged services

    NASA Astrophysics Data System (ADS)

    Cheng, Ning

    2015-12-01

    This paper reviews recent developments of flexible TWDM PON (time- and wavelength-division multiplexed passive optical network) with pluggable transceivers for pay-as-you-grow deployment, load balancing, channel protection and power saving. Different architectures for TWDM PON with WDM (wavelength division multiplexed) overlay for converged broadband services are discussed and experimental results are presented for WDM overlay using low-cost self-seeded RSOA (reflective semiconductor optical amplifiers). Challenging issues and possible solutions for future evolution toward software defined flexible PONs (FlexPONs) are also discussed with respect to dynamic lambda flow, elastic bandwidth and flexible reach.

  3. Measured residual stresses in overlay pipe weldments removed from service

    SciTech Connect

    Shack, W.J.

    1985-02-01

    Surface and throughwall residual stresses were measured on an elbow-to-pipe weldment that had been removed from the Hatch-2 reactor about a year after the application of a weld overlay. The results were compared with experimental measurements on three mock-up weldments and with finite-element calculations. The comparison shows that there are significant differences in the form and magnitude of the residual stress distributions. However, even after more than a year of service, the residual stresses over most of the inner surface of the actual plant weldment with an overlay were strongly compressive. 3 refs., 7 figs.

  4. Recovery of Sublethally Injured Bacteria Using Selective Agar Overlays.

    ERIC Educational Resources Information Center

    McKillip, John L.

    2001-01-01

    This experiment subjects bacteria in a food sample and an environmental sample to conditions of sublethal stress in order to assess the effectiveness of the agar overlay method to recover sublethally injured cells compared to direct plating onto the appropriate selective medium. (SAH)

  5. Semantic overlay network for large-scale spatial information indexing

    NASA Astrophysics Data System (ADS)

    Zou, Zhiqiang; Wang, Yue; Cao, Kai; Qu, Tianshan; Wang, Zhongmin

    2013-08-01

    The increased demand for online services of spatial information poses new challenges to the combined filed of Computer Science and Geographic Information Science. Amongst others, these include fast indexing of spatial data in distributed networks. In this paper we propose a novel semantic overlay network for large-scale multi-dimensional spatial information indexing, called SON_LSII, which has a hybrid structure integrating a semantic quad-tree and Chord ring. The SON_LSII is a small world overlay network that achieves a very competitive trade-off between indexing efficiency and maintenance overhead. To create SON_LSII, we use an effective semantic clustering strategy that considers two aspects, i.e., the semantic of spatial information that peer holds in overlay network and physical network performances. Based on SON_LSII, a mapping method is used to reduce the multi-dimensional features into a single dimension and an efficient indexing algorithm is presented to support complex range queries of the spatial information with a massive number of concurrent users. The results from extensive experiments demonstrate that SON_LSII is superior to existing overlay networks in various respects, including scalability, maintenance, rate of indexing hits, indexing logical hops, and adaptability. Thus, the proposed SON_LSII can be used for large-scale spatial information indexing.

  6. Factors affecting the erosion resistance of weld overlays

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1996-12-31

    Research was conducted to study factors affecting the solid particle erosion resistance of weld overlay coatings. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400 C. Erosion resistance was evaluated by determining the steady state erosion rate. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at 30 and 90{degree} impact angles. Microhardness tests were performed on the eroded samples below the erosion surface to determine the size of the plastically deformed zone and it was found that one group of coatings deformed plastically as a result of the particle impact while the others did not. No correlations were found between average microhardness at 400 C and volumetric erosion rates for plastically deformed weld overlays. For this group of overlays erosion resistance was correlated to the area under the curve of microhardness versus distance from the eroded surface. The physical significance of this parameter is discussed. For coatings that did not deform plastically, an increase in average microhardness at 400 C led to an increase in their volumetric erosion rates. The possible erosion mechanisms for these coating groups are discussed.

  7. Promoting Learning of Instructional Design via Overlay Design Tools

    ERIC Educational Resources Information Center

    Carle, Andrew Jacob

    2012-01-01

    I begin by introducing Virtual Design Apprenticeship (VDA), a learning model--built on a solid foundation of education principles and theories--that promotes learning of design skills via overlay design tools. In VDA, when an individual needs to learn a new design skill or paradigm she is provided accessible, concrete examples that have been…

  8. Incidental Learning of Geospatial Concepts across Grade Levels: Map Overlay

    ERIC Educational Resources Information Center

    Battersby, Sarah E.; Golledge, Reginald G.; Marsh, Meredith J.

    2006-01-01

    In this paper, the authors evaluate map overlay, a concept central to geospatial thinking, to determine how it is naively and technically understood, as well as to identify when it is leaner innately. The evaluation is supported by results from studies at three grade levels to show the progression of incidentally learned geospatial knowledge as…

  9. 12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ON UPSTREAM EMBANKMENT OF DAM (FROM REPAIRS COMPLETED IN 1977) - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  10. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  11. BWR pipe crack and weld clad overlay studies

    SciTech Connect

    Shack, W.J.; Kassner, T.F.; Maiya, P.S.; Park, J.Y.; Ruther, W.E.; Rybicki, E.F.

    1985-10-01

    This paper presents results on (a) the influence of simulated BWR environments and temperature on the intergranular-stress-corrosion cracking (IGSCC) susceptibility of sensitized stainless steels (SS), (b) the stress-corrosion susceptibility of alternative piping materials, (c) analysis of field components to assess the effectiveness of in-service inspection techniques and the in-reactor performance of weld overlay repairs, and (d) finite-element analyses and experimental measurement of residual stresses in weldments with weld overlays. Fracture-mechanics crack-growth data are presented to confirm correlations between the critical corrosion potentials required to inhibit IGSCC and the level of impurities in the environment. Slow-strain-rate tests show that very low levels of impurities (25 ppb of sulfate) can produce suseptibility to transgranular-stress-corrosion cracking (TGSCC) in Type 316NG SS and that nitrogen levels is SS above 0.1 wt. % appear to increase susceptibility to TGSCC. Preliminary results on a German Type 347NG SS suggest that it is at least as resistant to TGSCC in impurity environments as Type 316NG SS. Measurements on overlay weldments removed from the Hatch-2 reactor confirm that compressive residual stresses are produced on the inner surface of the weldments by the overlay.

  12. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  13. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  14. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  15. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  16. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  17. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  18. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... Statements § 210.3-20 Currency for financial statements of foreign private issuers. (a) A foreign private... date shall be used if materially different. (c) If the financial statements of a foreign private...

  19. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... Statements § 210.3-20 Currency for financial statements of foreign private issuers. (a) A foreign private... date shall be used if materially different. (c) If the financial statements of a foreign private...

  20. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  1. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  2. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... private issuers. (a) A foreign private issuer, as defined in § 230.405 of this chapter, shall state... the financial statements of a foreign private issuer are stated in a currency of a country that...

  3. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  4. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  5. Throughput and Packet Delay Analysis of the Intermittent DCF for Overlay Access Networks

    NASA Astrophysics Data System (ADS)

    Adamis, Athanassios V.; Maliatsos, Konstantinos N.; Constantinou, Philip

    Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.

  6. Privatization and Education

    ERIC Educational Resources Information Center

    Dash, Neena

    2009-01-01

    This paper highlights emerging trends, programmes and policies in privatization of education in Western countries. These trends are educational vouchers, choice of private schools, private school liberalization, private contracting of specific services, tuition tax credits and deductions for parents ,subsidies and assistance grants to private…

  7. 78 FR 40761 - Proposed Renewal of Information Collection; Private Rental Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-08

    ... Office of the Secretary Proposed Renewal of Information Collection; Private Rental Survey AGENCY: Office... should reference OMB control number 1084-0033, ``Private Rental Survey''. FOR FURTHER INFORMATION CONTACT... Departments of the Interior (DOI), Agriculture, Commerce, Homeland Security, Justice, Transportation,...

  8. 17 CFR 270.18c-1 - Exemption of privately held indebtedness.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of privately held indebtedness. 270.18c-1 Section 270.18c-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.18c-1 Exemption of privately held indebtedness. The issuance or...

  9. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  10. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  11. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  12. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  13. 77 FR 70780 - Federal Acquisition Regulation; Submission for OMB Review; Contractors Performing Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Security Functions Outside the United States. A notice was published in the Federal Register at 77 FR 43039... Regulation; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United... 9000-0184, Contractors Performing Private Security Functions Outside the United States''. Follow...

  14. Quantum data locking for high-rate private communication

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Lloyd, Seth

    2015-03-01

    We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.

  15. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  16. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  17. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  18. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  19. Modeling the dynamical interaction between epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Marceau, Vincent; Noël, Pierre-André; Hébert-Dufresne, Laurent; Allard, Antoine; Dubé, Louis J.

    2011-08-01

    Epidemics seldom occur as isolated phenomena. Typically, two or more viral agents spread within the same host population and may interact dynamically with each other. We present a general model where two viral agents interact via an immunity mechanism as they propagate simultaneously on two networks connecting the same set of nodes. By exploiting a correspondence between the propagation dynamics and a dynamical process performing progressive network generation, we develop an analytical approach that accurately captures the dynamical interaction between epidemics on overlay networks. The formalism allows for overlay networks with arbitrary joint degree distribution and overlap. To illustrate the versatility of our approach, we consider a hypothetical delayed intervention scenario in which an immunizing agent is disseminated in a host population to hinder the propagation of an undesirable agent (e.g., the spread of preventive information in the context of an emerging infectious disease).

  20. Modeling of Co overlayers on Pd (111) from first principles

    NASA Astrophysics Data System (ADS)

    Uba, S.; Uba, L.; Antonov, V. N.

    2007-04-01

    The electronic, magnetic and magneto-optical properties of Co overlayers on Pd (1 1 1) substrate have been investigated by ab initio band structure calculations within the spin-polarized relativistic linear muffin-thin orbitals (LMTO) method and supercell approach. The role of the Co-Pd interface structure, the number of the Co atomic layers ( n Co ), as well as the spin-orbit interaction and induced Pd spin polarization, in formation of magneto-optical response of the structures for [ n CoCo/Pd (1 1 1)] system is shown. The sign reversal of the polar Kerr rotation obtained theoretically with decreasing thickness of Co overlayers agrees well with experiment. We will demonstrate the effectiveness of the extended numeric modeling of magneto-optical properties from first principles.

  1. Chlorine adsorption on Au(111): chlorine overlayer or surface chloride?

    PubMed

    Gao, Weiwei; Baker, Thomas A; Zhou, Ling; Pinnaduwage, Dilini S; Kaxiras, Efthimios; Friend, Cynthia M

    2008-03-19

    We report the first scanning tunneling microscope (STM) investigation, combined with density functional theory calculations, to resolve controversy regarding the bonding and structure of chlorine adsorbed on Au(111). STM experiments are carried out at 120 K to overcome instability caused by mobile species upon chlorine adsorption at room temperature. Chlorine adsorption initially lifts the herringbone reconstruction. At low coverages (<0.33 ML), chlorine binds to the top of Au(111)-(1 x 1) surface and leads to formation of an overlayer with (square root(3) x square root(3))R30 degree structure at 0.33 ML. At higher coverages, packing chlorine into an overlayer structure is no longer favored. Gold atoms incorporate into a complex superlattice of a Au-Cl surface compound. PMID:18290645

  2. Improved overlay metrology device correlation on 90-nm logic processes

    NASA Astrophysics Data System (ADS)

    Ueno, Atsushi; Tsujita, Kouichirou; Kurita, Hiroyuki; Iwata, Yasuhisa; Ghinovker, Mark; Poplawski, Jorge M.; Kassel, Elyakim; Adel, Mike E.

    2004-05-01

    Isolated and dense patterns were formed at process layers from gate through to back-end on wafers using a 90 nm logic device process utilizing ArF lithography under various lithography conditions. Pattern placement errors (PPE) between AIM grating and BiB marks were characterized for line widths varying from 1000nm to 140nm. As pattern size was reduced, overlay discrepancies became larger, a tendency which was confirmed by optical simulation with simple coma aberration. Furthermore, incorporating such small patterns into conventional marks resulted in significant degradation in metrology performance while performance on small pattern segmented grating marks was excellent. Finally, the data also show good correlation between the grating mark and specialized design rule feature SEM marks, with poorer correlation between conventional mark and SEM mark confirming that new grating mark significantly improves overlay metrology correlation with device patterns.

  3. CLIO — A Cross-Layer Information Service for Overlay Network Optimization

    NASA Astrophysics Data System (ADS)

    Haage, Dirk; Holz, Ralph; Niedermayer, Heiko; Laskov, Pavel

    New overlay-based services aim to provide properties like resilience, availability or QoS. To achieve this, automatic organization and optimization is required, which again demands accurate information on the network. Collecting and exchanging this data has a significant impact on the network, especially if several overlays are used on the same host. In this paper, we provide a survey of the current state of the art and identify challenges which must be addressed in order for new overlay-based services to be successful. We present our own solution CLIO, a cross-layer information service for overlays. CLIO provides information for the automatic creation and optimization of overlays. The service supports multiple overlays on the same node, the provided information is overlay-independent, and collected information is reused.

  4. Prepenetrant Etchant For Incology(R) 903 Weld Overlays

    NASA Technical Reports Server (NTRS)

    O'Tousa, Joseph E.; Thomas, Clark S.; Foster, Robert E.

    1990-01-01

    Etching solution developed for use prior to type-IVc penetrant inspection of Incology(R) 903 weld overlays. Formulated as follows: 80 g ferric chloride hexahydrate, 300 mL reagent-grade hydrochloric acid, 25 mL food- or reagent-grade phosphoric acid, and 100 mL ethylene glycol. Gives more reasonable range of etching time and reduces probability of overetching and resulting damage. Stored indefinitely.

  5. Diffusion Barriers to Increase the Oxidative Life of Overlay Coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Lei, Jih-Fen

    1999-01-01

    Currently, most blades and vanes in the hottest section of aero gas turbine engines require some type of coating for oxidation protection. Newly developed single crystal superalloys have the mechanical potential to operate at increasingly higher component temperatures. However, at these elevated temperatures, coating/substrate interdiffusion can shorten the protective life of the coating. Diffusion barriers between overlay coatings and substrates are being examined to extend the protective life of the coating. A previously- developed finite-difference diffusion model has been modified to predict the oxidative life enhancement due to use of a diffusion barrier. The original diffusion model, designated COSIM, simulates Al diffusion in the coating to the growing oxide scale as well as Al diffusion into the substrate. The COSIM model incorporates an oxide growth and spalling model to provide the rate of Al consumption during cyclic oxidation. Coating failure is predicted when the Al concentration at the coating surface drops to a defined critical level. The modified COSIM model predicts the oxidative life of an overlay coating when a diffusion barrier is present eliminating diffusion of Al from the coating into the substrate. Both the original and the modified diffusion models have been used to predict the effectiveness of a diffusion barrier in extending the protective life of a NiCrAl overlay coating undergoing cyclic oxidation at 1100 C.

  6. An Overlapping Structured P2P for REIK Overlay Network

    NASA Astrophysics Data System (ADS)

    Liu, Wenjun; Song, Jingjing; Yu, Jiguo

    REIK is based on a ring which embedded an inverse Kautz digraph, to enable multi-path P2P routing. It has the constant degree and the logarithmic diameter DHT scheme with constant congestion and Byzantine fault tolerance. However, REIK did not consider the interconnection of many independent smaller networks. In this paper, we propose a new approach to build overlay network, OLS-REIK which is an overlapping structured P2P for REIK overlay network. It is a more flexible interconnecting different REIK network. Peers can belong to several rings, allowing this interconnection. By connecting smaller structured overlay networks in an unstructured way, it provides a cost effective alternative to hierarchical structured P2P systems requiring costly merging. Routing of lookup messages is performed as in REIK within one ring, but a peer belonging to several rings forwards the request to the different rings it belongs to. Furthermore a small number of across point is enough to ensure a high exhaustiveness level.

  7. Overlay mark optimization using the KTD signal simulation system

    NASA Astrophysics Data System (ADS)

    Marchelli, Anat; Gutjahr, Karsten; Kubis, Michael; Sparka, Christian; Ghinovker, Mark; Navarra, Alessandra; Widmann, Amir

    2009-03-01

    As the overlay performance and accuracy requirements become tighter, the impact of process parameters on the target signal becomes more significant. Traditionally, in order to choose the optimum overlay target, several candidates are placed in the kerf area. The candidate targets are tested under different process conditions, before the target to be used in mass production is selected. The varieties of targets are left on the mass production mask and although they will not be used for overlay measurements they still consume kerf real estate. To improve the efficiency of the process we are proposing the KTD (KLA-Tencor Target Designer). It is an easy to use system that enables the user to select the optimum target based on advanced signal simulation. Implementing the KTD in production is expected to save 30% of kerf real estate due to more efficient target design process as well as reduced engineering time. In this work we demonstrate the capability of the KTD to simulate the Archer signal in the context of advanced DRAM processes. For several stacks we are comparing simulated target signals with the Archer100 signals. We demonstrate the robustness feature in the KTD application that enables the user to test the target sensitivity to process changes. The results indicate the benefit of using KTD in the target optimization process.

  8. Multicast Routing in Structured Overlays and Hybrid Networks

    NASA Astrophysics Data System (ADS)

    Wählisch, Matthias; Schmidt, Thomas C.

    Key-based routing has enabled efficient group communication on the application or service middleware layer, stimulated by the need of applications to access multicast. These developments follow a continuous debate about network layer multicast that had lasted for about 30 years history of the Internet. The IP host group model today still faces a strongly divergent state of deployment. In this chapter, we first review the key concepts of multicast and broadcast data distribution on structured overlays. Second, we perform a comprehensive theoretical analysis examining the different distribution trees constructed on top of a key-based routing layer. Characteristic performance measures of the multicast approaches are compared in detail and major structural differences are identified. Overlay multicast overcomes deployment problems on the price of a performance penalty. Hybrid approaches, which dynamically combine multicast in overlay and underlay, adaptively optimize group communication. We discuss current schemes along with its integration in common multicast routing protocols in the third part of this chapter. Finally, we reconsider and enhance approaches to a common API for group communication, which serves the requirements of data distribution and maintenance for multicast and broadcast on a middleware abstraction layer, and in particular facilitates hybrid multicast schemes.

  9. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1014) Fairness of the going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY...

  10. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF...

  11. Survival Rate of Resin and Ceramic Inlays, Onlays, and Overlays: A Systematic Review and Meta-analysis.

    PubMed

    Morimoto, S; Rebello de Sampaio, F B W; Braga, M M; Sesma, N; Özcan, M

    2016-08-01

    This systematic review and meta-analysis aimed to evaluate the survival rate of ceramic and resin inlays, onlays, and overlays and to identify the complication types associated with the main clinical outcomes. Two reviewers searched PubMed, EMBASE, and the Cochrane Central Register of Controlled Trials for articles published between 1983 through April 2015, conforming to Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines for systematic reviews. Clinical studies meeting the following criteria were included: 1) studies related to resin and ceramic inlays, onlays, and overlays; 2) prospective, retrospective, or randomized controlled trials conducted in humans; 3) studies with a dropout rate of less than 30%; and 4) studies with a follow-up longer than 5 y. Of 1,389 articles, 14 met the inclusion criteria. The meta-regression indicated that the type of ceramic material (feldspathic porcelain vs. glass-ceramic), study design (retrospective vs. prospective), follow-up time (5 vs. 10 y), and study setting (university vs. private clinic) did not affect the survival rate. Estimated survival rates for glass-ceramics and feldspathic porcelain were between 92% and 95% at 5 y (n = 5,811 restorations) and were 91% at 10 y (n = 2,154 restorations). Failures were related to fractures/chipping (4%), followed by endodontic complications (3%), secondary caries (1%), debonding (1%), and severe marginal staining (0%). Odds ratios (95% confidence intervals) were 0.19 (0.04 to 0.96) and 0.54 (0.17 to 1.69) for pulp vitality and type of tooth involved (premolars vs. molars), respectively. Ceramic inlays, onlays, and overlays showed high survival rates at 5 y and 10 y, and fractures were the most frequent cause of failure. PMID:27287305

  12. The Private Language Argument.

    ERIC Educational Resources Information Center

    Baker, Gordon

    1998-01-01

    Discusses the private language argument (PLA)--the argument against the possibility of a private language. Raises questions about the PLA, suggesting there are a number of problems that PLA interpretation generates and fails to resolve. (Author/JL)

  13. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-1, registration statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section 239.31 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms...

  14. 76 FR 6702 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... fees for comment on ] August 16, 2010 (75 FR 49932) and requested public comments during a 60-day... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency... transfer fee covenants and in certain related securities. Such covenants are adverse to the liquidity...

  15. Case study of virtual private network

    NASA Astrophysics Data System (ADS)

    Hernandez, Harold; Chung, Ping-Tsai

    2001-07-01

    In this study, business benefits for this Virtual Private Network (VPN) and protocols, techniques, equipments used in this VPN are reported. In addition, our design experience for fault tolerance, security and network management and administration on this VPN are showed. Finally, the issues for future planning of this VPN is addressed.

  16. Study of correlation between overlay and displacement measured by Coherent Gradient Sensing (CGS) interferometry

    NASA Astrophysics Data System (ADS)

    Mileham, Jeffrey; Tanaka, Yasushi; Anberg, Doug; Owen, David M.; Lee, Byoung-Ho; Bouche, Eric

    2016-03-01

    Within the semiconductor lithographic process, alignment control is one of the most critical considerations. In order to realize high device performance, semiconductor technology is approaching the 10 nm design rule, which requires progressively smaller overlay budgets. Simultaneously, structures are expanding in the 3rd dimension, thereby increasing the potential for inter-layer distortion. For these reasons, device patterning is becoming increasingly difficult as the portion of the overlay budget attributed to process-induced variation increases. After lithography, overlay gives valuable feedback to the lithography tool; however overlay measurements typically have limited density, especially at the wafer edge, due to throughput considerations. Moreover, since overlay is measured after lithography, it can only react to, but not predict the process-induced overlay. This study is a joint investigation in a high-volume manufacturing environment of the portion of overlay associated with displacement induced by a single process across many chambers. Displacement measurements are measured by Coherent Gradient Sensing (CGS) interferometry, which generates high-density displacement maps (>3 million points on a 300 mm wafer) such that the stresses induced die-by-die and process-by-process can be tracked in detail. The results indicate the relationship between displacement and overlay shows the ability to forecast overlay values before the lithographic process. Details of the correlation including overlay/displacement range, and lot-to-lot displacement variability are considered.

  17. Privatization in Education.

    ERIC Educational Resources Information Center

    Rehfuss, John

    1995-01-01

    Privatization calls for substantially trimming the scope and breadth of government services, replacing them with private or other nongovernmental operators. The attraction of privatization is reduced costs and increased management flexibility. To date, the arrangement has received substantial support from students and parents in situations that…

  18. Security message exchange interoperability scenarios

    SciTech Connect

    Tarman, Thomas

    1998-07-01

    This contribution describes three interoperability scenarios for the ATM Security Message Exchange (SME) protocol. These scenarios include network-wide signaling support for the Security Services Information Element, partial signaling support wherethe SSIE is only supported in private or workgroup ATM networks, and the case where the SSIE is nonsupported by any network elements (exceptthosethat implement security services). Explanatory text is proposed for inclusion infection 2.3 of the ATM Security Specification, Version 1.0.

  19. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  20. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  1. Combined overlay, focus and CD metrology for leading edge lithography

    NASA Astrophysics Data System (ADS)

    Ebert, Martin; Cramer, Hugo; Tel, Wim; Kubis, Michael; Megens, Henry

    2011-04-01

    As leading edge lithography moves to 22-nm design rules, low k1 technologies like double patterning are the new resolution enablers, and system control and setup are the new drivers to meet remarkably tight process requirements. The way of thinking and executing setup and control of lithography scanners is changing in four ways. First, unusually tight process tolerances call for very dense sampling [1], which in effect means measurements at high throughput combined with high order modeling and corrections to compensate for wafer spatial fingerprint. Second, complex interactions between scanner and process no longer allow separation of error sources through traditional metrology approaches, which are based on using one set of metrology tools and methods for setup and another for scanner performance control. Moreover, setup and control of overlay is done independently from CD uniformity, which in effect leads to independent and conflicting adjustments for the scanner. Third, traditional CD setup and control is based on the focus and dose calculated from their CD response and not from measurement of their effect on pattern profile, which allows a clean and orthogonal de-convolution of focus and dose variations across the wafer. Fourth, scanner setup and control has to take into consideration the final goal of lithography, which is the accurate printing of a complex pattern describing a real device layout. To this end we introduce a new setup and control metrology step: measuring-to-match scanner 1D and 2D proximity. In this paper we will describe the strategy for setup and control of overlay, focus, CD and proximity based on the YieldStarTM metrology tool and present the resulting performance. YieldStar-200 is a new, high throughput metrology tool based on a high numerical aperture scatterometer concept. The tool can be used stand-alone as well as integrated in a processing track. It is suitable for determining process offsets in X,Y and Z directions through Overlay

  2. 78 FR 75376 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTP-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... discuss matters relating to the Classified National Security Information Program for State, Local, Tribal... Administration; 700 Pennsylvania Avenue NW., Jefferson Room; Washington, DC 20408. FOR FURTHER...

  3. A basic guide to overlay design using nondestructive testing equipment data

    NASA Astrophysics Data System (ADS)

    Turner, Vernon R.

    1990-08-01

    The purpose of this paper is to provide a basic and concise guide to designing asphalt concrete (AC) overlays over existing AC pavements. The basis for these designs is deflection data obtained from nondestructive testing (NDT) equipment. This data is used in design procedures which produce required overlay thickness or an estimate of remaining pavement life. This guide enables one to design overlays or better monitor the designs being performed by others. This paper will discuss three types of NDT equipment, the Asphalt Institute Overlay Designs by Deflection Analysis and by the effective thickness method as well as a method of estimating remaining pavement life, correlations between NDT equipment and recent correlations in Washington State. Asphalt overlays provide one of the most cost effective methods of improving existing pavements. Asphalt overlays can be used to strengthen existing pavements, to reduce maintenance costs, to increase pavement life, to provide a smoother ride, and to improve skid resistance.

  4. Evaluation of Free-Riding Traffic Problem in Overlay Routing and Its Mitigation Method

    NASA Astrophysics Data System (ADS)

    Hasegawa, Go; Hiraoka, Yuichiro; Murata, Masayuki

    Recent research on overlay networks has revealed that user-perceived network performance could be improved by an overlay routing mechanism. The effectiveness of overlay routing is mainly a result of the policy mismatch between the overlay routing and the underlay IP routing operated by ISPs. However, this policy mismatch causes a “free-riding” traffic problem, which may become harmful to the cost structure of Internet Service Providers. In the present paper, we define the free-riding problem in the overlay routing and evaluate the degree of free-riding traffic to reveal the effect of the problem on ISPs. We introduce a numerical metric to evaluate the degree of the free-riding problem and confirm that most multihop overlay paths that have better performance than the direct path brings the free-riding problem. We also discuss the guidelines for selecting paths that are more effective than the direct path and that mitigate the free-riding problem.

  5. Effect of Perovskite Overlayers on TiO2 Electrodes in Perovskite-Sensitized Solar Cells.

    PubMed

    Kim, Kang-Pil; Kim, Jeong-Hwa; Hwang, Dae-Kue

    2016-05-01

    In this paper, we have studied the effect of the thickness of a CH3NH3PbI3 perovskite overlayer on mesoporous TiO2 electrodes in perovskite solar cells. The overlayers were prepared by spin coating PbI2 films on the electrodes, which were subsequently exposed to a CH3NH3I/2-propanol solution. We controlled the thickness of the perovskite overlayer by changing the PbI2 solution concentration. The thicknesses of the overlayers spin-coated from 0.5, 0.75, 0.9, and 1 M PbI2 solutions were approximately 179, 262, 316, and 341 nm, respectively. Perovskite solar cells with an approximately 316-nm-thick overlayer showed the highest efficiency of 9.11%. We conclude that optimization of the perovskite overlayer thickness in the solar cell structure is necessary to improve the cell efficiency. PMID:27483921

  6. Ductile film delamination from compliant substrates using hard overlayers

    PubMed Central

    Cordill, M.J.; Marx, V.M.; Kirchlechner, C.

    2014-01-01

    Flexible electronic devices call for copper and gold metal films to adhere well to polymer substrates. Measuring the interfacial adhesion of these material systems is often challenging, requiring the formulation of different techniques and models. Presented here is a strategy to induce well defined areas of delamination to measure the adhesion of copper films on polyimide substrates. The technique utilizes a stressed overlayer and tensile straining to cause buckle formation. The described method allows one to examine the effects of thin adhesion layers used to improve the adhesion of flexible systems. PMID:25641995

  7. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  8. Effect of a Dielectric Overlay on a Linearly Tapered Slot Antenna Excited by a Coplanar Waveguide

    NASA Technical Reports Server (NTRS)

    Simons, Rainee N.; Lee, Richard Q.; Perl, Thomas D.; Silvestro, John

    1993-01-01

    The effect of a dielectric overlay on a linearly tapered slot antenna (LTSA) is studied. The LTSA under study has very wide bandwidth and excellent radiation patterns. A dielectric overlay improves the patterns and directivity of the antenna by increasing the electrical length and effective aperture of the antenna. A dielectric overlay can also be used to reduce the physical length of the antenna without compromising the pattern quality.

  9. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...

  10. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...