Science.gov

Sample records for private overlays secure

  1. Using overlays to improve network security

    NASA Astrophysics Data System (ADS)

    Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel

    2002-07-01

    As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.

  2. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  3. Private Security Training. Phase 3: Private Investigator. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This curriculum guide provides instructional materials for the private investigator phase of a private security training course of study. Five units cover the following topics: understanding responsibilities to clients; interpreting laws of private investigations; complying with the Fair Credit Reporting Act; conducting investigations and…

  4. Private Security Training. Phase 2: Security Guard. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This module on private security guard training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains four instructional units that cover the following topics: (1) public relations; (2) performing fixed post…

  5. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  6. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  7. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  8. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  9. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  10. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    NASA Astrophysics Data System (ADS)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  11. Security of practical private randomness generation

    NASA Astrophysics Data System (ADS)

    Pironio, Stefano; Massar, Serge

    2013-01-01

    Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness in a device-independent way, i.e., without making detailed assumptions about the internal working of the quantum devices used to generate the random numbers. Furthermore these numbers are also private; i.e., they appear random not only to the user but also to any adversary that might possess a perfect description of the devices. Since this process requires a small initial random seed to sample the behavior of the quantum devices and to extract uniform randomness from the raw outputs of the devices, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold. First, we point out that in most real, practical situations, where the concept of device independence is used as a protection against unintentional flaws or failures of the quantum apparatuses, it is sufficient to show that the generated string is random with respect to an adversary that holds only classical side information; i.e., proving randomness against quantum side information is not necessary. Furthermore, the initial random seed does not need to be private with respect to the adversary, provided that it is generated in a way that is independent from the measured systems. The devices, however, will generate cryptographically secure randomness that cannot be predicted by the adversary, and thus one can, given access to free public randomness, talk about private randomness generation. The theoretical tools to quantify the generated randomness according to these criteria were already introduced in S. Pironio [Nature (London)NATUAS0028-083610.1038/nature09008 464, 1021 (2010)], but the final results were improperly formulated. The second aim of this paper is to correct this inaccurate formulation and therefore lay out a precise theoretical framework for practical device

  12. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  13. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  14. 48 CFR 225.370 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Contractors performing private security functions. 225.370 Section 225.370 Federal Acquisition Regulations System DEFENSE... Performed Outside the United States 225.370 Contractors performing private security functions....

  15. How to Keep Your Health Information Private and Secure

    MedlinePlus

    ... communities, such as message boards. · Store in a personal health record (PHR) that is not offered through ... information. Here are some tips to ensure your personal health information is private and secure when accessing ...

  16. Private Security Training. Phase 1: Basic. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…

  17. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  18. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  19. Private Security Training. Phase 4: Firearms Training. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This curriculum guide provides instructional materials for the firearms training phase of a private security training course of study. The seven units in the course cover the following topics: safety; revolver nomenclature and maintenance; inspecting revolvers and holsters; fundamentals of revolver shooting; legal issues and deadly force; range…

  20. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System... security functions. As prescribed in 225.370-6, insert the following clause: CONTRACTORS PERFORMING PRIVATE SECURITY FUNCTIONS (AUG 2011) (a) Definition. Private security functions means activities engaged in by...

  1. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  2. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  3. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Private resales of securities... COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.144A Private resales of... Security Act of 1974; (F) Any trust fund whose trustee is a bank or trust company and whose...

  4. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... RECORDS ADMINISTRATION Information Security Oversight Office; State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight...

  5. New holographic overlays

    NASA Astrophysics Data System (ADS)

    Hopwood, Anthony I.

    1991-10-01

    This paper discusses a new type of holographic overlay, FLASHPRINT, which may be used in both security and packaging applications. Unlike the more common embossed holograms currently used, FLASHPRINT leads to reduced set-up costs and offers a simpler process. This reduces the long lead times characteristic of the existing technology and requires the customer to provide only two-dimensional artwork. The overlay material contains a covert 2-D image. The image may be switched on or off by simply tilting the overlay in a light source. The overlay is replayed in the 'on' position to reveal the encoded security message as a highly saturated gold colored image. This effect is operable for a wide range of lighting conditions and viewing geometries. In the 'off' position the overlay is substantially transparent. These features make the visual effect of the overlay attractive to incorporate into product design. They may be laminated over complex printed artwork such as labels and security passes without masking the printed message. When switched 'on' the image appears both sharp and more than seven times brighter than white paper. The image remains sharp and clear even in less favorable lighting conditions. Although the technique offers a low set-up cost for the customer, through its simplicity, it remains as technically demanding and difficult to counterfeit as any holographic process.

  6. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 1 2013-10-01 2013-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  7. 48 CFR 25.302 - Contractors performing private security functions outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 1 2014-10-01 2014-10-01 false Contractors performing private security functions outside the United States. 25.302 Section 25.302 Federal Acquisition... Performed Outside the United States 25.302 Contractors performing private security functions outside...

  8. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  9. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  10. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware

  11. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... background checks), and security requirements established by 32 CFR part 159, Private Security Contractors... contract comply with 32 CFR part 159, and with any orders, directives, and instructions to Contractors... CFR part 159. Such action may be taken at the Government's discretion without prejudice to its...

  12. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  13. A New Method for Creating Efficient Security Policies in Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  14. "i3" Recipients Dash to Secure Private Match

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2010-01-01

    Winners of the Investing in Innovation (i3) competition scrambled to make a deadline to find private-sector matches for their multimillion-dollar federal awards, meeting the challenge through a mix of cash grants and donations of pricey equipment and services, and by rechanneling previous grants to new purposes. The 49 organizations selected to…

  15. A Needs Assessment Study and Curriculum Development for a Public and Private Security Program at Alvin Community College.

    ERIC Educational Resources Information Center

    Bethscheider, John

    A needs assessment for a community college curriculum in public and private security was conducted by surveying 50 high schools, four-year colleges, and private security agencies in the Alvin Community College area; 36 institutions responded. Findings revealed: most have a designated director of their security program; most would rather hire the…

  16. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms...

  17. Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication

    NASA Astrophysics Data System (ADS)

    Gong, Li-Hua; Liu, Ye; Zhou, Nan-Run

    2013-09-01

    Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.

  18. Selection, training and retention of an armed private security department.

    PubMed

    Hollar, David B

    2009-01-01

    To arm or not to arm security officers? One hospital which has opted for arming its officers is Cook Children's Healthcare System, Fort Worth, TX, an integrated pediatric healthcare facility with over 4000 employees. Because of its location in a major metropolitan area and based on several factors including demographics, exterior risk assessments and crime statistics, the hospital's Administration and its Risk Manager supported the decision to operate as an armed security force, according to the author. In this article he shares its current program and presents some thoughts and ideas that may benefit others who are considering this important step. PMID:19711796

  19. Generic Overlay Framework

    Energy Science and Technology Software Center (ESTSC)

    2005-09-01

    This software provides a framework for building application layter overlay networks. It includes example overlays that can be used without modification. Also provided are example multicast and routing protocols that can be used with the overlays.

  20. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 2 2014-10-01 2014-10-01 false Contractors Performing Private Security Functions Outside the United States. 52.225-26 Section 52.225-26 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION (CONTINUED) CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  1. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  2. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ...The DoD, GSA, and NASA are proposing to amend the Federal Acquisition Regulation (FAR) to implement Governmentwide requirements in National Defense Authorization Acts that establish minimum processes and requirements for the selection, accountability, training, equipping, and conduct of personnel performing private security functions outside the United...

  3. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  4. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ...This Rule establishes policy, assigns responsibilities and provides procedures for the regulation of the selection, accountability, training, equipping, and conduct of personnel performing private security functions under a covered contract during contingency operations, combat operations or other significant military operations. It also assigns responsibilities and establishes procedures for......

  5. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... countermeasures (other than the discharge of a weapon, including laser optical distracters, acoustic hailing...://www.bpn.gov/iuid/); and (iv) Reporting incidents in which— (A) A weapon is discharged by personnel... contractor personnel; (D) A weapon is discharged against personnel performing private security functions...

  6. 48 CFR 252.225-7039 - Contractors performing private security functions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Contractors performing private security functions. 252.225-7039 Section 252.225-7039 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions...

  7. Overlay accuracy fundamentals

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Levinski, Vladimir; Sapiens, Noam; Cohen, Guy; Amit, Eran; Klein, Dana; Vakshtein, Irina

    2012-03-01

    Currently, the performance of overlay metrology is evaluated mainly based on random error contributions such as precision and TIS variability. With the expected shrinkage of the overlay metrology budget to < 0.5nm, it becomes crucial to include also systematic error contributions which affect the accuracy of the metrology. Here we discuss fundamental aspects of overlay accuracy and a methodology to improve accuracy significantly. We identify overlay mark imperfections and their interaction with the metrology technology, as the main source of overlay inaccuracy. The most important type of mark imperfection is mark asymmetry. Overlay mark asymmetry leads to a geometrical ambiguity in the definition of overlay, which can be ~1nm or less. It is shown theoretically and in simulations that the metrology may enhance the effect of overlay mark asymmetry significantly and lead to metrology inaccuracy ~10nm, much larger than the geometrical ambiguity. The analysis is carried out for two different overlay metrology technologies: Imaging overlay and DBO (1st order diffraction based overlay). It is demonstrated that the sensitivity of DBO to overlay mark asymmetry is larger than the sensitivity of imaging overlay. Finally, we show that a recently developed measurement quality metric serves as a valuable tool for improving overlay metrology accuracy. Simulation results demonstrate that the accuracy of imaging overlay can be improved significantly by recipe setup optimized using the quality metric. We conclude that imaging overlay metrology, complemented by appropriate use of measurement quality metric, results in optimal overlay accuracy.

  8. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. PMID:21631459

  9. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD. PMID:26453195

  10. Security analysis of multi-party quantum private comparison protocol by model checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie; Luo, Qingbin; Wang, Yuqi

    2015-06-01

    This paper presents an analysis method for quantum information protocols based on model checking, with special focus on the quantum privacy comparison (QPC). The security properties of these protocols can be proved but in ways with much difficulty. Here we will discuss a probabilistic model checking tool — PRISM to verify specific properties of QPC protocol with multi-body and PRISM to verify specific properties of quantum private comparison (QPC) protocol with multi-party and d-dimensional entangled states.

  11. Enhacement of intrafield overlay using a design based metrology system

    NASA Astrophysics Data System (ADS)

    Jo, Gyoyeon; Ji, Sunkeun; Kim, Shinyoung; Kang, Hyunwoo; Park, Minwoo; Kim, Sangwoo; Kim, Jungchan; Park, Chanha; Yang, Hyunjo; Maruyama, Kotaro; Park, Byungjun

    2016-03-01

    As the scales of the semiconductor devices continue to shrink, accurate measurement and control of the overlay have been emphasized for securing more overlay margin. Conventional overlay analysis methods are based on the optical measurement of the overlay mark. However, the overlay data obtained from these optical methods cannot represent the exact misregistration between two layers at the circuit level. The overlay mismatch may arise from the size or pitch difference between the overlay mark and the real pattern. Pattern distortion, caused by CMP or etching, could be a source of the overlay mismatch as well. Another issue is the overlay variation in the real circuit pattern which varies depending on its location. The optical overlay measurement methods, such as IBO and DBO that use overlay mark on the scribeline, are not capable of defining the exact overlay values of the real circuit. Therefore, the overlay values of the real circuit need to be extracted to integrate the semiconductor device properly. The circuit level overlay measurement using CDSEM is time-consuming in extracting enough data to indicate overall trend of the chip. However DBM tool is able to derive sufficient data to display overlay tendency of the real circuit region with high repeatability. An E-beam based DBM(Design Based Metrology) tool can be an alternative overlay measurement method. In this paper, we are going to certify that the overlay values extracted from optical measurement cannot represent the circuit level overlay values. We will also demonstrate the possibility to correct misregistration between two layers using the overlay data obtained from the DBM system.

  12. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  13. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and on... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  14. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  15. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... List of CFR Sections Affected, which appears in the Finding Aids section of the printed volume and at... securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239... foreign private issuers issued in certain business combination transactions. This form may be used by...

  16. The effectiveness of an electronic security management system in a privately owned apartment complex.

    PubMed

    Greenberg, David F; Roush, Jeffrey B

    2009-02-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment buildings in New York City. Crime rates in a control apartment complex under the same ownership, and in the police precinct in which the 2 complexes are located, serve as controls. PMID:19001121

  17. Borrowing to save: a critique of recent proposals to partially privatize Social Security.

    PubMed

    Dattalo, Patrick

    2007-07-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs are more likely to be a problem than a solution. Paradoxically, PSAs require the government to borrow to encourage current workers to save. The author recommends resources to help social workers remain informed about proposed program reforms and prepared to advocate for the concept of social insurance. PMID:17850031

  18. SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage

    PubMed Central

    Toth, Csaba; Durham, Elizabeth; Kantarcioglu, Murat; Xue, Yuan; Malin, Bradley

    2014-01-01

    To mitigate bias in multi-institutional research studies, healthcare organizations need to integrate patient records. However, this process must be accomplished without disclosing the identities of the corresponding patients. Various private record linkage (PRL) techniques have been proposed, but there is a lack of translation into practice because no software suite supports the entire PRL lifecycle. This paper addresses this issue with the introduction of the Secure Open Enterprise Master Patient Index (SOEMPI). We show how SOEMPI covers the PRL lifecycle, illustrate the implementation of several PRL protocols, and provide a runtime analysis for the integration of two datasets consisting of 10,000 records. While the PRL process is slower than a non-secure setting, our analysis shows the majority of processes in a PRL protocol require several seconds or less and that SOEMPI completes the process in approximately two minutes, which is a practical amount of time for integration. PMID:25954421

  19. Secure Quantum Private Comparison of Equality Based on Asymmetric W State

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Liu, Chao; Wang, Hai-bin; Liu, Jing-Fa; Wang, Fang; Yuan, Xiao-Min

    2014-06-01

    Recently, Liu et al. (Opt. Commun. 284:3160, 2011) proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric W state. However, Li et al. (Eur. Phys. J. D 66:110, 2012) pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric W state, a secure QPCE protocol based on this asymmetric W state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.

  20. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  1. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  2. Enabling distributed simulation multilevel security using virtual machine and virtual private network technology

    NASA Astrophysics Data System (ADS)

    Stytz, Martin R.; Banks, Sheila B.

    2007-04-01

    Increasing the accuracy of the portrayal of all of the elements of a simulation environment has long been a prime goal of the modeling and simulation community; a goal that has remained far out of reach for many reasons. One of the greatest hurdles facing simulation developers in the effort to increase simulation accuracy is the need to segregate information across the entire simulation environment according to access restrictions in order to insure the integrity, security, and reliability requirements imposed on the data. However, this need for segregation does not mean that those with the highest access permissions should be forced to use multiple computers and displays to integrate the information that they need or that intelligent agents should be restricted in their access to the information that they need in order to adequately assist their human operators. In this paper, we present a potential solution to the problem of integrating and segregating data, which is the use of virtual machine and virtual private network technology in order to maintain segregation of data, control access, and control intercommunication.

  3. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  4. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  5. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  6. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... exchange registered under section 6 of the Exchange Act or quoted in a U.S. automated inter-dealer... securities listed on a national securities exchange or quoted in a U.S. automated inter-dealer quotation... principal trading markets. (e) Offers and sales of securities pursuant to this section shall be deemed...

  7. Campus Public Safety and Security, with Guidance as Well for High Schools and Private Secondary Schools.

    ERIC Educational Resources Information Center

    Wensyel, James W.

    Intended for school administrators from the middle school to the university level, the development and maintenance of an effective campus security program are discussed. The leadership role of the school's administrator is stressed and the use of security and safety teams, traffic studies and other measures, to identify security risks and evaluate…

  8. The business of medicine: how to overcome financial obstacles and secure financing for your private practice and ancillary services business.

    PubMed

    Nayor, David

    2012-01-01

    Doctors across the country who operate private medical practices are facing increasing financial obstacles, namely shrinking income as a result of rising costs and lower reimbursements. In addition, as hospitals have become overburdened many physicians have opened up private surgical centers; magnetic resonance imaging and computed tomography and positron emission tomography scanning facilities; pathology labs; colonoscopy/endoscopy suites; lithotripsy centers; and other medical businesses typically performed within the hospital. Moreover, many doctors seek loans to purchase existing practices or for their capital contribution in medical partnerships. The past decade has thus seen a significant increase in the number of doctors taking out small business loans. Indeed, banks view the healthcare industry as a large growth market. This article includes practical information, advice, and resources to help doctors to secure bank financing for their practices, ancillary services business, real estate, and equipment on the best possible market terms. PMID:22920034

  9. Accuracy in optical overlay metrology

    NASA Astrophysics Data System (ADS)

    Bringoltz, Barak; Marciano, Tal; Yaziv, Tal; DeLeeuw, Yaron; Klein, Dana; Feler, Yoel; Adam, Ido; Gurevich, Evgeni; Sella, Noga; Lindenfeld, Ze'ev; Leviant, Tom; Saltoun, Lilach; Ashwal, Eltsafon; Alumot, Dror; Lamhot, Yuval; Gao, Xindong; Manka, James; Chen, Bryan; Wagner, Mark

    2016-03-01

    In this paper we discuss the mechanism by which process variations determine the overlay accuracy of optical metrology. We start by focusing on scatterometry, and showing that the underlying physics of this mechanism involves interference effects between cavity modes that travel between the upper and lower gratings in the scatterometry target. A direct result is the behavior of accuracy as a function of wavelength, and the existence of relatively well defined spectral regimes in which the overlay accuracy and process robustness degrades (`resonant regimes'). These resonances are separated by wavelength regions in which the overlay accuracy is better and independent of wavelength (we term these `flat regions'). The combination of flat and resonant regions forms a spectral signature which is unique to each overlay alignment and carries certain universal features with respect to different types of process variations. We term this signature the `landscape', and discuss its universality. Next, we show how to characterize overlay performance with a finite set of metrics that are available on the fly, and that are derived from the angular behavior of the signal and the way it flags resonances. These metrics are used to guarantee the selection of accurate recipes and targets for the metrology tool, and for process control with the overlay tool. We end with comments on the similarity of imaging overlay to scatterometry overlay, and on the way that pupil overlay scatterometry and field overlay scatterometry differ from an accuracy perspective.

  10. Characterization of overlay mark fidelity

    NASA Astrophysics Data System (ADS)

    Adel, Mike; Ghinovker, Mark; Poplawski, Jorge M.; Kassel, Elyakim; Izikson, Pavel; Pollentier, Ivan K.; Leray, Philippe; Laidler, David W.

    2003-05-01

    In this publication we introduce a new metric for process robustness of overlay metrology in microelectronic manufacturing. By straightforward statistical analysis of overlay metrology measurements on an array of adjacent, nominally identical overlay targets the Overlay Mark Fidelity (OMF) can be estimated. We present the results of such measurements and analysis on various marks, which were patterned using a DUV scanner. The same reticle set was used to pattern wafers on different process layers and process conditions. By appropriate statistical analysis, the breakdown of the total OMF into a reticle-induced OMF component and a process induced OMF component was facilitated. We compare the OMF of traditional box-in-box overlay marks with that of new gratingbased overlay marks and show that in all cases the grating marks are superior. The reticle related OMF showed an improvement of 30 % when using the new grating-based overlay mark. Furthermore, in a series of wafers run through an STI-process with different Chemical Mechanical Polish (CMP) times, the random component of the OMF of the new grating-based overlay mark was observed to be 40% lower and 50% less sensitive to process variation compared with Box in Box marks. These two observations are interpreted as improved process robustness of the grating mark over box in box, specifically in terms of reduced site by site variations and reduced wafer to wafer variations as process conditions change over time. Overlay Mark Fidelity, as defined in this publication, is a source of overlay metrology uncertainty, which is statistically independent of the standard error contributors, i.e. precision, TIS variability, and tool to tool matching. Current overlay metrology budgeting practices do not take this into consideration when calculating total measurement uncertainty (TMU). It is proposed that this be reconsidered, given the tightness of overlay and overlay metrology budgets at the 70 nm design rule node and below.

  11. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV. PMID:20377597

  12. Electrically conductive polymer concrete overlays

    NASA Astrophysics Data System (ADS)

    Fontana, J. J.; Webster, R. P.

    1984-08-01

    The use of cathodic protection to prevent the corrosion of reinforcing steel in concrete structures has been well established. Application of a durable, skid-resistant electrically conductive polymer concrete overlay would advance the use of cathodic protection for the highway industry. Laboratory studies indicate that electrically conductive polymer concrete overlays using conductive fillers, such as calcined coke breeze, in conjunction with polyester or vinyl ester resins have resistivities of 1 to 10 ohm-cm. Both multiple-layer and premixed mortar-type overlays were made. Shear bond strengths of the conductive overlays to concrete substrates vary from 600 to 1300 psi, with the premixed overlays having bond strengths 50 to 100% higher than the multiple-layer overlays.

  13. Media delivery and media service overlays

    NASA Astrophysics Data System (ADS)

    Wee, Susie

    2005-03-01

    Multimedia communication and streaming media services will become mainstream network infrastructure applications in the coming decade. However, there are many challenges that must be overcome. These challenges include the Internet"s limited ability to handle real-time, low-latency media streams, the need for media security, and an uncertainty of the killer app. The nature of these challenges lends itself to enabling technology innovations in the media delivery and media processing space. Specifically, we envision an overlay infrastructure that supports networked media services that couple media delivery with in-network media processing. The media overlay should be programmable to allow rapid deployment of new applications and services and manageable so as to support the evolving requirements of the resulting usage models. Furthermore, the media overlay should allow for the delivery of protected media content for applications that have security requirements. A properly architected infrastructure can enable real-time multimedia communication and streaming media services in light of the inherent challenges.

  14. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects. PMID:23823398

  15. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ..., August 18, 2010. [FR Doc. 2010-21016 Filed 8-20-10; 8:45 am] Billing code 3195-W0-P ... Documents#0;#0; #0; #0;Title 3-- #0;The President ] Executive Order 13549 of August 18, 2010 Classified... with Executive Order 13526 of December 29, 2009 (``Classified National Security...

  16. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  17. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Li, Jian; Jia, Lu; Zhou, Hong-Fu; Zhang, Ting-Ting

    2016-03-01

    We propose a new quantum private comparison protocol with the help of a semi-honest third party (TP), enabling two participants to compare the equality of their private inputs without exposing any information about their respective private inputs. Different from previous protocols, our protocol utilizes the properties of entanglement swapping between three-particle W-Class state and Bell state. The presented protocol can ensure correctness, fairness and security. Meanwhile, all the quantum particles undergo a one-way transmission, and all the participants including TP are just required having the ability to perform Bell-state measurement and exclusive-or operation which make our protocol more feasible and efficient. At last, the security of this protocol with respect to various kinds of attacks is analyzed in detail.

  18. Overlay similarity: a new overlay index for metrology tool and scanner overlay fingerprint methodology

    NASA Astrophysics Data System (ADS)

    Ke, Chih-Ming; Kao, Ching-Pin; Wang, Yu-Hsi; Hu, Jimmy; Chang, Chen-Yu; Tsai, Ya-Jung; Yen, Anthony; Lin, Burn J.

    2009-03-01

    For different CD metrologies like average CD from CD SEM and optical CD (OCD) from scatterometry, CD point-to-point R2 has been well adopted as the CD correlation index. For different overlay metrologies like image-based box-in-box overlay and scatterometry-based overlay, we propose the cosine similarity as the correlation index of overlay. The cosine similarity is a measure of similarity between two vectors of n dimensions by finding the cosine of the angle between them, often used to compare documents in text mining. It has been widely used in web and document search engines and can be used as the similarity index of overlay tool-to-tool matching and scanner tool-to-tool or day-to-day fingerprint. In this paper, we demonstrate that the cosine similarity has a very high sensitivity to the overly tool performance. We compared the similarities of three generations (A1, A2, A3) of the overlay tools of venders A and B and found that after target re-training and TIS correction on each tool A1 similarity to A3 can be improved from 0.9837 to 0.9951. Overlay point-to-point matching with A3 vs. A1 can be reduced from 4.8 to 2.1 nm. The tool precision similarities, i.e. tool self best similarity, for A1, A2, A3 and B are 0.9986, 0.9990, 0.9995, and 0.9994 respectively. From this table, we demonstrate that we can use old-generation overlay tool with suitable hardware maintenance, to match to the latest-generation overlay tool.

  19. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  20. Implementing a Trust Overlay Framework for Digital Ecosystems

    NASA Astrophysics Data System (ADS)

    Malone, Paul; McGibney, Jimmy; Botvich, Dmitri; McLaughlin, Mark

    Digital Ecosystems, being decentralised in nature, are inherently untrustworthy environments. This is due to the fact that these environments lack a centralised gatekeeper and identity provider. In order for businesses to operate in these environments there is a need for security measures to support accountability and traceability. This paper describes a trust overlay network developed in the OPAALS project to allow entities participating in digital ecosystems to share experience through the exchange of trust values and to leverage on this network to determine reputation based trustworthiness of unknown and initially untrusted entities. An overlay network is described together with sample algorithms and a discussion on implementation.

  1. New analytical algorithm for overlay accuracy

    NASA Astrophysics Data System (ADS)

    Ham, Boo-Hyun; Yun, Sangho; Kwak, Min-Cheol; Ha, Soon Mok; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    The extension of optical lithography to 2Xnm and beyond is often challenged by overlay control. With reduced overlay measurement error budget in the sub-nm range, conventional Total Measurement Uncertainty (TMU) data is no longer sufficient. Also there is no sufficient criterion in overlay accuracy. In recent years, numerous authors have reported new method of the accuracy of the overlay metrology: Through focus and through color. Still quantifying uncertainty in overlay measurement is most difficult work in overlay metrology. According to the ITRS roadmap, total overlay budget is getting tighter than former device node as a design rule shrink on each device node. Conventionally, the total overlay budget is defined as the square root of square sum of the following contributions: the scanner overlay performance, wafer process, metrology and mask registration. All components have been supplying sufficiently performance tool to each device nodes, delivering new scanner, new metrology tools, and new mask e-beam writers. Especially the scanner overlay performance was drastically decreased from 9nm in 8x node to 2.5nm in 3x node. The scanner overlay seems to reach the limitation the overlay performance after 3x nod. The importance of the wafer process overlay as a contribution of total wafer overlay became more important. In fact, the wafer process overlay was decreased by 3nm between DRAM 8x node and DRAM 3x node. We develop an analytical algorithm for overlay accuracy. And a concept of nondestructive method is proposed in this paper. For on product layer we discovered the layer has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. In this paper, authors suggest an analytical algorithm for overlay accuracy. And a concept of non-destructive method is proposed in this paper. For on product layers, we discovered it has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. Furthermore

  2. Fabrication of magnetic bubble memory overlay

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Self-contained magnetic bubble memory overlay is fabricated by process that employs epitaxial deposition to form multi-layered complex of magnetically active components on single chip. Overlay fabrication comprises three metal deposition steps followed by subtractive etch.

  3. Meeting overlay requirements for future technology nodes with in-die overlay metrology

    NASA Astrophysics Data System (ADS)

    Schulz, Bernd; Seltmann, Rolf; Busch, Jens; Hempel, Fritjof; Cotte, Eric; Alles, Benjamin

    2007-03-01

    As a consequence of the shrinking sizes of the integrated circuit structures, the overlay budget shrinks as well. Overlay is traditionally measured with relatively large test structures which are located in the scribe line of the exposure field, in the four corners. Although the performance of the overlay metrology tools has improved significantly over time it is questionable if this traditional method of overlay control will be sufficient for future technology nodes. For advanced lithography techniques like double exposure or double patterning, in-die overlay is critical and it is important to know how much of the total overlay budget is consumed by in-die components. We reported earlier that small overlay targets were included directly inside die areas and good performance was achieved. This new methodology enables a wide range of investigations. This provides insight into processes which were less important in the past or not accessible for metrology. The present work provides actual data from productive designs, instead of estimates, illustrating the differences between the scribe line and in-die registration and overlay. The influence of the pellicle on pattern placement on mask and wafer overlay is studied. Furthermore the registration overlay error of the reticles is correlated to wafer overlay residuals. The influence of scanner-induced distortions (tool to tool differences) on in-die overlay is shown. Finally, the individual contributors to in-die-overlay are discussed in the context of other overlay contributors. It is proposed to use in-die overlay and registration results to derive guidelines for future overlay and registration specifications. It will be shown that new overlay correction schemes which take advantage of the additional in-die overlay information need to be considered for production.

  4. TES overlayed on MOLA DEM

    NASA Technical Reports Server (NTRS)

    1999-01-01

    This image is TES thermal data (Orbit 222) overlayed on the MOLA DEM. The color scale is TES T18-T25, which is a cold spot index. The grey scale is MOLA elevation in kilometers. Most cold spots can be attributed to surface spectral emissivity effects. Regions that are colored black-violet-blue have near unity emissivity and are coarse grained CO2. Regions that are yellow-red are fined grained CO2. The red-white spot located approximately 300W85N is our most likely candidate for a CO2 snow storm.

  5. Total overlay analysis for designing future aligner

    NASA Astrophysics Data System (ADS)

    Magome, Nobutaka; Kawai, Hidemi

    1995-05-01

    We found total overlay with respect to optical lithography using an approach similar to quality control technique employed at a semiconductor factory. This approach involves an aligner performance, process quality, reticle error and overlay measurement. This paper further describes new ides for the number of machines to be used for matching and data collection period. Lastly, improvement on total overlay and a prospective view for a future aligner and its usage are also described.

  6. Overlays for classroom and optometric use.

    PubMed

    Wilkins, A

    1994-01-01

    Perceptual distortion of printed text can sometimes be reduced by placing upon the page a sheet of coloured plastic (overlay). The colour that best reduces the distortion differs from one individual to another and may need to be selected with precision. A set of overlays has been developed that samples the CIE UCS diagram systematically. The overlays are robust and have a matte finish. They can be combined in an intuitive way to provide a wide range of chromaticities. PMID:7512256

  7. On-demand Overlay Networks for Large Scientific Data Transfers

    SciTech Connect

    Ramakrishnan, Lavanya; Guok, Chin; Jackson, Keith; Kissel, Ezra; Swany, D. Martin; Agarwal, Deborah

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  8. Flutter Analysis of the Shuttle Tile Overlay Repair Concept

    NASA Technical Reports Server (NTRS)

    Bey, Kim S.; Scott, Robert C.; Bartels, Robert E.; Waters, William A.; Chen, Roger

    2007-01-01

    The Space Shuttle tile overlay repair concept, developed at the NASA Johnson Space Center, is designed for on-orbit installation over an area of damaged tile to permit safe re-entry. The thin flexible plate is placed over the damaged area and secured to tile at discreet points around its perimeter. A series of flutter analyses were performed to determine if the onset of flutter met the required safety margins. Normal vibration modes of the panel, obtained from a simplified structural analysis of the installed concept, were combined with a series of aerodynamic analyses of increasing levels of fidelity in terms of modeling the flow physics to determine the onset of flutter. Results from these analyses indicate that it is unlikely that the overlay installed at body point 1800 will flutter during re-entry.

  9. Analysis Of Overlay Distortion Patterns

    NASA Astrophysics Data System (ADS)

    Armitage, John D.; Kirk, Joseph P.

    1988-01-01

    A comprehensive geometrical approach is presented for the least-squares analysis of overlay distortion patterns into useful, physically meaningful systematic distortion subpatterns and an essentially non-systematic residue. A scheme of generally useful distortion sub-patterns is presented in graphic and algorithmic form; some of these sub-patterns are additions to those already in widespread use. A graphic and geometric approach is emphasized rather than an algebraic or statistical approach, and an example illustrates the value in utilizing the pattern-detecting ability of the eye-brain system. The conditions are described under which different distortion sub-patterns may interact, possibly leading to misleading or erroneous conclusions about the types and amounts of different distortions present. Examples of typical interaction situations are given, and recommendations are made for analytic procedures to avoid misinterpretation. It is noted that the lower-order distortion patterns preserve straight-line linearity, but that higher-order distortion may result in straight lines becoming curved. The principle of least-squares analysis is outlined and a simple polynomial data-fitting example is used to illustrate the method. Algorithms are presented for least-squares distortion analysis of overlay patterns, and an APL2 program is given to show how this may easily be implemented on a digital computer. The appendix extends the treatment to cases where small-angle approximation is not permissible.

  10. Women and Private Pensions.

    ERIC Educational Resources Information Center

    Benson, Helene A.

    This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…

  11. CFDP for Interplanetary Overlay Network

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol for Interplanetary Overlay Network (CFDP-ION) is an implementation of CFDP that uses IO' s DTN (delay tolerant networking) implementation as its UT (unit-data transfer) layer. Because the DTN protocols effect automatic, reliable transmission via multiple relays, CFDP-ION need only satisfy the requirements for Class 1 ("unacknowledged") CFDP. This keeps the implementation small, but without loss of capability. This innovation minimizes processing resources by using zero-copy objects for file data transmission. It runs without modification in VxWorks, Linux, Solaris, and OS/X. As such, this innovation can be used without modification in both flight and ground systems. Integration with DTN enables the CFDP implementation itself to be very simple; therefore, very small. Use of ION infrastructure minimizes consumption of storage and processing resources while maximizing safety.

  12. Device overlay method for high volume manufacturing

    NASA Astrophysics Data System (ADS)

    Lee, Honggoo; Han, Sangjun; Kim, Youngsik; Kim, Myoungsoo; Heo, Hoyoung; Jeon, Sanghuck; Choi, DongSub; Nabeth, Jeremy; Brinster, Irina; Pierson, Bill; Robinson, John C.

    2016-03-01

    Advancing technology nodes with smaller process margins require improved photolithography overlay control. Overlay control at develop inspection (DI) based on optical metrology targets is well established in semiconductor manufacturing. Advances in target design and metrology technology have enabled significant improvements in overlay precision and accuracy. One approach to represent in-die on-device as-etched overlay is to measure at final inspection (FI) with a scanning electron microscope (SEM). Disadvantages to this approach include inability to rework, limited layer coverage due to lack of transparency, and higher cost of ownership (CoO). A hybrid approach is investigated in this report whereby infrequent DI/FI bias is characterized and the results are used to compensate the frequent DI overlay results. The bias characterization is done on an infrequent basis, either based on time or triggered from change points. On a per-device and per-layer basis, the optical target overlay at DI is compared with SEM on-device overlay at FI. The bias characterization results are validated and tracked for use in compensating the DI APC controller. Results of the DI/FI bias characterization and sources of variation are presented, as well as the impact on the DI correctables feeding the APC system. Implementation details in a high volume manufacturing (HVM) wafer fab will be reviewed. Finally future directions of the investigation will be discussed.

  13. Interacting epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Funk, Sebastian; Jansen, Vincent A. A.

    2010-03-01

    The interaction between multiple pathogens spreading on networks connecting a given set of nodes presents an ongoing theoretical challenge. Here, we aim to understand such interactions by studying bond percolation of two different processes on overlay networks of arbitrary joint degree distribution. We find that an outbreak of a first pathogen providing immunity to another one spreading subsequently on a second network connecting the same set of nodes does so most effectively if the degrees on the two networks are positively correlated. In that case, the protection is stronger the more heterogeneous the degree distributions of the two networks are. If, on the other hand, the degrees are uncorrelated or negatively correlated, increasing heterogeneity reduces the potential of the first process to prevent the second one from reaching epidemic proportions. We generalize these results to cases where the edges of the two networks overlap to arbitrary amount, or where the immunity granted is only partial. If both processes grant immunity to each other, we find a wide range of possible situations of coexistence or mutual exclusion, depending on the joint degree distribution of the underlying networks and the amount of immunity granted mutually. These results generalize the concept of a coexistence threshold and illustrate the impact of large-scale network structure on the interaction between multiple spreading agents.

  14. 26 CFR 1.141-2 - Private activity bond tests.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... test and private security or payment test of section 141(b) or the private loan financing test of section 141(c). The private business use and private security or payment tests are described in §§ 1.141-3... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Private activity bond tests. 1.141-2 Section...

  15. 26 CFR 1.141-2 - Private activity bond tests.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... test and private security or payment test of section 141(b) or the private loan financing test of section 141(c). The private business use and private security or payment tests are described in §§ 1.141-3... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Private activity bond tests. 1.141-2 Section...

  16. A moving overlay shrinks the attentional blink.

    PubMed

    Chua, Fook K

    2015-01-01

    This report describes a study examining the effects of overlaying a veil of spots on the letters in a central rapid serial visual presentation stream. Observers identified two target letters (T1 and T2, respectively) embedded in a stream of distractor letters printed in a different color. In Experiment 1, the attentional blink (AB) diminished when a different overlay veiled each letter, such that the spots appeared to move as the letters changed. Experiment 2 concerned whether the performance enhancement occurred because the overlay hampered processing of the lag 1 distractor, thus weakening the distractor's interference with T1. Experiment 3 focused on how changing the overlay at or around T1 affected the AB. The attention disengagement hypothesis was proposed to explain the common theme in the results-that performance was only enhanced when different overlays were applied to the T1 and lag 1 frames. The claim is that the AB reflects a failure of prompt attentional disengagement from T1, which, in turn, delays reengagement when T2 appears shortly thereafter. When T1's disappearance is accompanied by an overlay change, the perceptual system gets an additional cue signaling that the visual scene has changed, thereby inducing attentional disengagement. Apart from facilitating prompt reengagement at the next target, earlier disengagement also improves target recovery by excluding features of the trailing item, likely to be a distractor, from working memory. PMID:25245077

  17. Scatterometry or imaging overlay: a comparative study

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that

  18. Polymer concrete overlay on SH-51, bridge deck

    NASA Astrophysics Data System (ADS)

    Borg, T. M.

    1982-06-01

    A thin resinous overlay was placed on a sound bridge deck in Oklahoma to evaluate its performance over one year using various physical tests. The evaluation shows how well the overlay protects the reinforcing steel from corrosion due to deicing salts. The steps leading to the construction of the overlay are detailed as well as the actual placing of the overlay. The results of various physical tests are reported for both before and after the overlay.

  19. Epitaxial interactions between molecular overlayers and ordered substrates

    NASA Astrophysics Data System (ADS)

    Hillier, Andrew C.; Ward, Michael D.

    1996-11-01

    A framework for evaluating the epitaxy of crystalline organic overlayers of generic symmetry on ordered substrates is described, which combines a computationally efficient analytical method for explicit determination of the type of epitaxy (i.e., commensurism, coincidence, or incommensurism) and overlayer azimuthal orientation with an analysis of the elastic properties of the overlayer and the overlayer-substrate interface. The azimuthal orientations predicted by the analytical method agree with values predicted by semiempirical potential-energy calculations and observed experimentally for previously reported organic overlayers which are demonstrated here to be coincident. Calculations based on this analytical approach are much less computationally intensive than potential-energy calculations, as the number of computational operations is independent of the overlayer size chosen for analysis. This enables analyses to be performed for the large overlayer basis sets common for molecular overlayers. Furthermore, this facilitates the analysis of coincident overlayers, for which the overlayer size needs to be large enough to establish a phasing relationship between a substrate and a large nonprimitive overlayer supercell so that the global minimum with respect to azimuthal angle can be determined. The computational efficiency of this method also enables a convenient examination of numerous possible reconstructed overlayer configurations in which the lattice parameters are bracketed around those of the native overlayer, thereby allowing examination of possible epitaxy-driven overlayer reconstructions. When combined with calculated intralayer- and overlayer-substrate elastic constants, this method provides a strategy for the design of heteroepitaxial molecular films.

  20. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  1. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Not Available

    1994-11-01

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB`s.

  2. Solidification of an alloy 625 weld overlay

    SciTech Connect

    DuPont, J.N.

    1996-11-01

    The solidification behavior (microsegregation, secondary phase formation, and solidification temperature range) of an Alloy 625 weld overlay deposited on 2.25Cr-1Mo steel by gas metal arc welding was investigated by light and electron optical microscopy, electron microprobe, and differential thermal analysis techniques. The overlay deposit was found to terminate solidification at {approx}1,216 C by a {gamma}/Laves eutectic-type reaction. The Laves phase was highly enriched in Nb, Mo, and Si. The solidification reaction and microsegregation potential of major alloying elements in the overlay deposit are compared to other Nb-bearing Ni base alloys and found to be very similar to those for Alloy 718. Solidification cracks observed in the overlay were attributed to the wide solidification temperature range ({approx}170 C) and formation of interdendritic ({gamma} + Laves) constituent. Reasonable agreement is obtained between the calculated and measured volume percent ({gamma} + Laves) constituent with the Scheil equation by treating the overlay system as a simple {gamma}-Nb binary and using an experimentally determined k{sub Nb} value from electron microprobe data.

  3. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  4. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  5. Weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  6. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  7. KML Super Overlay to WMS Translator

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  8. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-04-18

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based on a literature review These alloys have been separated into three major groups: (1) Cobalt containing alloys, (2) Nickel-base alloys, (3) Iron base alloys. These alloys are being applied to carbon steel substrates and will undergo preliminary erosion testing to identify candidates weld overlay alloys for erosion control in CFB boilers. The candidate alloys selected from the preliminary erosion tests will then undergo more detailed evaluations in future research.

  9. Hybrid overlay metrology for high order correction by using CDSEM

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Halder, Sandip; Lorusso, Gian; Baudemprez, Bart; Inoue, Osamu; Okagawa, Yutaka

    2016-03-01

    Overlay control has become one of the most critical issues for semiconductor manufacturing. Advanced lithographic scanners use high-order corrections or correction per exposure to reduce the residual overlay. It is not enough in traditional feedback of overlay measurement by using ADI wafer because overlay error depends on other process (etching process and film stress, etc.). It needs high accuracy overlay measurement by using AEI wafer. WIS (Wafer Induced Shift) is the main issue for optical overlay, IBO (Image Based Overlay) and DBO (Diffraction Based Overlay). We design dedicated SEM overlay targets for dual damascene process of N10 by i-ArF multi-patterning. The pattern is same as device-pattern locally. Optical overlay tools select segmented pattern to reduce the WIS. However segmentation has limit, especially the via-pattern, for keeping the sensitivity and accuracy. We evaluate difference between the viapattern and relaxed pitch gratings which are similar to optical overlay target at AEI. CDSEM can estimate asymmetry property of target from image of pattern edge. CDSEM can estimate asymmetry property of target from image of pattern edge. We will compare full map of SEM overlay to full map of optical overlay for high order correction ( correctables and residual fingerprints).

  10. Differential signal scatterometry overlay metrology: an accuracy investigation

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Adel, Mike; Dinu, Berta; Golovanevsky, Boris; Izikson, Pavel; Levinski, Vladimir; Vakshtein, Irina; Leray, Philippe; Vasconi, Mauro; Salski, Bartlomiej

    2007-06-01

    The overlay control budget for the 32nm technology node will be 5.7nm according to the ITRS. The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty (TMU) requirements of 0.57nm for the most challenging use cases of the 32nm node. The current state of the art imaging overlay metrology technology does not meet this strict requirement, and further technology development is required to bring it to this level. In this work we present results of a study of an alternative technology for overlay metrology - Differential signal scatterometry overlay (SCOL). Theoretical considerations show that overlay technology based on differential signal scatterometry has inherent advantages, which will allow it to achieve the 32nm technology node requirements and go beyond it. We present results of simulations of the expected accuracy associated with a variety of scatterometry overlay target designs. We also present our first experimental results of scatterometry overlay measurements, comparing this technology with the standard imaging overlay metrology technology. In particular, we present performance results (precision and tool induced shift) and address the issue of accuracy of scatterometry overlay. We show that with the appropriate target design and algorithms scatterometry overlay achieves the accuracy required for future technology nodes.

  11. Colors, colored overlays, and reading skills

    PubMed Central

    Uccula, Arcangelo; Enna, Mauro; Mulatti, Claudio

    2014-01-01

    In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e., who experience eyestrain and/or visual distortions – e.g., color, shape, or movement illusions – while reading. This condition would interest the 12–14% of the general population and up to the 46% of the dyslexic population. Thus, colored overlays have been largely employed as a remedy for some aspects of the difficulties in reading experienced by dyslexic individuals, as fluency and speed. Despite the wide use of colored overlays, how they exert their effects has not been made clear yet. Also, according to some researchers, the results supporting the efficacy of colored overlays as a tool for helping readers are at least controversial. Furthermore, the very nature of the Meares-Irlen syndrome has been questioned. Here we provide a concise, critical review of the literature. PMID:25120525

  12. Robotic weld overlay coatings for erosion control

    NASA Astrophysics Data System (ADS)

    Levin, B. F.; Dupont, J. N.; Marder, A. R.

    1994-01-01

    Research is being conducted to develop criteria for selecting weld overlay coatings for erosion mitigation in circulated fluidized beds. Twelve weld overlay alloys were deposited on 1018 steel substrates using plasma arc welding. Ten samples from each coating were prepared for erosion testing. All selected coatings were erosion tested at 400C and their erosion resistance and microstructure evaluated. Steady state erosion rates were similar for several weld overlay coatings (Ultimet, Inconel-625, Iron-Aluminide, 316L SS, and High Chromium Cast Iron) and were considerably lower than the remaining coating evaluated. These coatings had different base (Co, Fe, Ni-base). No correlations were found between room temperature microhardness of the weld overlay coatings and their erosion resistance at elevated temperature, although this criteria is often thought to be an indicator of erosion resistance. It was suggested that the coatings that showed similar erosion rates may have similar mechanical properties such as fracture strength, toughness and work hardening rates at this temperature. During the past quarter, Iron-Aluminide, Inconel-625, and 316L SS coatings were selected for more detailed investigations based upon the preliminary erosion test results. Microhardness tests were performed on eroded samples to determine the size of the work hardened zone and change in coatings hardness due to erosion. The work hardened zone was correlated with erosion resistance of the coatings. Additional Iron-Aluminide, Inconel-625, and 316L SS coatings were deposited on 1018 steel substrates.

  13. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  14. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  15. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection... to obtain debt collection services provided by private collection agencies....

  16. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California legislation…

  17. Overlay Tolerances For VLSI Using Wafer Steppers

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Rice, Rory

    1988-01-01

    In order for VLSI circuits to function properly, the masking layers used in the fabrication of those devices must overlay each other to within the manufacturing tolerance incorporated in the circuit design. The capabilities of the alignment tools used in the masking process determine the overlay tolerances to which circuits can be designed. It is therefore of considerable importance that these capabilities be well characterized. Underestimation of the overlay accuracy results in unnecessarily large devices, resulting in poor utilization of wafer area and possible degradation of device performance. Overestimation will result in significant yield loss because of the failure to conform to the tolerances of the design rules. The proper methodology for determining the overlay capabilities of wafer steppers, the most commonly used alignment tool for the production of VLSI circuits, is the subject of this paper. Because cost-effective manufacturing process technology has been the driving force of VLSI, the impact on productivity is a primary consideration in all discussions. Manufacturers of alignment tools advertise the capabilities of their equipment. It is notable that no manufacturer currently characterizes his aligners in a manner consistent with the requirements of producing very large integrated circuits, as will be discussed. This has resulted in the situation in which the evaluation and comparison of the capabilities of alignment tools require the attention of a lithography specialist. Unfortunately, lithographic capabilities must be known by many other people, particularly the circuit designers and the managers responsible for the financial consequences of the high prices of modern alignment tools. All too frequently, the designer or manager is confronted with contradictory data, one set coming from his lithography specialist, and the other coming from a sales representative of an equipment manufacturer. Since the latter generally attempts to make his

  18. Overlay improvement by ASML HOWA 5th alignment strategy

    NASA Astrophysics Data System (ADS)

    Wang, Raf; Chiang, CY; Hsu, Wilson; Yang, Richer; Shih, Todd; Chen, Jackie; Chiu, Jonathan; Lin, Wythe

    2009-12-01

    Overlay control is more challenging when DRAM volume production continues to shrink its critical dimention (CD) to 70nm and beyond. Effected by process, the overlay behavior at wafer edge is quite different from wafer center. The big contribution to worse overlay at wafer edge which causes yield loss is misalignment. The analysis in wafer edge suggests that high order uncorrectable overlay residuals are often observed by certain process impact. Therefore, the basic linear model used for alignment correction is not sufficient and it is necessary to introduce an advanced alignment correction model for wafer edge overlay improvement. In this study, we demonstrated the achievement of moderating the poor overlay at wafer edge area by using a high order wafer alignment strategy. The mechanism is to use non-linear correction methods of high order models ( up to 5th order), with support by the function High Order Wafer Alignment (known as HOWA) in scanner. Instead of linear model for the 6 overlay parameters which come from average result, HOWA alignment strategy can do high order fitting through the wafer to get more accurate overlay parameters which represent the local wafer grid distortion better. As a result, the overlay improvement for wafer edge is achieved. Since alignment is a wafer dependent correction, with HOWA the wafer to wafer overlay variation can be improved dynamically as well. In addition, the effects of different mark quantity and sampling distribution from HOWA are also introduced in this paper. The results of this study indicate that HOWA can reduce uncorrectable overlay residual by 30~40% and improve wafer-to-wafer overlay variation significantly. We conclude that HOWA is a noteworthy strategy for overlay improvement. Moreover, optimized alignment mark numbers and distribution layout are also key factors to make HOWA successful.

  19. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  20. Privatizing Australia

    SciTech Connect

    Burr, M.T.

    1995-07-01

    The sun is setting on Australia`s long tradition of state involvement in business. As part of efforts begun in the late-1980`s to stem the tide of debt rising within Australian federal and state treasuries, government-owned entities are being corporatized and privatized, and private companies are sponsoring a large share of the country`s new infrastructure projects.

  1. Privatizing Maintenance.

    ERIC Educational Resources Information Center

    Hounsell, Dan

    1996-01-01

    Schools and other government facilities want to see whether privatization of maintenance can provide services as efficiently and at less cost than inhouse workers. Privatization proponents say that everyone will benefit the most if the bidding process involves competition. Offers examples from the Memphis City Schools and the Union Public Schools…

  2. Experimental AC (Asphalt Concrete) overlays of PCC pavement

    NASA Astrophysics Data System (ADS)

    Smith, R. D.

    1983-11-01

    A series of experimental asphalt concrete (AC) overlays was constructed over an existing distressed portland cement concrete pavement on Interstate 80 near Boca, California. The experimental overlays included rubberized dense-graded AC, rubberized open-graded AC, a rubber flush coat interlayer, dense-graded AC with short polyester fibers and Bituthene interlayer strips. The report presents a description and discussion of AC mix batching, construction observations, laboratory testing, overlay covering, and initial performance evaluation.

  3. Highly corrosion resistant weld overlay for oil patch applications

    SciTech Connect

    Hibner, E.L.; Maligas, M.N.; Vicic, J.C.

    1994-12-31

    Petroleum equipment companies currently sell 4130 and 4140 steel pipe with alloy 625 (UNS N06625) weld overlay for Oil Patch applications. Alloy 686 (UNS N06686), because of it`s superior corrosion resistance, is currently being evaluated as a replacement material for alloy 625. Mechanical properties and Slow Strain Rate test results for the alloy 686 weld overlay are discussed relative to the alloy 625 weld overlay.

  4. Sampling for advanced overlay process control

    NASA Astrophysics Data System (ADS)

    Choi, DongSub; Izikson, Pavel; Sutherland, Doug; Sherman, Kara; Manka, Jim; Robinson, John C.

    2008-03-01

    Overlay metrology and control have been critical for successful advanced microlithography for many years, and are taking on an even more important role as time goes on. Due to throughput constraints it is necessary to sample only a small subset of overlay metrology marks, and typical sample plans are static over time. Standard production monitoring and control involves measuring sufficient samples to calculate up to 6 linear correctables. As design rules shrink and processing becomes more complex, however, it is necessary to consider higher order modeled terms for control, fault detection, and disposition. This in turn, requires a higher level of sampling. Due to throughput concerns, however, careful consideration is needed to establish a base-line sampling, and higher levels of sampling can be considered on an exception-basis based on automated trigger mechanisms. The goal is improved scanner control and lithographic cost of ownership. This study addresses tools for establishing baseline sampling as well as motivation and initial results for dynamic sampling for application to higher order modeling.

  5. Sampling for advanced overlay process control

    NASA Astrophysics Data System (ADS)

    Kato, Cindy; Kurita, Hiroyuki; Izikson, Pavel; Robinson, John C.

    2009-03-01

    Overlay metrology and control have been critical for successful advanced microlithography for many years, and are taking on an even more important role as time goes on. Due to throughput constraints it is necessary to sample only a small subset of overlay metrology marks, and typical sample plans are static over time. Standard production monitoring and control involves measuring sufficient samples to calculate up to 6 linear correctables. As design rules shrink and processing becomes more complex, however, it is necessary to consider higher order models with additional degrees of freedom for control, fault detection, and disposition. This in turn, requires a higher level of sampling and a careful consideration of flyer removal. Due to throughput concerns, however, careful consideration is needed to establish a baseline sampling plan using rigorous statistical methods. This study focuses on establishing a 3x nm node immersion lithography production-worthy sampling plan for 3rd order modeling, verification of the accuracy, and proof of robustness of the sampling. In addition we discuss motivation for dynamic sampling for application to higher order modeling.

  6. Investigation of Iron Aluminide Weld Overlays

    SciTech Connect

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  7. Pragmatic privatization

    SciTech Connect

    Bernstein, S.

    1995-10-01

    Chile was probably the first country in the world to privatize under a decentralized and competitive framework a former state-owned power sector. Power sector privatization was conducted with pragmatism, particularly in terms of the speed with which the changes occurred. In fact, the earliest privatization did not occur until 1980 and the process was not completed until early 1990. The privatized Chilean electric industry has performed fairly well in terms of the investments carried out not only in the power sector, but also in other economic activities and in foreign countries. The diversification of ownership and the competitive framework have been an incentive to reach efficiency and a guaranty for the stability of the rules of the game in the long run.

  8. Real cell overlay measurement through design based metrology

    NASA Astrophysics Data System (ADS)

    Yoo, Gyun; Kim, Jungchan; Park, Chanha; Lee, Taehyeong; Ji, Sunkeun; Jo, Gyoyeon; Yang, Hyunjo; Yim, Donggyu; Yamamoto, Masahiro; Maruyama, Kotaro; Park, Byungjun

    2014-04-01

    Until recent device nodes, lithography has been struggling to improve its resolution limit. Even though next generation lithography technology is now facing various difficulties, several innovative resolution enhancement technologies, based on 193nm wavelength, were introduced and implemented to keep the trend of device scaling. Scanner makers keep developing state-of-the-art exposure system which guarantees higher productivity and meets a more aggressive overlay specification. "The scaling reduction of the overlay error has been a simple matter of the capability of exposure tools. However, it is clear that the scanner contributions may no longer be the majority component in total overlay performance. The ability to control correctable overlay components is paramount to achieve the desired performance.(2)" In a manufacturing fab, the overlay error, determined by a conventional overlay measurement: by using an overlay mark based on IBO and DBO, often does not represent the physical placement error in the cell area of a memory device. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion, caused by etching or CMP, also can be a source of the mismatch. Therefore, the requirement of a direct overlay measurement in the cell pattern gradually increases in the manufacturing field, and also in the development level. In order to overcome the mismatch between conventional overlay measurement and the real placement error of layer to layer in the cell area of a memory device, we suggest an alternative overlay measurement method utilizing by design, based metrology tool. A basic concept of this method is shown in figure1. A CD-SEM measurement of the overlay error between layer 1 and 2 could be the ideal method but it takes too long time to extract a lot of data from wafer level. An E-beam based DBM tool provides high speed to cover the whole wafer with high repeatability. It is enabled by using the design as a

  9. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  10. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  11. 26 CFR 1.141-5 - Private loan financing test.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... be private activity bonds under the private business use and the private security or payment tests... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Private loan financing test. 1.141-5 Section 1... (CONTINUED) INCOME TAXES (CONTINUED) Tax Exemption Requirements for State and Local Bonds § 1.141-5...

  12. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  13. Overlay measurement accuracy enhancement by design and algorithm

    NASA Astrophysics Data System (ADS)

    Lee, Honggoo; Lee, Byongseog; Han, Sangjun; Kim, Myoungsoo; Kwon, Wontaik; Park, Sungki; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Itzkovich, Tal; Amir, Nuriel; Volkovich, Roie; Herzel, Eitan; Wagner, Mark; El Kodadi, Mohamed

    2015-03-01

    Advanced design nodes require more complex lithography techniques, such as double patterning, as well as advanced materials like hard masks. This poses new challenge for overlay metrology and process control. In this publication several step are taken to face these challenges. Accurate overlay metrology solutions are demonstrated for advanced memory devices.

  14. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1995-08-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions have limited their use in applications where good weldability is required. Using hot crack testing techniques invented at ORNL, and experimental determinations of preheat and postweld heat treatment needed to avoid cold cracking, we have developed iron aluminide filler metal compositions which can be successfully used to weld overlay clad various substrate materials, including 9Cr-1Mo steel, 2-1/4Cr-1Mo steel, and 300-series austenitic stainless steels. Dilution must be carefully controlled to avoid crack-sensitive deposit compositions. The technique used to produce the current filler metal compositions is aspiration-casting, i.e. drawing the liquid from the melt into glass rods. Future development efforts will involve fabrication of composite wires of similar compositions to permit mechanized gas tungsten arc (GTA) and/or gas metal arc (GMA) welding.

  15. Improving text recognition by distinguishing scene and overlay text

    NASA Astrophysics Data System (ADS)

    Quehl, Bernhard; Yang, Haojin; Sack, Harald

    2015-02-01

    Video texts are closely related to the content of a video. They provide a valuable source for indexing and interpretation of video data. Text detection and recognition task in images or videos typically distinguished between overlay and scene text. Overlay text is artificially superimposed on the image at the time of editing and scene text is text captured by the recording system. Typically, OCR systems are specialized on one kind of text type. However, in video images both types of text can be found. In this paper, we propose a method to automatically distinguish between overlay and scene text to dynamically control and optimize post processing steps following text detection. Based on a feature combination a Support Vector Machine (SVM) is trained to classify scene and overlay text. We show how this distinction in overlay and scene text improves the word recognition rate. Accuracy of the proposed methods has been evaluated by using publicly available test data sets.

  16. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1996-11-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions limited their use to applications where good weldability was not required. Considerable progress has been made toward improving this situation. Using hot crack testing techniques developed at ORNL and a systematic study of alloy compositional effects, we have established a range of compositions within which hot cracking resistance is very good, essentially equivalent to stainless steel. Cold cracking, however, remains an issue, and extensive efforts are continuing to optimize composition and welding parameters, especially preheat and postweld heat treatment, to minimize its occurrence. In terms of filler metal and process development, we have progressed from sheared strip through aspiration cast rod and shielded metal arc electrodes to the point where we can now produce composite wire with a steel sheath and aluminum core in coil form, which permits the use of both the gas tungsten arc and gas metal arc processes. This is a significant advancement in that the gas metal arc process lends itself well to automated welding, and is the process of choice for commercial weld overlay applications. Using the newly developed filler metals, we have prepared clad specimens for testing in a variety of environments both in-house and outside ORNL, including laboratory and commercial organizations. As a means of assessing the field performance of this new type of material, we have modified several non-pressure boundary boiler components, including fuel nozzles and port shrouds, by introducing areas of weld overlay in strategic locations, and have placed these components in service in operating boilers for a side-by-side comparison with conventional corrosion-resistant materials.

  17. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... Infrastructure Private Sector Clearance Program (PSCP). DHS previously published this ICR in the Federal...

  18. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance...

  19. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false No private right of action. 205.7 Section 205.7 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARDS OF PROFESSIONAL CONDUCT FOR ATTORNEYS APPEARING AND PRACTICING BEFORE THE COMMISSION IN THE REPRESENTATION OF AN ISSUER § 205.7 No private right...

  20. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service to obtain debt collection...

  1. 6 CFR 11.7 - Private collection agencies.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Private collection agencies. 11.7 Section 11.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CLAIMS § 11.7 Private collection agencies. DHS will transfer delinquent DHS debts to the Treasury Department's Financial Management Service to obtain debt collection...

  2. Prolonged use of coloured overlays for classroom reading.

    PubMed

    Jeanes, R; Busby, A; Martin, J; Lewis, E; Stevenson, N; Pointon, D; Wilkins, A

    1997-11-01

    Ninety-three children in a primary school and 59 children in two first-year classes of a secondary school were asked individually to observe a paragraph of random letters arranged to resemble text, and to compare the perceptual effects on its clarity of coloured plastic sheets overlaid on the text. A total of 29 colours were compared using 10 coloured plastic sheets and 19 pairwise combinations of sheets, one superimposed on another. The resulting colours sampled CIE 1976 hue angle (huv) and saturation (suv) systematically and efficiently. All the children who reported beneficial perceptual effects (53 per cent) were given their preferred overlay or combination of overlays to use as and when they wished. When the children were examined three months later the children tended to choose a colour similar to one they had chosen previously. Ten months later, 22 per cent of those offered the overlaps were still using them of their own volition. These children, but not those who had ceased to use their overlay(s), read randomly ordered simple words more quickly with their overlay than without. In a second independent group of children referred to the Norfolk Sensory Support Service, who used overlays routinely, the reading speed was similar with a grey or clear overlay; and slower than with the chosen coloured overlay, suggesting that reduction of contrast was not the critical factor. In a third independent group of children in a primary school in Kent, the increase in reading speed with the chosen overlay predicted the children who continued to use their overlay during the ensuing eight weeks. PMID:9415962

  3. 17 CFR 249.220f - Form 20-F, registration of securities of foreign private issuers pursuant to section 12(b) or (g...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Form 20-F, registration of... pursuant to sections 13 and 15(d), and shell company reports required under Rule 13a-19 or 15d-19 (§ 240... and transition reports pursuant to sections 13 and 15(d), and shell company reports required...

  4. Private advantage

    SciTech Connect

    Marier, D.; Stoiaken, L.

    1988-03-01

    At least a half dozen independent power producers put out initial public offerings in 1985-86 and the experts were projecting more to come. Most executives of private development companies admitted that they had at least taken a hard look at going public. Several quarters worth of disappointing earnings and the October market crash have brought attention back to the activities of private companies. Fortunately for the industry, at about the same time public-equity markets were closing down, new sources of debt and equity were entering the field in a big way-including insurance companies, pension funds, and utilities. While the development should be good news for all companies in the field (private equity is not necessarily earmarked for private companies), the impact of the crash has made it more difficult for public companies to make their case to the new equity players. The newest players, the unregulated utility subsidiaries, the fastest growing segment in the industry, are probably in a position to put a major dent in the business.

  5. Envelopment technique and topographic overlays in bite mark analysis

    PubMed Central

    Djeapragassam, Parimala; Daniel, Mariappan Jonathan; Srinivasan, Subramanian Vasudevan; Ramadoss, Koliyan; Jimsha, Vannathan Kumaran

    2015-01-01

    Aims and Objectives: The aims and objectives of our study were to compare four sequential overlays generated using the envelopment technique and to evaluate inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Materials and Methods: Dental stone models were prepared from impressions made from healthy individuals; photographs were taken and computer-assisted overlays were generated. The models were then enveloped in a different-color dental stone. After this, four sequential cuts were made at a thickness of 1mm each. Each sectional cut was photographed and overlays were generated. Thus, 125 overlays were generated and compared. Results: The scoring was done based on matching accuracy and the data were analyzed. The Kruskal-Wallis one-way analysis of variance (ANOVA) test was used to compare four sequential overlays and Spearman's rank correlation tests were used to evaluate the inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Conclusion: Through our study, we conclude that the third and fourth cuts were the best among the four cuts and inter- and intraoperator reliability were found to be statistically significant at 5% level that is 95% confidence interval (P < 0.05). PMID:26816458

  6. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  7. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1997-12-01

    The author has established a range of compositions for these alloys within which hot cracking resistance is very good, and within which cold cracking can be avoided in many instances by careful control of welding conditions, particularly preheat and postweld heat treatment. For example, crack-free butt welds have been produced for the first time in 12-mm thick wrought Fe{sub 3}Al plate. Cold cracking, however, still remains an issue in many cases. The author has developed a commercial source for composite weld filler metals spanning a wide range of achievable aluminum levels, and are pursuing the application of these filler metals in a variety of industrial environments. Welding techniques have been developed for both the gas tungsten arc and gas metal arc processes, and preliminary work has been done to utilize the wire arc process for coating of boiler tubes. Clad specimens have been prepared for environmental testing in-house, and a number of components have been modified and placed in service in operating kraft recovery boilers. In collaboration with a commercial producer of spiral weld overlay tubing, the author is attempting to utilize the new filler metals for this novel application.

  8. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  9. Lithography aware overlay metrology target design method

    NASA Astrophysics Data System (ADS)

    Lee, Myungjun; Smith, Mark D.; Lee, Joonseuk; Jung, Mirim; Lee, Honggoo; Kim, Youngsik; Han, Sangjun; Adel, Michael E.; Lee, Kangsan; Lee, Dohwa; Choi, Dongsub; Liu, Zephyr; Itzkovich, Tal; Levinski, Vladimir; Levy, Ady

    2016-03-01

    We present a metrology target design (MTD) framework based on co-optimizing lithography and metrology performance. The overlay metrology performance is strongly related to the target design and optimizing the target under different process variations in a high NA optical lithography tool and measurement conditions in a metrology tool becomes critical for sub-20nm nodes. The lithography performance can be quantified by device matching and printability metrics, while accuracy and precision metrics are used to quantify the metrology performance. Based on using these metrics, we demonstrate how the optimized target can improve target printability while maintaining the good metrology performance for rotated dipole illumination used for printing a sub-100nm diagonal feature in a memory active layer. The remaining challenges and the existing tradeoff between metrology and lithography performance are explored with the metrology target designer's perspective. The proposed target design framework is completely general and can be used to optimize targets for different lithography conditions. The results from our analysis are both physically sensible and in good agreement with experimental results.

  10. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  11. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  12. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  13. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 28 Judicial Administration 1 2012-07-01 2012-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  14. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 28 Judicial Administration 1 2014-07-01 2014-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  15. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 28 Judicial Administration 1 2013-07-01 2013-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  16. 28 CFR 36.501 - Private suits.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 28 Judicial Administration 1 2011-07-01 2011-07-01 false Private suits. 36.501 Section 36.501... ACCOMMODATIONS AND IN COMMERCIAL FACILITIES Enforcement § 36.501 Private suits. (a) General. Any person who is... the civil action without the payment of fees, costs, or security. Nothing in this section...

  17. Diffraction based overlay metrology for α-carbon applications

    NASA Astrophysics Data System (ADS)

    Saravanan, Chandra Saru; Tan, Asher; Dasari, Prasad; Goelzer, Gary; Smith, Nigel; Woo, Seouk-Hoon; Shin, Jang Ho; Kang, Hyun Jae; Kim, Ho Chul

    2008-03-01

    Applications that require overlay measurement between layers separated by absorbing interlayer films (such as α- carbon) pose significant challenges for sub-50nm processes. In this paper scatterometry methods are investigated as an alternative to meet these stringent overlay metrology requirements. In this article, a spectroscopic Diffraction Based Overlay (DBO) measurement technique is used where registration errors are extracted from specially designed diffraction targets. DBO measurements are performed on detailed set of wafers with varying α-carbon (ACL) thicknesses. The correlation in overlay values between wafers with varying ACL thicknesses will be discussed. The total measurement uncertainty (TMU) requirements for these layers are discussed and the DBO TMU results from sub-50nm samples are reviewed.

  18. Augmenting reality in Direct View Optical (DVO) overlay applications

    NASA Astrophysics Data System (ADS)

    Hogan, Tim; Edwards, Tim

    2014-06-01

    The integration of overlay displays into rifle scopes can transform precision Direct View Optical (DVO) sights into intelligent interactive fire-control systems. Overlay displays can provide ballistic solutions within the sight for dramatically improved targeting, can fuse sensor video to extend targeting into nighttime or dirty battlefield conditions, and can overlay complex situational awareness information over the real-world scene. High brightness overlay solutions for dismounted soldier applications have previously been hindered by excessive power consumption, weight and bulk making them unsuitable for man-portable, battery powered applications. This paper describes the advancements and capabilities of a high brightness, ultra-low power text and graphics overlay display module developed specifically for integration into DVO weapon sight applications. Central to the overlay display module was the development of a new general purpose low power graphics controller and dual-path display driver electronics. The graphics controller interface is a simple 2-wire RS-232 serial interface compatible with existing weapon systems such as the IBEAM ballistic computer and the RULR and STORM laser rangefinders (LRF). The module features include multiple graphics layers, user configurable fonts and icons, and parameterized vector rendering, making it suitable for general purpose DVO overlay applications. The module is configured for graphics-only operation for daytime use and overlays graphics with video for nighttime applications. The miniature footprint and ultra-low power consumption of the module enables a new generation of intelligent DVO systems and has been implemented for resolutions from VGA to SXGA, in monochrome and color, and in graphics applications with and without sensor video.

  19. Coloured overlays and their effects on reading speed: a review.

    PubMed

    Wilkins, Arnold

    2002-09-01

    Coloured overlays can reduce symptoms of visual stress and improve reading speed. These benefits are reliable and are not attributable simply to placebo effects. Five percent of children in mainstream education read at least 25% more quickly with an overlay, provided they have chosen the colour. The suboptimal design of children's text and the high level of classroom lighting may be partly responsible. PMID:12358317

  20. Overlay improvements using a real time machine learning algorithm

    NASA Astrophysics Data System (ADS)

    Schmitt-Weaver, Emil; Kubis, Michael; Henke, Wolfgang; Slotboom, Daan; Hoogenboom, Tom; Mulkens, Jan; Coogans, Martyn; ten Berge, Peter; Verkleij, Dick; van de Mast, Frank

    2014-04-01

    While semiconductor manufacturing is moving towards the 14nm node using immersion lithography, the overlay requirements are tightened to below 5nm. Next to improvements in the immersion scanner platform, enhancements in the overlay optimization and process control are needed to enable these low overlay numbers. Whereas conventional overlay control methods address wafer and lot variation autonomously with wafer pre exposure alignment metrology and post exposure overlay metrology, we see a need to reduce these variations by correlating more of the TWINSCAN system's sensor data directly to the post exposure YieldStar metrology in time. In this paper we will present the results of a study on applying a real time control algorithm based on machine learning technology. Machine learning methods use context and TWINSCAN system sensor data paired with post exposure YieldStar metrology to recognize generic behavior and train the control system to anticipate on this generic behavior. Specific for this study, the data concerns immersion scanner context, sensor data and on-wafer measured overlay data. By making the link between the scanner data and the wafer data we are able to establish a real time relationship. The result is an inline controller that accounts for small changes in scanner hardware performance in time while picking up subtle lot to lot and wafer to wafer deviations introduced by wafer processing.

  1. Residual stresses in weld overlay tubes: A finite element study

    SciTech Connect

    Taljat, B.; Zacharia, T.; Wang, X.L.; Keiser, J.R.; Feng, Z.; Jirinec, M.J.

    1997-01-03

    Residual stresses and strains in a tube with circumferential weld overlay were analyzed by the finite element (FE) method. The objective of this work was to develop and verify a FE model, to determine the magnitude and distribution of residual stresses in the weld overlay tube, and to evaluate the significance of two contributing factors to residual stress: (1) difference in material properties between tube and weld material, and (2) thermal gradients in the weld. An axisymmetric FE model was developed to simulate the circumferential two-layer welding process of alloy 625 overlay on SA210 tube. The first layer was modeled as a gas metal arc welding process with filler metal, whereas the autogenous gas tungsten arc welding process was modeled for the second layer. Neutron diffraction technique was used to experimentally determine residual elastic strains in the weld overlay tube. Comparison with the FE results shows overall good agreement. Both the experimental and FE results show high compressive stresses at the inside tube surface and high tensile stresses in the weld overlay. This suggests that weld overlay may be used to relieve tensile or produce compressive stresses at the inside tube surface, which is significant for applications where crack initiation is found at the root pass of the joining weld.

  2. ``Electric growth`` of metal overlayers on semiconductor substrates

    SciTech Connect

    Zhang, Z.; Cho, J.H. |; Niu, Q.; Shih, C.K.; Suo, Z.

    1998-02-01

    In this article, the authors present the main results from their recent studies of metal overlayer growth on semiconductor substrates. They show that a variety of novel phenomena can exist in such systems, resulting from several competing interactions. The confined motion of the conduction electrons within the metal overlayer can mediate a surprisingly long-range repulsive force between the metal-semiconductor interface and the growth front, acting to stabilize the overlayer. Electron transfer from the overlayer to the substrate leads to an attractive force between the two interfaces, acting to destabilize the overlayer. Interface-induced Friedel oscillations in electron density can further impose an oscillatory modulation onto the two previous interactions. These three competing factors, of all electronic nature, can make a flat metal overlayer critically, marginally, or magically stable, or totally unstable against roughening. The authors further show that, for many systems, these electronic effects can easily win over the effect of stress. First-principles studies of a few representative systems support the main features of the present electronic growth concept.

  3. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  4. Peru privatizes

    SciTech Connect

    Suttil, K.R.

    1993-02-01

    Peru has been undergoing a revolution since the election of Alberto Fujimori as president in 1990. A revolution that is reversing many of the policies of the past 25 years and one which aims to bring Peru back into the mainstream of the world economy. All the enterprises nationalized in the heady days of the early 1970s are set up for privatization. The most important are the three mining companies: Hierro-Peru, Centromin, and Mineroo-Peru. It will not be easy to attract foreign investment after such a long period of political and economic instability but the rewards are there for the intrepid.

  5. Overlay progress in EUV lithography towards adoption for manufacturing

    NASA Astrophysics Data System (ADS)

    Hermans, Jan V.; Laidler, David; Pigneret, Charles; van Dijk, Andre; Voznyi, Oleg; Dusa, Mircea; Hendrickx, Eric

    2011-04-01

    Extreme Ultra-Violet (EUV) lithography is a candidate for semiconductor manufacturing for the 16nm technology node and beyond. Due to the very short wavelength of 13.5nm, EUV lithography provides the capability to continue single exposure scaling with improved resolution and higher pattern fidelity compared to 193nm immersion lithography. However, reducing the wavelength brings new equipment and process challenges. To enable EUV photon transmission through the optical system, the entire optical path of an EUV exposure tool operates under vacuum, and in addition reticle and optics are reflective. To obtain the required CD and overlay performance, both wafer and reticle front surfaces need to have near-perfect flatness, as non-flatness directly contributes to focus and image placement errors, in the case of the reticle due to non-telecentricity. Traditional vacuum chucks, both for reticle and wafer, cannot be used and are replaced by electrostatic chucks. Any contribution of this new clamping method on CD and overlay control therefore needs to be investigated, including avoidance of particle contamination over time. This work was performed on ASML's EUV Alpha Demo Tool (ADT). We investigated the different, non-conventional contributions to overlay control on the ADT, with particular attention to the wafer clamping performance of the exposure chuck. We demonstrate that we were able to improve the overlay performance by compensating for the wafer clamping error during the wafer alignment sequence. The impact of different wafer types on overlay was also evaluated. In addition to clamping effects, thermal effects have also been shown to impact overlay and were evaluated by monitoring the thermal behavior of a wafer during exposure on the ADT and correlating to the resulting overlay.

  6. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or noncompliance... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false No private right of...

  7. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or noncompliance... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false No private right of...

  8. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false No private right of action... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or...

  9. 17 CFR 205.7 - No private right of action.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false No private right of action... ISSUER § 205.7 No private right of action. (a) Nothing in this part is intended to, or does, create a private right of action against any attorney, law firm, or issuer based upon compliance or...

  10. Private database queries using one quantum state

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Zhang, Ming-Ou; Yang, Rui

    2015-03-01

    A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

  11. Instructional geographic information science Map overlay and spatial abilities

    NASA Astrophysics Data System (ADS)

    Tricot, Thomas Alexander, II

    The fundamental goal of this study is to determine if the complex spatial concept of map overlay can be effectively learned by young adolescents through the utilization of an instructional technique based within the foundations of Instructional Geographic Information Science (InGIScience). Percent correct and reaction times were the measures used to analyze the ability of young adolescents to learn the intersect, erase, and union functions of map overlay. The ability to solve for missing inputs, output, or function was also analyzed. Young adolescents of the test group scored higher percent correct and recorded faster reaction times than those of the control group or adults of the expert group by the end of the experiment. The intersect function of map overlay was more difficult in terms of percent correct and reaction time than the erase or union functions. Solving for the first or second input consistently resulted in lower percent correct and higher reaction times throughout the experiment. No overall performance differences were shown to exist between males and females. Results of a subjective "real-world" test also indicated learning by young adolescents. This study has shown that the practice of repetitive instruction and testing has proven effective for enhancing spatial abilities with regard to the map overlay concept. This study found that with practice, young adolescents can learn the map overlay concept and perform at levels equal to or greater than adults. This study has helped to answer the question of whether this development of spatial abilities is possible.

  12. Overlay metrology solutions in a triple patterning scheme

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Mao, Ming; Baudemprez, Bart; Amir, Nuriel

    2015-03-01

    Overlay metrology tool suppliers are offering today several options to their customers: Different hardware (Image Based Overlay or Diffraction Based Overlay), different target designs (with or without segmentation) or different target sizes (from 5 um to 30 um). All these variations are proposed to resolve issues like robustness of the target towards process variations, be more representative of the design or increase the density of measurements. In the frame of the development of a triple patterning BEOL scheme of 10 nm node layer, we compare IBO targets (standard AIM, AIMid and multilayer AIMid). The metrology tools used for the study are KLA-Tencor's nextgeneration Archer 500 system (scatterometry- and imaging-based measurement technologies on the same tool). The overlay response and fingerprint of these targets will be compared using a very dense sampling (up to 51 pts per field). The benefit of indie measurements compared to the traditional scribes is discussed. The contribution of process effects to overlay values are compared to the contribution of the performance of the target. Different targets are combined in one measurement set to benefit from their different strengths (performance vs size). The results are summarized and possible strategies for a triple patterning schemes are proposed.

  13. Large dynamic range Atomic Force Microscope for overlay improvements

    NASA Astrophysics Data System (ADS)

    Kuiper, Stefan; Fritz, Erik; Crowcombe, Will; Liebig, Thomas; Kramer, Geerten; Witvoet, Gert; Duivenvoorde, Tom; Overtoom, Ton; Rijnbeek, Ramon; van Zwet, Erwin; van Dijsseldonk, Anton; den Boef, Arie; Beems, Marcel; Levasier, Leon

    2016-03-01

    Nowadays most overlay metrology tools assess the overlay performance based on marker features which are deposited next to the functional device features within each layer of the semiconductor device. However, correct overlay of the relatively coarse marker features does not directly guarantee correct overlay of the much smaller device features. This paper presents the development of a tool that allows to measure the relative distance between the marker and device features within each layer of the semiconductor device, which can be used to improve the overlay at device feature level. In order to be effective, the marker to device feature distance should be measured with sub-nanometer measurement uncertainty over several millimeters range. Furthermore, the tool should be capable of profiling the marker features to allows prediction of the location interpretation of the optical diffraction based alignment sensors, which are sensitive for potential asymmetry of the marker features. To enable this, a highly stable Atomic Force Microscope system is being developed. The probe is positioned relative to the wafer with a 6DOF controlled hexapod stage, which has a relatively large positioning range of 8x8mm. The position and orientation of this stage is measured relative to the wafer using 6 interferometers via a highly stable metrology frame. A tilted probe concept is utilized to allow profiling of the high aspect ratio marker and device features. Current activities are aimed at demonstrating the measurement capabilities of the developed AFM system.

  14. 76 FR 80971 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... matters relating to the Classified National Security Information Program for State, Local, Tribal, and... number of individuals planning to attend must be submitted to the Information Security Oversight...

  15. 75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... Information Security Oversight Office (ISOO) announces the inaugural meeting of the State, Local, Tribal,...

  16. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... discuss the matters relating to the Classified National Security Information Program for State,...

  17. Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    NASA Astrophysics Data System (ADS)

    Nakano, Tadashi; Okaie, Yutaka

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

  18. Constructing Overlay Networks with Short Paths and Low Communication Cost

    NASA Astrophysics Data System (ADS)

    Makikawa, Fuminori; Tsuchiya, Tatsuhiro; Kikuno, Tohru

    A Peer-To-Peer (P2P) application uses an overlay network which is a virtual network constructed over the physical network. Traditional overlay construction methods do not take physical location of nodes into consideration, resulting in a large amount of redundant traffic. Some proximity-aware construction methods have been proposed to address this problem. These methods typically connect nearby nodes in the physical network. However, as the number of nodes increases, the path length of a route between two distant nodes rapidly increases. To alleviate this problem, we propose a technique which can be incorporated in existing overlay construction methods. The idea behind this technique is to employ long links to directly connect distant nodes. Through simulation experiments, we show that using our proposed technique, networks can achieve small path length and low communication cost while maintaining high resiliency to failures.

  19. Tensile Bond Strength of Latex-Modified Bonded Concrete Overlays

    NASA Astrophysics Data System (ADS)

    Dubois, Cameron; Ramseyer, Chris

    2010-10-01

    The tensile bond strength of bonded concrete overlays was tested using the in-situ pull-off method described in ASTM C 1583 with the goal of determining whether adding latex to the mix design increases bond strength. One slab of ductile concrete (f'c > 12,000 psi) was cast with one half tined, i.e. roughened, and one half steel-troweled, i.e. smooth. The slab surface was sectioned off and overlay mixtures containing different latex contents cast in each section. Partial cores were drilled perpendicular to the surface through the overlay into the substrate. A tensile loading device applied a direct tensile load to each specimen and the load was increased until failure occurred. The tensile bond strength was then calculated for comparison between the specimens.

  20. Tuning carrier density at complex oxide interface with metallic overlayer

    NASA Astrophysics Data System (ADS)

    Zhou, Y.; Shi, Y. J.; Jiang, S. W.; Yue, F. J.; Wang, P.; Ding, H. F.; Wu, D.

    2016-06-01

    We have systematically investigated the electronic transport properties of the LaAlO3/SrTiO3 interfaces with several different metal capping layers. The sheet carrier density can be tuned in a wide range by the metallic overlayer without changing the carrier mobility. The sheet carrier density variation is found to be linearly dependent on the size of metal work function. This behavior is explained by the mechanism of the charge transfer between the oxide interface and the metal overlayer across the LaAlO3 layer. Our results confirm the existence of a built-in electric field in LaAlO3 film with an estimated value of 67.7 eV/Å. Since the metallic overlayer is essential for devices, the present phenomena must be considered for future applications.

  1. Measured residual stresses in overlay pipe weldments removed from service

    SciTech Connect

    Shack, W.J.

    1985-02-01

    Surface and throughwall residual stresses were measured on an elbow-to-pipe weldment that had been removed from the Hatch-2 reactor about a year after the application of a weld overlay. The results were compared with experimental measurements on three mock-up weldments and with finite-element calculations. The comparison shows that there are significant differences in the form and magnitude of the residual stress distributions. However, even after more than a year of service, the residual stresses over most of the inner surface of the actual plant weldment with an overlay were strongly compressive. 3 refs., 7 figs.

  2. High-frequency nonreciprocal reflection from magnetic films with overlayers

    SciTech Connect

    Wang, Ying; Nie, Yan; Camley, R. E.

    2013-11-14

    We perform a theoretical study of the nonreciprocal reflection of high-frequency microwave radiation from ferromagnetic films with thin overlayers. Reflection from metallic ferromagnetic films is always near unity and shows no nonreciprocity. In contrast, reflection from a structure which has a dielectric overlayer on top of a film composed of insulated ferromagnetic nanoparticles or nanostructures can show significant nonreciprocity in the 75–80 GHz frequency range, a very high value. This can be important for devices such as isolators or circulators.

  3. Flexible TWDM PON with WDM overlay for converged services

    NASA Astrophysics Data System (ADS)

    Cheng, Ning

    2015-12-01

    This paper reviews recent developments of flexible TWDM PON (time- and wavelength-division multiplexed passive optical network) with pluggable transceivers for pay-as-you-grow deployment, load balancing, channel protection and power saving. Different architectures for TWDM PON with WDM (wavelength division multiplexed) overlay for converged broadband services are discussed and experimental results are presented for WDM overlay using low-cost self-seeded RSOA (reflective semiconductor optical amplifiers). Challenging issues and possible solutions for future evolution toward software defined flexible PONs (FlexPONs) are also discussed with respect to dynamic lambda flow, elastic bandwidth and flexible reach.

  4. Incidental Learning of Geospatial Concepts across Grade Levels: Map Overlay

    ERIC Educational Resources Information Center

    Battersby, Sarah E.; Golledge, Reginald G.; Marsh, Meredith J.

    2006-01-01

    In this paper, the authors evaluate map overlay, a concept central to geospatial thinking, to determine how it is naively and technically understood, as well as to identify when it is leaner innately. The evaluation is supported by results from studies at three grade levels to show the progression of incidentally learned geospatial knowledge as…

  5. 12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ON UPSTREAM EMBANKMENT OF DAM (FROM REPAIRS COMPLETED IN 1977) - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  6. Semantic overlay network for large-scale spatial information indexing

    NASA Astrophysics Data System (ADS)

    Zou, Zhiqiang; Wang, Yue; Cao, Kai; Qu, Tianshan; Wang, Zhongmin

    2013-08-01

    The increased demand for online services of spatial information poses new challenges to the combined filed of Computer Science and Geographic Information Science. Amongst others, these include fast indexing of spatial data in distributed networks. In this paper we propose a novel semantic overlay network for large-scale multi-dimensional spatial information indexing, called SON_LSII, which has a hybrid structure integrating a semantic quad-tree and Chord ring. The SON_LSII is a small world overlay network that achieves a very competitive trade-off between indexing efficiency and maintenance overhead. To create SON_LSII, we use an effective semantic clustering strategy that considers two aspects, i.e., the semantic of spatial information that peer holds in overlay network and physical network performances. Based on SON_LSII, a mapping method is used to reduce the multi-dimensional features into a single dimension and an efficient indexing algorithm is presented to support complex range queries of the spatial information with a massive number of concurrent users. The results from extensive experiments demonstrate that SON_LSII is superior to existing overlay networks in various respects, including scalability, maintenance, rate of indexing hits, indexing logical hops, and adaptability. Thus, the proposed SON_LSII can be used for large-scale spatial information indexing.

  7. Factors affecting the erosion resistance of weld overlays

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1996-12-31

    Research was conducted to study factors affecting the solid particle erosion resistance of weld overlay coatings. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400 C. Erosion resistance was evaluated by determining the steady state erosion rate. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at 30 and 90{degree} impact angles. Microhardness tests were performed on the eroded samples below the erosion surface to determine the size of the plastically deformed zone and it was found that one group of coatings deformed plastically as a result of the particle impact while the others did not. No correlations were found between average microhardness at 400 C and volumetric erosion rates for plastically deformed weld overlays. For this group of overlays erosion resistance was correlated to the area under the curve of microhardness versus distance from the eroded surface. The physical significance of this parameter is discussed. For coatings that did not deform plastically, an increase in average microhardness at 400 C led to an increase in their volumetric erosion rates. The possible erosion mechanisms for these coating groups are discussed.

  8. Promoting Learning of Instructional Design via Overlay Design Tools

    ERIC Educational Resources Information Center

    Carle, Andrew Jacob

    2012-01-01

    I begin by introducing Virtual Design Apprenticeship (VDA), a learning model--built on a solid foundation of education principles and theories--that promotes learning of design skills via overlay design tools. In VDA, when an individual needs to learn a new design skill or paradigm she is provided accessible, concrete examples that have been…

  9. BWR pipe crack and weld clad overlay studies

    SciTech Connect

    Shack, W.J.; Kassner, T.F.; Maiya, P.S.; Park, J.Y.; Ruther, W.E.; Rybicki, E.F.

    1985-10-01

    This paper presents results on (a) the influence of simulated BWR environments and temperature on the intergranular-stress-corrosion cracking (IGSCC) susceptibility of sensitized stainless steels (SS), (b) the stress-corrosion susceptibility of alternative piping materials, (c) analysis of field components to assess the effectiveness of in-service inspection techniques and the in-reactor performance of weld overlay repairs, and (d) finite-element analyses and experimental measurement of residual stresses in weldments with weld overlays. Fracture-mechanics crack-growth data are presented to confirm correlations between the critical corrosion potentials required to inhibit IGSCC and the level of impurities in the environment. Slow-strain-rate tests show that very low levels of impurities (25 ppb of sulfate) can produce suseptibility to transgranular-stress-corrosion cracking (TGSCC) in Type 316NG SS and that nitrogen levels is SS above 0.1 wt. % appear to increase susceptibility to TGSCC. Preliminary results on a German Type 347NG SS suggest that it is at least as resistant to TGSCC in impurity environments as Type 316NG SS. Measurements on overlay weldments removed from the Hatch-2 reactor confirm that compressive residual stresses are produced on the inner surface of the weldments by the overlay.

  10. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  11. Recovery of Sublethally Injured Bacteria Using Selective Agar Overlays.

    ERIC Educational Resources Information Center

    McKillip, John L.

    2001-01-01

    This experiment subjects bacteria in a food sample and an environmental sample to conditions of sublethal stress in order to assess the effectiveness of the agar overlay method to recover sublethally injured cells compared to direct plating onto the appropriate selective medium. (SAH)

  12. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  13. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  14. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  15. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  16. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  17. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  18. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... Statements § 210.3-20 Currency for financial statements of foreign private issuers. (a) A foreign private... date shall be used if materially different. (c) If the financial statements of a foreign private...

  19. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... Statements § 210.3-20 Currency for financial statements of foreign private issuers. (a) A foreign private... date shall be used if materially different. (c) If the financial statements of a foreign private...

  20. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2012-04-01 2012-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  1. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  2. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges... private issuers. (a) A foreign private issuer, as defined in § 230.405 of this chapter, shall state... the financial statements of a foreign private issuer are stated in a currency of a country that...

  3. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  4. 26 CFR 1.145-2 - Application of private activity bond regulations.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of the private business use test and the private security or payment test mean “5 percent” and “net... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Application of private activity bond regulations... Bonds § 1.145-2 Application of private activity bond regulations. (a) In general. Except as provided...

  5. Throughput and Packet Delay Analysis of the Intermittent DCF for Overlay Access Networks

    NASA Astrophysics Data System (ADS)

    Adamis, Athanassios V.; Maliatsos, Konstantinos N.; Constantinou, Philip

    Overlay Access Technology can compensate for the spectrum underutilization problem by exploiting Cognitive Radios capabilities. MAC design is an important aspect of Overlay Access research. In this paper we present the overlay access environment and the challenges it poses to MAC design. Then, we propose the use of a modified Distributed Coordination Function as the MAC protocol for distributed Overlay Access networks. The resulted Intermittent DCF performs with robustness in the demanding overlay access environment, which is characterized by frequent spectrum scan procedure interruptions and low achievable transmission rates. The most recent DCF Markov Chain Model is extended in order to include the overlay operation modifications. Our extension concerns the slot duration expectations calculation which, in the overlay environment, have not constant values but depend on overlay operation parameters. Using the analytical model we evaluate the performance of the DCF under the effect of certain overlay access parameters. The new analytical model predictions are validated with simulations, and are found to accurately capture many interesting features of the overlay operation. Our model can be used in feasibility studies of realistic overlay scenarios and in admission control algorithms of QoS enabled distributed overlay access networks that engage the Intermittent DCF.

  6. Privatization and Education

    ERIC Educational Resources Information Center

    Dash, Neena

    2009-01-01

    This paper highlights emerging trends, programmes and policies in privatization of education in Western countries. These trends are educational vouchers, choice of private schools, private school liberalization, private contracting of specific services, tuition tax credits and deductions for parents ,subsidies and assistance grants to private…

  7. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  8. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... affecting Form F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  9. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  10. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... F-1, see the List of CFR Sections Affected, which appears in the Finding Aids section of the printed... statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section... under the Securities Act of 1933 for securities of certain foreign private issuers. (a) Form F-1...

  11. 78 FR 40761 - Proposed Renewal of Information Collection; Private Rental Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-08

    ... Office of the Secretary Proposed Renewal of Information Collection; Private Rental Survey AGENCY: Office... should reference OMB control number 1084-0033, ``Private Rental Survey''. FOR FURTHER INFORMATION CONTACT... Departments of the Interior (DOI), Agriculture, Commerce, Homeland Security, Justice, Transportation,...

  12. 17 CFR 270.18c-1 - Exemption of privately held indebtedness.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of privately held indebtedness. 270.18c-1 Section 270.18c-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT COMPANY ACT OF 1940 § 270.18c-1 Exemption of privately held indebtedness. The issuance or...

  13. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  14. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  15. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  16. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND... (Regulation M-A) § 229.1014 (Item 1014) Fairness of the going-private transaction. (a) Fairness. State whether... transaction is fair or unfair to unaffiliated security holders. If any director dissented to or abstained...

  17. 77 FR 70780 - Federal Acquisition Regulation; Submission for OMB Review; Contractors Performing Private...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... Security Functions Outside the United States. A notice was published in the Federal Register at 77 FR 43039... Regulation; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United... 9000-0184, Contractors Performing Private Security Functions Outside the United States''. Follow...

  18. Quantum data locking for high-rate private communication

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Lloyd, Seth

    2015-03-01

    We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.

  19. Chlorine adsorption on Au(111): chlorine overlayer or surface chloride?

    PubMed

    Gao, Weiwei; Baker, Thomas A; Zhou, Ling; Pinnaduwage, Dilini S; Kaxiras, Efthimios; Friend, Cynthia M

    2008-03-19

    We report the first scanning tunneling microscope (STM) investigation, combined with density functional theory calculations, to resolve controversy regarding the bonding and structure of chlorine adsorbed on Au(111). STM experiments are carried out at 120 K to overcome instability caused by mobile species upon chlorine adsorption at room temperature. Chlorine adsorption initially lifts the herringbone reconstruction. At low coverages (<0.33 ML), chlorine binds to the top of Au(111)-(1 x 1) surface and leads to formation of an overlayer with (square root(3) x square root(3))R30 degree structure at 0.33 ML. At higher coverages, packing chlorine into an overlayer structure is no longer favored. Gold atoms incorporate into a complex superlattice of a Au-Cl surface compound. PMID:18290645

  20. Modeling the dynamical interaction between epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Marceau, Vincent; Noël, Pierre-André; Hébert-Dufresne, Laurent; Allard, Antoine; Dubé, Louis J.

    2011-08-01

    Epidemics seldom occur as isolated phenomena. Typically, two or more viral agents spread within the same host population and may interact dynamically with each other. We present a general model where two viral agents interact via an immunity mechanism as they propagate simultaneously on two networks connecting the same set of nodes. By exploiting a correspondence between the propagation dynamics and a dynamical process performing progressive network generation, we develop an analytical approach that accurately captures the dynamical interaction between epidemics on overlay networks. The formalism allows for overlay networks with arbitrary joint degree distribution and overlap. To illustrate the versatility of our approach, we consider a hypothetical delayed intervention scenario in which an immunizing agent is disseminated in a host population to hinder the propagation of an undesirable agent (e.g., the spread of preventive information in the context of an emerging infectious disease).

  1. Modeling of Co overlayers on Pd (111) from first principles

    NASA Astrophysics Data System (ADS)

    Uba, S.; Uba, L.; Antonov, V. N.

    2007-04-01

    The electronic, magnetic and magneto-optical properties of Co overlayers on Pd (1 1 1) substrate have been investigated by ab initio band structure calculations within the spin-polarized relativistic linear muffin-thin orbitals (LMTO) method and supercell approach. The role of the Co-Pd interface structure, the number of the Co atomic layers ( n Co ), as well as the spin-orbit interaction and induced Pd spin polarization, in formation of magneto-optical response of the structures for [ n CoCo/Pd (1 1 1)] system is shown. The sign reversal of the polar Kerr rotation obtained theoretically with decreasing thickness of Co overlayers agrees well with experiment. We will demonstrate the effectiveness of the extended numeric modeling of magneto-optical properties from first principles.

  2. Improved overlay metrology device correlation on 90-nm logic processes

    NASA Astrophysics Data System (ADS)

    Ueno, Atsushi; Tsujita, Kouichirou; Kurita, Hiroyuki; Iwata, Yasuhisa; Ghinovker, Mark; Poplawski, Jorge M.; Kassel, Elyakim; Adel, Mike E.

    2004-05-01

    Isolated and dense patterns were formed at process layers from gate through to back-end on wafers using a 90 nm logic device process utilizing ArF lithography under various lithography conditions. Pattern placement errors (PPE) between AIM grating and BiB marks were characterized for line widths varying from 1000nm to 140nm. As pattern size was reduced, overlay discrepancies became larger, a tendency which was confirmed by optical simulation with simple coma aberration. Furthermore, incorporating such small patterns into conventional marks resulted in significant degradation in metrology performance while performance on small pattern segmented grating marks was excellent. Finally, the data also show good correlation between the grating mark and specialized design rule feature SEM marks, with poorer correlation between conventional mark and SEM mark confirming that new grating mark significantly improves overlay metrology correlation with device patterns.

  3. CLIO — A Cross-Layer Information Service for Overlay Network Optimization

    NASA Astrophysics Data System (ADS)

    Haage, Dirk; Holz, Ralph; Niedermayer, Heiko; Laskov, Pavel

    New overlay-based services aim to provide properties like resilience, availability or QoS. To achieve this, automatic organization and optimization is required, which again demands accurate information on the network. Collecting and exchanging this data has a significant impact on the network, especially if several overlays are used on the same host. In this paper, we provide a survey of the current state of the art and identify challenges which must be addressed in order for new overlay-based services to be successful. We present our own solution CLIO, a cross-layer information service for overlays. CLIO provides information for the automatic creation and optimization of overlays. The service supports multiple overlays on the same node, the provided information is overlay-independent, and collected information is reused.

  4. Prepenetrant Etchant For Incology(R) 903 Weld Overlays

    NASA Technical Reports Server (NTRS)

    O'Tousa, Joseph E.; Thomas, Clark S.; Foster, Robert E.

    1990-01-01

    Etching solution developed for use prior to type-IVc penetrant inspection of Incology(R) 903 weld overlays. Formulated as follows: 80 g ferric chloride hexahydrate, 300 mL reagent-grade hydrochloric acid, 25 mL food- or reagent-grade phosphoric acid, and 100 mL ethylene glycol. Gives more reasonable range of etching time and reduces probability of overetching and resulting damage. Stored indefinitely.

  5. 17 CFR 229.1014 - (Item 1014) Fairness of the going-private transaction.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 1014) Fairness of the going-private transaction. 229.1014 Section 229.1014 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY...

  6. 17 CFR 210.3-20 - Currency for financial statements of foreign private issuers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Currency for financial statements of foreign private issuers. 210.3-20 Section 210.3-20 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL STATEMENTS, SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF...

  7. An Overlapping Structured P2P for REIK Overlay Network

    NASA Astrophysics Data System (ADS)

    Liu, Wenjun; Song, Jingjing; Yu, Jiguo

    REIK is based on a ring which embedded an inverse Kautz digraph, to enable multi-path P2P routing. It has the constant degree and the logarithmic diameter DHT scheme with constant congestion and Byzantine fault tolerance. However, REIK did not consider the interconnection of many independent smaller networks. In this paper, we propose a new approach to build overlay network, OLS-REIK which is an overlapping structured P2P for REIK overlay network. It is a more flexible interconnecting different REIK network. Peers can belong to several rings, allowing this interconnection. By connecting smaller structured overlay networks in an unstructured way, it provides a cost effective alternative to hierarchical structured P2P systems requiring costly merging. Routing of lookup messages is performed as in REIK within one ring, but a peer belonging to several rings forwards the request to the different rings it belongs to. Furthermore a small number of across point is enough to ensure a high exhaustiveness level.

  8. Diffusion Barriers to Increase the Oxidative Life of Overlay Coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Lei, Jih-Fen

    1999-01-01

    Currently, most blades and vanes in the hottest section of aero gas turbine engines require some type of coating for oxidation protection. Newly developed single crystal superalloys have the mechanical potential to operate at increasingly higher component temperatures. However, at these elevated temperatures, coating/substrate interdiffusion can shorten the protective life of the coating. Diffusion barriers between overlay coatings and substrates are being examined to extend the protective life of the coating. A previously- developed finite-difference diffusion model has been modified to predict the oxidative life enhancement due to use of a diffusion barrier. The original diffusion model, designated COSIM, simulates Al diffusion in the coating to the growing oxide scale as well as Al diffusion into the substrate. The COSIM model incorporates an oxide growth and spalling model to provide the rate of Al consumption during cyclic oxidation. Coating failure is predicted when the Al concentration at the coating surface drops to a defined critical level. The modified COSIM model predicts the oxidative life of an overlay coating when a diffusion barrier is present eliminating diffusion of Al from the coating into the substrate. Both the original and the modified diffusion models have been used to predict the effectiveness of a diffusion barrier in extending the protective life of a NiCrAl overlay coating undergoing cyclic oxidation at 1100 C.

  9. Overlay mark optimization using the KTD signal simulation system

    NASA Astrophysics Data System (ADS)

    Marchelli, Anat; Gutjahr, Karsten; Kubis, Michael; Sparka, Christian; Ghinovker, Mark; Navarra, Alessandra; Widmann, Amir

    2009-03-01

    As the overlay performance and accuracy requirements become tighter, the impact of process parameters on the target signal becomes more significant. Traditionally, in order to choose the optimum overlay target, several candidates are placed in the kerf area. The candidate targets are tested under different process conditions, before the target to be used in mass production is selected. The varieties of targets are left on the mass production mask and although they will not be used for overlay measurements they still consume kerf real estate. To improve the efficiency of the process we are proposing the KTD (KLA-Tencor Target Designer). It is an easy to use system that enables the user to select the optimum target based on advanced signal simulation. Implementing the KTD in production is expected to save 30% of kerf real estate due to more efficient target design process as well as reduced engineering time. In this work we demonstrate the capability of the KTD to simulate the Archer signal in the context of advanced DRAM processes. For several stacks we are comparing simulated target signals with the Archer100 signals. We demonstrate the robustness feature in the KTD application that enables the user to test the target sensitivity to process changes. The results indicate the benefit of using KTD in the target optimization process.

  10. Multicast Routing in Structured Overlays and Hybrid Networks

    NASA Astrophysics Data System (ADS)

    Wählisch, Matthias; Schmidt, Thomas C.

    Key-based routing has enabled efficient group communication on the application or service middleware layer, stimulated by the need of applications to access multicast. These developments follow a continuous debate about network layer multicast that had lasted for about 30 years history of the Internet. The IP host group model today still faces a strongly divergent state of deployment. In this chapter, we first review the key concepts of multicast and broadcast data distribution on structured overlays. Second, we perform a comprehensive theoretical analysis examining the different distribution trees constructed on top of a key-based routing layer. Characteristic performance measures of the multicast approaches are compared in detail and major structural differences are identified. Overlay multicast overcomes deployment problems on the price of a performance penalty. Hybrid approaches, which dynamically combine multicast in overlay and underlay, adaptively optimize group communication. We discuss current schemes along with its integration in common multicast routing protocols in the third part of this chapter. Finally, we reconsider and enhance approaches to a common API for group communication, which serves the requirements of data distribution and maintenance for multicast and broadcast on a middleware abstraction layer, and in particular facilitates hybrid multicast schemes.

  11. 17 CFR 239.31 - Form F-1, registration statement under the Securities Act of 1933 for securities of certain...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Form F-1, registration statement under the Securities Act of 1933 for securities of certain foreign private issuers. 239.31 Section 239.31 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE SECURITIES ACT OF 1933 Forms...

  12. Security message exchange interoperability scenarios

    SciTech Connect

    Tarman, Thomas

    1998-07-01

    This contribution describes three interoperability scenarios for the ATM Security Message Exchange (SME) protocol. These scenarios include network-wide signaling support for the Security Services Information Element, partial signaling support wherethe SSIE is only supported in private or workgroup ATM networks, and the case where the SSIE is nonsupported by any network elements (exceptthosethat implement security services). Explanatory text is proposed for inclusion infection 2.3 of the ATM Security Specification, Version 1.0.

  13. Survival Rate of Resin and Ceramic Inlays, Onlays, and Overlays: A Systematic Review and Meta-analysis.

    PubMed

    Morimoto, S; Rebello de Sampaio, F B W; Braga, M M; Sesma, N; Özcan, M

    2016-08-01

    This systematic review and meta-analysis aimed to evaluate the survival rate of ceramic and resin inlays, onlays, and overlays and to identify the complication types associated with the main clinical outcomes. Two reviewers searched PubMed, EMBASE, and the Cochrane Central Register of Controlled Trials for articles published between 1983 through April 2015, conforming to Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines for systematic reviews. Clinical studies meeting the following criteria were included: 1) studies related to resin and ceramic inlays, onlays, and overlays; 2) prospective, retrospective, or randomized controlled trials conducted in humans; 3) studies with a dropout rate of less than 30%; and 4) studies with a follow-up longer than 5 y. Of 1,389 articles, 14 met the inclusion criteria. The meta-regression indicated that the type of ceramic material (feldspathic porcelain vs. glass-ceramic), study design (retrospective vs. prospective), follow-up time (5 vs. 10 y), and study setting (university vs. private clinic) did not affect the survival rate. Estimated survival rates for glass-ceramics and feldspathic porcelain were between 92% and 95% at 5 y (n = 5,811 restorations) and were 91% at 10 y (n = 2,154 restorations). Failures were related to fractures/chipping (4%), followed by endodontic complications (3%), secondary caries (1%), debonding (1%), and severe marginal staining (0%). Odds ratios (95% confidence intervals) were 0.19 (0.04 to 0.96) and 0.54 (0.17 to 1.69) for pulp vitality and type of tooth involved (premolars vs. molars), respectively. Ceramic inlays, onlays, and overlays showed high survival rates at 5 y and 10 y, and fractures were the most frequent cause of failure. PMID:27287305

  14. The Private Language Argument.

    ERIC Educational Resources Information Center

    Baker, Gordon

    1998-01-01

    Discusses the private language argument (PLA)--the argument against the possibility of a private language. Raises questions about the PLA, suggesting there are a number of problems that PLA interpretation generates and fails to resolve. (Author/JL)

  15. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  16. Case study of virtual private network

    NASA Astrophysics Data System (ADS)

    Hernandez, Harold; Chung, Ping-Tsai

    2001-07-01

    In this study, business benefits for this Virtual Private Network (VPN) and protocols, techniques, equipments used in this VPN are reported. In addition, our design experience for fault tolerance, security and network management and administration on this VPN are showed. Finally, the issues for future planning of this VPN is addressed.

  17. 76 FR 6702 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... fees for comment on ] August 16, 2010 (75 FR 49932) and requested public comments during a 60-day... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency... transfer fee covenants and in certain related securities. Such covenants are adverse to the liquidity...

  18. Study of correlation between overlay and displacement measured by Coherent Gradient Sensing (CGS) interferometry

    NASA Astrophysics Data System (ADS)

    Mileham, Jeffrey; Tanaka, Yasushi; Anberg, Doug; Owen, David M.; Lee, Byoung-Ho; Bouche, Eric

    2016-03-01

    Within the semiconductor lithographic process, alignment control is one of the most critical considerations. In order to realize high device performance, semiconductor technology is approaching the 10 nm design rule, which requires progressively smaller overlay budgets. Simultaneously, structures are expanding in the 3rd dimension, thereby increasing the potential for inter-layer distortion. For these reasons, device patterning is becoming increasingly difficult as the portion of the overlay budget attributed to process-induced variation increases. After lithography, overlay gives valuable feedback to the lithography tool; however overlay measurements typically have limited density, especially at the wafer edge, due to throughput considerations. Moreover, since overlay is measured after lithography, it can only react to, but not predict the process-induced overlay. This study is a joint investigation in a high-volume manufacturing environment of the portion of overlay associated with displacement induced by a single process across many chambers. Displacement measurements are measured by Coherent Gradient Sensing (CGS) interferometry, which generates high-density displacement maps (>3 million points on a 300 mm wafer) such that the stresses induced die-by-die and process-by-process can be tracked in detail. The results indicate the relationship between displacement and overlay shows the ability to forecast overlay values before the lithographic process. Details of the correlation including overlay/displacement range, and lot-to-lot displacement variability are considered.

  19. Privatization in Education.

    ERIC Educational Resources Information Center

    Rehfuss, John

    1995-01-01

    Privatization calls for substantially trimming the scope and breadth of government services, replacing them with private or other nongovernmental operators. The attraction of privatization is reduced costs and increased management flexibility. To date, the arrangement has received substantial support from students and parents in situations that…

  20. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  1. 78 FR 75376 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTP-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... discuss matters relating to the Classified National Security Information Program for State, Local, Tribal... Administration; 700 Pennsylvania Avenue NW., Jefferson Room; Washington, DC 20408. FOR FURTHER...

  2. Combined overlay, focus and CD metrology for leading edge lithography

    NASA Astrophysics Data System (ADS)

    Ebert, Martin; Cramer, Hugo; Tel, Wim; Kubis, Michael; Megens, Henry

    2011-04-01

    As leading edge lithography moves to 22-nm design rules, low k1 technologies like double patterning are the new resolution enablers, and system control and setup are the new drivers to meet remarkably tight process requirements. The way of thinking and executing setup and control of lithography scanners is changing in four ways. First, unusually tight process tolerances call for very dense sampling [1], which in effect means measurements at high throughput combined with high order modeling and corrections to compensate for wafer spatial fingerprint. Second, complex interactions between scanner and process no longer allow separation of error sources through traditional metrology approaches, which are based on using one set of metrology tools and methods for setup and another for scanner performance control. Moreover, setup and control of overlay is done independently from CD uniformity, which in effect leads to independent and conflicting adjustments for the scanner. Third, traditional CD setup and control is based on the focus and dose calculated from their CD response and not from measurement of their effect on pattern profile, which allows a clean and orthogonal de-convolution of focus and dose variations across the wafer. Fourth, scanner setup and control has to take into consideration the final goal of lithography, which is the accurate printing of a complex pattern describing a real device layout. To this end we introduce a new setup and control metrology step: measuring-to-match scanner 1D and 2D proximity. In this paper we will describe the strategy for setup and control of overlay, focus, CD and proximity based on the YieldStarTM metrology tool and present the resulting performance. YieldStar-200 is a new, high throughput metrology tool based on a high numerical aperture scatterometer concept. The tool can be used stand-alone as well as integrated in a processing track. It is suitable for determining process offsets in X,Y and Z directions through Overlay

  3. A basic guide to overlay design using nondestructive testing equipment data

    NASA Astrophysics Data System (ADS)

    Turner, Vernon R.

    1990-08-01

    The purpose of this paper is to provide a basic and concise guide to designing asphalt concrete (AC) overlays over existing AC pavements. The basis for these designs is deflection data obtained from nondestructive testing (NDT) equipment. This data is used in design procedures which produce required overlay thickness or an estimate of remaining pavement life. This guide enables one to design overlays or better monitor the designs being performed by others. This paper will discuss three types of NDT equipment, the Asphalt Institute Overlay Designs by Deflection Analysis and by the effective thickness method as well as a method of estimating remaining pavement life, correlations between NDT equipment and recent correlations in Washington State. Asphalt overlays provide one of the most cost effective methods of improving existing pavements. Asphalt overlays can be used to strengthen existing pavements, to reduce maintenance costs, to increase pavement life, to provide a smoother ride, and to improve skid resistance.

  4. Evaluation of Free-Riding Traffic Problem in Overlay Routing and Its Mitigation Method

    NASA Astrophysics Data System (ADS)

    Hasegawa, Go; Hiraoka, Yuichiro; Murata, Masayuki

    Recent research on overlay networks has revealed that user-perceived network performance could be improved by an overlay routing mechanism. The effectiveness of overlay routing is mainly a result of the policy mismatch between the overlay routing and the underlay IP routing operated by ISPs. However, this policy mismatch causes a “free-riding” traffic problem, which may become harmful to the cost structure of Internet Service Providers. In the present paper, we define the free-riding problem in the overlay routing and evaluate the degree of free-riding traffic to reveal the effect of the problem on ISPs. We introduce a numerical metric to evaluate the degree of the free-riding problem and confirm that most multihop overlay paths that have better performance than the direct path brings the free-riding problem. We also discuss the guidelines for selecting paths that are more effective than the direct path and that mitigate the free-riding problem.

  5. Effect of Perovskite Overlayers on TiO2 Electrodes in Perovskite-Sensitized Solar Cells.

    PubMed

    Kim, Kang-Pil; Kim, Jeong-Hwa; Hwang, Dae-Kue

    2016-05-01

    In this paper, we have studied the effect of the thickness of a CH3NH3PbI3 perovskite overlayer on mesoporous TiO2 electrodes in perovskite solar cells. The overlayers were prepared by spin coating PbI2 films on the electrodes, which were subsequently exposed to a CH3NH3I/2-propanol solution. We controlled the thickness of the perovskite overlayer by changing the PbI2 solution concentration. The thicknesses of the overlayers spin-coated from 0.5, 0.75, 0.9, and 1 M PbI2 solutions were approximately 179, 262, 316, and 341 nm, respectively. Perovskite solar cells with an approximately 316-nm-thick overlayer showed the highest efficiency of 9.11%. We conclude that optimization of the perovskite overlayer thickness in the solar cell structure is necessary to improve the cell efficiency. PMID:27483921

  6. Ductile film delamination from compliant substrates using hard overlayers

    PubMed Central

    Cordill, M.J.; Marx, V.M.; Kirchlechner, C.

    2014-01-01

    Flexible electronic devices call for copper and gold metal films to adhere well to polymer substrates. Measuring the interfacial adhesion of these material systems is often challenging, requiring the formulation of different techniques and models. Presented here is a strategy to induce well defined areas of delamination to measure the adhesion of copper films on polyimide substrates. The technique utilizes a stressed overlayer and tensile straining to cause buckle formation. The described method allows one to examine the effects of thin adhesion layers used to improve the adhesion of flexible systems. PMID:25641995

  7. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  8. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...

  9. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...

  10. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...

  11. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Requirements for storing and using a private key... Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for digitally... private key. (b) The certificate holder must provide FIPS-approved secure storage for the private key,...

  12. Effect of a Dielectric Overlay on a Linearly Tapered Slot Antenna Excited by a Coplanar Waveguide

    NASA Technical Reports Server (NTRS)

    Simons, Rainee N.; Lee, Richard Q.; Perl, Thomas D.; Silvestro, John

    1993-01-01

    The effect of a dielectric overlay on a linearly tapered slot antenna (LTSA) is studied. The LTSA under study has very wide bandwidth and excellent radiation patterns. A dielectric overlay improves the patterns and directivity of the antenna by increasing the electrical length and effective aperture of the antenna. A dielectric overlay can also be used to reduce the physical length of the antenna without compromising the pattern quality.

  13. Examination of overlay pipe weldments removed from the Hatch-2 reactor

    SciTech Connect

    Park, J.Y.; Kupperman, D.S.; Shack, W.J.

    1985-02-01

    Laboratory ultrasonic examination (UT), dye penetrant examination (PT), metallography, and sensitization measurements were performed on Type 304 stainless steel overlay pipe weldments from the Hatch-2 BWR to determine the effectiveness of UT through overlays and the effects of the overlays on crack propagation in the weldments. Little correlation was observed between the results of earlier in-service ultrasonic inspection and the results of PT and destructive examination. Considerable difficulty was encountered in correctly detecting the presence of cracks by UT in the laboratory. Blunting of the crack tip by the weld overlay was observed, but there was no evidence of tearing or throughwall extension of the crack beyond the blunted region.

  14. Lightweight storage and overlay networks for fault tolerance.

    SciTech Connect

    Oldfield, Ron A.

    2010-01-01

    The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands to millions of processors, In such environments, it is critical to have fault-tolerance mechanisms, including checkpoint/restart, that scale with the size of applications and the percentage of the system on which the applications execute. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a scalable solution. For example, on today's massive-scale systems that execute applications which consume most of the memory of the employed compute nodes, checkpoint operations generate I/O that consumes nearly 80% of the total I/O usage. Motivated by this observation, this project aims to improve I/O performance for application-directed checkpoints through the use of lightweight storage architectures and overlay networks. Lightweight storage provide direct access to underlying storage devices. Overlay networks provide caching and processing capabilities in the compute-node fabric. The combination has potential to signifcantly reduce I/O overhead for large-scale applications. This report describes our combined efforts to model and understand overheads for application-directed checkpoints, as well as implementation and performance analysis of a checkpoint service that uses available compute nodes as a network cache for checkpoint operations.

  15. Dynamic bi-overlay rotation for streaming with heterogeneous devices

    NASA Astrophysics Data System (ADS)

    Liu, Dongyu; Chen, Songqing; Shen, Bo

    2008-01-01

    Recently Internet P2P/overlay streaming has gained increasing popularity. While plenty of research has focused on streaming performance study, it is not quite known yet on how to efficiently serve heterogeneous devices that have different limitations on display size, color depth, bandwidth capacities, CPU and battery power, than desktop computers. Although previous work1 proposes to reuse intermediate information (metadata) produced during transcoding to facilitate runtime content adaption to serve heterogeneous clients by reducing total computing load, unbalanced resource contribution may pre-maturely exhaust the limited power of mobile devices, and adversely affect the performance of participating nodes and subsequently threaten the robustness of the whole system. In this work, we propose a Dynamic Bi-Overlay Rotation (DOOR) scheme, in which, we further consider resource consumption of participating nodes to design a dynamic rotation scheme that reacts to dynamic situations and balances across multiple types of resources on individual nodes. Based on the computing load and transcoding quality parameters obtained through real transcoding sessions, we drive large scale simulations to evaluate DOOR. The results show clear improvement of DOOR over earlier work.

  16. Blot overlays with 32P-labeled fusion proteins.

    PubMed

    Zhao, Z; Lim, L; Manser, E

    2001-07-01

    Proteins labeled with 32P can be used as sensitive "prime" in blot overlays to detect binding proteins or domains. Small G-protein Ras can bind GTP with extremely high affinity (Kd approximately 10(-11)-10(-12) M) in the presence of Mg2+. We have taken advantage of this property of Ras to develop a vector that expresses proteins of interest such as glutathione S-transferase (GST)/Ras fusion proteins for noncovalent labeling with [gamma-32P]GTP. The labeling efficiency of this method is >60% and involves a single short incubation step. We have previously identified several binding proteins for the second SH3 domain of the adaptor Nck using this method. Here we illustrate the overlay method using the GST/Ras system and compare results with the SH3 domain labeled by phosphorylation with [gamma-32P]ATP. Both methods are similarly specific and sensitive; however, we show that signals are dependent primarily on GST-mediated probe dimerization. These dimeric probes allow a more stable probe-target complex similar to immunoglobulin interactions, thus significantly improving the sensitivity of the technique. PMID:11403569

  17. 49 CFR 1580.105 - Reporting significant security concerns.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... 49 Transportation 9 2012-10-01 2012-10-01 false Reporting significant security concerns. 1580.105... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  18. 49 CFR 1580.105 - Reporting significant security concerns.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... 49 Transportation 9 2014-10-01 2014-10-01 false Reporting significant security concerns. 1580.105... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  19. 49 CFR 1580.105 - Reporting significant security concerns.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... 49 Transportation 9 2013-10-01 2013-10-01 false Reporting significant security concerns. 1580.105... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY...

  20. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  1. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  2. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  3. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  4. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  5. 76 FR 60853 - Agency Information Collection Activities: Documents Required Aboard Private Aircraft

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-30

    ... Aboard Private Aircraft AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security... concerning the Documents Required Aboard Private Aircraft. This request for comment is being made pursuant to...: Documents Required Aboard Private Aircraft. OMB Number: 1651-0058. Form Number: None. Abstract:...

  6. 31 CFR 306.85 - Private corporations and unincorporated associations (including nominees).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Private corporations and... DEBT GENERAL REGULATIONS GOVERNING U.S. SECURITIES Assignments in Behalf of Private or Public Organizations § 306.85 Private corporations and unincorporated associations (including nominees)....

  7. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  8. 31 CFR 306.85 - Private corporations and unincorporated associations (including nominees).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false Private corporations and... SERVICE GENERAL REGULATIONS GOVERNING U.S. SECURITIES Assignments in Behalf of Private or Public Organizations § 306.85 Private corporations and unincorporated associations (including nominees)....

  9. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private...

  10. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  11. 17 CFR 275.202(a)(30)-1 - Foreign private advisers.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Foreign private advisers. 275... private advisers. (a) Client. You may deem the following to be a single client for purposes of section 202...) You are not required to count a private fund as a client if you count any investor, as that term...

  12. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private...

  13. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  14. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Private fund adviser exemption... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund...: (1) Acts solely as an investment adviser to one or more qualifying private funds; and (2)...

  15. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Private fund adviser exemption... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund...: (1) Acts solely as an investment adviser to one or more qualifying private funds; and (2)...

  16. 17 CFR 275.202(a)(30)-1 - Foreign private advisers.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Foreign private advisers. 275... private advisers. (a) Client. You may deem the following to be a single client for purposes of section 202...) You are not required to count a private fund as a client if you count any investor, as that term...

  17. 76 FR 45281 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-28

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private... private insurance companies (Companies) and to make available to the Companies the terms for subscription... July 1, 2011) private sector property insurers issue flood insurance policies and adjust...

  18. 43 CFR 429.32 - How will Reclamation address currently authorized existing private exclusive recreational or...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... security. A review of whether existing private exclusive recreational or residential uses is compatible... authorized existing private exclusive recreational or residential uses? 429.32 Section 429.32 Public Lands... private exclusive recreational or residential uses? The administration and potential renewal of...

  19. 13 CFR 107.1570 - Distributions by Licensee-optional Distribution to private investors and SBA.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Distribution to private investors and SBA. 107.1570 Section 107.1570 Business Credit and Assistance SMALL... private investors and SBA. If you have outstanding Participating Securities or Earmarked Assets, you may... and your private investors in proportion to the capital contributions of each. You must notify SBA...

  20. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private...

  1. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Private fund adviser exemption... COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund...: (1) Acts solely as an investment adviser to one or more qualifying private funds; and (2)...

  2. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private...

  3. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Private aircraft taken abroad by U.S. residents. 122.28 Section 122.28 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private...

  4. 17 CFR 275.202(a)(30)-1 - Foreign private advisers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Foreign private advisers. 275... private advisers. (a) Client. You may deem the following to be a single client for purposes of section 202...) You are not required to count a private fund as a client if you count any investor, as that term...

  5. 20 CFR 702.505 - Vocational rehabilitation; referrals to other public and private agencies.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... public and private agencies. 702.505 Section 702.505 Employees' Benefits EMPLOYMENT STANDARDS... public and private agencies. Referrals to such other public and private agencies providing assistance to... of the Veterans Administration, the Social Security Administration, and other such agencies, shall...

  6. 76 FR 35006 - Recovery Policy RP9523.4, Demolition of Private Structures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITY Federal Emergency Management Agency Recovery Policy RP9523.4, Demolition of Private Structures..., Demolition of Private Structures. DATES: Comments must be received by July 15, 2011. ADDRESSES: Comments must... private structures under the provisions of the Public Assistance Program. FEMA proposes to include...

  7. 17 CFR 240.13e-3 - Going private transactions by certain issuers or their affiliates.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Going private transactions by certain issuers or their affiliates. 240.13e-3 Section 240.13e-3 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under...

  8. Quantum private comparison over noisy channels

    NASA Astrophysics Data System (ADS)

    Siddhu, Vikesh; Arvind

    2015-08-01

    Quantum private comparison (QPC) allows us to protect private information during its comparison. In the past, various three-party quantum protocols have been proposed that claim to work well under noisy conditions. Here, we tackle the problem of QPC under noise. We analyze the EPR-based protocol under depolarizing noise, bit flip and phase flip noise. We show how noise affects the robustness of the EPR-based protocol. We then present a straightforward protocol based on CSS codes to perform QPC which is robust against noise and secure under general attacks.

  9. 75 FR 66822 - Study on Extraterritorial Private Rights of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ... COMMISSION Study on Extraterritorial Private Rights of Action AGENCY: Securities and Exchange Commission. ACTION: Request for Comments. SUMMARY: Section 929Y of the Dodd-Frank Wall Street Reform and Consumer... rights of action under the antifraud provisions of the Securities Exchange Act of 1934 (the...

  10. Virtual overlay metrology for fault detection supported with integrated metrology and machine learning

    NASA Astrophysics Data System (ADS)

    Lee, Hong-Goo; Schmitt-Weaver, Emil; Kim, Min-Suk; Han, Sang-Jun; Kim, Myoung-Soo; Kwon, Won-Taik; Park, Sung-Ki; Ryan, Kevin; Theeuwes, Thomas; Sun, Kyu-Tae; Lim, Young-Wan; Slotboom, Daan; Kubis, Michael; Staecker, Jens

    2015-03-01

    While semiconductor manufacturing moves toward the 7nm node for logic and 15nm node for memory, an increased emphasis has been placed on reducing the influence known contributors have toward the on product overlay budget. With a machine learning technique known as function approximation, we use a neural network to gain insight to how known contributors, such as those collected with scanner metrology, influence the on product overlay budget. The result is a sufficiently trained function that can approximate overlay for all wafers exposed with the lithography system. As a real world application, inline metrology can be used to measure overlay for a few wafers while using the trained function to approximate overlay vector maps for the entire lot of wafers. With the approximated overlay vector maps for all wafers coming off the track, a process engineer can redirect wafers or lots with overlay signatures outside the standard population to offline metrology for excursion validation. With this added flexibility, engineers will be given more opportunities to catch wafers that need to be reworked, resulting in improved yield. The quality of the derived corrections from measured overlay metrology feedback can be improved using the approximated overlay to trigger, which wafers should or shouldn't be, measured inline. As a development or integration engineer the approximated overlay can be used to gain insight into lots and wafers used for design of experiments (DOE) troubleshooting. In this paper we will present the results of a case study that follows the machine learning function approximation approach to data analysis, with production overlay measured on an inline metrology system at SK hynix.

  11. 17 CFR 279.9 - Form PF, reporting by investment advisers to private funds.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... Editorial Note: For Federal Register citations affecting Form PF, see the List of CFR Sections Affected... investment advisers to private funds. 279.9 Section 279.9 Commodity and Securities Exchanges SECURITIES AND..., reporting by investment advisers to private funds. This form shall be filed pursuant to Rule 204(b)-1 (§...

  12. 17 CFR 275.204(b)-1 - Reporting by investment advisers to private funds.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... least $150 million, you must complete and file a report on Form PF (17 CFR 279.9) by following the... advisers to private funds. 275.204(b)-1 Section 275.204(b)-1 Commodity and Securities Exchanges SECURITIES...)-1 Reporting by investment advisers to private funds. (a) Reporting by investment advisers to...

  13. 17 CFR 279.9 - Form PF, reporting by investment advisers to private funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... Editorial Note: For Federal Register citations affecting Form PF, see the List of CFR Sections Affected... investment advisers to private funds. 279.9 Section 279.9 Commodity and Securities Exchanges SECURITIES AND..., reporting by investment advisers to private funds. This form shall be filed pursuant to Rule 204(b)-1 (§...

  14. 17 CFR 279.9 - Form PF, reporting by investment advisers to private funds.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... Editorial Note: For Federal Register citations affecting Form PF, see the List of CFR Sections Affected... investment advisers to private funds. 279.9 Section 279.9 Commodity and Securities Exchanges SECURITIES AND..., reporting by investment advisers to private funds. This form shall be filed pursuant to Rule 204(b)-1 (§...

  15. 17 CFR 275.204(b)-1 - Reporting by investment advisers to private funds.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... least $150 million, you must complete and file a report on Form PF (17 CFR 279.9) by following the... advisers to private funds. 275.204(b)-1 Section 275.204(b)-1 Commodity and Securities Exchanges SECURITIES...)-1 Reporting by investment advisers to private funds. (a) Reporting by investment advisers to...

  16. 20 CFR 422.527 - Private printing and modification of prescribed applications, forms, and other publications.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Private printing and modification of... Management, 6401 Security Boulevard, Baltimore, MD 21235-6401....

  17. 20 CFR 422.527 - Private printing and modification of prescribed applications, forms, and other publications.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Private printing and modification of... Management, 6401 Security Boulevard, Baltimore, MD 21235-6401....

  18. 17 CFR 275.204(b)-1 - Reporting by investment advisers to private funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... least $150 million, you must complete and file a report on Form PF (17 CFR 279.9) by following the... advisers to private funds. 275.204(b)-1 Section 275.204(b)-1 Commodity and Securities Exchanges SECURITIES...)-1 Reporting by investment advisers to private funds. (a) Reporting by investment advisers to...

  19. Quantum private comparison with a malicious third party

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling; Wu, Chunhui

    2015-06-01

    In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants' inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.

  20. Toward 7nm target on product overlay for C028 FDSOI technology

    NASA Astrophysics Data System (ADS)

    Gatefait, Maxime; Le-Gratiet, Bertrand; Goirand, Pierre Jerome; Lam, Auguste; Van Haren, Richard; Pastol, Anne; Doytcheva, Maya; Liu, Xing Lan; Beltman, Jan

    2013-04-01

    The continuous need for lithography overlay performance improvement is a key point for advanced integrated circuit manufacturing. Overlay control is more and more challenging in the 2x nm process nodes regarding functionality margin of the chip and tool capability. Transistor architecture rules which are set, confirm poly to contact space as the most critical one for 28nm technology node. Critical Dimension variability of these layers, even with best in class process stability, in addition to design constraint lead to on product overlay specifications of around 7nm. In order to ensure that the target is met in production environment and to identify potential ways for improvement, identification of the contributors to overlay errors is essential. We have introduced a novel budget breakdown methodology using both bottom-up and top-down overlay data. For the bottom up part, we have performed extensive testing with very high sampling scheme so as to quantify the main effects. In-line overlay metrology data has been used for top down approach to verify the overall performance in production. In this paper we focused on the 28nm contact to gate overlay in a FDSOI process. The initial inconsistency between bottom up and top down results led us to further exploration of the root cause of these inconsistencies. We have been able to highlight key figures to focus on, like reticle heating, wafer table contamination and etch processing effects. Finally, we conclude on 7nm overlay target achievement feasibility in high volume manufacturing environment.

  1. Questioning the Benefits That Coloured Overlays Can Have for Reading in Students with and without Dyslexia

    ERIC Educational Resources Information Center

    Henderson, Lisa M.; Tsogka, Natassa; Snowling, Margaret J.

    2013-01-01

    Visual stress (the experience of visual distortions and discomfort during prolonged reading) is frequently identified and alleviated with coloured overlays or lenses. Previous studies have associated visual stress with dyslexia and as a consequence, coloured overlays are widely distributed to children and adults with reading difficulty. However,…

  2. The Limits of Privatization.

    ERIC Educational Resources Information Center

    Starr, Paul

    Transferring public services and public assets to private ownership is not an entirely new idea. Governments at all levels in the United States have for years contracted out many services. However, under the recently coined label "privatization," such policies now come recommended as a more comprehensive approach to the problems of modern…

  3. Public Values, Private Schools.

    ERIC Educational Resources Information Center

    Devins, Neal E.

    Controversy surrounding private education involves questions of compulsory education's role in inculcating values, how much alike public and private schools should be, and the duty of educational institutions to conform to constitutional norms. This book examines government regulation and resistance, legislative and judicial approaches, and issues…

  4. Private Speech in Ballet

    ERIC Educational Resources Information Center

    Johnston, Dale

    2006-01-01

    Authoritarian teaching practices in ballet inhibit the use of private speech. This paper highlights the critical importance of private speech in the cognitive development of young ballet students, within what is largely a non-verbal art form. It draws upon research by Russian psychologist Lev Vygotsky and contemporary socioculturalists, to…

  5. Overlay improvement by exposure map based mask registration optimization

    NASA Astrophysics Data System (ADS)

    Shi, Irene; Guo, Eric; Chen, Ming; Lu, Max; Li, Gordon; Li, Rivan; Tian, Eric

    2015-03-01

    Along with the increased miniaturization of semiconductor electronic devices, the design rules of advanced semiconductor devices shrink dramatically. [1] One of the main challenges of lithography step is the layer-to-layer overlay control. Furthermore, DPT (Double Patterning Technology) has been adapted for the advanced technology node like 28nm and 14nm, corresponding overlay budget becomes even tighter. [2][3] After the in-die mask registration (pattern placement) measurement is introduced, with the model analysis of a KLA SOV (sources of variation) tool, it's observed that registration difference between masks is a significant error source of wafer layer-to-layer overlay at 28nm process. [4][5] Mask registration optimization would highly improve wafer overlay performance accordingly. It was reported that a laser based registration control (RegC) process could be applied after the pattern generation or after pellicle mounting and allowed fine tuning of the mask registration. [6] In this paper we propose a novel method of mask registration correction, which can be applied before mask writing based on mask exposure map, considering the factors of mask chip layout, writing sequence, and pattern density distribution. Our experiment data show if pattern density on the mask keeps at a low level, in-die mask registration residue error in 3sigma could be always under 5nm whatever blank type and related writer POSCOR (position correction) file was applied; it proves random error induced by material or equipment would occupy relatively fixed error budget as an error source of mask registration. On the real production, comparing the mask registration difference through critical production layers, it could be revealed that registration residue error of line space layers with higher pattern density is always much larger than the one of contact hole layers with lower pattern density. Additionally, the mask registration difference between layers with similar pattern density

  6. Extremely fast hydrogen absorption/desorption through platinum overlayers

    NASA Astrophysics Data System (ADS)

    Połczyński, Piotr; Jurczakowski, Rafał

    2016-02-01

    The hydrogen electrosorption in thin palladium films (50-1000 nm) was investigated at palladium electrodes covered with platinum overlayers. The results for this model system show that the rates of the hydrogen sorption/desorption are orders of magnitude higher for platinized samples with respect to pure palladium. The highest absorption kinetics have been observed for Pd electrodes fully covered with 1-3 platinum monolayers. By means of electrochemical impedance spectroscopy (EIS) we have shown that the process is diffusion limited at platinized Pd layers. Diffusion coefficient, DH, determined in EIS, is two orders of magnitude higher than that previously reported for thin palladium films and approaches DH for bulk palladium. The system stability after hydrogen absorption was assessed and the sorption mechanism was discussed. Surprisingly high durability of the platinized palladium enables its use in a variety of applications where fast and selective response in the presence of hydrogen is required.

  7. Decentralized Service Allocation in a Broker Overlay Based Grid

    NASA Astrophysics Data System (ADS)

    Azab, Abdulrahman; Meling, Hein

    Grid computing is based on coordinated resource sharing in a dynamic environment of multi-institutional virtual organizations. Data exchanges, and service allocation, are challenging problems in the field of Grid computing. This is due to the decentralization of Grid systems. Building decentralized Grid systems with efficient resource management and software component mechanisms is a need for achieving the required efficiency and usability of Grid systems. In this work, a decentralized Grid system model is presented in which, the system is divided into virtual organizations each controlled by a broker. An overlay network of brokers is responsible for global resource management and managing allocation of services. Experimental results show that, the system achieves dependable performance with various loads of services, and broker failures.

  8. The Private User Network Interface--a GMPLS-compliant signaling

    NASA Astrophysics Data System (ADS)

    Papadimitriou, Dimitri; Rousseau, Bart; Körber, Wolfgang; Brockmann, Steffen; Verchère, Dominique

    2004-03-01

    To address the integration of [IP/MPLS (multiprotocol label-switching)] packet and (optical) transport networks, the Optical Internetworking Forum (OIF) has defined a user-to-network interface (UNI) for overlay networks: the OIF UNI version 1.0, also referred to as the Public UNI. However, since its implementation agreement specification, it has become clear that this UNI--based on OIF-specific extensions to the generalized MPLS (GMPLS) protocols--will not be able to meet the future requirements of some operational environments. Hence a flexible, extensible, and fully GMPLS-compliant UNI is being defined at the Internet Engineering Task Force (IETF): the Private UNI (aka GMPLS for overlay networks). The Private UNI enhances the interaction between the packet and transport network control planes of a multilayer network architecture. This interface is particularly suitable for a control-plane interconnection model in which the equipment belongs to a common administrative entity (i.e., a single carrier environment). Signaling sessions through the Private UNI are used to invoke two main services that require constructive coordination between the network layers: provisioning and network recovery. Here we present the Private UNI specific GMPLS resource reservation protocol-traffic engineering (RSVP-TE) extensions in support of these services in IP/MPLS over SONET/SDH (synchronous optical network/synchronous digital hierarchy) GMPLS multilayer networks and illustrate how Private UNI signaling enhances coordination in multilayer network recovery.

  9. Integrated production overlay field-by-field control for leading edge technology nodes

    NASA Astrophysics Data System (ADS)

    Chung, Woong Jae; Tristan, John; Gutjahr, Karsten; Subramany, Lokesh; Li, Chen; Sun, Yulei; Yelverton, Mark; Kim, Young Ki; Kim, Jeong Soo; Huang, Chin-Chou Kevin; Pierson, William; Karur-Shanmugam, Ramkumar; Riggs, Brent; Jug, Sven; Robinson, John C.; Yap, Lipkong; Ramanathan, Vidya

    2014-04-01

    As photolithography will continue with 193nm immersion multiple patterning technologies for the leading edge HVM process node, the production overlay requirement for critical layers in logic devices has almost reached the scanner hardware performance limit. To meet the extreme overlay requirements in HVM production environment, this study investigates a new integrated overlay control concept for leading edge technology nodes that combines the run-to-run (R2R) linear or high order control loop, the periodic field-by-field or correction per exposure (CPE) wafer process signature control loop, and the scanner baseline control loop into a single integrated overlay control path through the fab host APC system. The goal is to meet the fab requirements for overlay performance, lower the cost of ownership, and provide freedom of control methodology. In this paper, a detailed implementation of this concept will be discussed, along with some preliminary results.

  10. Exact and reliable overlay metrology in nanoscale semiconductor devices using an image processing method

    NASA Astrophysics Data System (ADS)

    Park, Jinkook; Shin, ChaeHo; Kim, Minkook; Kim, Junghwan; Park, JeongKyun; Kim, JungSoo; Jun, ChungSam; Yim, Yeny; Lee, Janghee

    2014-10-01

    As semiconductor processing becomes more complicated and pattern sizes shrink, the overlay metrology has become one of the most important issues in the semiconductor industry. Therefore, in order to obtain correct, reliable overlay values in semiconductor fabrication facilities (fab), quantization methods for the efficient management and implementation of a measurement algorithm are required, as well as an understanding of the target structures in the semiconductor device. We implemented correct, reliable overlay values in the pattern using the image processing method. The quantization method, through correlation analysis and a new algorithm for target structures, were able to improve the sensitivity to misalignment in the pattern and enable more stable and credible in-line measurement by decreasing the distribution of the residuals in overlay values. Since overlay values of the pattern in the fab were measured and managed more reliably and quickly, it is expected that our study will be able to contribute to the yield enhancement of semiconductor companies.

  11. Fundamentals of overlay measurement and inspection using scanning electron-microscope

    NASA Astrophysics Data System (ADS)

    Kato, T.; Okagawa, Y.; Inoue, O.; Arai, K.; Yamaguchi, S.

    2013-04-01

    Scanning electron-microscope (SEM) has been successfully applied to CD measurement as promising tools for qualifying and controlling quality of semiconductor devices in in-line manufacturing process since 1985. Furthermore SEM is proposed to be applied to in-die overlay monitor in the local area which is too small to be measured by optical overlay measurement tools any more, when the overlay control limit is going to be stringent and have un-ignorable dependence on device pattern layout, in-die location, and singular locations in wafer edge, etc. In this paper, we proposed new overlay measurement and inspection system to make an effective use of in-line SEM image, in consideration of trade-off between measurement uncertainty and measurement pattern density in each SEM conditions. In parallel, we make it clear that the best hybrid overlay metrology is in considering each tool's technology portfolio.

  12. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  13. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  14. 24 CFR 891.435 - Security deposits.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... other available public or private resources. The Owner (or Borrower) may collect the security deposit on... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Security deposits. 891.435 Section... Security deposits. This section shall apply to capital advances under the Section 202 Program and...

  15. 24 CFR 891.435 - Security deposits.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... other available public or private resources. The Owner (or Borrower) may collect the security deposit on... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Security deposits. 891.435 Section... Security deposits. This section shall apply to capital advances under the Section 202 Program and...

  16. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  17. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  18. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  19. Dialogue on private events

    PubMed Central

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior differs from other behavior except in amplitude. Most participants took a cautious stance, noting not only conceptual pitfalls and empirical difficulties in the study of private events, but doubting the value of interpretive exercises about them. Others argued that despite such obstacles, in domains where experimental analyses cannot be done, interpretation of private events in the light of laboratory principles is the best that science can offer. One participant suggested that the notion that private events can be behavioral in nature be abandoned entirely; as an alternative, the phenomena should be reinterpreted only as physiological events. PMID:22477293

  20. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  1. 17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Reports of foreign private... Regulations Under the Securities Exchange Act of 1934 Other Reports § 240.15d-16 Reports of foreign private issuers on Form 6-K . (a) Every foreign private issuer which is subject to Rule 15d-1 shall make...

  2. 17 CFR 240.15d-16 - Reports of foreign private issuers on Form 6-K [17 CFR 249.306].

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Reports of foreign private... Regulations Under the Securities Exchange Act of 1934 Other Reports § 240.15d-16 Reports of foreign private issuers on Form 6-K . (a) Every foreign private issuer which is subject to Rule 15d-1 shall make...

  3. Private Housing or Alternative Financing?

    ERIC Educational Resources Information Center

    Bruno, Nick

    1999-01-01

    Explores the history of privatizing university housing and some current financing options, including use of developer and private foundations. Examples of successful alternative financing methods are highlighted. (GR)

  4. Diffraction based overlay metrology: accuracy and performance on front end stack

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Cheng, Shaunee; Kandel, Daniel; Adel, Michael; Marchelli, Anat; Vakshtein, Irina; Vasconi, Mauro; Salski, Bartlomiej

    2008-03-01

    The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty requirements of 0.57 nm for the most challenging use cases of the 32nm technology generation. Theoretical considerations show that overlay technology based on differential signal scatterometry (SCOL TM) has inherent advantages, which will allow it to achieve the 32nm technology generation requirements and go beyond it. In this work we present results of an experimental and theoretical study of SCOL. We present experimental results, comparing this technology with the standard imaging overlay metrology. In particular, we present performance results, such as precision and tool induced shift, for different target designs. The response to a large range of induced misalignment is also shown. SCOL performance on these targets for a real stack is reported. We also show results of simulations of the expected accuracy and performance associated with a variety of scatterometry overlay target designs. The simulations were carried out on several stacks including FEOL and BEOL materials. The inherent limitations and possible improvements of the SCOL technology are discussed. We show that with the appropriate target design and algorithms, scatterometry overlay achieves the accuracy required for future technology generations.

  5. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  6. Augmented Endoscopic Images Overlaying Shape Changes in Bone Cutting Procedures.

    PubMed

    Nakao, Megumi; Endo, Shota; Nakao, Shinichi; Yoshida, Munehito; Matsuda, Tetsuya

    2016-01-01

    In microendoscopic discectomy for spinal disorders, bone cutting procedures are performed in tight spaces while observing a small portion of the target structures. Although optical tracking systems are able to measure the tip of the surgical tool during surgery, the poor shape information available during surgery makes accurate cutting difficult, even if preoperative computed tomography and magnetic resonance images are used for reference. Shape estimation and visualization of the target structures are essential for accurate cutting. However, time-varying shape changes during cutting procedures are still challenging issues for intraoperative navigation. This paper introduces a concept of endoscopic image augmentation that overlays shape changes to support bone cutting procedures. This framework handles the history of the location of the measured drill tip as a volume label and visualizes the remains to be cut overlaid on the endoscopic image in real time. A cutting experiment was performed with volunteers, and the feasibility of this concept was examined using a clinical navigation system. The efficacy of the cutting aid was evaluated with respect to the shape similarity, total moved distance of a cutting tool, and required cutting time. The results of the experiments showed that cutting performance was significantly improved by the proposed framework. PMID:27584732

  7. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  8. Ultrasonic Evaluation of Two Dissimilar Metal Weld Overlay Specimens

    SciTech Connect

    Crawford, Susan L.; Cinson, Anthony D.; Prowant, Matthew S.; Moran, Traci L.; Anderson, Michael T.

    2012-06-30

    Two dissimilar metal weld (DMW) pipe-to-nozzle specimens were implanted with thermal fatigue cracks in the 13% to 90% through-wall depth range. The specimens were ultrasonically evaluated with phased-array probes having center frequencies of 0.8, 1.0, 1.5, and 2.0 megahertz (MHz). An Alloy 82/182 weld overlay (WOL) was applied and the specimens were ultrasonically re-evaluated for flaw detection and characterization. The Post-WOL flaw depths were approximately 10% to 56% through-wall. This study has shown the effectiveness of ultrasonic examinations of Alloy 82/182 overlaid DMW specimens. Phased-array probes with center frequency in the 0.8- to 1.0-MHz range provide a strong coherent signal but the greater ultrasonic wavelength and larger beam spot size prevent the reliable detection of small flaws. These small flaws had nominal through-wall depths of less than 15% and length in the 50-60 mm (2-2.4 in.) range. Flaws in the 19% and greater through-wall depth range were readily detected with all four probes. At the higher frequencies, the reflected signals are less coherent but still provide adequate signal for flaw detection and characterization. A single inspection at 2.0 MHz could provide adequate detection and sizing information but a supplemental inspection at 1.0 or 1.5 MHz is recommended.

  9. Quality metric for accurate overlay control in <20nm nodes

    NASA Astrophysics Data System (ADS)

    Klein, Dana; Amit, Eran; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Huang, Chin-Chou Kevin; Karur-Shanmugam, Ramkumar; Pierson, Bill; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    The semiconductor industry is moving toward 20nm nodes and below. As the Overlay (OVL) budget is getting tighter at these advanced nodes, the importance in the accuracy in each nanometer of OVL error is critical. When process owners select OVL targets and methods for their process, they must do it wisely; otherwise the reported OVL could be inaccurate, resulting in yield loss. The same problem can occur when the target sampling map is chosen incorrectly, consisting of asymmetric targets that will cause biased correctable terms and a corrupted wafer. Total measurement uncertainty (TMU) is the main parameter that process owners use when choosing an OVL target per layer. Going towards the 20nm nodes and below, TMU will not be enough for accurate OVL control. KLA-Tencor has introduced a quality score named `Qmerit' for its imaging based OVL (IBO) targets, which is obtained on the-fly for each OVL measurement point in X & Y. This Qmerit score will enable the process owners to select compatible targets which provide accurate OVL values for their process and thereby improve their yield. Together with K-T Analyzer's ability to detect the symmetric targets across the wafer and within the field, the Archer tools will continue to provide an independent, reliable measurement of OVL error into the next advanced nodes, enabling fabs to manufacture devices that meet their tight OVL error budgets.

  10. 24 CFR 884.115 - Security and utility deposits.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... security and utility deposits, if required, from their own resources and/or other private or public sources. ... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Security and utility deposits. 884... Security and utility deposits. (a) An Owner may require Families to pay a security deposit in an...

  11. 24 CFR 884.115 - Security and utility deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... security and utility deposits, if required, from their own resources and/or other private or public sources. ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security and utility deposits. 884... Security and utility deposits. (a) An Owner may require Families to pay a security deposit in an...

  12. 24 CFR 884.115 - Security and utility deposits.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... security and utility deposits, if required, from their own resources and/or other private or public sources. ... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Security and utility deposits. 884... Security and utility deposits. (a) An Owner may require Families to pay a security deposit in an...

  13. 24 CFR 884.115 - Security and utility deposits.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... security and utility deposits, if required, from their own resources and/or other private or public sources. ... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Security and utility deposits. 884... Security and utility deposits. (a) An Owner may require Families to pay a security deposit in an...

  14. 24 CFR 884.115 - Security and utility deposits.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... security and utility deposits, if required, from their own resources and/or other private or public sources. ... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security and utility deposits. 884... Security and utility deposits. (a) An Owner may require Families to pay a security deposit in an...

  15. 64nm pitch metal1 double patterning metrology: CD and OVL control by SEMCD, image based overlay and diffraction based overlay

    NASA Astrophysics Data System (ADS)

    Ducoté, Julien; Dettoni, Florent; Bouyssou, Régis; Le-Gratiet, Bertrand; Carau, Damien; Dezauzier, Christophe

    2015-03-01

    Patterning process control of advanced nodes has required major changes over the last few years. Process control needs of critical patterning levels since 28nm technology node is extremely aggressive showing that metrology accuracy/sensitivity must be finely tuned. The introduction of pitch splitting (Litho-Etch-Litho-Etch) at 14FDSOInm node requires the development of specific metrologies to adopt advanced process control (for CD, overlay and focus corrections). The pitch splitting process leads to final line CD uniformities that are a combination of the CD uniformities of the two exposures, while the space CD uniformities are depending on both CD and OVL variability. In this paper, investigations of CD and OVL process control of 64nm minimum pitch at Metal1 level of 14FDSOI technology, within the double patterning process flow (Litho, hard mask etch, line etch) are presented. Various measurements with SEMCD tools (Hitachi), and overlay tools (KT for Image Based Overlay - IBO, and ASML for Diffraction Based Overlay - DBO) are compared. Metrology targets are embedded within a block instanced several times within the field to perform intra-field process variations characterizations. Specific SEMCD targets were designed for independent measurement of both line CD (A and B) and space CD (A to B and B to A) for each exposure within a single measurement during the DP flow. Based on those measurements correlation between overlay determined with SEMCD and with standard overlay tools can be evaluated. Such correlation at different steps through the DP flow is investigated regarding the metrology type. Process correction models are evaluated with respect to the measurement type and the intra-field sampling.

  16. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  17. Characterisation of hydrocarbonaceous overlayers important in metal-catalysed selective hydrogenation reactions

    NASA Astrophysics Data System (ADS)

    Lennon, David; Warringham, Robbie; Guidi, Tatiana; Parker, Stewart F.

    2013-12-01

    The hydrogenation of alkynes to alkenes over supported metal catalysts is an important industrial process and it has been shown that hydrocarbonaceous overlayers are important in controlling selectivity profiles of metal-catalysed hydrogenation reactions. As a model system, we have selected propyne hydrogenation over a commercial Pd(5%)/Al2O3 catalyst. Inelastic neutron scattering studies show that the C-H stretching mode ranges from 2850 to 3063 cm-1, indicating the mostly aliphatic nature of the overlayer and this is supported by the quantification of the carbon and hydrogen on the surface. There is also a population of strongly hydrogen-bonded hydroxyls, their presence would indicate that the overlayer probably contains some oxygen functionality. There is little evidence for any olefinic or aromatic species. This is distinctly different from the hydrogen-poor overlayers that are deposited on Ni/Al2O3 catalysts during methane reforming.

  18. The Effect of Colored Overlays on Reading Fluency in Individuals with Dyslexia.

    PubMed

    Denton, Tiffany Freeze; Meindl, James N

    2016-09-01

    Colored overlays, one type of tinted filter, are plastic reading sheets tinted with color and placed over text to eliminate or alleviate a wide range of reading difficulties such as low reading rate, accuracy, and comprehension. The effects of colored overlays on reading problems associated with dyslexia were investigated in this study via a multielement design. Reading fluency was assessed when participants read with and without colored overlays. Undifferentiated responding, or decreased accuracy, resulted across three participants, suggesting that colored overlays were ineffective and potentially detrimental to participants' reading abilities. As a result, empirically validated reading techniques were implemented across individuals. These findings are discussed and recommendations are made in regards to the use of research-based reading interventions. PMID:27622123

  19. Computerized polar plots by a cathode ray tube/grid overlay method

    NASA Technical Reports Server (NTRS)

    Freeman, J. M.; Shoup, E. L.

    1970-01-01

    Overlay is aligned with four calibration dots so it is not affected by CRT drift or changes in vertical or horizontal gain when producing Nyquist /frequency-response phase/amplitude/ plots. Method produces over 50 plots per hour.

  20. 76 FR 41826 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-15

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... will be held to discuss the matters relating to the Classified National Security Information Program... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 22, 2011. ISOO...

  1. Application of overlay modeling and control with Zernike polynomials in an HVM environment

    NASA Astrophysics Data System (ADS)

    Ju, JaeWuk; Kim, MinGyu; Lee, JuHan; Nabeth, Jeremy; Jeon, Sanghuck; Heo, Hoyoung; Robinson, John C.; Pierson, Bill

    2016-03-01

    Shrinking technology nodes and smaller process margins require improved photolithography overlay control. Generally, overlay measurement results are modeled with Cartesian polynomial functions for both intra-field and inter-field models and the model coefficients are sent to an advanced process control (APC) system operating in an XY Cartesian basis. Dampened overlay corrections, typically via exponentially or linearly weighted moving average in time, are then retrieved from the APC system to apply on the scanner in XY Cartesian form for subsequent lot exposure. The goal of the above method is to process lots with corrections that target the least possible overlay misregistration in steady state as well as in change point situations. In this study, we model overlay errors on product using Zernike polynomials with same fitting capability as the process of reference (POR) to represent the wafer-level terms, and use the standard Cartesian polynomials to represent the field-level terms. APC calculations for wafer-level correction are performed in Zernike basis while field-level calculations use standard XY Cartesian basis. Finally, weighted wafer-level correction terms are converted to XY Cartesian space in order to be applied on the scanner, along with field-level corrections, for future wafer exposures. Since Zernike polynomials have the property of being orthogonal in the unit disk we are able to reduce the amount of collinearity between terms and improve overlay stability. Our real time Zernike modeling and feedback evaluation was performed on a 20-lot dataset in a high volume manufacturing (HVM) environment. The measured on-product results were compared to POR and showed a 7% reduction in overlay variation including a 22% terms variation. This led to an on-product raw overlay Mean + 3Sigma X&Y improvement of 5% and resulted in 0.1% yield improvement.

  2. Live 3D image overlay for arterial duct closure with Amplatzer Duct Occluder II additional size.

    PubMed

    Goreczny, Sebstian; Morgan, Gareth J; Dryzek, Pawel

    2016-03-01

    Despite several reports describing echocardiography for the guidance of ductal closure, two-dimensional angiography remains the mainstay imaging tool; three-dimensional rotational angiography has the potential to overcome some of the drawbacks of standard angiography, and reconstructed image overlay provides reliable guidance for device placement. We describe arterial duct closure solely from venous approach guided by live three-dimensional image overlay. PMID:26358032

  3. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  4. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  5. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  6. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  7. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  8. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  9. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  10. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  11. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  12. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  13. 17 CFR 275.203(b)(3)-2 - Methods for counting clients in certain private funds.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... in certain private funds. 275.203(b)(3)-2 Section 275.203(b)(3)-2 Commodity and Securities Exchanges....203(b)(3)-2 Methods for counting clients in certain private funds. (a) For purposes of section 203(b..., members, or beneficiaries (any of which are referred to hereinafter as an “owner”) of a private fund...

  14. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the...

  15. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    SciTech Connect

    Beushausen, Hans Chilwesa, Masuzyo

    2013-11-15

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking.

  16. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast

    PubMed Central

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member’s departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  17. Mix-and-match overlay performance of the NSR-S622D immersion scanner

    NASA Astrophysics Data System (ADS)

    Makino, Katsushi; Kikuchi, Takahisa; Sasamoto, Satoru; Hongki, Park; Mori, Akiko; Takahashi, Nobuyuki; Wakamoto, Shinji

    2013-04-01

    Current technology nodes, as well as subsequent generations necessitate ongoing improvements to the mix-and-match overlay (MMO) capabilities of lithography scanners. This work will introduce newly developed scanner solutions to address this requirement, and performance data from the latest generation immersion scanner, the NSR-S622D, will be introduced. Enhanced MMO accuracy is imperative for the 22 nm half-pitch and future technology nodes. In order for the matched overlay accuracy to approach single machine overlay (SMO) capabilities, MMO errors must be reduced further. The dominant MMO error sources can be divided into three main areas: SMO, lens distortion matching and wafer grid matching. Nikon continues to decrease these matching error contributors over time, and the latest generation NSRS622D immersion scanner provides a number of innovative solutions to satisfy the most demanding overlay matching requirements ; as a result MMO performance within 3nm is achieved on S622D. Moreover, overlay master system is developed for further product overlay accuracy and stability improvement.

  18. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    PubMed

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  19. Application Oriented Flow Routing Algorithm for VoIP Overlay Networks

    NASA Astrophysics Data System (ADS)

    Wipusitwarakun, Komwut; Chimmanee, Sanon

    Overlay networks which are dynamically created over underlying IP networks are becoming widely used for delivering multimedia contents since they can provide several additional user-definable services. Multiple overlay paths between a source-destination overlay node pair are designed to improve service robustness against failures and bandwidth fluctuation of the underlying networks. Multimedia traffic can be distributed over those multiple paths in order to maximize paths' utilization and to increase application throughputs. Most of flow-based routing algorithms consider only common metrics such as paths' bandwidth or delay, which may be effective for data applications but not for real-time applications such as Voice over IP (VoIP), in which different levels of such performance metrics may give the same level of the performance experienced by end users. This paper focuses on such VoIP overlay networks and proposes a novel alternative path based flow routing algorithm using an application-specific traffic metric, i.e. “VoIP Path Capacity (VPCap), ” to calculate the maximum number of QoS satisfied VoIP flows which may be distributed over each available overlay path at a moment. The simulation results proved that more QoS-satisfied VoIP sessions can be established over the same multiple overlay paths, comparing to traditional approaches.

  20. Improving overlay control through proper use of multilevel query APC

    NASA Astrophysics Data System (ADS)

    Conway, Timothy H.; Carlson, Alan; Crow, David A.

    2003-06-01

    Many state-of-the-art fabs are operating with increasingly diversified product mixes. For example, at Cypress Semiconductor, it is not unusual to be concurrently running multiple technologies and many devices within each technology. This diverse product mix significantly increases the difficulty of manually controlling overlay process corrections. As a result, automated run-to-run feedforward-feedback control has become a necessary and vital component of manufacturing. However, traditional run-to-run controllers rely on highly correlated historical events to forecast process corrections. For example, the historical process events typically are constrained to match the current event for exposure tool, device, process level and reticle ID. This narrowly defined process stream can result in insufficient data when applied to lowvolume or new-release devices. The run-to-run controller implemented at Cypress utilizes a multi-level query (Level-N) correlation algorithm, where each subsequent level widens the search criteria for available historical data. The paper discusses how best to widen the search criteria and how to determine and apply a known bias to account for tool-to-tool and device-to-device differences. Specific applications include offloading lots from one tool to another when the first tool is down for preventive maintenance, utilizing related devices to determine a default feedback vector for new-release devices, and applying bias values to account for known reticle-to-reticle differences. In this study, we will show how historical data can be leveraged from related devices or tools to overcome the limitations of narrow process streams. In particular, this paper discusses how effectively handling narrow process streams allows Cypress to offload lots from a baseline tool to an alternate tool.

  1. Salazar on private power

    SciTech Connect

    Anderson, J.

    1995-02-01

    The Philipines power market, considered one of the more mature markets in Asia, continues to expand with economic growth. Independent power producers will find opportunities in the next few years as new additions are required. Currently, the government is encouraging private investment and is awaiting feedback from financiers as it considers eliminating its government guarantee. In a recent interview, the Honorable Mariano S. Salazar, secretary of energy, with the Philippines` Department of Energy, discussed the regulatory structure, encouragement of private power and his country`s capital needs.

  2. Social Security reform: implications for women.

    PubMed

    Williamson, J B; Rix, S E

    2000-01-01

    Despite recent economic gains for women, a substantial gender gap in financial security during old age remains, making women more dependent than men upon Social Security. Social Security plays an important role in providing for women's economic security. The implications for women of several proposed changes in Social Security policy, including the call for the partial privatization of Social Security via the introduction of individual accounts, are analyzed. Many of the proposals would have the effect of asking women, particularly low-income women, to shoulder a disproportionate share of the risks and burdens associated with the changes. PMID:11148830

  3. Security sonar for water intakes

    SciTech Connect

    Rothenbuhler, D.E.

    1987-07-01

    The security of the water approaches to nuclear facilities has been largely neglected because of the lack of solutions to the intrusion problem. This paper reviews underwater scanning sonar in general, highlights a number of problems encountered in a threat detection system using sonar and suggests some procedures that can help make such a system workable. Information is drawn from recent experience with several security projects in the governmental and private sectors, one of which was a nuclear facility.

  4. Slouching toward Privatization

    ERIC Educational Resources Information Center

    Dickeson, Robert C.; Figuli, David J.

    2007-01-01

    The past two decades have seen a significant shift in the financial model of American higher education, laying groundwork for a transformation that could reshape people's understanding of the academy. The shift--toward increasing degrees of privatization--is unmistakable and has affected every American college and university to varying extents.…

  5. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, July--September, 1994

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1994-10-26

    Research is presently being conducted to develop a criteria for selecting weld overlay coatings for erosion mitigation in Circulated Fluidized Beds. Initially, eleven weld overlay alloys were selected for erosion testing based upon a literature review. All eleven coatings were deposited on 1018 steel substrates using the plasma arc welding process. Ten samples from each coating were prepared for erosion testing. All selected coatings were erosion tested at 400 C and their erosion resistance was evaluated by determining the steady state erosion rate. In addition, the microstructure of each coating was characterized before and after the erosion tests. No correlations were found between room temperature hardness of the weld overlay coatings and their erosion resistance at elevated temperature. It was suggested that weld overlays mechanical properties such as fracture strength, toughness and work hardening rates may contributed to their erosion resistance. During the previous two quarters the microhardness tests were performed on the eroded samples in order to determine the size of the work hardened zone and the change in the coatings hardness due to erosion. As a result of these measurements it was established that one group of coatings deformed plastically, while another did not. In addition, the measurements of the weld overlays microhardness at 400 C were made. The coatings microhardness at 400 C was plotted versus their volume erosion rates. During the last quarter, erosion tests were performed for Inconel-625, 316L SS, and Iron-Aluminide wrought alloys in order to compare their erosion behavior with similar weld overlays. The results of microhardness profile measurements for all weld overlay coatings were analyzed. The factors that contribute to the erosion resistance of the coatings that deformed plastically are discussed in this progress report.

  6. Evaluation of Tizian overlays by means of a swept source optical coherence tomography system

    NASA Astrophysics Data System (ADS)

    Marcauteanu, Corina; Sinescu, Cosmin; Negrutiu, Meda Lavinia; Stoica, Eniko Tunde; Topala, Florin; Duma, Virgil Florin; Bradu, Adrian; Podoleanu, Adrian Gh.

    2016-03-01

    The teeth affected by pathologic attrition can be restored by a minimally invasive approach, using Tizian overlays. In this study we prove the advantages of a fast swept source (SS) OCT system in the evaluation of Tizian overlays placed in an environment characterized by high occlusal forces. 12 maxillary first premolars were extracted and prepared for overlays. The Tizian overlays were subjected to 3000 alternating cycles of thermo-cycling (from -10°C to +50°C) and to mechanical occlusal overloads (at 800 N). A fast SS OCT system was used to evaluate the Tizian overlays before and after the mechanical and thermal straining. The SS (Axsun Technologies, Billerica, MA) has a central wavelength of 1060 nm, sweeping range of 106 nm (quoted at 10 dB) and a 100 kHz line rate. The depth resolution of the system, measured experimentally in air was 10 μm. The imaging system used for this study offers high spatial resolutions in both directions, transversal and longitudinal of around 10 μm, a high sensitivity, and it is also able to acquire entire tridimensional (3D)/volume reconstructions as fast as 2.5 s. Once the full dataset was acquired, rendered high resolutions en-face projections could be produced. Using them, the overlay (i.e., cement) abutment tooth interfaces were remarked both on B-scans/two-dimensional (2D) sections and in the 3D reconstructions. Using the system several open interfaces were possible to detect. The fast SS OCT system thus proves useful in the evaluation of zirconia reinforced composite overlays, placed in an environment characterized by high occlusal forces.

  7. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  8. Collection Security.

    ERIC Educational Resources Information Center

    Boss, Richard W.

    1984-01-01

    Presents a systematic approach to the problem of security of library collections and facilities from theft and vandalism. Highlights include responses to losses, defining security needs, typical weaknesses of facilities, policies and procedures that weaken a library's security, conducting a security audit, cost of security, cost-effectiveness, and…

  9. Asphalt overlay design methods for rigid pavements considering rutting, reflection cracking, and fatigue cracking. Research report September 1996--August 1997

    SciTech Connect

    Cho, Y.H.; Liu, C.; Dossey, T.; McCullough, B.F.

    1998-10-01

    An asphalt concrete pavement (ACP) overlay over a rigid pavement represents a viable rehabilitation strategy. It can provide good serviceability at an initial construction cost that is substantially less than that of a rigid overlay rehabilitation. In addition, ACP overlays require less construction time, which can reduce user costs during construction. However, it may not be the most economical solution for long-term rehabilitation. Because of their relatively short service life, ACP overlays may require maintenance sooner than rigid overlays. And one of the more critical distresses that effectively determine the life span of the structure is reflection cracking. This report investigates alternative strategies that seek to prevent reflection cracking on ACP overlays.

  10. Security and Privacy at a Public University.

    ERIC Educational Resources Information Center

    Bomzer, Herbert W.

    The data center and the user offices at a public university have a responsibility to maintain security and to protect the privacy of the individuals whose data they process. This persists even though much personal data are accessible in libraries. How to identify "private" data, what security precautions to take to protect these data from being…

  11. Infrared differential interference contrast microscopy for overlay metrology on 3D-interconnect bonded wafers

    NASA Astrophysics Data System (ADS)

    Ku, Yi-sha; Shyu, Deh-Ming; Lin, Yeou-Sung; Cho, Chia-Hung

    2013-04-01

    Overlay metrology for stacked layers will be playing a key role in bringing 3D IC devices into manufacturing. However, such bonded wafer pairs present a metrology challenge for optical microscopy tools by the opaque nature of silicon. Using infrared microscopy, silicon wafers become transparent to the near-infrared (NIR) wavelengths of the electromagnetic spectrum, enabling metrology at the interface of bonded wafer pairs. Wafers can be bonded face to face (F2F) or face to back (F2B) which the stacking direction is dictated by how the stacks are carried in the process and functionality required. For example, Memory stacks tend to use F2B stacking enables a better managed design. Current commercial tools use single image technique for F2F bonding overlay measurement because depth of focus is sufficient to include both surfaces; and use multiple image techniques for F2B overlay measurement application for the depth of focus is no longer sufficient to include both stacked wafer surfaces. There is a need to specify the Z coordinate or stacking wafer number through the silicon when visiting measurement wafer sites. Two shown images are of the same (X, Y) but separate Z location acquired at focus position of each wafer surface containing overlay marks. Usually the top surface image is bright and clear; however, the bottom surface image is somewhat darker and noisier as an adhesive layer is used in between to bond the silicon wafers. Thus the top and bottom surface images are further processed to achieve similar brightness and noise level before merged for overlay measurement. This paper presents a special overlay measurement technique, using the infrared differential interference contrast (DIC) microscopy technique to measure the F2B wafer bonding overlay by a single shot image. A pair of thinned wafers at 50 and 150 μm thickness is bonded on top of a carrier wafer to evaluate the bonding overlay. It works on the principle of interferometry to gain information about the

  12. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  13. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  14. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  15. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  16. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  17. Compensation of overlay errors due to mask bending and non-flatness for EUV masks

    NASA Astrophysics Data System (ADS)

    Chandhok, Manish; Goyal, Sanjay; Carson, Steven; Park, Seh-Jin; Zhang, Guojing; Myers, Alan M.; Leeson, Michael L.; Kamna, Marilyn; Martinez, Fabian C.; Stivers, Alan R.; Lorusso, Gian F.; Hermans, Jan; Hendrickx, Eric; Govindjee, Sanjay; Brandstetter, Gerd; Laursen, Tod

    2009-03-01

    EUV blank non-flatness results in both out of plane distortion (OPD) and in-plane distortion (IPD) [3-5]. Even for extremely flat masks (~50 nm peak to valley (PV)), the overlay error is estimated to be greater than the allocation in the overlay budget. In addition, due to multilayer and other thin film induced stresses, EUV masks have severe bow (~1 um PV). Since there is no electrostatic chuck to flatten the mask during the e-beam write step, EUV masks are written in a bent state that can result in ~15 nm of overlay error. In this article we present the use of physically-based models of mask bending and non-flatness induced overlay errors, to compensate for pattern placement of EUV masks during the e-beam write step in a process we refer to as E-beam Writer based Overlay error Correction (EWOC). This work could result in less restrictive tolerances for the mask blank non-flatness specs which in turn would result in less blank defects.

  18. Image-based overlay (IBO) target segment design on self-aligned patterning process

    NASA Astrophysics Data System (ADS)

    Ye, Lei; Hu, Huayong; He, Weiming

    2016-03-01

    Self-Aligned Double Patterning (SADP) is widely applied in advanced sub-4X patterning technology, especially for the 1D resolution shrinkage of memory technology. As the application of SADP makes lithography minimum pitch down to half of design pitch with the remaining spacer aside core, its alignment mark and overlay (OVL) mark have to be well-segmented to ensure enough mark contrast. In this paper, we designed two types of image-based overlay (IBO) bar in bar (BIB) OVL target: bar-segmentation and background-segmentation with different duty ratio. Based on these two designed types of marks, we focus on the OVL of 2nd photo layer to 1st SADP layer with the core removed (which means spacer grating structure remained). We studied the effect of the overlay target segmentation on the precision and robustness of wafer-level overlay performance. Different lithography processes were also studied, including single layer lithography and tri-layer lithography with planarized spacer grating structures. We found there are strong correlations between overlay measurement accuracy and background segmentation rules. The results of our study will be presented and discussed in this paper.

  19. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, January 1994--March 1994

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1994-04-21

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterwalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in circulated fluidized beds.

  20. Implementation and benefits of advanced process control for lithography CD and overlay

    NASA Astrophysics Data System (ADS)

    Zavyalova, Lena; Fu, Chong-Cheng; Seligman, Gary S.; Tapp, Perry A.; Pol, Victor

    2003-05-01

    Due to the rapidly reduced imaging process windows and increasingly stingent device overlay requirements, sub-130 nm lithography processes are more severely impacted than ever by systamic fault. Limits on critical dimensions (CD) and overlay capability further challenge the operational effectiveness of a mix-and-match environment using multiple lithography tools, as such mode additionally consumes the available error budgets. Therefore, a focus on advanced process control (APC) methodologies is key to gaining control in the lithographic modules for critical device levels, which in turn translates to accelerated yield learning, achieving time-to-market lead, and ultimately a higher return on investment. This paper describes the implementation and unique challenges of a closed-loop CD and overlay control solution in high voume manufacturing of leading edge devices. A particular emphasis has been placed on developing a flexible APC application capable of managing a wide range of control aspects such as process and tool drifts, single and multiple lot excursions, referential overlay control, 'special lot' handling, advanced model hierarchy, and automatic model seeding. Specific integration cases, including the multiple-reticle complementary phase shift lithography process, are discussed. A continuous improvement in the overlay and CD Cpk performance as well as the rework rate has been observed through the implementation of this system, and the results are studied.

  1. In die mask overlay control for 14nm double-patterning lithography

    NASA Astrophysics Data System (ADS)

    Chou, William; Cheng, James; Tseng, Alex C. P.; Wu, J. K.; Chang, Chin Kuei; Cheng, Jeffrey; Lee, Adder; Huang, Chain Ting; Peng, N. T.; Hsu, Simon C. C.; Yu, Chun Chi; Lu, Colbert; Yu, Julia; Craig, Peter; Pollock, Chuck; Ham, Young; McMurran, Jeff

    2015-10-01

    According to the ITRS roadmap, semiconductor industry drives the 193nm lithography to its limits, using techniques like Double Pattern Technology (DPT), Source Mask Optimization (SMO) and Inverse Lithography Technology (ILT). In terms of considering the photomask metrology, full in-die measurement capability is required for registration and overlay control with challenging specifications for repeatability and accuracy. Double patterning using 193nm immersion lithography has been adapted as the solution to enable 14nm technology nodes. The overlay control is one of the key figures for the successful realization of this technology. In addition to the various error contributions from the wafer scanner, the reticles play an important role in terms of considering lithographic process contributed errors. Accurate pattern placement of the features on reticles with a registration error below 4nm is mandatory to keep overall photomask contributions to overlay of sub 20nm logic within the allowed error budget. In this paper, we show in-die registration errors using 14nm DPT product masks, by measuring in-die overlay patterns comparing with regular registration patterns. The mask measurements are used to obtain an accurate model to predict mask contribution on wafer overlay of double patterning technology.

  2. Design and development of a mobile image overlay system for needle interventions.

    PubMed

    Anand, M; King, F; Ungi, T; Lasso, A; Rudan, J; Jayender, J; Fritz, J; Carrino, J A; Jolesz, F A; Fichtinger, G

    2014-01-01

    Previously, a static and adjustable image overlay systems were proposed for aiding needle interventions. The system was either fixed to a scanner or mounted over a large articulated counterbalanced arm. Certain drawbacks associated with these systems limited the clinical translation. In order to minimize these limitations, we present the mobile image overlay system with the objective of reduced system weight, smaller dimension, and increased tracking accuracy. The design study includes optimal workspace definition, selection of display device, mirror, and laser source. The laser plane alignment, phantom design, image overlay plane calibration, and system accuracy validation methods are discussed. The virtual image is generated by a tablet device and projected into the patient by using a beamsplitter mirror. The viewbox weight (1.0 kg) was reduced by 8.2 times and image overlay plane tracking precision (0.21 mm, STD = 0.05) was improved by 5 times compared to previous system. The automatic self-calibration of the image overlay plane was achieved in two simple steps and can be done away from patient table. The fiducial registration error of the physical phantom to scanned image volume registration was 1.35 mm (STD = 0.11). The reduced system weight and increased accuracy of optical tracking should enable the system to be hand held by the physician and explore the image volume over the patient for needle interventions. PMID:25571403

  3. Diffraction-based overlay measurement on dedicated mark using rigorous modeling method

    NASA Astrophysics Data System (ADS)

    Lu, Hailiang; Wang, Fan; Zhang, Qingyun; Chen, Yonghui; Zhou, Chang

    2012-03-01

    Diffraction Based Overlay (DBO) is widely evaluated by numerous authors, results show DBO can provide better performance than Imaging Based Overlay (IBO). However, DBO has its own problems. As well known, Modeling based DBO (mDBO) faces challenges of low measurement sensitivity and crosstalk between various structure parameters, which may result in poor accuracy and precision. Meanwhile, main obstacle encountered by empirical DBO (eDBO) is that a few pads must be employed to gain sufficient information on overlay-induced diffraction signature variations, which consumes more wafer space and costs more measuring time. Also, eDBO may suffer from mark profile asymmetry caused by processes. In this paper, we propose an alternative DBO technology that employs a dedicated overlay mark and takes a rigorous modeling approach. This technology needs only two or three pads for each direction, which is economic and time saving. While overlay measurement error induced by mark profile asymmetry being reduced, this technology is expected to be as accurate and precise as scatterometry technologies.

  4. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  5. 17 CFR 240.13e-3 - Going private transactions by certain issuers or their affiliates.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Going private transactions by... private transactions by certain issuers or their affiliates. (a) Definitions. Unless indicated otherwise... section: (A) In accordance with the provisions of any applicable Federal or State law, but in no...

  6. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or... Testimony of FEMA employees in private litigation. (a) No FEMA employee shall testify in response to...

  7. 8 CFR 251.6 - Exemptions for private vessels and aircraft.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Exemptions for private vessels and aircraft. 251.6 Section 251.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL AND DEPARTURE MANIFESTS AND LISTS: SUPPORTING DOCUMENTS § 251.6 Exemptions for private vessels...

  8. 44 CFR 5.84 - Production of documents in private litigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... private litigation. 5.84 Section 5.84 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or... Production of documents in private litigation. (a) The production of records held by FEMA in response to...

  9. 75 FR 80082 - State, Local, Tribal, and Private Sector Policy Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... RECORDS ADMINISTRATION State, Local, Tribal, and Private Sector Policy Advisory Committee AGENCY: National..., Local, Tribal, and Private Sector Policy Advisory Committee is necessary and is in the public interest in connection with the Classified National Security Information Program. This committee will...

  10. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 31 Money and Finance:Treasury 3 2014-07-01 2014-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  11. 44 CFR 5.84 - Production of documents in private litigation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... private litigation. 5.84 Section 5.84 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or... Production of documents in private litigation. (a) The production of records held by FEMA in response to...

  12. 8 CFR 251.6 - Exemptions for private vessels and aircraft.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Exemptions for private vessels and aircraft. 251.6 Section 251.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL AND DEPARTURE MANIFESTS AND LISTS: SUPPORTING DOCUMENTS § 251.6 Exemptions for private vessels...

  13. 8 CFR 251.6 - Exemptions for private vessels and aircraft.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Exemptions for private vessels and aircraft. 251.6 Section 251.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL AND DEPARTURE MANIFESTS AND LISTS: SUPPORTING DOCUMENTS § 251.6 Exemptions for private vessels...

  14. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... in private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas... § 5.87 Testimony of FEMA employees in private litigation. (a) No FEMA employee shall testify...

  15. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 3 2012-07-01 2012-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  16. 8 CFR 251.6 - Exemptions for private vessels and aircraft.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Exemptions for private vessels and aircraft. 251.6 Section 251.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL AND DEPARTURE MANIFESTS AND LISTS: SUPPORTING DOCUMENTS § 251.6 Exemptions for private vessels...

  17. 8 CFR 251.6 - Exemptions for private vessels and aircraft.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Exemptions for private vessels and aircraft. 251.6 Section 251.6 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS ARRIVAL AND DEPARTURE MANIFESTS AND LISTS: SUPPORTING DOCUMENTS § 251.6 Exemptions for private vessels...

  18. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... in private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas... § 5.87 Testimony of FEMA employees in private litigation. (a) No FEMA employee shall testify...

  19. 20 CFR 422.527 - Private printing and modification of prescribed applications, forms, and other publications.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Private printing and modification of prescribed applications, forms, and other publications. 422.527 Section 422.527 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Applications and Related Forms § 422.527 Private printing and modification of...

  20. 44 CFR 5.84 - Production of documents in private litigation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... private litigation. 5.84 Section 5.84 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas or... Production of documents in private litigation. (a) The production of records held by FEMA in response to...

  1. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 3 2013-07-01 2013-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  2. 44 CFR 5.87 - Testimony of FEMA employees in private litigation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... in private litigation. 5.87 Section 5.87 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Subpoenas... § 5.87 Testimony of FEMA employees in private litigation. (a) No FEMA employee shall testify...

  3. 77 FR 36566 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to Private..., 2012) private sector property insurers sell flood insurance policies and adjust flood insurance claims... the remaining premium to the Federal Government. The Federal Government pays flood losses and...

  4. 76 FR 46626 - Safety Zone; Discovery World Private Wedding Firework Displays, Milwaukee, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Discovery World Private Wedding Firework... contrary to the public interest. Background and Purpose The Discovery World Private Wedding fireworks are a... will encompass all waters of Milwaukee Harbor in the vicinity of the Discovery World pier in...

  5. Private Management and School Reform.

    ERIC Educational Resources Information Center

    Doyle, Denis P.

    1994-01-01

    Many public schools are turning their administration over to private enterprise. The same logic suggests an advantage to privatizing instructional services. What this might mean is discussed. Educational quality and cost effectiveness might be enhanced if the antipathy of public-sector educators to the private sector can be overcome. (SLD)

  6. The Privatization of Special Education

    ERIC Educational Resources Information Center

    McKinney, Judith A.

    2011-01-01

    This study, The Privatization of Special Education, addresses a shift in the provision of special education and related services to students with disabilities in the Commonwealth of Virginia. Students with disabilities are being publicly placed in private day and residential schools at public expense. In Virginia, 125 private schools are licensed…

  7. Stimuli, Reinforcers, and Private Events

    ERIC Educational Resources Information Center

    Nevin, John A.

    2008-01-01

    Radical behaviorism considers private events to be a part of ongoing observable behavior and to share the properties of public events. Although private events cannot be measured directly, their roles in overt action can be inferred from mathematical models that relate private responses to external stimuli and reinforcers according to the same…

  8. The private Higgs

    NASA Astrophysics Data System (ADS)

    Porto, Rafael A.; Zee, A.

    2008-09-01

    We introduce Higgs democracy in the Yukawa sector by constructing a model with a private Higgs and a dark scalar for each fermion thus addressing the large hierarchy among fermion masses. The model has interesting implications for the LHC, while the Standard Model phenomenology is recovered at low energies. We discuss some phenomenological implications such as FCNC, new Higgses at the TeV scale and dark matter candidates.

  9. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  10. Interaction of nanostructured metal overlayers with oxide surfaces

    NASA Astrophysics Data System (ADS)

    Fu, Qiang; Wagner, Thomas

    2007-11-01

    Interactions between metals and oxides are key factors to determine the performance of metal/oxide heterojunctions, particularly in nanotechnology, where the miniaturization of devices down to the nanoregime leads to an enormous increase in the density of interfaces. One central issue of concern in engineering metal/oxide interfaces is to understand and control the interactions which consist of two fundamental aspects: (i) interfacial charge redistribution — electronic interaction, and (ii) interfacial atom transport — chemical interaction. The present paper focuses on recent advances in both electronic and atomic level understanding of the metal-oxide interactions at temperatures below 1000 ∘C, with special emphasis on model systems like ultrathin metal overlayers or metal nanoclusters supported on well-defined oxide surfaces. The important factors determining the metal-oxide interactions are provided. Guidelines are given in order to predict the interactions in such systems, and methods to desirably tune them are suggested. The review starts with a brief summary of the physics and chemistry of heterophase interface contacts. Basic concepts for quantifying the electronic interaction at metal/oxide interfaces are compared to well-developed contact theories and calculation methods. The chemical interaction between metals and oxides, i.e., the interface chemical reaction, is described in terms of its thermodynamics and kinetics. We review the different chemical driving forces and the influence of kinetics on interface reactions, proposing a strong interplay between the chemical interaction and electronic interaction, which is decisive for the final interfacial reactivity. In addition, a brief review of solid-gas interface reactions (oxidation of metal surfaces and etching of semiconductor surfaces) is given, in addition to a comparison of a similar mechanism dominating in solid-solid and solid-gas interface reactions. The main body of the paper reviews

  11. Effects of indium and tin overlayers on the photoluminescence spectrum of mercuric iodide

    NASA Astrophysics Data System (ADS)

    James, R. B.; Bao, X. J.; Schlesinger, T. E.; Ortale, C.; Cheng, A. Y.

    1990-03-01

    Mercuric iodide (HgI2 ) crystals with semitransparent metal overlayers of indium and tin were characterized using low-temperature photoluminescence (PL) spectroscopy. The PL spectra were found to differ for points beneath the thin metal overlayers and points that were masked off during each deposition. The photoluminescence data were compared with PL measurements taken on HgI2 photodetectors with indium-tin-oxide (ITO) entrance electrodes. The similarities of the spectra for the HgI2 samples with In, Sn, and ITO conducting overlayers indicate that the regions in the ITO-contacted photodetectors with relatively poor photoresponses are associated with the interaction of indium or tin with the mercuric iodide substrate.

  12. Characterizing the Global Impact of P2P Overlays on the AS-Level Underlay

    NASA Astrophysics Data System (ADS)

    Rasti, Amir Hassan; Rejaie, Reza; Willinger, Walter

    This paper examines the problem of characterizing and assessing the global impact of the load imposed by a Peer-to-Peer (P2P) overlay on the AS-level underlay. In particular, we capture Gnutella snapshots for four consecutive years, obtain the corresponding AS-level topology snapshots of the Internet and infer the AS-paths associated with each overlay connection. Assuming a simple model of overlay traffic, we analyze the observed load imposed by these Gnutella snapshots on the AS-level underlay using metrics that characterize the load seen on individual AS-paths and by the transit ASes, illustrate the churn among the top transit ASes during this 4-year period, and describe the propagation of traffic within the AS-level hierarchy.

  13. 40-Gb/s FSK modulated WDM-PON with variable-rate multicast overlay.

    PubMed

    Xin, Xiangjun; Liu, Bo; Zhang, Lijia; Yu, Jianjun

    2011-06-20

    This paper proposes a novel conjugate-driven frequency shift keying (FSK) modulated wavelength division multiplexing passive network (WDM-PON) with variable-rate multicast services. Optical orthogonal frequency division multiplexing (OFDM) is adopted for multicast overlay services with different rate requirements. A differential detection is used for the demodulation of FSK signal, which can eliminate the crosstalk from the OFDM signal. A total 40-Gb/s FSK point to point (P2P) signal and 6.3-Gb/s OFDM overlay with three kinds of variable-rate multicast services are experimentally demonstrated. A physical-layer adaptive identification is proposed for the variable-rate multicast services. After 25 km single mode fiber (SMF) transmission, the power penalties of FSK P2P signal and OFDM multicast overlay are 1.3 dB and 1.7 dB respectively. PMID:21716492

  14. High strength and corrosion resistant alloys weld overlays for oil patch applications

    SciTech Connect

    Hibner, E.L.; Maligas, M.N.; Vicic, J.C.

    1995-10-01

    Corrosion resistant alloys (CRAs) are specified for oilfield applications where severe environments cause general corrosion, pitting, crevice corrosion, chloride stress corrosion cracking and more importantly sulfide stress cracking. Historically, alloy 625 (UNS N06625) weld overlay has successfully been used in severely corrosive environments. Alloy 686 (UNS N06686) and alloy 725 (UNS N07725) have recently been evaluated as replacement materials for alloy 625. Alloy 686, because of it`s high alloying content, exhibits superior corrosion resistance to alloy 625. And, alloy 725 is a highly corrosion resistant alloy capable of being age hardened to 0.2% yield strengths of above 827 MPa (120 ksi) Mechanical properties and Slow Strain Rate test results for the alloy 686 and alloy 725 weld overlays are discussed relative to alloy 625, alloy C-22 (UNS N06622) and alloy 59 (UNS N06059) weld overlays.

  15. Threshold analysis of the susceptible-infected-susceptible model on overlay networks

    NASA Astrophysics Data System (ADS)

    Wu, Qingchu; Zhang, Haifeng; Small, Michael; Fu, Xinchu

    2014-07-01

    In this paper, we study epidemic spreading on overlay networks in which n multiple sets of links interconnect among the same nodes. By using the microscopic Markov-chain approximation (MMA) approach, we establish the conditions of epidemic outbreak for two kinds of spreading mechanisms in such an overlay network: the concatenation case and the switching case. When a uniform infection rate is set in all the subnetworks, we find the epidemic threshold for the switching case is just n times as large as that of concatenation case. We also find that the overlay network with a uniform infection rate can be considered as an equivalent (in the sense of epidemic dynamics and epidemic threshold) weighted network. To be specific, the concatenation case corresponds to the integer weighted network, while the switching case corresponds to the fractional weighted network. Interestingly, the time-varying unweighted network can be mapped into the static weighted network. Our analytic results exhibit good agreement with numerical simulations.

  16. Weld overlay coatings for erosion control. Task A: Literature review, progress report

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  17. A study of swing-curve physics in diffraction-based overlay

    NASA Astrophysics Data System (ADS)

    Bhattacharyya, Kaustuve; den Boef, Arie; Storms, Greet; van Heijst, Joost; Noot, Marc; An, Kevin; Park, Noh-Kyoung; Jeon, Se-Ra; Oh, Nang-Lyeom; McNamara, Elliott; van de Mast, Frank; Oh, SeungHwa; Lee, Seung Yoon; Hwang, Chan; Lee, Kuntack

    2016-03-01

    With the increase of process complexity in advanced nodes, the requirements of process robustness in overlay metrology continues to tighten. Especially with the introduction of newer materials in the film-stack along with typical stack variations (thickness, optical properties, profile asymmetry etc.), the signal formation physics in diffraction-based overlay (DBO) becomes an important aspect to apply in overlay metrology target and recipe selection. In order to address the signal formation physics, an effort is made towards studying the swing-curve phenomena through wavelength and polarizations on production stacks using simulations as well as experimental technique using DBO. The results provide a wealth of information on target and recipe selection for robustness. Details from simulation and measurements will be reported in this technical publication.

  18. Privatization Or Marketization: Educational Development in Post-Mao China

    NASA Astrophysics Data System (ADS)

    Mok, Ka Ho

    1997-09-01

    In the post-Mao era, the reformers have taken significant steps to privatize social policy and social welfare. Revamping the social security system and commodifying social services have become more prominent since the mid-eighties. Despite the post-Mao leaders' discomfort about the term "privatization", signs of state withdrawal from the provision of social policy and welfare are clear. The author argues that the emergence of private educational institutions indicates that China's educational development has gone through a similar process of privatization or quasi-marketization though the Chinese experience is different from that of Western counterparts. Specifically, this paper tries to examine how the flourishing market economy and the policy of decentralization have affected the development of China's higher education. No longer solely relying on public schools, private and minban (people run) educational institutions are becoming more popular in the new socialist market system. This paper attempts to examine how privatization and quasi- marketization have affected educational development in mainland China. The paper concludes with a discussion of the policy implications of the privatization of education in China.

  19. Full chip two-layer CD and overlay process window analysis

    NASA Astrophysics Data System (ADS)

    Gupta, Rachit; Shang, Shumay; Sturtevant, John

    2015-03-01

    In-line CD and overlay metrology specifications are typically established by starting with design rules and making certain assumptions about error distributions which might be encountered in manufacturing. Lot disposition criteria in photo metrology (rework or pass to etch) are set assuming worst case assumptions for CD and overlay respectively. For example poly to active overlay specs start with poly endcap design rules and make assumptions about active and poly lot average and across lot CDs, and incorporate general knowledge about poly line end rounding to ensure that leakage current is maintained within specification. There is an opportunity to go beyond generalized guard band design rules to full-chip, design-specific, model-based exploration of worst case layout locations. Such an approach can leverage not only the above mentioned coupling of CD and overlay errors, but can interrogate all layout configurations for both layers to help determine lot-specific, design-specific CD and overlay dispositioning criteria for the fab. Such an approach can elucidate whether for a specific design layout there exist asymmetries in the response to misalignment which might be exploited in manufacturing. This paper will investigate an example of two-layer model-based analysis of CD and overlay errors. It is shown, somewhat non-intuitively, that there can be small preferred misalignment asymmetries which should be respected to protect yield. We will show this relationship for via-metal overlap. We additionally present a new method of displaying edge placement process window variability, akin to traditional CD process window analysis.

  20. A safety evaluation for overlay disbonding of high-temperature and pressure vessels

    SciTech Connect

    Horita, Ryuichi; Nakajima; Hiroyuki; Tanaka, Kazunori; Murakami, Shunzo; Fujii, Tadaomi

    1995-11-01

    Hydrogen induced disbonding test (autoclave test) of stainless weld-overlaid 2-1/4Cr-1Mo and 2-1/4Cr-1Mo-1/4V steel, and the calculations of residual hydrogen contents at the fusion boundary in the specimens and actual vessels, were performed. The effects of microstructure of weld overlay near the fusion boundary and postweld heat treatment on disbonding resistance were clarified, and critical hydrogen content values in weld overlay to prevent disbonding were obtained. A simple evaluation method for disbonding in actual vessels using Tempering Parameter was established.

  1. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, January 1993--March 1993

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-04-18

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based on a literature review These alloys have been separated into three major groups: (1) Cobalt containing alloys, (2) Nickel-base alloys, (3) Iron base alloys. These alloys are being applied to carbon steel substrates and will undergo preliminary erosion testing to identify candidates weld overlay alloys for erosion control in CFB boilers. The candidate alloys selected from the preliminary erosion tests will then undergo more detailed evaluations in future research.

  2. A Spatial Overlay Ranking Method for a Geospatial Search of Text Objects

    USGS Publications Warehouse

    Lanfear, Kenneth J.

    2006-01-01

    Earth-science researchers need the capability to find relevant information by location and topic. Conventional geographic techniques that simply check whether polygons intersect can efficiently achieve a high recall on location, but can not achieve precision for ranking results in likely order of importance to the reader. A spatial overlay ranking based upon how well an object's footprint matches the search area provides a more effective way to spatially search a collection of reports, and avoids many of the problems associated with an 'in/out' (True/False) boolean search. Moreover, spatial overlay ranking appears to work well even when spatial extent is defined only by a simple bounding box.

  3. Scalable Tool Infrastructure for the Cray XT Using Tree-Based Overlay Networks

    SciTech Connect

    Roth, Philip C; Vetter, Jeffrey S

    2009-01-01

    Performance, debugging, and administration tools are critical for the effective use of parallel computing platforms, but traditional tools have failed to overcome several problems that limit their scalability, such as communication between a large number of tool processes and the management and processing of the volume of data generated on a large number of compute nodes. A tree-based overlay network has proven effective for overcoming these challenges. In this paper, we present our experiences in bringing our MRNet tree-based overlay network infrastructure to the Cray XT platform, including a description of proof-of-concept tools that use MRNet on the Cray XT.

  4. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) If a... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of...

  5. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) If a... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of...

  6. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) If a... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of...

  7. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) When... 24 Housing and Urban Development 4 2011-04-01 2011-04-01 false Security and utility deposits. 886... Section 8 Housing Assistance Program for the Disposition of HUD-Owned Projects § 886.315 Security...

  8. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) If a... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of...

  9. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) When... 24 Housing and Urban Development 4 2012-04-01 2012-04-01 false Security and utility deposits. 886... Section 8 Housing Assistance Program for the Disposition of HUD-Owned Projects § 886.315 Security...

  10. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) If a... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of...

  11. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) When... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security and utility deposits. 886... Section 8 Housing Assistance Program for the Disposition of HUD-Owned Projects § 886.315 Security...

  12. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) When... 24 Housing and Urban Development 4 2014-04-01 2014-04-01 false Security and utility deposits. 886... Section 8 Housing Assistance Program for the Disposition of HUD-Owned Projects § 886.315 Security...

  13. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... security deposits and utility deposits from its resources and/or other public or private sources. (b) When... 24 Housing and Urban Development 4 2013-04-01 2013-04-01 false Security and utility deposits. 886... Section 8 Housing Assistance Program for the Disposition of HUD-Owned Projects § 886.315 Security...

  14. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    NASA Astrophysics Data System (ADS)

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-01

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of

  15. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  16. Robust Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wang, Shu-Yu; Ma, Jian-Feng

    2016-02-01

    We propose a new quantum private query protocol with the technique of decoherence-free states, which is a theoretical study of how decoherence-free states can be used for the protection of quantum information in such a protocol. This protocol can solve the noise problem that will make the user obtain a wrong answer and hence give rise to a bad influence on the reputation of the database provider. Furthermore, this protocol is also flexible, loss-resistant and easily generalized to a large database similar to the previous works.

  17. Robust Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wang, Shu-Yu; Ma, Jian-Feng

    2016-07-01

    We propose a new quantum private query protocol with the technique of decoherence-free states, which is a theoretical study of how decoherence-free states can be used for the protection of quantum information in such a protocol. This protocol can solve the noise problem that will make the user obtain a wrong answer and hence give rise to a bad influence on the reputation of the database provider. Furthermore, this protocol is also flexible, loss-resistant and easily generalized to a large database similar to the previous works.

  18. Evaluation of Iron Aluminide Weld Overlays for Erosion-Corrosion Resistant Boiler Tube Coatings in Low NOx Boilers

    SciTech Connect

    Regina, J.R.; Lim, M.; Barbosa, N., DuPont, J.N.; Marder, A.R.

    2000-04-28

    Iron aluminide weld overlays containing ternary additions and thermal spray coatings are being investigated for corrosion protection of boiler tubes in Low NO{sub x} burners. The primary objective of the research is to identify overlay and thermal spray compositions that provide corrosion protection of waterwall boiler tubes.

  19. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  20. 78 FR 41959 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... 20408. Purpose: To discuss the matters relating to the Classified National Security Information Program... Information Security Oversight Office (ISOO) no later than Friday, July 19, 2013. ISOO will provide...

  1. Private sector involvement in civil space remote sensing. Volume 1: Report

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.

  2. Wastewater privatization: A beneficial alternative

    SciTech Connect

    Wakeman, R.F.; Drewry, W.A.

    1999-07-01

    Municipalities with wastewater operations face increasing requirements to maximize efficiency, implement capital improvements, and ensure environmental compliance. Privatization is a relatively unused alternative offering benefits in the areas of cost-effective operations, flexible financing, technology access, and compliance assurance. Recent executive direction and tax code changes have opened new doors for mutually beneficial public-private partnerships. Wastewater privatization has historically consisted of short-term contract agreements for treatment operations, but looming infrastructure recapitalization and development requirements have catalyzed an exploration of non-traditional alternatives that include private sector financing, development, and operation of entire wastewater systems, The purpose of this paper is to show why privatization must be considered, evaluate the different levels available, and generate an analytical aid for communities taking their first look at privatization opportunities.

  3. Use of fabrics and other measures for retarding reflective cracking of asphaltic concrete overlays

    NASA Astrophysics Data System (ADS)

    Jackson, R. D.

    1980-03-01

    Prevention or control of reflection cracks in asphaltic concrete overlays has been a problem from the inception of this type of construction. The many different treatments that have been tried in an effort to solve this problem are: (1) reinforcement within and below the overlay, (2) bond breakers, (3) stress relieving layers, (4) asphalt-mix additives, and (5) placement of fabrics between the existing pavement and the overlay. At the present time, no treatment has been tried that will completely prevent the formation of reflection cracks. Some treatments do delay the formation of cracks, while others do not appear to help at all. Indications are that fabrics do have some beneficial effects, such as a moisture barrier, even though the overlays develop reflection cracks. The fabrics that have been tried for the control of reflection cracks included: (1) Petromat, (2) Bidim, (3) Typar, (4) Cerex, (5) Mirafi, (6) Structofors, (7) Bituthene, (8) Protecto-Wrap, and (9) Fiberglass. Asphalt-rubber interlayers, as formulated by the Arizona Refining Company and the Sahuaro Petroleum Company, show promise in retarding reflection cracks.

  4. Assessing the Crossdisciplinarity of Technology-Enhanced Learning with Science Overlay Maps and Diversity Measures

    ERIC Educational Resources Information Center

    Kalz, Marco; Specht, Marcus

    2014-01-01

    This paper deals with the assessment of the crossdisciplinarity of technology-enhanced learning (TEL). Based on a general discussion of the concept interdisciplinarity and a summary of the discussion in the field, two empirical methods from scientometrics are introduced and applied. Science overlay maps and the Rao-Stirling diversity index are…

  5. Passivation of hematite nanorod photoanodes with a phosphorus overlayer for enhanced photoelectrochemical water oxidation

    NASA Astrophysics Data System (ADS)

    Xiong, Dehua; Li, Wei; Wang, Xiaoguang; Liu, Lifeng

    2016-09-01

    Hematite (i.e., α-Fe2O3) nanorod photoanodes passivated with a phosphorus overlayer have been fabricated by decomposing sodium hypophosphite (NaH2PO2) at a low temperature over the hematite nanorod surface. Extensive scanning electron microscopy, transmission electron microscopy, x-ray diffractometry and UV–vis spectroscopy characterizations confirm that conformal deposition of an amorphous phosphorus overlayer does not change the crystal structure, morphology, and optical absorption properties of hematite photoanodes. X-ray photoelectron spectroscopy reveals that phosphorus in the deposited overlayer exists in an oxidized state. Comprehensive steady-state polarization, transient photocurrent response, and impedance spectroscopy measurements as well as Mott–Schottky analysis manifest that the phosphorus overlayer is able to effectively passivate surface states and suppress electron–hole recombination, substantially enhancing the photocurrent for water oxidation. Combining the phosphorization treatment with two-step thermal activation, a photocurrent density of 1.1 mA cm‑2 is achieved at 1.23 V versus reversible hydrogen electrode under illumination of 100 mW cm‑2, ca 55 times higher than that of the non-activated pristine hematite photoanode measured under the same conditions. The simple and fast phosphorization strategy we present here can be readily applied to passivate surfaces of other semiconductor photoelectrodes to improve their photoelectrochemical performance.

  6. Robotic weld overlay coatings for erosion control. Quarterly progress report, October 1993--December 1993

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1994-01-20

    Research is being conducted to develop criteria for selecting weld overlay coatings for erosion mitigation in Circulated Fluidized Beds. Twelve weld overlay alloys were deposited on 1018 steel substrates using plasma arc welding. Ten samples from each coating were prepared for erosion testing. All selected coatings were erosion tested at 400C and their erosion resistance and microstructure evaluated. Steady state erosion rates were similar for several weld overlay coatings (Ultimet, Inconel-625, Iron-Aluminide, 316L SS, and High Chromium Cast Iron) and were considerably lower than the remaining coating evaluated. These coatings had different base (Co, Fe, Ni-base). No correlations were found between room temperature microhardness of the weld overlay coatings and their erosion resistance at elevated temperature, although this criteria is often thought to be an indicator of erosion resistance. It was suggested that the coatings that showed similar erosion rates may have similar mechanical properties such as fracture strength, toughness and work hardening rates at this temperature. During the past quarter, Iron-Aluminide, Inconel-625, and 316L SS coatings were selected for more detailed investigations based upon the preliminary erosion test results. Microhardness tests were performed on eroded samples to determine the size of the work hardened zone and change in coatings hardness due to erosion. The work hardened zone was to correlated with erosion resistance of the coatings. Additional Iron-Aluminide, Inconel-625, and 316L SS coatings were deposited on 1018 steel substrates.

  7. A new approach to plane-sweep overlay: topological structuring and line-segment classification

    USGS Publications Warehouse

    van Roessel, Jan W.

    1991-01-01

    An integrated approach to spatial overlay was developed with the objective of creating a single function that can perform most of the tasks now assigned to discrete functions in current systems. Two important components of this system are a unique method for topological structuring, and a method for attribute propagation and line-segment classification. -Author

  8. Arbitration Intervention Worker (AIW) Services: Case Management Overlay in a Juvenile Diversion Program

    ERIC Educational Resources Information Center

    Poythress, Norman G.; Dembo, Richard; DuDell, Gary; Wareham, Jennifer

    2006-01-01

    In this issue we describe a clinical trials study of the impact of adding specific case manager overlay services to "treatment as usual" services for youths in a Juvenile Arbitration Program. In this first article we describe the experimental intervention, the Arbitration Intervention Worker (AIW) service, which was provided to a randomly selected…

  9. Fluorogenic membrane overlays to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and seawater

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Three assays were developed to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and other foods and in seawater and other environmental samples. Assays involve membrane overlays of overnight colonies on non-selective agar plates to detect ß-glucuronidase and lysyl am...

  10. Disbond detection with piezoelectric wafer active sensors in RC structures strengthened with FRP composite overlays

    NASA Astrophysics Data System (ADS)

    Giurgiutiu, Victor; Harries, Kent; Petrou, Michael; Bost, Joel; Quattlebaum, Josh B.

    2003-12-01

    The capability of embedded piezoelectric wafer active sensors (PWAS) to perform in-situ nondestructive evaluation (NDE) for structural health monitoring (SHM) of reinforced concrete (RC) structures strengthened with fiber reinforced polymer (FRP) composite overlays is explored. First, the disbond detection method were developed on coupon specimens consisting of concrete blocks covered with an FRP composite layer. It was found that the presence of a disbond crack drastically changes the electromechanical (E/M) impedance spectrum measured at the PWAS terminals. The spectral changes depend on the distance between the PWAS and the crack tip. Second, large scale experiments were conducted on a RC beam strengthened with carbon fiber reinforced polymer (CFRP) composite overlay. The beam was subject to an accelerated fatigue load regime in a three-point bending configuration up to a total of 807,415 cycles. During these fatigue tests, the CFRP overlay experienced disbonding beginning at about 500,000 cycles. The PWAS were able to detect the disbonding before it could be reliably seen by visual inspection. Good correlation between the PWAS readings and the position and extent of disbond damage was observed. These preliminary results demonstrate the potential of PWAS technology for SHM of RC structures strengthened with FRP composite overlays.

  11. Robotic weld overlay coatings for erosion control. Final technical progress report, July 1992--July 1995

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1995-10-15

    The erosion behavior of weld overlay coatings has been studied. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400{degrees}C at 90{degrees} and 30{degrees} particle impact angles. The microstructure of each coating was characterized before erosion testing. A relative ranking of the coatings erosion resistance was developed by determining the steady state erosion rates. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at both impact angles. It was found that weld overlays that exhibit good abrasion resistance did not show good erosion resistance. Erosion tests were also performed for selected wrought materials with chemical composition similar to weld overlays. Eroded surfaces of the wrought and weld alloys were examined by Scanning Electron Microscopy (SEM). Microhardness tests were performed on the eroded samples below the erosion surface to determine size of the plastically deformed region. It was found that one group of coatings experienced significant plastic deformation as a result of erosion while the other did not. It was also established that, in the steady state erosion regime, the size of the plastically deformed region is constant.

  12. Semantic Overlays in Educational Content Networks--The hylOs Approach

    ERIC Educational Resources Information Center

    Engelhardt, Michael; Hildebrand, Arne; Lange, Dagmar; Schmidt, Thomas C.

    2006-01-01

    Purpose: The paper aims to introduce an educational content management system, Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.…

  13. Impact of the back side flatness of a mask on the panel overlay

    NASA Astrophysics Data System (ADS)

    Kemmochi, Daisuke; Yoshikawa, Yutaka; Iwanaga, Yoshinori; Hirano, Termusa; Kinoshita, Hiroshi

    2015-07-01

    Recently, the annual increase in the definition of high-function panels for mobile devices such as smartphones or tablets has led to TFT-LCD and TFT-OLED (Organic Light Emitting Diode) circuits becoming increasingly miniaturized and densified. TFT circuits are comprised of a superposition of layers such as gates, acts and contact holes, with a certain amount of allowance between each layer. However, that allowance has now disappeared due to the high density of the circuit. Therefore, a high-precision mask overlay is essential in order to realize circuits with even higher density. In the mask manufacturing process, the mask is placed on a writer tool, during which the back side surface of the mask makes contact with the stage. This contact alters the front side flatness of the mask. Moreover, once the circuit pattern has been drawn on the mask, it is removed from the writer tool, thus altering the front side flatness and coordinates of the mask. In this paper, we evaluated the overlay of a panel that underwent exposure using a number of masks with different back side flatness. As a result, we confirmed that deviations in the back side flatness of each mask manifest themselves in the panel overlay. Therefore, we need to improve the flatness of the back side of masks hereafter in order to further enhance the panel overlay.

  14. A quantitative comet assay: imaging and analysis of virus plaques formed with a liquid overlay.

    PubMed

    Zhu, Ying; Yin, John

    2007-01-01

    Although the plaque assay defines a "gold-standard" for measuring virus infectivity, its reliance on plaque counting limits its sensitivity. When the assay is performed with a liquid overlay, instead of agar overlay, spontaneous flows can promote a uni-directional spread of infection, creating elongated regions of cytopathology that resemble comets. As a model system comet and plaque cultures of vesicular stomatitis virus (VSV) on baby hamster kidney (BHK-21) cells were compared. Host-cell monolayers were infected with VSV particles, incubated 15 h in the presence of liquid or agar overlays and stained. VSV formed significantly larger comets than plaques, consistent with a mechanism of flow-enhanced spread. When antiviral drug (5-fluorouracil) was incorporated into the liquid overlay, comet sizes were reduced in a dose-dependent manner. Images of infected monolayers, acquired using a simple digital scanner, enabled a quantification of the inhibitory effect of the drug on infectivity. The resulting measure of drug susceptibility was found to be 18-fold more sensitive than the IC(50) measure attained by the traditional plaque-reduction assay. This quantitative comet assay has the potential to similarly enhance the sensitivity of infection measures for other plaque-forming viruses. PMID:17092573

  15. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  16. Bidirectional private key exchange using delay-coupled semiconductor lasers.

    PubMed

    Porte, Xavier; Soriano, Miguel C; Brunner, Daniel; Fischer, Ingo

    2016-06-15

    We experimentally demonstrate a key exchange cryptosystem based on the phenomenon of identical chaos synchronization. In our protocol, the private key is symmetrically generated by the two communicating partners. It is built up from the synchronized bits occurring between two current-modulated bidirectionally coupled semiconductor lasers with additional self-feedback. We analyze the security of the exchanged key and discuss the amplification of its privacy. We demonstrate private key generation rates up to 11  Mbit/s over a public channel. PMID:27304310

  17. 78 FR 77484 - Agency Information Collection Activities: Documents Required Aboard Private Aircraft

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-23

    ... SECURITY U.S. Customs and Border Protection Agency Information Collection Activities: Documents Required Aboard Private Aircraft AGENCY: U.S. Customs and Border Protection (CBP), Department of Homeland Security... the Paperwork Reduction Act of 1995 (Pub. L. 104-13; 44 U.S.C. 3507). DATES: Written comments...

  18. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of private... 32 National Defense 6 2012-07-01 2012-07-01 false Classified information in the custody of...

  19. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY...

  20. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of private... 32 National Defense 6 2014-07-01 2014-07-01 false Classified information in the custody of...

  1. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of private... 32 National Defense 6 2013-07-01 2013-07-01 false Classified information in the custody of...

  2. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.36 Classified information in the custody of private... 32 National Defense 6 2010-07-01 2010-07-01 false Classified information in the custody of...

  3. 78 FR 45059 - Safety Zone; Sherman Private Party Fireworks, Lake Michigan, Winnetka, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    .... SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Sherman Private Party Fireworks, Lake... establishing a temporary safety zone on Lake Michigan near Winnetka, IL. This safety zone is intended...

  4. TWRS privatization bibliography

    SciTech Connect

    1996-02-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. The organization of this bibliography is by subject area. Some of the documents overlap subject areas, and may be presented in more than one. Additionally, assignment of a document to one subject area does not necessarily preclude that document from containing information relevant to other subject areas not identified. The subject areas include, in order of presentation:. Waste Characterization; Pre-treatment; High-level Waste Immobilization; Low-level Waste Immobilization; Low-level Waste Melter Test Program; Performance Assessment; and General Safety.

  5. Private Stimuli, Covert Responses, and Private Events: Conceptual Remarks

    PubMed Central

    Tourinho, Emmanuel Zagury

    2006-01-01

    In this article, I discuss the concepts of private stimuli, covert responses, and private events, emphasizing three aspects: the conditions under which private stimuli may acquire discriminative functions to verbal responses, the conditions of unobservability of covert responses, and the complexity of events or phenomena described as private. I argue that the role of private stimuli in the control of self-descriptive verbal responses is dependent on a relation (correlation or equivalence relation) with public stimuli, and that responses vary along a continuum of observability. These remarks on private stimuli and covert responses are introductory to an examination of the varying complexity of phenomena described as private. I argue that private events is a verbal response emitted under the control of phenomena of different degrees of complexity, and I interpret these phenomena, based on the principle of selection by consequences. I introduce the notion of inclusiveness to suggest that some phenomena related to privacy are less or more complex as they include relations of a phylogenetic, ontogenetic, and cultural origin. PMID:22478451

  6. Quantum Oblivious Transfer Based on a Quantum Symmetrically Private Information Retrieval Protocol

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Sun, Si-Jia; Wang, Yan

    2015-03-01

    Private information retrieval implies oblivious transfer in classical cryptography. Following this clue, we present a novel quantum one-out-of-two OT protocol based on a practical quantum symmetrically private information retrieval protocol Jakobi et al. (Phys. Rev. A 83, 022301 2011), with changes only in the classical postprocessing of the key. While unconditionally secure oblivious transfer is known to be impossible, we argue that an interesting degree of security can be achieved by means of quantum physical principles instead of unproven security assumptions in order to protect both the sender and the receiver. The proposed OT protocol is loss tolerant, practical and robust against quantum memory attack.

  7. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  8. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  9. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  10. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  11. Public and Private at College.

    ERIC Educational Resources Information Center

    Newton, Robert

    1983-01-01

    The college, public or private, contains two separate realms. The public realm is the sphere of life bearing on the values sought by the college, and the private realm is that not bearing on those values. The scope of these realms is determined by the college's implicit and explicit purposes. (MSE)

  12. Private Loans: Facts and Trends

    ERIC Educational Resources Information Center

    Institute for College Access & Success, 2014

    2014-01-01

    Private loans are one of the riskiest ways to finance a college education. Like credit cards, they typically have variable interest rates. Both variable and fixed rates are higher for those who can least afford them--as high as 13% in June 2014. Private loans are not eligible for the important deferment, income-based repayment, or loan forgiveness…

  13. Michigan School Privatization Survey 2008

    ERIC Educational Resources Information Center

    Hohman, James M.; Freeland, William L. E.

    2008-01-01

    Privatization of school support services is a time-tested means for lowering educational costs. The three major services that school districts in Michigan contract out for are food, custodial and transportation. The Mackinac Center for Public Policy's survey of privatization is the longest running and most comprehensive source of school support…

  14. Public/Private Partnership Programs.

    ERIC Educational Resources Information Center

    District of Columbia Public Schools, Washington, DC.

    This document presents the Public/Private Partnership Programs, a school-community project developed in 1981 by the District of Columbia public schools and the private sector community to provide career-focused high school programs. The project was designed to motivate and support young people to stay in school, graduate from high school, and…

  15. Signed Soliloquy: Visible Private Speech

    ERIC Educational Resources Information Center

    Zimmermann, Kathrin; Brugger, Peter

    2013-01-01

    Talking to oneself can be silent (inner speech) or vocalized for others to hear (private speech, or soliloquy). We investigated these two types of self-communication in 28 deaf signers and 28 hearing adults. With a questionnaire specifically developed for this study, we established the visible analog of vocalized private speech in deaf signers.…

  16. The Law and Private Police.

    ERIC Educational Resources Information Center

    Kakalik, James S.; Wildhorn, Sorrel

    This report is one of a series of five describing a 16-month study of the nature and extent of the private police industry in the United States, its problems, its present regulation, and how the law impinges on it. A general discussion of the sources of legal limitations upon private police activities and personnel and sources of legal powers is…

  17. Michigan School Privatization Survey 2010

    ERIC Educational Resources Information Center

    Hohman, James M.; Anderson, Dustin D.

    2010-01-01

    Privatization of support services has been a method that Michigan school districts have used for several years to lower costs. More than ever before, Michigan school districts are privatizing the three main support services they offer--food, custodial and transportation. The annual survey finds that 48.8 percent of Michigan school districts are…

  18. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  19. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  20. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-12-16

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. However, a thick Al{sub 2}O{sub 3} overlay was harmful for TBC by increasing compressive stress which causes crack and spalling of YSZ coating. As a result, a dense and thin Al{sub 2}O{sub 3} overlay is critical for simultaneously preventing YSZ from hot corrosion and spalling. In the next reporting period, we will measure or calculate the residue stress within Al{sub 2}O{sub 3} overlay and YSZ coating to study the mechanism of effect of Al{sub 2}O{sub 3} overlay on spalling of YSZ coating.

  1. Secure authenticated video equipment

    SciTech Connect

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  2. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2002-11-30

    In order to improve the hot corrosion resistance of conventional YSZ TBC system, the Al{sub 2}O{sub 3} overlay coating has been successfully produced on the surface of YSZ by the Sol-gel route. The YSZ substrates were coated with boehmite sol by dip coating process, dried to form a gel film and calcined at 1200 C to form {alpha}-Al{sub 2}O{sub 3} overlay. The microstructures of TBC and Al{sub 2}O{sub 3} overlay were examined by scanning electron microscopy (SEM). The results showed that micro-pores ranged from 3 {micro}m to 20 {micro}m and micro-cracks could be clearly seen on the surface of APS YSZ coating. The thickness of alumina overlay increased with increasing the number of dip coating circles. The small microcracks (0.5-1.0 {micro}m width) on the YSZ surface could be filled and blocked by calcined alumina particles, whereas large pores remained empty and the alumina overlay was un-continuous after one time dip coating circle. Alumina overlay thicker than 5 m m obtained by five times dip coating circles largely cracked after calcinations. As a result, multiple dip coatings up to three times were ideal for getting high quality, crack- free and continuous overlay. The optimal thickness of alumina overlay was in the range of 2.5-3.5 {micro}m. In the next reporting period, we will study the hot corrosion behaviors of YSZ TBC with Al{sub 2}O{sub 3} overlay coating produced by sol gel route by exposure the samples to molten salts mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}) at 950 C.

  3. A novel approach for latent print identification using accurate overlays to prioritize reference prints.

    PubMed

    Gantz, Daniel T; Gantz, Donald T; Walch, Mark A; Roberts, Maria Antonia; Buscaglia, JoAnn

    2014-12-01

    A novel approach to automated fingerprint matching and scoring that produces accurate locally and nonlinearly adjusted overlays of a latent print onto each reference print in a corpus is described. The technology, which addresses challenges inherent to latent prints, provides the latent print examiner with a prioritized ranking of candidate reference prints based on the overlays of the latent onto each candidate print. In addition to supporting current latent print comparison practices, this approach can make it possible to return a greater number of AFIS candidate prints because the ranked overlays provide a substantial starting point for latent-to-reference print comparison. To provide the image information required to create an accurate overlay of a latent print onto a reference print, "Ridge-Specific Markers" (RSMs), which correspond to short continuous segments of a ridge or furrow, are introduced. RSMs are reliably associated with any specific local section of a ridge or a furrow using the geometric information available from the image. Latent prints are commonly fragmentary, with reduced clarity and limited minutiae (i.e., ridge endings and bifurcations). Even in the absence of traditional minutiae, latent prints contain very important information in their ridges that permit automated matching using RSMs. No print orientation or information beyond the RSMs is required to generate the overlays. This automated process is applied to the 88 good quality latent prints in the NIST Special Database (SD) 27. Nonlinear overlays of each latent were produced onto all of the 88 reference prints in the NIST SD27. With fully automated processing, the true mate reference prints were ranked in the first candidate position for 80.7% of the latents tested, and 89.8% of the true mate reference prints ranked in the top ten positions. After manual post-processing of those latents for which the true mate reference print was not ranked first, these frequencies increased to 90

  4. Privatization and management development in the healthcare sector of Georgia.

    PubMed

    West, Daniel J; Costello, Michael; Ramirez, Bernardo

    2011-01-01

    Healthcare reforms in Georgia parallel some of the major changes made by other Central and Eastern European countries. This is especially true of efforts to privatize the health sector and secure capital investments from Western Europe. Privatization of Georgian healthcare requires an understanding of the Soviet-era healthcare system and ideological orientation. Many of the issues and problems of privatization in Georgia require new knowledge to enhance equity outcomes, improve financial performance, increase access to care and encourage healthcare competition. Training existing and future healthcare leaders in modern management theory and practice is paramount. A university based health-management education partnership model was developed and implemented between several universities in the United States and Europe, along with two Georgian universities, to address workforce demands, changing market conditions, management knowledge and leadership competencies. Health-management education concentrations were developed and implemented along with several short courses to meet market demand for trained leaders and managers. PMID:21677531

  5. Holistic overlay control for multi-patterning process layers at the 10nm and 7nm nodes

    NASA Astrophysics Data System (ADS)

    Verstappen, Leon; Mos, Evert; Wardenier, Peter; Megens, Henry; Schmitt-Weaver, Emil; Bhattacharyya, Kaustuve; Adam, Omer; Grzela, Grzegorz; van Heijst, Joost; Willems, Lotte; Wildenberg, Jochem; Ignatova, Velislava; Chen, Albert; Elich, Frank; Rajasekharan, Bijoy; Vergaij-Huizer, Lydia; Lewis, Brian; Kea, Marc; Mulkens, Jan

    2016-03-01

    Multi-patterning lithography at the 10-nm and 7-nm nodes is driving the allowed overlay error down to extreme low values. Advanced high order overlay correction schemes are needed to control the process variability. Additionally the increase of the number of split layers results in an exponential increase of metrology complexity of the total overlay and alignment tree. At the same time, the process stack includes more hard-mask steps and becomes more and more complex, with as consequence that the setup and verification of the overlay metrology recipe becomes more critical. All of the above require a holistic approach that addresses total overlay optimization from process design to process setup and control in volume manufacturing. In this paper we will present the holistic overlay control flow designed for 10-nm and 7-nm nodes and illustrate the achievable ultimate overlay performance for a logic and DRAM use case. As figure 1 illustrates we will explain the details of the steps in the holistic flow. Overlay accuracy is the driver for target design and metrology tool optimization like wavelength and polarization. We will show that it is essential to include processing effects like etching and CMP which can result in a physical asymmetry of the bottom grating of diffraction based overlay targets. We will introduce a new method to create a reference overlay map, based on metrology data using multiple wavelengths and polarization settings. A similar approach is developed for the wafer alignment step. The overlay fingerprint correction using linear or high order correction per exposure (CPE) has a large amount of parameters. It is critical to balance the metrology noise with the ultimate correction model and the related metrology sampling scheme. Similar approach is needed for the wafer align step. Both for overlay control as well as alignment we have developed methods which include efficient use of metrology time, available for an in the litho-cluster integrated

  6. A private power plan

    SciTech Connect

    Ganguli, B.

    1995-01-01

    The involvement of independent power producers in the development of the Indian power sector is a result of the fiscal crisis which overwhelmed the Indian state about 1990. Until then the power sector had been almost exclusively a public sector monopoly. The power ministry estimates energy and peaking shortages of 11 percent and 32 percent in fiscal year 1993 to 1994. These are well above worst case scenarios projected by the Central Electricity Authority. Though it has received more attention, generation is not the only area in India`s power sector where independents will find opportunities. Upgrading, modernization, and transmission and distribution are also open to the private sector. State Electricity Boards (SEBs) currently lose 22 percent of power generated during transmission and distribution, a large part of this due to theft. Ultimately, success in attracting foreign investments will depend on the government`s ability to reform SEBs. This in turn will mean that the state governments will have to muster up the political will to raise tariffs.

  7. Managing the risks of a more private hydro market

    SciTech Connect

    Hurst, P.A.D.

    1995-12-31

    The trend toward increasing private involvement in hydropower ownership and finance is changing the balance of critical issues for successful projects. The completion and long-term viability of a project now can depend as much on issues of risk management and legal security as on engineering and mechanical design. A prudent project owner can minimize the new uncertainties by identifying potential issues early in the planning process and developing sound management strategies.

  8. Private Information and Insurance Rejections

    PubMed Central

    Hendren, Nathaniel

    2013-01-01

    Across a wide set of non-group insurance markets, applicants are rejected based on observable, often high-risk, characteristics. This paper argues that private information, held by the potential applicant pool, explains rejections. I formulate this argument by developing and testing a model in which agents may have private information about their risk. I first derive a new no-trade result that theoretically explains how private information could cause rejections. I then develop a new empirical methodology to test whether this no-trade condition can explain rejections. The methodology uses subjective probability elicitations as noisy measures of agents beliefs. I apply this approach to three non-group markets: long-term care, disability, and life insurance. Consistent with the predictions of the theory, in all three settings I find significant amounts of private information held by those who would be rejected; I find generally more private information for those who would be rejected relative to those who can purchase insurance; and I show it is enough private information to explain a complete absence of trade for those who would be rejected. The results suggest private information prevents the existence of large segments of these three major insurance markets. PMID:24187381

  9. New clear-out scheme to improve the overlay performance for a CMP process

    NASA Astrophysics Data System (ADS)

    Guo, Yao-Wen; Kao, Han-Pin; Chien, Tsung-Chih; Chang, Chiafu; Lin, Hsin-Sung; Chen, Yen-Fen; Ku, Chin-Yu

    2002-07-01

    To obtain good overlay performance, the quality of the wafer marks should be well designed. Although different brands of steppers and scanners use unique mark pattern design and alignment system, these exposure tools determine the position of marks through the signal obtaining from the height difference within the mark region. The largest problem of the marks is that the quality of the marks is influenced by the process conditions, such as film deposition, chemical mechanical polishing, and etching conditions, etc. In this work, we studied the impact of the CMP on the quality of the ASML alignment mark. The film structure and process flow are also investigated to understand the deformation of marks for different clear-out scheme. The lot-to-lot overlay variation can be prevented when the new clear-out scheme is employed.

  10. A hierarchical P2P overlay network for interest-based media contents lookup

    NASA Astrophysics Data System (ADS)

    Lee, HyunRyong; Kim, JongWon

    2006-10-01

    We propose a P2P (peer-to-peer) overlay architecture, called IGN (interest grouping network), for contents lookup in the DHC (digital home community), which aims to provide a formalized home-network-extended construction of current P2P file sharing community. The IGN utilizes the Chord and de Bruijn graph for its hierarchical overlay network construction. By combining two schemes and by inheriting its features, the IGN efficiently supports contents lookup. More specifically, by introducing metadata-based lookup keyword, the IGN offers detailed contents lookup that can reflect the user interests. Moreover, the IGN tries to reflect home network environments of DHC by utilizing HG (home gateway) of each home network as a participating node of the IGN. Through experimental and analysis results, we show that the IGN is more efficient than Chord, a well-known DHT (distributed hash table)-based lookup protocol.

  11. Overlay metrology for dark hard mask process: simulation and experiment study

    NASA Astrophysics Data System (ADS)

    Shin, Jangho; Chalykh, Roman; Kang, Hyunjae; Kim, SeongSue; Lee, SukJoo; Cho, Han-Ku

    2007-03-01

    Simulation and experimental study results are reported to solve align/overlay problem in dark hard mask process in lithography. For simulation part, an in-house simulator, which is based on rigorous coupled wave analysis and Fourier optics method of high NA imaging, is used. According to the simulation and experiment study, image quality of alignment and overlay marks can be optimized by choosing hard mask and sub-film thickness carefully for a given process condition. In addition, it is important to keep the specification of film thickness uniformity within a certain limit. Simulation results are confirmed by experiment using the state of art memory process in Samsung semiconductor R&D facility.

  12. Robotic weld overlay coatings for erosion control. [Quarterly report, July--September 1993

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1993-10-20

    In the previous period of work, twelve overlay hardfacing alloys were selected for erosion testing based upon a literature review. All twelve coatings were deposited on 1018 steel substrates using the plasma arc welding process. Ten samples from each coating were prepared for erosion testing. The coating deposition and sample preparation procedures were described in the previous quarterly report. During the past quarter, all the coatings were erosion tested at 400 C. The erosion resistance of each coating was evaluated by determining the steady state erosion rate. In addition, the microstructure of each coating was characterized before and after the erosion tests. This progress report describes the erosion test results and coating microstructures. Also, a preliminary analysis on the relationships, between weld overlay coating hardness, microstructure, and erosion resistance will be discussed.

  13. Automatic Generation of Overlays and Offset Values Based on Visiting Vehicle Telemetry and RWS Visuals

    NASA Technical Reports Server (NTRS)

    Dunne, Matthew J.

    2011-01-01

    The development of computer software as a tool to generate visual displays has led to an overall expansion of automated computer generated images in the aerospace industry. These visual overlays are generated by combining raw data with pre-existing data on the object or objects being analyzed on the screen. The National Aeronautics and Space Administration (NASA) uses this computer software to generate on-screen overlays when a Visiting Vehicle (VV) is berthing with the International Space Station (ISS). In order for Mission Control Center personnel to be a contributing factor in the VV berthing process, computer software similar to that on the ISS must be readily available on the ground to be used for analysis. In addition, this software must perform engineering calculations and save data for further analysis.

  14. Detection and characterization of heparin-binding proteins with a gel overlay procedure

    SciTech Connect

    Mehlman, T.; Burgess, W.H. )

    1990-07-01

    The binding of {sup 125}I-labeled derivatives of heparin has been used by several investigators to identify heparin-binding fragments of different heparin-binding proteins. In this report we utilize the procedure described by J.W. Smith and D.J. Knauer (1987, Anal. Biochem. 160, 105-114) to produce {sup 125}I-fluorescein-heparin. Using this derivative, we compare the use of gel overlay procedures with Western blot procedures for the detection of heparin-binding proteins following polyacrylamide gel electrophoresis in the presence of sodium dodecyl sulfate. We show that the gel overlay procedure is a relatively simple and sensitive method for visualizing heparin-binding proteins. In addition, we use the procedure to characterize the heparin-binding properties of heparin-binding growth factor 1 (acidic fibroblast growth factor) with synthetic peptide competitors and site-directed mutants of the growth factor.

  15. 75 FR 49932 - Private Transfer Fee Covenants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... AGENCY Private Transfer Fee Covenants AGENCY: Federal Housing Finance Agency. ACTION: Notice of proposed... Guidance, ``Guidance on Private Transfer Fee Covenants,'' to the Federal National Mortgage Association... mortgages on properties encumbered by private transfer fee covenants. Such covenants appear adverse...

  16. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  17. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  18. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  19. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  20. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...