Science.gov

Sample records for private overlays secure

  1. Using overlays to improve network security

    NASA Astrophysics Data System (ADS)

    Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel

    2002-07-01

    As we increase our dependency upon networked communication, the incentive to compromise and degrade network performance increases for those who wish to disrupt the flow of information. Attacks that lead to such compromise and degradation can come in a variety of forms, including distributed denial of service (DDoS) attacks, cutting wires, jamming transmissions, and monitoring/eavesdropping. Users can protect themselves from monitoring by applying cryptographic techniques, and the recent work has explored developing networks that react to DDoS attacks by locating the source(s) of the attack. However, there has been little work that addresses preventing the other kinds of attacks as opposed to reacting to them. Here, we discuss how network overlays can be used to complicate the job of an attacker that wishes to prevent communication. To amplify our point, we focus briefly on a study of preventing DDoS attacks by using overlays.

  2. Using Mobile Agents and Overlay Networks to Secure Electrical Netoworks

    SciTech Connect

    Dawes, Neal A.; Prosser, Bryan J.; Fulp, Errin W.; McKinnon, Archibald D.

    2013-04-01

    ABSTRACT The use of wandering, mobile agents can provide a robust approach for managing, monitoring, and securing electrical distribution networks. However, the topological structure of electrical networks can affect system performance. For example, if the multi-agent system relies on a regular inspection rate (on average, points of interest are inspected with equal frequency), then locations that are not well connected will on average be inspected less frequently. This paper discusses creation and use of overlay networks that create a virtual grid graph can provide faster coverage and a more uniform average agent sampling rate. Using overlays agents wander a virtual neighborhood consisting of only points of interest that are interconnected in a regular fashion (each point has the same number of neighbors). Experimental results will show that an overlay can often provide better network coverage and a more uniform inspection rate, which can improve cyber security by providing a faster detection of threats

  3. Private Security Training. Phase 2: Security Guard. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This module on private security guard training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains four instructional units that cover the following topics: (1) public relations; (2) performing fixed post…

  4. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  5. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  6. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  7. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Privately owned weapons-security. 552.116 Section..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  8. 32 CFR 552.116 - Privately owned weapons-security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Privately owned weapons-security. 552.116..., Ammunition, and Explosives-Fort Lewis, Washington § 552.116 Privately owned weapons—security. Privately owned arms and ammunition will be secured in the manner required for military weapons and ammunition...

  9. Scalable P2P Overlays of Very Small Constant Degree: An Emerging Security Threat

    NASA Astrophysics Data System (ADS)

    Jelasity, Márk; Bilicki, Vilmos

    In recent years peer-to-peer (P2P) technology has been adopted by Internet-based malware as a fault tolerant and scalable communication medium for self-organization and survival. It has been shown that malicious P2P networks would be nearly impossible to uncover if they operated in a stealth mode, that is, using only a small constant number of fixed overlay connections per node for communication. While overlay networks of a small constant maximal degree are generally considered to be unscalable, we argue in this paper that it is possible to design them to be scalable, efficient and robust. This is an important finding from a security point of view: we show that stealth mode P2P malware that is very difficult to discover with state-of-the-art methods is a plausible threat. In this paper we discuss algorithms and theoretical results that support the scalability of stealth mode overlays, and we present realistic simulations using an event based implementation of a proof-of-concept system. Besides P2P botnets, our results are also applicable in scenarios where relying on a large number of overlay connections per node is not feasible because of cost or the limited number of communication channels available.

  10. Security of practical private randomness generation

    NASA Astrophysics Data System (ADS)

    Pironio, Stefano; Massar, Serge

    2013-01-01

    Measurements on entangled quantum systems necessarily yield outcomes that are intrinsically unpredictable if they violate a Bell inequality. This property can be used to generate certified randomness in a device-independent way, i.e., without making detailed assumptions about the internal working of the quantum devices used to generate the random numbers. Furthermore these numbers are also private; i.e., they appear random not only to the user but also to any adversary that might possess a perfect description of the devices. Since this process requires a small initial random seed to sample the behavior of the quantum devices and to extract uniform randomness from the raw outputs of the devices, one usually speaks of device-independent randomness expansion. The purpose of this paper is twofold. First, we point out that in most real, practical situations, where the concept of device independence is used as a protection against unintentional flaws or failures of the quantum apparatuses, it is sufficient to show that the generated string is random with respect to an adversary that holds only classical side information; i.e., proving randomness against quantum side information is not necessary. Furthermore, the initial random seed does not need to be private with respect to the adversary, provided that it is generated in a way that is independent from the measured systems. The devices, however, will generate cryptographically secure randomness that cannot be predicted by the adversary, and thus one can, given access to free public randomness, talk about private randomness generation. The theoretical tools to quantify the generated randomness according to these criteria were already introduced in S. Pironio [Nature (London)NATUAS0028-083610.1038/nature09008 464, 1021 (2010)], but the final results were improperly formulated. The second aim of this paper is to correct this inaccurate formulation and therefore lay out a precise theoretical framework for practical device-independent randomness generation.

  11. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  12. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  13. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Private resales of securities to institutions. 230.144A Section 230.144A Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 General § 230.144A Private resales of securities to institutions. Preliminary...

  14. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect

    Olejnik, Lukasz

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  15. Secure quantum private information retrieval using phase-encoded queries

    NASA Astrophysics Data System (ADS)

    Olejnik, Lukasz

    2011-08-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett.PRLTAO0031-900710.1103/PhysRevLett.100.230502 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  16. Cryptanalysis of the secure quantum private comparison protocol

    NASA Astrophysics Data System (ADS)

    Liu, Xing-Tong; Zhao, Jing-Jing; Wang, Jian; Tang, Chao-Jing

    2013-06-01

    Recently, Yang et al [2009 Phys. Scr. 80 065002] presented the first quantum private comparison protocol that involves single photons only. This protocol is very promising in practice. However, in this paper, we analyze the security of the protocol and point out a subtle loophole. It is shown that both Eve and Charlie could obtain Bob's secret by launching a special dense-coding attack. Moreover, details of this attack and its correctness are given, and also two solutions are demonstrated to improve the protocol in order to overcome the fatal flaw.

  17. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., helicopters, and other military vehicles operated by Contractors performing private security functions; and... contract comply with 32 CFR part 159, and with any orders, directives, and instructions to Contractors... background checks), and security requirements established by 32 CFR part 159, Private Security...

  18. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.

  19. Inter-BSs virtual private network for privacy and security enhanced 60 GHz radio-over-fiber system

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Chen, Chen; Zhang, Wei; Jin, Wei; Qiu, Kun; Li, Changchun; Jiang, Ning

    2013-06-01

    A novel inter-basestations (inter-BSs) based virtual private network (VPN) for the privacy and security enhanced 60 GHz radio-over-fiber (RoF) system using optical code-division multiplexing (OCDM) is proposed and demonstrated experimentally. By establishing inter-BSs VPN overlaying the network structure of a 60 GHz RoF system, the express and private paths for the communication of end-users under different BSs can be offered. In order to effectively establish the inter-BSs VPN, the OCDM encoding/decoding technology is employed in the RoF system. In each BS, a 58 GHz millimeter-wave (MMW) is used as the inter-BSs VPN channel, while a 60 GHz MMW is used as the common central station (CS)-BSs communication channel. The optical carriers used for the downlink, uplink and VPN link transmissions are all simultaneously generated in a lightwave-centralized CS, by utilizing four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA). The obtained results properly verify the feasibility of our proposed configuration of the inter-BSs VPN in the 60 GHz RoF system.

  20. 77 FR 76076 - Information Security Oversight Office; State, Local, Tribal, and Private Sector Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ...In accordance with the Federal Advisory Committee Act (5 U.S.C. app 2) and implementing regulation 41 CFR 101-6, announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss the matters relating to the Classified National Security Information Program for State, Local, Tribal, and Private Sector...

  1. How to Keep Your Health Information Private and Secure

    MedlinePlus

    ... You may have heard about the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules. ... Your Electronic Health Information Secure There are a number of ways you can help protect your electronic ...

  2. Authenticated, private, and secured smart cards (APS-SC)

    NASA Astrophysics Data System (ADS)

    Szu, Harold; Mehmood, Amir

    2006-04-01

    From historical perspective, the recent advancements in better antenna designs, low power circuitry integrations and inexpensive fabrication materials have made possible a miniature counter-measure against Radar, a clutter behaving like a fake target return called Digital Reflection Frequency Modulation (DRFM). Such a military counter-measure have found its way in the commerce as a near field communication known as Radio Frequency Identification (RFID), a passive or active item tag T attached to every readable-writable Smart Card (SC): Passports ID, medical patient ID, biometric ID, driver licenses, book ID, library ID, etc. These avalanche phenomena may be due to the 3 rd Gen phones seeking much more versatile & inexpensive interfaces, than the line-of-sight bar-code optical scan. Despite of the popularity of RFID, the lacking of Authenticity, Privacy and Security (APS) protection restricted somewhat the wide spread commercial, financial, medical, legal, and militarily applications. Conventional APS approach can obfuscate a private passkey K of SC with the tag number T or the reader number R, or both, i.e. only T*K or R*K or both will appear on them, where * denotes an invertible operation, e.g. EXOR, but not limited to it. Then, only the authentic owner, knowing all, can inverse the operation, e.g. EXOR*EXOR= I to find K. However, such an encryption could be easily compromised by a hacker seeking exhaustively by comparison based on those frequently used words. Nevertheless, knowing biological wetware lesson for power of pairs sensors and Radar hardware counter-measure history, we can counter the counter-measure DRFM, instead using one RFID tag per SD, we follow the Nature adopting two ears/tags, e.g. each one holding portions of the ID or simply two different ID's readable only by different modes of the interrogating reader, followed by brain central processor in terms of nonlinear invertible shufflers mixing two ID bits. We prefer to adopt such a hardware-software combined hybrid approach because of a too limited phase space of a single RFID for any meaningful encryption approach. Furthermore, a useful biological lesson is not to put all eggs in one basket, "if you don't get it all, you can't hack it". According to the Radar physics, we can choose the amplitude, the frequency, the phase, the polarization, and two radiation energy supply principles, the capacitance coupling (~6m) and the inductance coupling (<1m), to code the pair of tags differently. A casual skimmer equipped with single-mode reader can not read all. We consider near-field and mid-field applications each in this paper. The near-field is at check-out counters or the convey-belt inventory involving sensitive and invariant data. The mid-field search & rescue involves not only item/person identification, but also the geo-location. If more RF power becomes cheaper & portable for longer propagation distance in the near future, then a triangulation with pair of secured readers, located at known geo-locations, could interrogate and identify items/persons and their locations in a GPS-blind environment.

  3. Creating conditions for greater private sector participation in achieving contraceptive security.

    PubMed

    Sharma, Suneeta; Dayaratna, Varuni

    2005-03-01

    The growing gap between donor/government funding and the expected need for contraceptives is an issue of great concern for most developing countries. Addressing this resource shortfall, and meeting the goals of contraceptive security requires that countries mobilize the full and active participation of the private sector in the contraceptive market. Private sector involvement will not only increase the resource base available for contraceptives, it can also free up scarce donor and government resources to serve those who have the greatest need for public subsidies. This paper provides an overview of policy processes, strategies, and tools that can be used in developing countries to create an enabling environment for greater private sector participation, foster complementary public-private sector roles, and enhance the contribution of the private sector to contraceptive security. PMID:15694501

  4. 48 CFR 52.225-26 - Contractors Performing Private Security Functions Outside the United States.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... background checks), and security requirements established by 32 CFR part 159, Private Security Contractors... contract comply with 32 CFR part 159, and with any orders, directives, and instructions to Contractors... CFR part 159. Such action may be taken at the Government's discretion without prejudice to its...

  5. A New Method for Creating Efficient Security Policies in Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  6. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    SciTech Connect

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes. These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.

  7. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security

    NASA Astrophysics Data System (ADS)

    Sathya Narayanan, G.; Aishwarya, T.; Agrawal, Anugrah; Patra, Arpita; Choudhary, Ashish; Pandu Rangan, C.

    In this paper, we focus on the specific problems of Private Matching, Set Disjointness and Cardinality of Set Intersection in information theoretic settings. Specifically, we give perfectly secure protocols for the above problems in n party settings, tolerating a computationally unbounded semi-honest adversary, who can passively corrupt at most t < n/2 parties. To the best of our knowledge, these are the first such information theoretically secure protocols in a multi-party setting for all the three problems. Previous solutions for Distributed Private Matching and Cardinality of Set Intersection were cryptographically secure and the previous Set Disjointness solution, though information theoretically secure, is in a two party setting. We also propose a new model for Distributed Private matching which is relevant in a multi-party setting.

  8. "i3" Recipients Dash to Secure Private Match

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2010-01-01

    Winners of the Investing in Innovation (i3) competition scrambled to make a deadline to find private-sector matches for their multimillion-dollar federal awards, meeting the challenge through a mix of cash grants and donations of pricey equipment and services, and by rechanneling previous grants to new purposes. The 49 organizations selected to…

  9. Lighten Encryption Schemes for Secure and Private RFID Systems

    NASA Astrophysics Data System (ADS)

    Canard, Sébastien; Coisel, Iwen; Etrog, Jonathan

    We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RFID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Gamal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Gamal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Gamal based solutions appear as the most promising schemes.

  10. Generic Overlay Framework

    Energy Science and Technology Software Center (ESTSC)

    2005-09-01

    This software provides a framework for building application layter overlay networks. It includes example overlays that can be used without modification. Also provided are example multicast and routing protocols that can be used with the overlays.

  11. 76 FR 49650 - Private Security Contractors (PSCs) Operating in Contingency Operations, Combat Operations or...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... interim rule amending 32 CFR part 159 which was published at 74 FR 34691 on July 17, 2009, is adopted as a... of the Secretary 32 CFR Part 159 Private Security Contractors (PSCs) Operating in Contingency... covered contract during contingency operations, combat operations or other significant military...

  12. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment

  13. The Effectiveness of an Electronic Security Management System in a Privately Owned Apartment Complex

    ERIC Educational Resources Information Center

    Greenberg, David F.; Roush, Jeffrey B.

    2009-01-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…

  14. Borrowing to Save: A Critique of Recent Proposals to Partially Privatize Social Security

    ERIC Educational Resources Information Center

    Dattalo, Patrick

    2007-01-01

    Concern over Social Security's forecasted long-run deficit is occurring at a time when the program has a short-term surplus. One proposed strategy to address this forecasted deficit is to allow the investment of a portion of payroll taxes into private savings accounts (PSAs). The author analyzes recent proposals for PSAs and concludes that PSAs…

  15. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ..., August 18, 2010. [FR Doc. 2010-21016 Filed 8-20-10; 8:45 am] Billing code 3195-W0-P ... National Security Information Program for State, Local, Tribal, and Private Sector Entities By the... order to ensure the proper safeguarding of information shared with State, local, tribal, and...

  16. 77 FR 43039 - Federal Acquisition Regulation; Contractors Performing Private Security Functions Outside the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-23

    ... Military Operations,'' on August 11, 2011 (see 76 FR 49650) (or, see the corresponding Department of... regulations required by the statute (32 CFR part 159, published at 76 FR 49650 on August 11, 2011) add... RIN 9000-AM20 Federal Acquisition Regulation; Contractors Performing Private Security...

  17. 76 FR 52133 - Defense Federal Acquisition Regulation Supplement; Contractors Performing Private Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-19

    ... for determining whether private security contractors adhere to standards for operational and business... amended, and the definition of ``complex contingency operations'' from JP-102 (DoD Dictionary). This... comments from small business concerns and other interested parties on the expected impact of this rule...

  18. Overlay accuracy fundamentals

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Levinski, Vladimir; Sapiens, Noam; Cohen, Guy; Amit, Eran; Klein, Dana; Vakshtein, Irina

    2012-03-01

    Currently, the performance of overlay metrology is evaluated mainly based on random error contributions such as precision and TIS variability. With the expected shrinkage of the overlay metrology budget to < 0.5nm, it becomes crucial to include also systematic error contributions which affect the accuracy of the metrology. Here we discuss fundamental aspects of overlay accuracy and a methodology to improve accuracy significantly. We identify overlay mark imperfections and their interaction with the metrology technology, as the main source of overlay inaccuracy. The most important type of mark imperfection is mark asymmetry. Overlay mark asymmetry leads to a geometrical ambiguity in the definition of overlay, which can be ~1nm or less. It is shown theoretically and in simulations that the metrology may enhance the effect of overlay mark asymmetry significantly and lead to metrology inaccuracy ~10nm, much larger than the geometrical ambiguity. The analysis is carried out for two different overlay metrology technologies: Imaging overlay and DBO (1st order diffraction based overlay). It is demonstrated that the sensitivity of DBO to overlay mark asymmetry is larger than the sensitivity of imaging overlay. Finally, we show that a recently developed measurement quality metric serves as a valuable tool for improving overlay metrology accuracy. Simulation results demonstrate that the accuracy of imaging overlay can be improved significantly by recipe setup optimized using the quality metric. We conclude that imaging overlay metrology, complemented by appropriate use of measurement quality metric, results in optimal overlay accuracy.

  19. A tainted trade? Moral ambivalence and legitimation work in the private security industry.

    PubMed

    Thumala, Angélica; Goold, Benjamin; Loader, Ian

    2011-06-01

    The private security industry is often represented - and typically represents itself - as an expanding business, confident of its place in the world and sure of its ability to meet a rising demand for security. But closer inspection of the ways in which industry players talk about its past, present and future suggests that this self-promotion is accompanied by unease about the industry's condition and legitimacy. In this paper, we analyse the self-understandings of those who sell security - as revealed in interviews conducted with key industry players and in a range of trade materials - in order to highlight and dissect the constitutive elements of this ambivalence. This analysis begins by describing the reputational problems that are currently thought to beset the industry and the underlying fears about its status and worth that these difficulties disclose. We then examine how security players seek to legitimate the industry using various narratives of professionalization. Four such narratives are identified - regulation, education, association and borrowing - each of which seeks to justify private security and enhance the industry's social worth. What is striking about these legitimation claims is that they tend not to justify the selling of security in market terms. In conclusion we ask why this is the case and argue that market justifications are 'closed-off' by a moral ambivalence that attaches to an industry trading in products which cannot guarantee to deliver the condition that its consumers crave. PMID:21631459

  20. Security analysis of multi-party quantum private comparison protocol by model checking

    NASA Astrophysics Data System (ADS)

    Yang, Fan; Yang, Guowu; Hao, Yujie; Luo, Qingbin; Wang, Yuqi

    2015-06-01

    This paper presents an analysis method for quantum information protocols based on model checking, with special focus on the quantum privacy comparison (QPC). The security properties of these protocols can be proved but in ways with much difficulty. Here we will discuss a probabilistic model checking tool — PRISM to verify specific properties of QPC protocol with multi-body and PRISM to verify specific properties of quantum private comparison (QPC) protocol with multi-party and d-dimensional entangled states.

  1. The effectiveness of an electronic security management system in a privately owned apartment complex.

    PubMed

    Greenberg, David F; Roush, Jeffrey B

    2009-02-01

    Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment buildings in New York City. Crime rates in a control apartment complex under the same ownership, and in the police precinct in which the 2 complexes are located, serve as controls. PMID:19001121

  2. Contracting-out in the United Kingdom: a partnership between social security and private pension plans.

    PubMed

    Daykin, Chris

    2002-01-01

    Contracting-out was introduced in the United Kingdom in 1978 as part of the arrangements for the State Earnings-Related Pension Scheme (SERPS) in order to avoid duplication with the existing well-developed defined benefit occupational pension plan sector. Members and sponsors of contracted-out schemes were able to save on their social security contributions in recognition of the fact that they were accruing equivalent benefits through an occupational pension plan. Later on this concept was extended to those with individual money purchase pension plans. This article considers a brief history of contracting-out, the principles of contracting-out, some problems associated with contracting-out, the implications of the introduction of stakeholder pensions and State Second Pension, and the latest rebate review and rebate orders. It examines how U.K. pensions policy since 1978 has been based on a partnership between social security and private pension plans. PMID:12503327

  3. SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage

    PubMed Central

    Toth, Csaba; Durham, Elizabeth; Kantarcioglu, Murat; Xue, Yuan; Malin, Bradley

    2014-01-01

    To mitigate bias in multi-institutional research studies, healthcare organizations need to integrate patient records. However, this process must be accomplished without disclosing the identities of the corresponding patients. Various private record linkage (PRL) techniques have been proposed, but there is a lack of translation into practice because no software suite supports the entire PRL lifecycle. This paper addresses this issue with the introduction of the Secure Open Enterprise Master Patient Index (SOEMPI). We show how SOEMPI covers the PRL lifecycle, illustrate the implementation of several PRL protocols, and provide a runtime analysis for the integration of two datasets consisting of 10,000 records. While the PRL process is slower than a non-secure setting, our analysis shows the majority of processes in a PRL protocol require several seconds or less and that SOEMPI completes the process in approximately two minutes, which is a practical amount of time for integration. PMID:25954421

  4. SOEMPI: A Secure Open Enterprise Master Patient Index Software Toolkit for Private Record Linkage.

    PubMed

    Toth, Csaba; Durham, Elizabeth; Kantarcioglu, Murat; Xue, Yuan; Malin, Bradley

    2014-01-01

    To mitigate bias in multi-institutional research studies, healthcare organizations need to integrate patient records. However, this process must be accomplished without disclosing the identities of the corresponding patients. Various private record linkage (PRL) techniques have been proposed, but there is a lack of translation into practice because no software suite supports the entire PRL lifecycle. This paper addresses this issue with the introduction of the Secure Open Enterprise Master Patient Index (SOEMPI). We show how SOEMPI covers the PRL lifecycle, illustrate the implementation of several PRL protocols, and provide a runtime analysis for the integration of two datasets consisting of 10,000 records. While the PRL process is slower than a non-secure setting, our analysis shows the majority of processes in a PRL protocol require several seconds or less and that SOEMPI completes the process in approximately two minutes, which is a practical amount of time for integration. PMID:25954421

  5. Overlay accuracy calibration

    NASA Astrophysics Data System (ADS)

    Amit, Eran; Klein, Dana; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    In order to fulfill the ever tightening requirements of advanced node overlay budgets, overlay metrology is becoming more and more sensitive to even the smallest imperfections in the metrology target. Under certain circumstances, inaccuracy due to such target imperfections can become the dominant contribution to the metrology uncertainty and cannot be quantified by the standard TMU contributors. In this paper we describe a calibration method that makes the overlay measurement robust to target imperfections without diminishing its sensitivity to the target overlay. The basic assumption of the method is that overlay measurement result can be approximated as the sum of two terms: the accurate overlay and the measurement inaccuracy (independently of the conventional contributors). While the first term (the "real overlay") is robust it is known that the overlay target inaccuracy depends on the measurement conditions. This dependence on measurement conditions is used to estimate quantitative inaccuracy by means of the overlay quality merit which was described in previous publications. This paper includes the theoretical basis of the method as well as experimental validation.

  6. Secure Quantum Private Comparison of Equality Based on Asymmetric W State

    NASA Astrophysics Data System (ADS)

    Liu, Wen-Jie; Liu, Chao; Wang, Hai-bin; Liu, Jing-Fa; Wang, Fang; Yuan, Xiao-Min

    2014-06-01

    Recently, Liu et al. (Opt. Commun. 284:3160, 2011) proposed a protocol for quantum private comparison of equality (QPCE) based on symmetric W state. However, Li et al. (Eur. Phys. J. D 66:110, 2012) pointed out that there is a flaw of information leak, and they proposed a new protocol based on EPR pairs. While examining these two protocols, we find that there exists a same flaw: the third party (TP) can know the comparison result. In this paper, through introducing and constructing a special class of asymmetric W state, a secure QPCE protocol based on this asymmetric W state is presented. Analysis shows the present protocol can not only effectively avoid the information leak found by Li et al., but also ensure TP would not get any information about the comparison result.

  7. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories

    SciTech Connect

    MILLER,MARC M.; YONEK JR.,GEORGE A.

    2001-08-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access.

  8. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the target site that is running the VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  9. Making Wireless Networks Secure for NASA Mission Critical Applications using Virtual Private Network (VPN) Technology

    NASA Technical Reports Server (NTRS)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their offices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (IAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing acceptance. The user computer running the VPN client and the. target site that is running the . VPN firewall exchange this encryption key and therefore are the only ones that are able to decipher the data. The level of encryption offered by the VPN is making it possible for wireless networks to pass the strict security policies that have kept them from being used in the past. Now people will be able to benefit from the many advantages that wireless networking has to offer in the area of mission critical applications.

  10. Campus Public Safety and Security, with Guidance as Well for High Schools and Private Secondary Schools.

    ERIC Educational Resources Information Center

    Wensyel, James W.

    Intended for school administrators from the middle school to the university level, the development and maintenance of an effective campus security program are discussed. The leadership role of the school's administrator is stressed and the use of security and safety teams, traffic studies and other measures, to identify security risks and evaluate…

  11. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... offer or sale of securities. 6. Securities acquired in a transaction made pursuant to the provisions of... to or subscription by a dealer as a participant in a public offering shall not be deemed to be owned... financial statements, as of a date not more than 16 months preceding the date of sale under the Rule in...

  12. False security or greater social inclusion? Exploring perceptions of CCTV use in public and private spaces accessed by the homeless.

    PubMed

    Huey, Laura

    2010-03-01

    It has been well documented that owing to the vulnerability inherent in their situation and status, the homeless experience high rates of harassment and criminal victimization. And yet, the question of whether CCTV surveillance of public and private spaces - so frequently viewed by the middle classes as a positive source of potential security - might also be viewed by the homeless in similar ways. Within the present paper, I address this issue by considering the possibility that CCTV might be seen by some homeless men and women as offering: a) a measure of enhanced security for those living in the streets and in shelters, and; b) to the extent that security is conceived of as a social good, the receipt of which marks one as a citizen of the state, a means by which they can be reconstituted as something more than 'lesser citizens'. To test these ideas, I rely on data from interviews conducted with homeless service users, service providers for the homeless, and police personnel in three cities. What is revealed is a mixed set of beliefs as to the relative security and meaning of CCTV. PMID:20377597

  13. Intention of private hospitals to become contractors in the prepaid social security scheme in Thailand: why and why not?

    PubMed

    Sriratanaban, J; Srichatrapimuk, K; Kositanurit, I

    1998-12-01

    The objective of the study was to examine whether private hospitals wanted be main contractors (MCs) under the social security scheme. Data were obtained from a cross-sectional survey of 94 private hospitals in Bangkok and its vicinity area conducted between August 1995 and May 1996 using in-person interview and hospital survey forms. The overall response rate was 88.3%. The results showed that some 46 hospitals (55%) expressed their intention to become MCs. However, nearly 40% of MCs in 1995 indicated that they really did not want to join the scheme while several non-MC hospitals said that they wanted to participate. The most prevalent justifications for the intention of the hospitals to become MCs, or not, were operational and marketing-related in nature. While the scheme was considered a profitable market opportunity by many, it affected hospital positioning. Participation in the scheme might also complicate health services delivery. Whether private hospitals wanted, or did not want, to become MCs was associated with ownership status (p = 0.001) and leading competitive strategies of the hospitals (p = 0.041). PMID:10772569

  14. Critical issues in overlay metrology

    NASA Astrophysics Data System (ADS)

    Sullivan, Neal T.

    2001-01-01

    In this paper, following an overview of overlay metrology, the difficult relationship of overlay with device performance and yield is discussed and supported with several examples. This is followed by a discussion of the impending collision of metrology equipment performance and "real" process tolerances for sub 0.18 um technologies. This convergence of tolerance and performance is demonstrated to lead to the current emergence of real-time overlay modeling in a feed-forward/feedback process environment and the associated metrology/sampling implications. This modeling takes advantage of the wealth of understanding concerning the systematic behavior of overlay registration errors. Finally, the impact of new process technologies (RET, OAI, CPSM, CMP, & etc.) on the measurement target is discussed and shown to de-stabilize overlay performance on standard overlay measurement target designs.

  15. Overlay quality metric

    NASA Astrophysics Data System (ADS)

    Cohen, Guy; Amit, Eran; Klein, Dana; Kandel, Daniel; Levinski, Vladimir B.

    2012-03-01

    As overlay budget continues to shrink, an improved analysis of the different contributors to this budget is needed. A major contributor that has never been quantified is the accuracy of the measurements. KLA-Tencor developed a quality metric, that calculates and attaches an accuracy value to each OVL target. This operation is performed on the fly during measurement and can be applied without affecting MAM time or throughput. Using a linearity array we demonstrate that the quality metric identifies targets deviating from the intended OVL value, with no false alarms.

  16. Direct Mask Overlay Inspection

    NASA Astrophysics Data System (ADS)

    Hsia, Liang-Choo; Su, Lo-Soun

    1983-11-01

    In this paper, we present a mask inspection methodology and procedure that involves direct X-Y measurements. A group of dice is selected for overlay measurement; four measurement targets were laid out in the kerf of each die. The measured coordinates are then fit-ted to either a "historical" grid, which reflects the individual tool bias, or to an ideal grid squares fashion. Measurements are done using a Nikon X-Y laser interferometric measurement system, which provides a reference grid. The stability of the measurement system is essential. We then apply appropriate statistics to the residual after the fit to determine the overlay performance. Statistical methods play an important role in the product disposition. The acceptance criterion is, however, a compromise between the cost for mask making and the final device yield. In order to satisfy the demand on mask houses for quality of masks and high volume, mixing lithographic tools in mask making has become more popular, in particular, mixing optical and E-beam tools. In this paper, we also discuss the inspection procedure for mixing different lithographic tools.

  17. Network security vulnerabilities and personal privacy issues in Healthcare Information Systems: a case study in a private hospital in Turkey.

    PubMed

    Namoğlu, Nihan; Ulgen, Yekta

    2013-01-01

    Healthcare industry has become widely dependent on information technology and internet as it moves from paper to electronic records. Healthcare Information System has to provide a high quality service to patients and a productive knowledge share between healthcare staff by means of patient data. With the internet being commonly used across hospitals, healthcare industry got its own share from cyber threats like other industries in the world. The challenge is allowing knowledge transfer to hospital staff while still ensuring compliance with security mandates. Working in collaboration with a private hospital in Turkey; this study aims to reveal the essential elements of a 21st century business continuity plan for hospitals while presenting the security vulnerabilities in the current hospital information systems and personal privacy auditing standards proposed by regulations and laws. We will survey the accreditation criteria in Turkey and counterparts in US and EU. We will also interview with medical staff in the hospital to understand the needs for personal privacy and the technical staff to perceive the technical requirements in terms of network security configuration and deployment. As hospitals are adopting electronic transactions, it should be considered a must to protect these electronic health records in terms of personal privacy aspects. PMID:23823398

  18. HIPAA security: compliance in radiology--an academic radiology department's plan contrasted with a small private practice.

    PubMed

    Haramati, N

    2000-01-01

    In complying with the HIPAA security regulations, the large, multi-site academic radiology department is quite different from the small, private radiology practice. This article compares and contrasts the methods each of these two model organizations use to achieve compliance. In common between the two organizations is that complete documentation of the procedures and processes involved in data management must be prepared and reviewed. Although not required in the regulations, having the documentation conform to the regulation allows for easy monitoring, auditing, and certification of compliance by future independent bodies. The level to which each organization must secure their data, perform threat assessments, and implement security procedures and intrusion detection systems are very different. The regulations do not specify what level of due diligence is required. This must be determined by each organization using their own common-sense dictum. Although the solutions used by these two types of organizations may not be the same as those adopted by other radiology departments and practices, the approaches may still serve as useful templates to guide compliance efforts by others. PMID:11190264

  19. 17 CFR 230.144A - Private resales of securities to institutions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... financial statements, as of a date not more than 16 months preceding the date of sale under the Rule in the... securities holdings in its financial statements on the basis of their market value, and no current... entity that are consolidated with the entity in its financial statements prepared in accordance...

  20. Enabling private and public sector organizations as agents of homeland security

    NASA Astrophysics Data System (ADS)

    Glassco, David H. J.; Glassco, Jordan C.

    2006-05-01

    Homeland security and defense applications seek to reduce the risk of undesirable eventualities across physical space in real-time. With that functional requirement in mind, our work focused on the development of IP based agent telecommunication solutions for heterogeneous sensor / robotic intelligent "Things" that could be deployed across the internet. This paper explains how multi-organization information and device sharing alliances may be formed to enable organizations to act as agents of homeland security (in addition to other uses). Topics include: (i) using location-aware, agent based, real-time information sharing systems to integrate business systems, mobile devices, sensor and actuator based devices and embedded devices used in physical infrastructure assets, equipment and other man-made "Things"; (ii) organization-centric real-time information sharing spaces using on-demand XML schema formatted networks; (iii) object-oriented XML serialization as a methodology for heterogeneous device glue code; (iv) how complex requirements for inter / intra organization information and device ownership and sharing, security and access control, mobility and remote communication service, tailored solution life cycle management, service QoS, service and geographic scalability and the projection of remote physical presence (through sensing and robotics) and remote informational presence (knowledge of what is going elsewhere) can be more easily supported through feature inheritance with a rapid agent system development methodology; (v) how remote object identification and tracking can be supported across large areas; (vi) how agent synergy may be leveraged with analytics to complement heterogeneous device networks.

  1. Secure Quantum Private Comparison Protocol Based on the Entanglement Swapping Between Three-Particle W-Class State and Bell State

    NASA Astrophysics Data System (ADS)

    Li, Jian; Jia, Lu; Zhou, Hong-Fu; Zhang, Ting-Ting

    2016-03-01

    We propose a new quantum private comparison protocol with the help of a semi-honest third party (TP), enabling two participants to compare the equality of their private inputs without exposing any information about their respective private inputs. Different from previous protocols, our protocol utilizes the properties of entanglement swapping between three-particle W-Class state and Bell state. The presented protocol can ensure correctness, fairness and security. Meanwhile, all the quantum particles undergo a one-way transmission, and all the participants including TP are just required having the ability to perform Bell-state measurement and exclusive-or operation which make our protocol more feasible and efficient. At last, the security of this protocol with respect to various kinds of attacks is analyzed in detail.

  2. Secure and Robust Overlay Content Distribution

    ERIC Educational Resources Information Center

    Kang, Hun Jeong

    2010-01-01

    With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…

  3. Overlay similarity: a new overlay index for metrology tool and scanner overlay fingerprint methodology

    NASA Astrophysics Data System (ADS)

    Ke, Chih-Ming; Kao, Ching-Pin; Wang, Yu-Hsi; Hu, Jimmy; Chang, Chen-Yu; Tsai, Ya-Jung; Yen, Anthony; Lin, Burn J.

    2009-03-01

    For different CD metrologies like average CD from CD SEM and optical CD (OCD) from scatterometry, CD point-to-point R2 has been well adopted as the CD correlation index. For different overlay metrologies like image-based box-in-box overlay and scatterometry-based overlay, we propose the cosine similarity as the correlation index of overlay. The cosine similarity is a measure of similarity between two vectors of n dimensions by finding the cosine of the angle between them, often used to compare documents in text mining. It has been widely used in web and document search engines and can be used as the similarity index of overlay tool-to-tool matching and scanner tool-to-tool or day-to-day fingerprint. In this paper, we demonstrate that the cosine similarity has a very high sensitivity to the overly tool performance. We compared the similarities of three generations (A1, A2, A3) of the overlay tools of venders A and B and found that after target re-training and TIS correction on each tool A1 similarity to A3 can be improved from 0.9837 to 0.9951. Overlay point-to-point matching with A3 vs. A1 can be reduced from 4.8 to 2.1 nm. The tool precision similarities, i.e. tool self best similarity, for A1, A2, A3 and B are 0.9986, 0.9990, 0.9995, and 0.9994 respectively. From this table, we demonstrate that we can use old-generation overlay tool with suitable hardware maintenance, to match to the latest-generation overlay tool.

  4. Implementing a Trust Overlay Framework for Digital Ecosystems

    NASA Astrophysics Data System (ADS)

    Malone, Paul; McGibney, Jimmy; Botvich, Dmitri; McLaughlin, Mark

    Digital Ecosystems, being decentralised in nature, are inherently untrustworthy environments. This is due to the fact that these environments lack a centralised gatekeeper and identity provider. In order for businesses to operate in these environments there is a need for security measures to support accountability and traceability. This paper describes a trust overlay network developed in the OPAALS project to allow entities participating in digital ecosystems to share experience through the exchange of trust values and to leverage on this network to determine reputation based trustworthiness of unknown and initially untrusted entities. An overlay network is described together with sample algorithms and a discussion on implementation.

  5. Overlay welding irradiated stainless steel

    NASA Astrophysics Data System (ADS)

    Kanne, W. R.; Chandler, G. T.; Nelson, D. Z.; Franco-Ferreira, E. A.

    An overlay technique developed for welding irradiated stainless steel may be important for repair or modification of fusion reactor materials. Helium, present due to (n,alpha) reactions, is known to cause cracking using conventional welding methods. Stainless steel impregnated with 3 to 220 appm helium by decay of tritium was used to develop a welding process that could be used for repair. The result was a gas metal arc weld overlay technique with low-heat input and low-penetration into the helium-containing material. Extensive metallurgical and mechanical testing of this technique demonstrated substantial reduction of helium embrittlement damage. The overlay technique was applied to irradiated 304 stainless steel containing 10 appm helium. Surface cracking, present in conventional welds made on the same steel at lower helium concentrations, was eliminated. Underbead cracking, although greater than for tritium charged and aged material, was minimal compared to conventional welding methods.

  6. Overlay welding irradiated stainless steel

    SciTech Connect

    Kanne, W.R.; Chandler, G.T.; Nelson, D.Z.; Franco-Ferreira, E.A.

    1993-08-01

    An overlay technique developed for welding irradiated stainless steel may be important for repair or modification of fusion reactor materials. Helium, present due to n,{alpha} reactions, is known to cause cracking using conventional welding methods. Stainless steel impregnated with 3 to 220 appm helium by decay of tritium was used to develop a welding process that could be used for repair. The result was a gas metal arc weld overlay technique with low-heat input and low-penetration into the helium-containing material. Extensive metallurgical and mechanical testing of this technique demonstrated substantial reduction of helium embrittlement damage. The overlay technique was applied to irradiated 304 stainless steel containing 10 appm helium. Surface cracking, present in conventional welds made on the same steel at lower helium concentrations, was eliminated. Underbead cracking, although greater than for tritium charged and aged material, was minimal compared to conventional welding methods.

  7. New analytical algorithm for overlay accuracy

    NASA Astrophysics Data System (ADS)

    Ham, Boo-Hyun; Yun, Sangho; Kwak, Min-Cheol; Ha, Soon Mok; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    The extension of optical lithography to 2Xnm and beyond is often challenged by overlay control. With reduced overlay measurement error budget in the sub-nm range, conventional Total Measurement Uncertainty (TMU) data is no longer sufficient. Also there is no sufficient criterion in overlay accuracy. In recent years, numerous authors have reported new method of the accuracy of the overlay metrology: Through focus and through color. Still quantifying uncertainty in overlay measurement is most difficult work in overlay metrology. According to the ITRS roadmap, total overlay budget is getting tighter than former device node as a design rule shrink on each device node. Conventionally, the total overlay budget is defined as the square root of square sum of the following contributions: the scanner overlay performance, wafer process, metrology and mask registration. All components have been supplying sufficiently performance tool to each device nodes, delivering new scanner, new metrology tools, and new mask e-beam writers. Especially the scanner overlay performance was drastically decreased from 9nm in 8x node to 2.5nm in 3x node. The scanner overlay seems to reach the limitation the overlay performance after 3x nod. The importance of the wafer process overlay as a contribution of total wafer overlay became more important. In fact, the wafer process overlay was decreased by 3nm between DRAM 8x node and DRAM 3x node. We develop an analytical algorithm for overlay accuracy. And a concept of nondestructive method is proposed in this paper. For on product layer we discovered the layer has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. In this paper, authors suggest an analytical algorithm for overlay accuracy. And a concept of non-destructive method is proposed in this paper. For on product layers, we discovered it has overlay inaccuracy. Also we use find out source of the overlay error though the new technique. Furthermore total overlay error data is decomposed into two parts: the systematic error and the random error. And we tried to show both error components characteristic, systematic error has a good correlation with residual error by scanner condition, whereas, random error has a good correlation with residual error as going process steps. Furthermore, we demonstrate the practical using case with proposed method that shows the working of the high order method through systematic error. Our results show that to characterize an overlay data that is suitable for use in advanced technology nodes requires much more than just evaluating the conventional metrology metrics of TIS and TMU.

  8. Overlay metrology at the crossroads

    NASA Astrophysics Data System (ADS)

    Smith, Nigel P.; Binns, Lewis A.; Plambeck, Albert; Heidrich, Kevin

    2008-03-01

    The introduction of new techniques such as double patterning will reduce overlay process tolerance much faster than the rate at which critical feature dimensions are shrinking. In order to control such processes measurements with uncertainties under 0.4nm are desirable today and will become essential within the next few years. This very small error budget leads to questions about the capability of the imaging technology used in overlay tools today and to evaluation of potential replacement techniques. In this paper we will show that while imaging technology is in principle capable of meeting this requirement, the real uncertainty in overlay within devices falls well short of the levels needed. A proper comparison between techniques needs to focus on all of the possible sources of error, and especially those that cannot be simply reduced by calibration or by repeating measurements. On that basis there are more significant problems than the relative capability of different measurement techniques. We will discuss a method by which overlay within the device area can be controlled to the required tolerance.

  9. Fabrication of magnetic bubble memory overlay

    NASA Technical Reports Server (NTRS)

    1973-01-01

    Self-contained magnetic bubble memory overlay is fabricated by process that employs epitaxial deposition to form multi-layered complex of magnetically active components on single chip. Overlay fabrication comprises three metal deposition steps followed by subtractive etch.

  10. Quality indicators of image-based overlay

    NASA Astrophysics Data System (ADS)

    Chen, Yen-Liang; Huang, Jacky; Lee, Rita; Wang, Chen-Ming; Ke, Chih-Ming; Gau, Tsai-Sheng

    2012-03-01

    A new method for indicating the image quality of overlay measurement is proposed in this paper. Due to the constraint of the overlay control tolerance, the overlay metrology requirement has become very stringent. Current indicators such as the total measurement uncertainty (TMU) are insufficient to guarantee a good overlay measurement. This paper describes two quality indicators, the contrast index (CI) and the asymmetry index (AI). The CI is a crucial quality indicator that affects the overlay accuracy greatly. The AI, based on an imaging process with modified cross-correlation operation, shows alignment mark robustness in both the x and the y directions. For determination of the best recipe, the box-in-box overlay marks are measured to obtain the images with different conditions. The conventional TMU indicators are used first to sieve out the better choices. Then the CI and AI can help to judge whether the overlay results are reliable and can be applied to monitoring of process variations.

  11. Meeting overlay requirements for future technology nodes with in-die overlay metrology

    NASA Astrophysics Data System (ADS)

    Schulz, Bernd; Seltmann, Rolf; Busch, Jens; Hempel, Fritjof; Cotte, Eric; Alles, Benjamin

    2007-03-01

    As a consequence of the shrinking sizes of the integrated circuit structures, the overlay budget shrinks as well. Overlay is traditionally measured with relatively large test structures which are located in the scribe line of the exposure field, in the four corners. Although the performance of the overlay metrology tools has improved significantly over time it is questionable if this traditional method of overlay control will be sufficient for future technology nodes. For advanced lithography techniques like double exposure or double patterning, in-die overlay is critical and it is important to know how much of the total overlay budget is consumed by in-die components. We reported earlier that small overlay targets were included directly inside die areas and good performance was achieved. This new methodology enables a wide range of investigations. This provides insight into processes which were less important in the past or not accessible for metrology. The present work provides actual data from productive designs, instead of estimates, illustrating the differences between the scribe line and in-die registration and overlay. The influence of the pellicle on pattern placement on mask and wafer overlay is studied. Furthermore the registration overlay error of the reticles is correlated to wafer overlay residuals. The influence of scanner-induced distortions (tool to tool differences) on in-die overlay is shown. Finally, the individual contributors to in-die-overlay are discussed in the context of other overlay contributors. It is proposed to use in-die overlay and registration results to derive guidelines for future overlay and registration specifications. It will be shown that new overlay correction schemes which take advantage of the additional in-die overlay information need to be considered for production.

  12. Overlays for classroom and optometric use.

    PubMed

    Wilkins, A

    1994-01-01

    Perceptual distortion of printed text can sometimes be reduced by placing upon the page a sheet of coloured plastic (overlay). The colour that best reduces the distortion differs from one individual to another and may need to be selected with precision. A set of overlays has been developed that samples the CIE UCS diagram systematically. The overlays are robust and have a matte finish. They can be combined in an intuitive way to provide a wide range of chromaticities. PMID:7512256

  13. Flutter Analysis of the Shuttle Tile Overlay Repair Concept

    NASA Technical Reports Server (NTRS)

    Bey, Kim S.; Scott, Robert C.; Bartels, Robert E.; Waters, William A.; Chen, Roger

    2007-01-01

    The Space Shuttle tile overlay repair concept, developed at the NASA Johnson Space Center, is designed for on-orbit installation over an area of damaged tile to permit safe re-entry. The thin flexible plate is placed over the damaged area and secured to tile at discreet points around its perimeter. A series of flutter analyses were performed to determine if the onset of flutter met the required safety margins. Normal vibration modes of the panel, obtained from a simplified structural analysis of the installed concept, were combined with a series of aerodynamic analyses of increasing levels of fidelity in terms of modeling the flow physics to determine the onset of flutter. Results from these analyses indicate that it is unlikely that the overlay installed at body point 1800 will flutter during re-entry.

  14. On-demand Overlay Networks for Large Scientific Data Transfers

    SciTech Connect

    Ramakrishnan, Lavanya; Guok, Chin; Jackson, Keith; Kissel, Ezra; Swany, D. Martin; Agarwal, Deborah

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  15. Women and Private Pensions.

    ERIC Educational Resources Information Center

    Benson, Helene A.

    This speech focuses on women and private pension plans, such as private pension coverage and smaller benefit amounts. Pension issues affecting women as employees include participation in plans, vesting, break-in service, benefit accruals, integration with Social Security, sex-based actuarial tables, portability, inflation, and individual…

  16. CFDP for Interplanetary Overlay Network

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol for Interplanetary Overlay Network (CFDP-ION) is an implementation of CFDP that uses IO' s DTN (delay tolerant networking) implementation as its UT (unit-data transfer) layer. Because the DTN protocols effect automatic, reliable transmission via multiple relays, CFDP-ION need only satisfy the requirements for Class 1 ("unacknowledged") CFDP. This keeps the implementation small, but without loss of capability. This innovation minimizes processing resources by using zero-copy objects for file data transmission. It runs without modification in VxWorks, Linux, Solaris, and OS/X. As such, this innovation can be used without modification in both flight and ground systems. Integration with DTN enables the CFDP implementation itself to be very simple; therefore, very small. Use of ION infrastructure minimizes consumption of storage and processing resources while maximizing safety.

  17. Design For Manufacture In Overlay Metrology

    NASA Astrophysics Data System (ADS)

    Adel, Mike

    2005-09-01

    Overlay metrology has become a cornerstone requirement which enables modern lithographic patterning. The mantra of metrology engineers in the litho cell and tool vendors alike has traditionally been TMU — Total Measurement Uncertainty — a metric which combines all sources of metrology tool related uncertainty. Although relentless TMU reduction is essential, it is certainly not a sufficient condition to meet the overlay control needs for the 32 nm node and below. Many other "on wafer" contributors must be factored into the uncertainty equation. A wider scope in the definition of the overlay metrology process is required which views it as part of the greater IC manufacturing process. Current and emerging overlay metrology industry practices will be reviewed in light of the increasing complexity associated with the interactions between metrology tool, target design and the sampling plan.

  18. A comparison of advanced overlay technologies

    NASA Astrophysics Data System (ADS)

    Dasari, Prasad; Smith, Nigel; Goelzer, Gary; Liu, Zhuan; Li, Jie; Tan, Asher; Koh, Chin Hwee

    2010-03-01

    The extension of optical lithography to 22nm and beyond by Double Patterning Technology is often challenged by CDU and overlay control. With reduced overlay measurement error budgets in the sub-nm range, relying on traditional Total Measurement Uncertainty (TMU) estimates alone is no longer sufficient. In this paper we will report scatterometry overlay measurements data from a set of twelve test wafers, using four different target designs. The TMU of these measurements is under 0.4nm, within the process control requirements for the 22nm node. Comparing the measurement differences between DBO targets (using empirical and model based analysis) and with image-based overlay data indicates the presence of systematic and random measurement errors that exceeds the TMU estimate.

  19. Qmerit-calibrated overlay to improve overlay accuracy and device performance

    NASA Astrophysics Data System (ADS)

    Ullah, Md Zakir; Jazim, Mohamed Fazly Mohamed; Sim, Stella; Lim, Alan; Hiem, Biow; Chuen, Lieu Chia; Ang, Jesline; Lim, Ek Chow; Klein, Dana; Amit, Eran; Volkovitch, Roie; Tien, David; Choi, DongSub

    2015-03-01

    In advanced semiconductor industries, the overlay error budget is getting tighter due to shrinkage in technology. To fulfill the tighter overlay requirements, gaining every nanometer of improved overlay is very important in order to accelerate yield in high-volume manufacturing (HVM) fabs. To meet the stringent overlay requirements and to overcome other unforeseen situations, it is becoming critical to eliminate the smallest imperfections in the metrology targets used for overlay metrology. For standard cases, the overlay metrology recipe is selected based on total measurement uncertainty (TMU). However, under certain circumstances, inaccuracy due to target imperfections can become the dominant contributor to the metrology uncertainty and cannot be detected and quantified by the standard TMU. For optical-based overlay (OBO) metrology targets, mark asymmetry is a common issue which can cause measurement inaccuracy, and it is not captured by standard TMU. In this paper, a new calibration method, Archer Self-Calibration (ASC), has been established successfully in HVM fabs to improve overlay accuracy on image-based overlay (IBO) metrology targets. Additionally, a new color selection methodology has been developed for the overlay metrology recipe as part of this calibration method. In this study, Qmerit-calibrated data has been used for run-to-run control loop at multiple devices. This study shows that color filter can be chosen more precisely with the help of Qmerit data. Overlay stability improved by 10~20% with best color selection, without causing any negative impact to the products. Residual error, as well as overlay mean plus 3-sigma, showed an improvement of up to 20% when Qmerit-calibrated data was used. A 30% improvement was seen in certain electrical data associated with tested process layers.

  20. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content

  1. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  2. Scatterometry or imaging overlay: a comparative study

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that both imaging overlay technology and DBO-1 technology are fully successful and have a valid roadmap for the next few design nodes, with some use cases better suited for one or the other measurement technologies. Having both imaging and DBO technology options available in parallel, allows Overlay Engineers a mix and match overlay measurement strategy, providing back up when encountering difficulties with one of the technologies and benefiting from the best of both technologies for every use case.

  3. Polymer concrete overlay on SH-51, bridge deck

    NASA Astrophysics Data System (ADS)

    Borg, T. M.

    1982-06-01

    A thin resinous overlay was placed on a sound bridge deck in Oklahoma to evaluate its performance over one year using various physical tests. The evaluation shows how well the overlay protects the reinforcing steel from corrosion due to deicing salts. The steps leading to the construction of the overlay are detailed as well as the actual placing of the overlay. The results of various physical tests are reported for both before and after the overlay.

  4. Solidification of an alloy 625 weld overlay

    NASA Astrophysics Data System (ADS)

    Dupont, J. N.

    1996-11-01

    The solidification behavior (microsegregation, secondary phase formation, and solidification temperature range) of an Alloy 625 weld overlay deposited on 2.25Cr - 1Mo steel by gas metal arc welding was investigated by light and electron optical microscopy, electron microprobe, and differential thermal analysis techniques. The overlay deposit was found to terminate solidification at ≈ 1216 °C by a γ/Laves eutectic-type reaction. The Laves phase was highly enriched in Nb, Mo, and Si. The solidification reaction and microsegregation potential of major alloying elements in the overlay deposit are compared to other Nb-bearing Ni base alloys and found to be very similar to those for Alloy 718. Solidification cracks observed in the overlay were attributed to the wide solidification temperature range (≈170 °C) and formation of interdendritic ( γ+Laves) constituent. Reasonable agreement is obtained between the calculated and measured volume percent ( γ+Laves) constituent with the Scheil equation by treating the overlay system as a simple γ-Nb “binary” and using an experimentally determined k Nb value from electron microprobe data.

  5. Solidification of an alloy 625 weld overlay

    SciTech Connect

    DuPont, J.N.

    1996-11-01

    The solidification behavior (microsegregation, secondary phase formation, and solidification temperature range) of an Alloy 625 weld overlay deposited on 2.25Cr-1Mo steel by gas metal arc welding was investigated by light and electron optical microscopy, electron microprobe, and differential thermal analysis techniques. The overlay deposit was found to terminate solidification at {approx}1,216 C by a {gamma}/Laves eutectic-type reaction. The Laves phase was highly enriched in Nb, Mo, and Si. The solidification reaction and microsegregation potential of major alloying elements in the overlay deposit are compared to other Nb-bearing Ni base alloys and found to be very similar to those for Alloy 718. Solidification cracks observed in the overlay were attributed to the wide solidification temperature range ({approx}170 C) and formation of interdendritic ({gamma} + Laves) constituent. Reasonable agreement is obtained between the calculated and measured volume percent ({gamma} + Laves) constituent with the Scheil equation by treating the overlay system as a simple {gamma}-Nb binary and using an experimentally determined k{sub Nb} value from electron microprobe data.

  6. Robotic weld overlay coatings for erosion control

    SciTech Connect

    Not Available

    1994-11-01

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB`s.

  7. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  8. A spectral overlay method for dissimilar materials

    NASA Technical Reports Server (NTRS)

    Belytschko, T.; Lu, Y. Y.; Gu, L.

    1992-01-01

    The spectral overlay method is applied to examine the stress distribution along the interface between the two different materials. The essential feature of the spectral overlay method is that the high resolution of localized steep gradients can be achieved by overlaying a spectral interpolant on a standard finite element mesh. In order to evaluate this method and compare it with conventional finite element method, a test problem with high gradients in Poisson equation has been devised. The results show that this method is very powerful in capturing the shape of the gradient field and its peak value. Solutions for two problems with interfaces between dissimilar materials are then given to illustrate the effectiveness of this method.

  9. Weld overlay coatings for erosion control

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  10. Mask inspection placement maps for improving overlay

    NASA Astrophysics Data System (ADS)

    Parizat, Ziv; de Kruif, Robert; Finders, Jo; Minnaert-Janssen, Ingrid; Duray, Frank; Ben Yishai, Michael; Mangan, Shmoolik; Cohen, Yaron; Englard, Ilan

    2009-10-01

    With each successive technology node the overlay specifications of the immersion lithography scanner have become increasingly more stringent. One of the challenges is high order distortions introduced by the mask. These distortions may contribute significantly to the product overlay budget raising it above the specification requirements and are not easy to correct. The higher order distortions, originating from pellicle and mask process imperfections, have been shown to result in errors in the range of several nanometers to the overall overlay budget [1],[2]. Correction markers and the actual product features cannot occupy the same space on the mask. As a result they might be exposed to differing local distortions which could result in non-optimal systematic distortion corrections [3]. Therefore high precision placement measurements of features across the mask are required for placement control and correction. The Applied Materials Aera2TM aerial imaging mask inspection system is capable of generating high precision global and local feature placement maps with a high measurement density. These maps can be used to monitor feature placement. Furthermore, the maps can be used in a feed forward APC system such as ASML's GridMapper IntrafieldTM[4]. This feed forward system helps to reduce the overall overlay error of feature processes and to meet the stringent overlay budget requirements. In this paper we present for the first time (?) mask registration results obtained with the Aera2 and show that this tool is able to meet the 1 [nm], 3δ ITRS requirement [5] for the 22nm node. Key words: Inspection, Mask, Reticle, Placement, Registration, Overlay,

  11. Relativistic quantum private database queries

    NASA Astrophysics Data System (ADS)

    Sun, Si-Jia; Yang, Yu-Guang; Zhang, Ming-Ou

    2015-04-01

    Recently, Jakobi et al. (Phys Rev A 83, 022301, 2011) suggested the first practical private database query protocol (J-protocol) based on the Scarani et al. (Phys Rev Lett 92, 057901, 2004) quantum key distribution protocol. Unfortunately, the J-protocol is just a cheat-sensitive private database query protocol. In this paper, we present an idealized relativistic quantum private database query protocol based on Minkowski causality and the properties of quantum information. Also, we prove that the protocol is secure in terms of the user security and the database security.

  12. KML Super Overlay to WMS Translator

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  13. Differential signal scatterometry overlay metrology: an accuracy investigation

    NASA Astrophysics Data System (ADS)

    Kandel, Daniel; Adel, Mike; Dinu, Berta; Golovanevsky, Boris; Izikson, Pavel; Levinski, Vladimir; Vakshtein, Irina; Leray, Philippe; Vasconi, Mauro; Salski, Bartlomiej

    2007-06-01

    The overlay control budget for the 32nm technology node will be 5.7nm according to the ITRS. The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty (TMU) requirements of 0.57nm for the most challenging use cases of the 32nm node. The current state of the art imaging overlay metrology technology does not meet this strict requirement, and further technology development is required to bring it to this level. In this work we present results of a study of an alternative technology for overlay metrology - Differential signal scatterometry overlay (SCOL). Theoretical considerations show that overlay technology based on differential signal scatterometry has inherent advantages, which will allow it to achieve the 32nm technology node requirements and go beyond it. We present results of simulations of the expected accuracy associated with a variety of scatterometry overlay target designs. We also present our first experimental results of scatterometry overlay measurements, comparing this technology with the standard imaging overlay metrology technology. In particular, we present performance results (precision and tool induced shift) and address the issue of accuracy of scatterometry overlay. We show that with the appropriate target design and algorithms scatterometry overlay achieves the accuracy required for future technology nodes.

  14. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California legislation…

  15. Private Rehabilitation.

    ERIC Educational Resources Information Center

    McMahon, Brian T., Ed.

    1983-01-01

    Discusses the expanding role of the rehabilitation counselor into private sector rehabilitation in the seven articles of this special issue. Topics cover private rehabilitation in an insurance context including forensics issues, computer applications, recent trends, services in a multiprogram private clinic, and rehabilitation counselor training.…

  16. Privatizing Libraries

    ERIC Educational Resources Information Center

    Jerrard, Jane; Bolt, Nancy; Strege, Karen

    2012-01-01

    This timely special report from ALA Editions provides a succinct but comprehensive overview of the "privatization" of public libraries. It provides a history of the trend of local and state governments privatizing public services and assets, and then examines the history of public library privatization right up to the California legislation

  17. Advance overlay correction beyond 32nm DRAM process

    NASA Astrophysics Data System (ADS)

    Hung, Chia Tsung; Hsia, Chung Ping; Cheng, Tzu Shen; Huang, Chun Yen; Wu, Wen Bin; Shih, Chiang Lin

    2008-11-01

    Overlay requirements for semiconductor devices are decreasing faster than anticipation. Beyond 50nm technology node, overlay budget becomes much tighter as 20% of half pitch. If Double Patterning Technology implemented, CD error will consume overlay control budget, which must be tighter than 1nm or 2nm. For 32nm technology node, the overlay control budget might be less than 5nm. In this paper, we studied the possibility of 5nm overlay control by using Zone Alignment (ZA), High Order Correction (HOC) and Correction Per Exposure (CPE). ZA is a novel zone dependency alignment strategy which compensates an improper averaging effect through weighting all surrounding marks with a linear model. HOC is an alignment correction method which can compensate nonlinear overlay error up to fifth order polynomial. CPE is a function of Grid-Mapper package, which is a field base method to correct overlay error field by field. It's also a good approach to minimize the grid fingerprint difference between exposure tools. The results of this paper indicate that ZA and HOC can reduce 15~25% uncorrectable overlay residual against conventional linear model and the stability in mass production has been demonstrated. Therefore, it is still not possible to control overlay within 5nm. CPE shows very good overlay residual performance as our expectation, and it's a possible approach to achieve 5nm overlay control in 32nm technology node. In addition, the feedback or feed-forward mechanisms have to be established for mass production worthy.

  18. Overlay Tolerances For VLSI Using Wafer Steppers

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Rice, Rory

    1988-01-01

    In order for VLSI circuits to function properly, the masking layers used in the fabrication of those devices must overlay each other to within the manufacturing tolerance incorporated in the circuit design. The capabilities of the alignment tools used in the masking process determine the overlay tolerances to which circuits can be designed. It is therefore of considerable importance that these capabilities be well characterized. Underestimation of the overlay accuracy results in unnecessarily large devices, resulting in poor utilization of wafer area and possible degradation of device performance. Overestimation will result in significant yield loss because of the failure to conform to the tolerances of the design rules. The proper methodology for determining the overlay capabilities of wafer steppers, the most commonly used alignment tool for the production of VLSI circuits, is the subject of this paper. Because cost-effective manufacturing process technology has been the driving force of VLSI, the impact on productivity is a primary consideration in all discussions. Manufacturers of alignment tools advertise the capabilities of their equipment. It is notable that no manufacturer currently characterizes his aligners in a manner consistent with the requirements of producing very large integrated circuits, as will be discussed. This has resulted in the situation in which the evaluation and comparison of the capabilities of alignment tools require the attention of a lithography specialist. Unfortunately, lithographic capabilities must be known by many other people, particularly the circuit designers and the managers responsible for the financial consequences of the high prices of modern alignment tools. All too frequently, the designer or manager is confronted with contradictory data, one set coming from his lithography specialist, and the other coming from a sales representative of an equipment manufacturer. Since the latter generally attempts to make his merchandise appear as attractive as possible, the lithographer is frequently placed in the position of having to explain subtle issues in order to justify his decisions. It is the purpose of this paper to provide that explanation.

  19. Impact of reticle writing errors on the on-product overlay performance

    NASA Astrophysics Data System (ADS)

    van Haren, Richard; Cekli, Hakki Ergun; Liu, Xing Lan; Beltman, Jan; Pastol, Anne; Massin, Jean; Dupre La Tour, Emilie; Gatefait, Maxime; Sundermann, Frank

    2014-10-01

    The on-product overlay specification and Advanced Process Control (APC) are getting extremely challenging particularly after the introduction of multi-patterning applications like Litho-Etch-Litho-Etch (LELE). While the Reticle Writing Error (RWE) contribution could be marginalized for quite some time in the layer-to-layer overlay budget, it will become one of the dominating overlay contributors when the intra-layer overlay budget is considered. While most of the overlay contributors like wafer processing, scanner status, reticle transmission, dose, illumination conditions drop out of the intra-layer overlay budget, this is certainly not the case for reticle to reticle writing differences. In this work, we have studied the impact of the RWE on the on-product overlay performance. We show that the RWE can be characterized by an off-line mask registration tool and the modelled results can be sent as feed-forward corrections to the ASML TWINSCANTM. By doing so, the overlay control complexity (e.g. send-ahead wafers, APC settling time) can be reduced significantly. Off-line characterization enables that all reticles virtually become equal after correction (at least to the level of correction capability of the scanner). This means that all higher order RWE contributions (currently up to a third order polynomial) can be removed from the fingerprint. We show that out of 50 production reticles (FEOL, 28-nm technology), 30% can be improved on residual level when non-linear feed-forward corrections are considered as well. The additional benefit of feeding forward linear corrections to the scanner is even higher: it is anticipated that a large portion of the APC variation might find its origin in the RWE contribution. In order to send feed-forward corrections to the scanner, we obviously rely on the quality of the off-line RWE measurements. These measurements are usually provided by a registration tool at the mask shop. To secure the quality, an independent experimental verification test was developed to check if off-line RWE measurements can be used as feed-forward corrections to the scanner. The test has been executed on an ASML NXT: 1950i scanner and was designed such to isolate the reticle writing error contribution. The match between the off-line measurements and the experiment is striking.

  20. Secure key storage and distribution

    DOEpatents

    Agrawal, Punit

    2015-06-02

    This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.

  1. Overlay tool comparison for sub-130-nm technologies

    NASA Astrophysics Data System (ADS)

    Russo, Beth; Bishop, Michael; Benoit, David C.; Silver, Richard M.

    2002-07-01

    The Overlay Metrology Advisory Group (OMAG), which includes representatives from International SEMATECH Member Companies and the National Institute of Standards and Technology, has collaborated to create a unified specification for overlay measurement tools [1]. The methodology and results of an overlay benchmarking comparison of several tools are discussed in this paper. As device technologies shrink below the sub-130nm range, a critical need arises to develop more precise tools to measure overlay. Overlay metrology capability needs to be available for detecting and controlling total device overlay regardless of the source of error. The misregistration measurement uncertainty introduced by the overlay tool can be compared for several systems. A benchmarking study is currently underway and focuses on the existing technique of optical measurement of centerline offsets in different target designs. The critical parameters that the study analyzes include precision, accuracy, throughput, through focus measurements, and recipe portability. Imaging issues such as low contrast targets, across wafer thickness variation, CMP effects, and grainy metal targets can contribute greatly to overlay errors. Several process stacks were designed to incorporate some of these imaging issues and test the limitations of the overlay tools. The same set of wafers and test locations were measured at each supplier site and the results were analyzed. This paper focuses on the methodology used for overlay benchmarking and examples of the results generated with respect to the parameters tested.

  2. New low-viscosity overlay medium for viral plaque assays

    PubMed Central

    Matrosovich, Mikhail; Matrosovich, Tatyana; Garten, Wolfgang; Klenk, Hans-Dieter

    2006-01-01

    Background Plaque assays in cell culture monolayers under solid or semisolid overlay media are commonly used for quantification of viruses and antiviral substances. To overcome the pitfalls of known overlays, we tested suspensions of microcrystalline cellulose Avicel RC/CL™ as overlay media in the plaque and plaque-inhibition assay of influenza viruses. Results Significantly larger plaques were formed under Avicel-containing media, as compared to agar and methylcellulose (MC) overlay media. The plaque size increased with decreasing Avicel concentration, but even very diluted Avicel overlays (0.3%) ensured formation of localized plaques. Due to their low viscosity, Avicel overlays were easier to use than methylcellulose overlays, especially in the 96-well culture plates. Furthermore, Avicel overlay could be applied without prior removal of the virus inoculum thus facilitating the assay and reducing chances of cross-contamination. Using neuraminidase inhibitor oseltamivir carboxylate, we demonstrated applicability of the Avicel-based plaque reduction assay for testing of antiviral substances. Conclusion Plaque assay under Avicel-containing overlay media is easier, faster and more sensitive than assays under agar- and methylcellulose overlays. The assay can be readily performed in a 96-well plate format and seems particularly suitable for high-throughput virus titrations, serological studies and experiments on viral drug sensitivity. It may also facilitate work with highly pathogenic agents performed under hampered conditions of bio-safety labs. PMID:16945126

  3. Privatizing Australia

    SciTech Connect

    Burr, M.T.

    1995-07-01

    The sun is setting on Australia`s long tradition of state involvement in business. As part of efforts begun in the late-1980`s to stem the tide of debt rising within Australian federal and state treasuries, government-owned entities are being corporatized and privatized, and private companies are sponsoring a large share of the country`s new infrastructure projects.

  4. Assessment of a Cambridge Structural Database-driven overlay program.

    PubMed

    Giangreco, Ilenia; Olsson, Tjelvar S G; Cole, Jason C; Packer, Martin J

    2014-11-24

    We recently published an improved methodology for overlaying multiple flexible ligands and an extensive data set for validating pharmacophore programs. Here, we combine these two developments and present evidence of the effectiveness of the new overlay methodology at predicting correct superimpositions for systems with varying levels of complexity. The overlay program was able to generate correct predictions for 95%, 73%, and 39% of systems classified as easy, moderate, and hard, respectively. PMID:25392927

  5. Molecular Dynamics study of Pb overlayer on Cu(100)

    NASA Technical Reports Server (NTRS)

    Karimi, M.; Tibbits, P.; Ila, D.; Dalins, I.; Vidali, G.

    1991-01-01

    Isothermal-isobaric Molecular Dynamics (MD) simulation of a submonolayer Pb film in c(2x2) ordered structure adsorbed on a Cu(100) substrate showed retention of order to high T. The Embedded Atom Method (EAM) calculated the energy of atoms of overlayer and substrate. The time-averaged squared modulus of the two dimensional structure factor for the Pb overlayer measured the order of the overlayer. The results are for increasing T only, and require verification by simulated cooling.

  6. Investigation of Iron Aluminide Weld Overlays

    SciTech Connect

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  7. Pragmatic privatization

    SciTech Connect

    Bernstein, S.

    1995-10-01

    Chile was probably the first country in the world to privatize under a decentralized and competitive framework a former state-owned power sector. Power sector privatization was conducted with pragmatism, particularly in terms of the speed with which the changes occurred. In fact, the earliest privatization did not occur until 1980 and the process was not completed until early 1990. The privatized Chilean electric industry has performed fairly well in terms of the investments carried out not only in the power sector, but also in other economic activities and in foreign countries. The diversification of ownership and the competitive framework have been an incentive to reach efficiency and a guaranty for the stability of the rules of the game in the long run.

  8. Hybrid overlay metrology with CDSEM in a BEOL patterning scheme

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Jehoul, Christiane; Inoue, Osamu; Okagawa, Yutaka

    2015-03-01

    Overlay metrology accuracy is a major concern for our industry. Advanced logic process require more tighter overlay control for multipatterning schemes. TIS (Tool Induced Shift) and WIS (Wafer Induced Shift) are the main issues for IBO (Image Based Overlay) and DBO (Diffraction Based Overlay). Methods of compensation have been introduced, some are even very efficient to reduce these measured offsets. Another related question is about the overlay target designs. These targets are never fully representative of the design rules, strong efforts have been achieved, but the device cannot be completely duplicated. Ideally, we would like to measure in the device itself to verify the real overlay value. Top down CDSEM can measure critical dimensions of any structure, it is not dependent of specific target design. It can also measure the overlay errors but only in specific cases like LELE (Litho Etch Litho Etch) after final patterning. In this paper, we will revisit the capability of the CDSEM at final patterning by measuring overlay in dedicated targets as well as inside a logic and an SRAM design. In the dedicated overlay targets, we study the measurement differences between design rules gratings and relaxed pitch gratings. These relaxed pitch which are usually used in IBO or DBO targets. Beyond this "simple" LELE case, we will explore the capability of the CDSEM to measure overlay even if not at final patterning, at litho level. We will assess the hybridization of DBO and CDSEM for reference to optical tools after final patterning. We will show that these reference data can be used to validate the DBO overlay results (correctables and residual fingerprints).

  9. A map overlay error model based on boundary geometry

    USGS Publications Warehouse

    Gaeuman, D.; Symanzik, J.; Schmidt, J.C.

    2005-01-01

    An error model for quantifying the magnitudes and variability of errors generated in the areas of polygons during spatial overlay of vector geographic information system layers is presented. Numerical simulation of polygon boundary displacements was used to propagate coordinate errors to spatial overlays. The model departs from most previous error models in that it incorporates spatial dependence of coordinate errors at the scale of the boundary segment. It can be readily adapted to match the scale of error-boundary interactions responsible for error generation on a given overlay. The area of error generated by overlay depends on the sinuosity of polygon boundaries, as well as the magnitude of the coordinate errors on the input layers. Asymmetry in boundary shape has relatively little effect on error generation. Overlay errors are affected by real differences in boundary positions on the input layers, as well as errors in the boundary positions. Real differences between input layers tend to compensate for much of the error generated by coordinate errors. Thus, the area of change measured on an overlay layer produced by the XOR overlay operation will be more accurate if the area of real change depicted on the overlay is large. The model presented here considers these interactions, making it especially useful for estimating errors studies of landscape change over time. ?? 2005 The Ohio State University.

  10. Overlay measurement accuracy enhancement by design and algorithm

    NASA Astrophysics Data System (ADS)

    Lee, Honggoo; Lee, Byongseog; Han, Sangjun; Kim, Myoungsoo; Kwon, Wontaik; Park, Sungki; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Itzkovich, Tal; Amir, Nuriel; Volkovich, Roie; Herzel, Eitan; Wagner, Mark; El Kodadi, Mohamed

    2015-03-01

    Advanced design nodes require more complex lithography techniques, such as double patterning, as well as advanced materials like hard masks. This poses new challenge for overlay metrology and process control. In this publication several step are taken to face these challenges. Accurate overlay metrology solutions are demonstrated for advanced memory devices.

  11. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1995-08-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions have limited their use in applications where good weldability is required. Using hot crack testing techniques invented at ORNL, and experimental determinations of preheat and postweld heat treatment needed to avoid cold cracking, we have developed iron aluminide filler metal compositions which can be successfully used to weld overlay clad various substrate materials, including 9Cr-1Mo steel, 2-1/4Cr-1Mo steel, and 300-series austenitic stainless steels. Dilution must be carefully controlled to avoid crack-sensitive deposit compositions. The technique used to produce the current filler metal compositions is aspiration-casting, i.e. drawing the liquid from the melt into glass rods. Future development efforts will involve fabrication of composite wires of similar compositions to permit mechanized gas tungsten arc (GTA) and/or gas metal arc (GMA) welding.

  12. Weld overlay cladding with iron aluminides

    SciTech Connect

    Goodwin, G.M.

    1996-11-01

    The hot and cold cracking tendencies of some early iron aluminide alloy compositions limited their use to applications where good weldability was not required. Considerable progress has been made toward improving this situation. Using hot crack testing techniques developed at ORNL and a systematic study of alloy compositional effects, we have established a range of compositions within which hot cracking resistance is very good, essentially equivalent to stainless steel. Cold cracking, however, remains an issue, and extensive efforts are continuing to optimize composition and welding parameters, especially preheat and postweld heat treatment, to minimize its occurrence. In terms of filler metal and process development, we have progressed from sheared strip through aspiration cast rod and shielded metal arc electrodes to the point where we can now produce composite wire with a steel sheath and aluminum core in coil form, which permits the use of both the gas tungsten arc and gas metal arc processes. This is a significant advancement in that the gas metal arc process lends itself well to automated welding, and is the process of choice for commercial weld overlay applications. Using the newly developed filler metals, we have prepared clad specimens for testing in a variety of environments both in-house and outside ORNL, including laboratory and commercial organizations. As a means of assessing the field performance of this new type of material, we have modified several non-pressure boundary boiler components, including fuel nozzles and port shrouds, by introducing areas of weld overlay in strategic locations, and have placed these components in service in operating boilers for a side-by-side comparison with conventional corrosion-resistant materials.

  13. Improving text recognition by distinguishing scene and overlay text

    NASA Astrophysics Data System (ADS)

    Quehl, Bernhard; Yang, Haojin; Sack, Harald

    2015-02-01

    Video texts are closely related to the content of a video. They provide a valuable source for indexing and interpretation of video data. Text detection and recognition task in images or videos typically distinguished between overlay and scene text. Overlay text is artificially superimposed on the image at the time of editing and scene text is text captured by the recording system. Typically, OCR systems are specialized on one kind of text type. However, in video images both types of text can be found. In this paper, we propose a method to automatically distinguish between overlay and scene text to dynamically control and optimize post processing steps following text detection. Based on a feature combination a Support Vector Machine (SVM) is trained to classify scene and overlay text. We show how this distinction in overlay and scene text improves the word recognition rate. Accuracy of the proposed methods has been evaluated by using publicly available test data sets.

  14. Multicast and Bulk Lookup in Structured Overlay Networks

    NASA Astrophysics Data System (ADS)

    Ghodsi, Ali

    Structured overlay networks are often used to implement a Distributed Hash Table (DHT) abstraction. In this chapter, we argue that structured overlay networks are suitable for doing efficient group communication. We provide algorithms that enable a node to efficiently broadcast a message to all other nodes in a structured overlay network, without inducing any redundant messages. We also provide algorithms that enasble any node to efficiently send a message to all nodes in a specified set of identifiers. Such algorithms have found usage in many structured overlay networks that implement range queries. Similarly, we provide algorithms that enable any node to efficiently send a message to the nodes responsible for any of the identifiers in a specified set of identifiers. Finally, we look at a case study of implementing efficient Application Level Multicast (ALM) using the group communication algorithms on top of structured overlay networks.

  15. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Infrastructure Protection. Title: Critical Infrastructure Private Sector Clearance Program Request. OMB Number... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following...

  16. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... sector partners who are responsible for critical infrastructure protection but would not otherwise be... Protection. Title: Critical Infrastructure Private Sector Clearance Program. OMB Number: 1670-0013....

  17. Prolonged use of coloured overlays for classroom reading.

    PubMed

    Jeanes, R; Busby, A; Martin, J; Lewis, E; Stevenson, N; Pointon, D; Wilkins, A

    1997-11-01

    Ninety-three children in a primary school and 59 children in two first-year classes of a secondary school were asked individually to observe a paragraph of random letters arranged to resemble text, and to compare the perceptual effects on its clarity of coloured plastic sheets overlaid on the text. A total of 29 colours were compared using 10 coloured plastic sheets and 19 pairwise combinations of sheets, one superimposed on another. The resulting colours sampled CIE 1976 hue angle (huv) and saturation (suv) systematically and efficiently. All the children who reported beneficial perceptual effects (53 per cent) were given their preferred overlay or combination of overlays to use as and when they wished. When the children were examined three months later the children tended to choose a colour similar to one they had chosen previously. Ten months later, 22 per cent of those offered the overlaps were still using them of their own volition. These children, but not those who had ceased to use their overlay(s), read randomly ordered simple words more quickly with their overlay than without. In a second independent group of children referred to the Norfolk Sensory Support Service, who used overlays routinely, the reading speed was similar with a grey or clear overlay; and slower than with the chosen coloured overlay, suggesting that reduction of contrast was not the critical factor. In a third independent group of children in a primary school in Kent, the increase in reading speed with the chosen overlay predicted the children who continued to use their overlay during the ensuing eight weeks. PMID:9415962

  18. 76 FR 45281 - National Flood Insurance Program (NFIP); Assistance to Private Sector Property Insurers...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-28

    ... private insurance companies (Companies) and to make available to the Companies the terms for subscription... private insurance companies participating under the current FY2011 Arrangement. Any private insurance... SECURITY Federal Emergency Management Agency National Flood Insurance Program (NFIP); Assistance to...

  19. Envelopment technique and topographic overlays in bite mark analysis

    PubMed Central

    Djeapragassam, Parimala; Daniel, Mariappan Jonathan; Srinivasan, Subramanian Vasudevan; Ramadoss, Koliyan; Jimsha, Vannathan Kumaran

    2015-01-01

    Aims and Objectives: The aims and objectives of our study were to compare four sequential overlays generated using the envelopment technique and to evaluate inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Materials and Methods: Dental stone models were prepared from impressions made from healthy individuals; photographs were taken and computer-assisted overlays were generated. The models were then enveloped in a different-color dental stone. After this, four sequential cuts were made at a thickness of 1mm each. Each sectional cut was photographed and overlays were generated. Thus, 125 overlays were generated and compared. Results: The scoring was done based on matching accuracy and the data were analyzed. The Kruskal-Wallis one-way analysis of variance (ANOVA) test was used to compare four sequential overlays and Spearman's rank correlation tests were used to evaluate the inter- and intraoperator reliability of the overlays obtained by the envelopment technique. Conclusion: Through our study, we conclude that the third and fourth cuts were the best among the four cuts and inter- and intraoperator reliability were found to be statistically significant at 5% level that is 95% confidence interval (P < 0.05). PMID:26816458

  20. Private advantage

    SciTech Connect

    Marier, D.; Stoiaken, L.

    1988-03-01

    At least a half dozen independent power producers put out initial public offerings in 1985-86 and the experts were projecting more to come. Most executives of private development companies admitted that they had at least taken a hard look at going public. Several quarters worth of disappointing earnings and the October market crash have brought attention back to the activities of private companies. Fortunately for the industry, at about the same time public-equity markets were closing down, new sources of debt and equity were entering the field in a big way-including insurance companies, pension funds, and utilities. While the development should be good news for all companies in the field (private equity is not necessarily earmarked for private companies), the impact of the crash has made it more difficult for public companies to make their case to the new equity players. The newest players, the unregulated utility subsidiaries, the fastest growing segment in the industry, are probably in a position to put a major dent in the business.

  1. Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks

    NASA Astrophysics Data System (ADS)

    Navare, Jyoti; Gemikonakli, Orhan

    Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.

  2. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  3. The Interplanetary Overlay Networking Protocol Accelerator

    NASA Technical Reports Server (NTRS)

    Pang, Jackson; Torgerson, Jordan L.; Clare, Loren P.

    2008-01-01

    A document describes the Interplanetary Overlay Networking Protocol Accelerator (IONAC) an electronic apparatus, now under development, for relaying data at high rates in spacecraft and interplanetary radio-communication systems utilizing a delay-tolerant networking protocol. The protocol includes provisions for transmission and reception of data in bundles (essentially, messages), transfer of custody of a bundle to a recipient relay station at each step of a relay, and return receipts. Because of limitations on energy resources available for such relays, data rates attainable in a conventional software implementation of the protocol are lower than those needed, at any given reasonable energy-consumption rate. Therefore, a main goal in developing the IONAC is to reduce the energy consumption by an order of magnitude and the data-throughput capability by two orders of magnitude. The IONAC prototype is a field-programmable gate array that serves as a reconfigurable hybrid (hardware/ firmware) system for implementation of the protocol. The prototype can decode 108,000 bundles per second and encode 100,000 bundles per second. It includes a bundle-cache static randomaccess memory that enables maintenance of a throughput of 2.7Gb/s, and an Ethernet convergence layer that supports a duplex throughput of 1Gb/s.

  4. Private Schools Put Spotlight on Safety

    ERIC Educational Resources Information Center

    Zehr, Mary Ann

    2005-01-01

    Administrators and students at private schools tend to see their schools as safer than public schools. Spurred in part by the terrorist attacks of Sept. 11, 2001, many private schools have joined the national push to revamp campus safety plans. Kenneth S. Trump, the president of the Cleveland-based National School Safety and Security Services,…

  5. Diffraction based overlay metrology for α-carbon applications

    NASA Astrophysics Data System (ADS)

    Saravanan, Chandra Saru; Tan, Asher; Dasari, Prasad; Goelzer, Gary; Smith, Nigel; Woo, Seouk-Hoon; Shin, Jang Ho; Kang, Hyun Jae; Kim, Ho Chul

    2008-03-01

    Applications that require overlay measurement between layers separated by absorbing interlayer films (such as α- carbon) pose significant challenges for sub-50nm processes. In this paper scatterometry methods are investigated as an alternative to meet these stringent overlay metrology requirements. In this article, a spectroscopic Diffraction Based Overlay (DBO) measurement technique is used where registration errors are extracted from specially designed diffraction targets. DBO measurements are performed on detailed set of wafers with varying α-carbon (ACL) thicknesses. The correlation in overlay values between wafers with varying ACL thicknesses will be discussed. The total measurement uncertainty (TMU) requirements for these layers are discussed and the DBO TMU results from sub-50nm samples are reviewed.

  6. Optimization of alignment/overlay sampling and marker layout to improve overlay performance for double patterning technology

    NASA Astrophysics Data System (ADS)

    Chue, Chuei-Fu; Chiou, Tsann-Bim; Huang, Chun-Yen; Chen, Alek C.; Shih, Chiang-Lin

    2009-12-01

    Double patterning technology is capable of extending usability of immersion ArF systems for 32nm half-pitch node and below. However, overlay errors between the two patterning steps will directly contribute to critical dimension variation in a dual litho-etch process. The overlay errors need to be reduced significantly to meet the tight critical dimension uniformity requirement in the technology nodes. The present scanners are able to correct intra- and inter-field overlay errors that include not only linear terms but also certain higher-order terms. As a result, a 3nm overlay requirement for DPT becomes feasible by applying the most advanced correction schemes. Overlay modeling with a larger number of sample fields will give a more accurate estimate of the model parameters and will therefore improve the overlay corrections; however, metrology time will increase simultaneously. To balance the correction accuracy and metrology time, the number of fields and its layout on the wafer must be optimized. This also applies to wafer alignment, one of the other factors that determine the overlay performance. A bad alignment sampling scheme will cause a poor overlay performance in the end. Increasing the number of sample fields can improve the alignment performance but wafer throughput will be impacted immediately. Performance of the intra-field correction is dependent on number and distribution of the markers within an exposure field. Correction per field, for instance, is one of the most effective correction schemes. However, it needs to measure extra markers in each field for overlay modeling especially when including high-order terms. To limit the chip area occupied by the markers and the metrology time, it is necessary to well control the number of the markers. Moreover, accuracy of the overlay models is sensitive to layout of the markers. The overlay marker layout hence needs to be optimized to gain a robust correction with a minimum number of markers. In this paper, firstly we developed various geometry-based sampling methods for both alignment and overlay corrections to evaluate correction robustness while keeping the number of sample fields as small as possible. The results show that modeling with a limited number of fields can adequately describe a full-wafer alignment/overlay signature and the errors can be well corrected accordingly. A hybrid sampling approach was then proposed taking into consideration the spatial coverage (geometry-based) as well as the overlay signature of the fields. To improve the intra-field correction, an algorithm to assist in designing the layout of the overlay markers on a mask was developed. The most effective marker layouts with the least number of markers were suggested for different correction schemes. Using the most effective correction scheme as well as the proposed optimization techniques, the overlay performance can be improved to meet the overlay requirement of the 32nm DPT.

  7. Coloured overlays and their effects on reading speed: a review.

    PubMed

    Wilkins, Arnold

    2002-09-01

    Coloured overlays can reduce symptoms of visual stress and improve reading speed. These benefits are reliable and are not attributable simply to placebo effects. Five percent of children in mainstream education read at least 25% more quickly with an overlay, provided they have chosen the colour. The suboptimal design of children's text and the high level of classroom lighting may be partly responsible. PMID:12358317

  8. Augmenting reality in Direct View Optical (DVO) overlay applications

    NASA Astrophysics Data System (ADS)

    Hogan, Tim; Edwards, Tim

    2014-06-01

    The integration of overlay displays into rifle scopes can transform precision Direct View Optical (DVO) sights into intelligent interactive fire-control systems. Overlay displays can provide ballistic solutions within the sight for dramatically improved targeting, can fuse sensor video to extend targeting into nighttime or dirty battlefield conditions, and can overlay complex situational awareness information over the real-world scene. High brightness overlay solutions for dismounted soldier applications have previously been hindered by excessive power consumption, weight and bulk making them unsuitable for man-portable, battery powered applications. This paper describes the advancements and capabilities of a high brightness, ultra-low power text and graphics overlay display module developed specifically for integration into DVO weapon sight applications. Central to the overlay display module was the development of a new general purpose low power graphics controller and dual-path display driver electronics. The graphics controller interface is a simple 2-wire RS-232 serial interface compatible with existing weapon systems such as the IBEAM ballistic computer and the RULR and STORM laser rangefinders (LRF). The module features include multiple graphics layers, user configurable fonts and icons, and parameterized vector rendering, making it suitable for general purpose DVO overlay applications. The module is configured for graphics-only operation for daytime use and overlays graphics with video for nighttime applications. The miniature footprint and ultra-low power consumption of the module enables a new generation of intelligent DVO systems and has been implemented for resolutions from VGA to SXGA, in monochrome and color, and in graphics applications with and without sensor video.

  9. Overlay improvements using a real time machine learning algorithm

    NASA Astrophysics Data System (ADS)

    Schmitt-Weaver, Emil; Kubis, Michael; Henke, Wolfgang; Slotboom, Daan; Hoogenboom, Tom; Mulkens, Jan; Coogans, Martyn; ten Berge, Peter; Verkleij, Dick; van de Mast, Frank

    2014-04-01

    While semiconductor manufacturing is moving towards the 14nm node using immersion lithography, the overlay requirements are tightened to below 5nm. Next to improvements in the immersion scanner platform, enhancements in the overlay optimization and process control are needed to enable these low overlay numbers. Whereas conventional overlay control methods address wafer and lot variation autonomously with wafer pre exposure alignment metrology and post exposure overlay metrology, we see a need to reduce these variations by correlating more of the TWINSCAN system's sensor data directly to the post exposure YieldStar metrology in time. In this paper we will present the results of a study on applying a real time control algorithm based on machine learning technology. Machine learning methods use context and TWINSCAN system sensor data paired with post exposure YieldStar metrology to recognize generic behavior and train the control system to anticipate on this generic behavior. Specific for this study, the data concerns immersion scanner context, sensor data and on-wafer measured overlay data. By making the link between the scanner data and the wafer data we are able to establish a real time relationship. The result is an inline controller that accounts for small changes in scanner hardware performance in time while picking up subtle lot to lot and wafer to wafer deviations introduced by wafer processing.

  10. Residual stresses in weld overlay tubes: A finite element study

    SciTech Connect

    Taljat, B.; Zacharia, T.; Wang, X.L.; Keiser, J.R.; Feng, Z.; Jirinec, M.J.

    1997-01-03

    Residual stresses and strains in a tube with circumferential weld overlay were analyzed by the finite element (FE) method. The objective of this work was to develop and verify a FE model, to determine the magnitude and distribution of residual stresses in the weld overlay tube, and to evaluate the significance of two contributing factors to residual stress: (1) difference in material properties between tube and weld material, and (2) thermal gradients in the weld. An axisymmetric FE model was developed to simulate the circumferential two-layer welding process of alloy 625 overlay on SA210 tube. The first layer was modeled as a gas metal arc welding process with filler metal, whereas the autogenous gas tungsten arc welding process was modeled for the second layer. Neutron diffraction technique was used to experimentally determine residual elastic strains in the weld overlay tube. Comparison with the FE results shows overall good agreement. Both the experimental and FE results show high compressive stresses at the inside tube surface and high tensile stresses in the weld overlay. This suggests that weld overlay may be used to relieve tensile or produce compressive stresses at the inside tube surface, which is significant for applications where crack initiation is found at the root pass of the joining weld.

  11. ``Electric growth`` of metal overlayers on semiconductor substrates

    SciTech Connect

    Zhang, Z.; Cho, J.H. |; Niu, Q.; Shih, C.K.; Suo, Z.

    1998-02-01

    In this article, the authors present the main results from their recent studies of metal overlayer growth on semiconductor substrates. They show that a variety of novel phenomena can exist in such systems, resulting from several competing interactions. The confined motion of the conduction electrons within the metal overlayer can mediate a surprisingly long-range repulsive force between the metal-semiconductor interface and the growth front, acting to stabilize the overlayer. Electron transfer from the overlayer to the substrate leads to an attractive force between the two interfaces, acting to destabilize the overlayer. Interface-induced Friedel oscillations in electron density can further impose an oscillatory modulation onto the two previous interactions. These three competing factors, of all electronic nature, can make a flat metal overlayer critically, marginally, or magically stable, or totally unstable against roughening. The authors further show that, for many systems, these electronic effects can easily win over the effect of stress. First-principles studies of a few representative systems support the main features of the present electronic growth concept.

  12. Liquid-overlay culture of cellular spheroids.

    PubMed

    Carlsson, J; Yuhas, J M

    1984-01-01

    The capacity of different types of human cells to form and grow as spheroids was tested by using suspension culture over a bottom surface, which prevented cell attachment (liquid-overlay culture). The best and most convenient bottom surface so far tested was the bottom of a normal culture dish covered with a thin film of agarose. The agarose film was allowed to dry prior to the addition of medium. Several different human cell lines were tested, and it was found that many types of tumor cells formed and grew as spheroids, Large variations in growth rate, cell morphology, thickness of the viable cell layer and PO2 profiles were found among the tested spheroids. This variability parallels the variability seen in solid tumors. The morphology and the growth rate of solid tumors vary a great deal, depending on the type and position of the tumors (Ackerman and Rosai 1975; Steel 1977). Some tumors have a slow growth rate, with a few proliferating cells, while others grow faster and have higher proportions of proliferative cells (Charbit et al. 1971; Malaise et al. 1973; Friedman 1974; Lightdale and Lipkin 1975; Steel 1977). Local variations in both morphology and proliferation are usually found even within single tumors (Denekamp and Kallman 1973; Ackerman and Rosai 1974). Considering the variability in morphology, growth rate, and radiosensitivity between different types of spheroids, it is not difficult to imagine that wide variations may exist in these variables between different types of tumors or even between different regions within single tumors. The use of a group of different spheroids, showing a spectrum of growth rates, radiosensitivities, etc., will, it is hoped, be helpful in elucidating factors of importance in cancer therapy. PMID:6396753

  13. Interplanetary Overlay Network Bundle Protocol Implementation

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  14. Peru privatizes

    SciTech Connect

    Suttil, K.R.

    1993-02-01

    Peru has been undergoing a revolution since the election of Alberto Fujimori as president in 1990. A revolution that is reversing many of the policies of the past 25 years and one which aims to bring Peru back into the mainstream of the world economy. All the enterprises nationalized in the heady days of the early 1970s are set up for privatization. The most important are the three mining companies: Hierro-Peru, Centromin, and Mineroo-Peru. It will not be easy to attract foreign investment after such a long period of political and economic instability but the rewards are there for the intrepid.

  15. Overlay budget considerations for an all-scanner fab

    NASA Astrophysics Data System (ADS)

    Seltmann, Rolf; Demmerle, Wolfgang; Staples, Marc; Minvielle, Anna Maria; Schulz, Bernd; Muehle, Sven

    2000-07-01

    According to the SIA roadmap an overlay of 65nm is necessary for state of the art 0.18micrometers processes. To meet such tight requirements it is necessary to know the magnitude of all contributions, to understand possible interactions and to try to drive every individual overlay component to its ultimate lower limit. In this experimental study we evaluate the impact of different contributions on the overall overlay performance in a fab equipped exclusively with ASML step and scan systems. First we discuss the overlay performance of advanced step and scan systems in a mix and match scenario, focusing on single machine overlay, long term stability and multiple machine matching. We show that both distortion and stage differences between different tools are typically less than 22nm, justifying a multiple machine scenario without significant loss of overlay performance. In the next step, we discuss the impact of layer deposition and CMP. We include shallow trench isolation, tungsten-CMP as well as conventional aluminum wiring and copper-dual-damascene technology into our examinations. In particular, we discuss the pro's and con's of using a zero-layer-mark-approach, compared to an alignment on marks formed in certain layers for direct layer to layer alignment. Furthermore, we examine the performance of ASMLs 'through-the-lens' (TTL)-alignment system becomes as small as 6nm using TTL-alignment. For marks directly affected by CMP-processes technology impact can be controlled within 13nm. We show that, even in a scenario with multiple tools matched to each other, where alignment marks are directly affected by a CMP process step, and where the standard TTL alignment marks are directly affected by a CMP process step, and where the standard TTL alignment system is used, the overall overlay can be controlled within 60nm. Using the ATHENA alignment system, a further improvement is possible.

  16. Further beyond: registration and overlay control enhancements for optical masks

    NASA Astrophysics Data System (ADS)

    Gorhad, Kujan; Cohen, Avi; Avizemer, Dan; Dmitriev, Vladimir; Beyer, Dirk; Degel, Wolfgang; Kirsch, Markus

    2014-10-01

    Mask registration control is one of the key performance specifications during the mask qualification process. It is becoming an important factor for yield improvement with the continuously tightening registration specs driven by tight wafer overlay specs. Understanding the impact of miss classified masks on the final wafer yield is gaining more and more attention, especially with the appearance of Multiple Patterning Technologies, where mask to mask overlay effect on wafer is heavily influenced by mask registration. ZEISS has established a promising closed loop solution implemented in the mask house, where the PROVE® system - a highly accurate mask registration and overlay metrology measurement tool, is being used to feed the RegC® - a registration and mask to mask overlay correction tool that can also accurately predict the correction potential in advance. The well-established RegC® process typically reaches 40-70% improvement of the mask registration/overlay error standard deviation. The PROVE® - RegC® closed loop solution has several advantages over alternative registration control methods apart of the mask re-write saving. Among the advantages is the capability to correct for pellicle mounting registration effects without the need to remove the pellicle. This paper will demonstrate improved method for enhanced mask to mask overlay control based on a new scheme of data acquisition and performance validation by the PROVE®. The mask registration data as well as additional mask information will be used to feed the RegC® correction process. Significantly improved mask to mask overlay correction results will be discussed and presented in details.

  17. Intra-field overlay correction for illumination based distortion

    NASA Astrophysics Data System (ADS)

    Pike, Michael; Brunner, Timothy; Morgenfeld, Bradley; Jing, Nan; Wiltshire, Timothy

    2015-03-01

    The use of extreme freeform illumination conditions and multi patterning processes used to generate sub 40nm images can result in significant intra-field overlay errors. When levels with differing illumination conditions are aligned to each other, these intra-field distortions can result in overlay errors which are uncorrectable using normal linear feedback corrections. We use a double exposure method, previously described by Minghetti [1] et al. to isolate and measure intra-field overlay distortions caused by tool lens signatures and different illumination conditions. A full field test reticle is used to create a dual level expose pattern. The same pattern is exposed twice, but with two different illumination conditions. The first exposure is done with a standard reference illumination. The second exposure is the target illumination condition. The test reticle has overlay target pairs that are measurable when the 2nd exposure is offset in the Y direction by the designed amount. This allows for a high density, 13x13, intra-field overlay measurement to be collected and modeled to determine 2nd and 3rd order intra-field terms. Since the resulting illumination and scanner lens specific intra field corrections are independent of field size, the sub-recipes can be applied to any product exposure independent of field size, which use the same illumination conditions as the test exposures. When the method is applied to all exposure levels in a product build cycle, the overlay errors contributed by the reference illumination condition cancel out. The remaining errors are due exclusively to the impact of the illumination condition on that scanner lens. Actual results correlated well with the model with more than 80% of the predicted overlay improvement being achieved.

  18. Overlay control using scatterometry based metrology (SCOMTM) in production environment

    NASA Astrophysics Data System (ADS)

    Dinu, Berta; Fuchs, Stefan; Kramer, Uwe; Kubis, Michael; Marchelli, Anat; Navarra, Alessandra; Sparka, Christian; Widmann, Amir

    2008-03-01

    The newly emerging lithographic technologies related to the 32nm node and below will require a step function in the overlay metrology performance, due to the dramatic shrinking of the error budgets. In this work, we present results of an emerging alternative technology for overlay metrology - Differential signal scatterometry overlay (SCO TM). The technique is based on spectroscopic analysis of polarized light, reflected from a "grating-on-grating" target. Based on theoretical analysis and initial data, this technology, as well as broad band bright field overlay, is a candidate technology that will allow achieving the requirements of the 32nm node and beyond it. We investigate the capability of SCOL TM to control overlay in a production environment, on complex stacks and process, in the context of advanced DRAM and Flash technologies. We evaluate several metrology mark designs and the effect on the metrology performance, in view of the tight TMU requirements of the 32nm node. The results - achieved on the KLA-Tencor's Archer tool, equipped with both broad band bright field AIM TM and scatterometry SCOL TM sensors - indicate the capability of the SCOL TM technology to satisfy the advanced nodes requirements.

  19. Private database queries using one quantum state

    NASA Astrophysics Data System (ADS)

    Yang, Yu-Guang; Zhang, Ming-Ou; Yang, Rui

    2015-03-01

    A novel private database query protocol with only one quantum state is proposed. The database owner Bob sends only one quantum state to the user Alice. The proposed protocol combines the idea of semiquantum key distribution and private query. It can be implemented in the situation where not all the parties can afford expensive quantum resources and operations. So our proposal is more practical in use. We also prove that the proposed protocol is secure in terms of the user security and the database security.

  20. 75 FR 80082 - State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-21

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, And Private Sector Policy Advisory Committee (SLTPS-PAC) AGENCY: Information Security Oversight Office, National Archives... Information Security Oversight Office (ISOO) announces the inaugural meeting of the State, Local, Tribal,...

  1. Cooperative Resource Pricing in Service Overlay Networks for Mobile Agents

    NASA Astrophysics Data System (ADS)

    Nakano, Tadashi; Okaie, Yutaka

    The success of peer-to-peer overlay networks depends on cooperation among participating peers. In this paper, we investigate the degree of cooperation among individual peers required to induce globally favorable properties in an overlay network. Specifically, we consider a resource pricing problem in a market-oriented overlay network where participating peers sell own resources (e.g., CPU cycles) to earn energy which represents some money or rewards in the network. In the resource pricing model presented in this paper, each peer sets the price for own resource based on the degree of cooperation; non-cooperative peers attempt to maximize their own energy gains, while cooperative peers maximize the sum of own and neighbors' energy gains. Simulation results are presented to demonstrate that the network topology is an important factor influencing the minimum degree of cooperation required to increase the network-wide global energy gain.

  2. Advances in process overlay: alignment solutions for future technology nodes

    NASA Astrophysics Data System (ADS)

    Megens, Henry; van Haren, Richard; Musa, Sami; Doytcheva, Maya; Lalbahadoersing, Sanjay; van Kemenade, Marc; Lee, Hyun-Woo; Hinnen, Paul; van Bilsen, Frank

    2007-03-01

    Semiconductor industry has an increasing demand for improvement of the total lithographic overlay performance. To improve the level of on-product overlay control the number of alignment measurements increases. Since more mask levels will be integrated, more alignment marks need to be printed when using direct-alignment (also called layer-to-layer alignment). Accordingly, the alignment mark size needs to become smaller, to fit all marks into the scribelane. For an in-direct alignment scheme, e.g. a scheme that aligns to another layer than the layer to which overlay is being measured, the number of needed alignment marks can be reduced. Simultaneously there is a requirement to reduce the size of alignment mark sub-segmentations without compromising the alignment and overlay performance. Smaller features within alignment marks can prevent processing issues like erosion, dishing and contamination. However, when the sub-segmentation size within an alignment mark becomes comparable to the critical dimension, and thus smaller than the alignment-illuminating wavelength, polarization effects might start to occur. Polarization effects are a challenge for optical alignment systems to maintain mark detectability. Nevertheless, this paper shows how to actually utilize those effects in order to obtain enhanced alignment and overlay performance to support future technology nodes. Finally, another challenge to be met for new semiconductor product technologies is the ability to align through semi-opaque materials, like for instance new hard-mask materials. Enhancement of alignment signal strength can be reached by adapting to new alignment marks that generate a higher alignment signal. This paper provides a description of an integral alignment solution that meets with these emerging customer application requirements. Complying with these requirements will significantly enhance the flexibility in production strategies while maintaining or improving the alignment and overlay performance. This paper describes the methodology for optimization of the alignment strategy.

  3. High-frequency nonreciprocal reflection from magnetic films with overlayers

    SciTech Connect

    Wang, Ying; Nie, Yan; Camley, R. E.

    2013-11-14

    We perform a theoretical study of the nonreciprocal reflection of high-frequency microwave radiation from ferromagnetic films with thin overlayers. Reflection from metallic ferromagnetic films is always near unity and shows no nonreciprocity. In contrast, reflection from a structure which has a dielectric overlayer on top of a film composed of insulated ferromagnetic nanoparticles or nanostructures can show significant nonreciprocity in the 75–80 GHz frequency range, a very high value. This can be important for devices such as isolators or circulators.

  4. Flexible TWDM PON with WDM overlay for converged services

    NASA Astrophysics Data System (ADS)

    Cheng, Ning

    2015-12-01

    This paper reviews recent developments of flexible TWDM PON (time- and wavelength-division multiplexed passive optical network) with pluggable transceivers for pay-as-you-grow deployment, load balancing, channel protection and power saving. Different architectures for TWDM PON with WDM (wavelength division multiplexed) overlay for converged broadband services are discussed and experimental results are presented for WDM overlay using low-cost self-seeded RSOA (reflective semiconductor optical amplifiers). Challenging issues and possible solutions for future evolution toward software defined flexible PONs (FlexPONs) are also discussed with respect to dynamic lambda flow, elastic bandwidth and flexible reach.

  5. BWR pipe crack and weld clad overlay studies

    SciTech Connect

    Shack, W.J.; Kassner, T.F.; Maiya, P.S.; Park, J.Y.; Ruther, W.E.; Rybicki, E.F.

    1985-10-01

    This paper presents results on (a) the influence of simulated BWR environments and temperature on the intergranular-stress-corrosion cracking (IGSCC) susceptibility of sensitized stainless steels (SS), (b) the stress-corrosion susceptibility of alternative piping materials, (c) analysis of field components to assess the effectiveness of in-service inspection techniques and the in-reactor performance of weld overlay repairs, and (d) finite-element analyses and experimental measurement of residual stresses in weldments with weld overlays. Fracture-mechanics crack-growth data are presented to confirm correlations between the critical corrosion potentials required to inhibit IGSCC and the level of impurities in the environment. Slow-strain-rate tests show that very low levels of impurities (25 ppb of sulfate) can produce suseptibility to transgranular-stress-corrosion cracking (TGSCC) in Type 316NG SS and that nitrogen levels is SS above 0.1 wt. % appear to increase susceptibility to TGSCC. Preliminary results on a German Type 347NG SS suggest that it is at least as resistant to TGSCC in impurity environments as Type 316NG SS. Measurements on overlay weldments removed from the Hatch-2 reactor confirm that compressive residual stresses are produced on the inner surface of the weldments by the overlay.

  6. Investigations of Magnetic Overlayers at the Advanced Photon Source

    SciTech Connect

    Tobin, J G; Yu, S; Butterfield, M T

    2009-06-26

    Magnetic overlayers of Fe and Co have been investigated with X-ray Magnetic Circular Dichroism in X-ray Absorption Spectroscopy (XMCD-ABS) and Photoelectron Spectroscopy (PES), including Spin-Resolved Photoelectron Spectroscopy (SRPES), at Beamline 4 at the Advanced Photon Source (APS). Particular emphasis was placed upon the interrogation of the 2p levels of the Fe.

  7. Forged seal detection based on the seal overlay metric.

    PubMed

    Lee, Joong; Kong, Seong G; Lee, Young-Soo; Moon, Ki-Woong; Jeon, Oc-Yeub; Han, Jong Hyun; Lee, Bong-Woo; Seo, Joong-Suk

    2012-01-10

    This paper describes a method for verifying the authenticity of a seal impression imprinted on a document based on the seal overlay metric, which refers to the ratio of an effective seal impression pattern and the noise in the neighborhood of the reference impression region. A reference seal pattern is obtained by taking the average of a number of high-quality impressions of a genuine seal. A target seal impression to be examined, often on paper with some background texts and lines, is segmented out from the background by an adaptive threshold applied to the histogram of color components. The segmented target seal impression is then spatially aligned with the reference by maximizing the count of matching pixels. Then the seal overlay metric is computed for the reference and the target. If the overlay metric of a target seal is below a predetermined limit for the similarity to the genuine, then the target is classified as a forged seal. To further reduce the misclassification rate, the seal overlay metric is adjusted by the filling rate, which reflects the quality of inked pattern of the target seal. Experiment results demonstrate that the proposed method can detect elaborate seal impressions created by advanced forgery techniques such as lithography and computer-aided manufacturing. PMID:21890293

  8. Semantic overlay network for large-scale spatial information indexing

    NASA Astrophysics Data System (ADS)

    Zou, Zhiqiang; Wang, Yue; Cao, Kai; Qu, Tianshan; Wang, Zhongmin

    2013-08-01

    The increased demand for online services of spatial information poses new challenges to the combined filed of Computer Science and Geographic Information Science. Amongst others, these include fast indexing of spatial data in distributed networks. In this paper we propose a novel semantic overlay network for large-scale multi-dimensional spatial information indexing, called SON_LSII, which has a hybrid structure integrating a semantic quad-tree and Chord ring. The SON_LSII is a small world overlay network that achieves a very competitive trade-off between indexing efficiency and maintenance overhead. To create SON_LSII, we use an effective semantic clustering strategy that considers two aspects, i.e., the semantic of spatial information that peer holds in overlay network and physical network performances. Based on SON_LSII, a mapping method is used to reduce the multi-dimensional features into a single dimension and an efficient indexing algorithm is presented to support complex range queries of the spatial information with a massive number of concurrent users. The results from extensive experiments demonstrate that SON_LSII is superior to existing overlay networks in various respects, including scalability, maintenance, rate of indexing hits, indexing logical hops, and adaptability. Thus, the proposed SON_LSII can be used for large-scale spatial information indexing.

  9. 12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    12. DETAIL INDICATING TRANSITION FROM ORIGINAL SURFACE TO GUNITE OVERLAY ON UPSTREAM EMBANKMENT OF DAM (FROM REPAIRS COMPLETED IN 1977) - Upper Doughty Dam, 200 feet west of Garden State Parkway, 1.7 miles west of Absecon, Egg Harbor City, Atlantic County, NJ

  10. Improved overlay control through automated high order compensation

    NASA Astrophysics Data System (ADS)

    Wakamoto, S.; Ishii, Y.; Yasukawa, K.; Sukegawa, A.; Maejima, S.; Kato, A.; Robinson, J. C.; Eichelberger, B. J.; Izikson, P.; Adel, M.

    2007-03-01

    As Moore's Law drives CD smaller and smaller, overlay budget is shrinking rapidly. Furthermore, the cost of advanced lithography tools prohibits usage of latest and greatest scanners on non-critical layers, resulting in different layers being exposed with different tools; a practice commonly known as 'mix and match.' Since each tool has its unique signature, mix and match becomes the source of high order overlay errors. Scanner alignment performance can be degraded by a factor of 2 in mix and match, compared to single tool overlay operation. In a production environment where scanners from different vendors are mixed, errors will be even more significant. Mix and match may also be applied to a single scanner when multiple illumination modes are used to expose critical levels. This is because different illuminations will have different impact to scanner aberration fingerprint. The semiconductor technology roadmap has reached a point where such errors are no longer negligible. Mix and match overlay errors consist of scanner stage grid component, scanner field distortion component, and process induced wafer distortion. Scanner components are somewhat systematic, so they can be characterized on non product wafers using a dedicated reticle. Since these components are known to drift over time it becomes necessary to monitor them periodically, per scanner, per illumination. In this paper, we outline a methodology for automating characterization of mix and match errors, and a control system for real-time correction.

  11. Promoting Learning of Instructional Design via Overlay Design Tools

    ERIC Educational Resources Information Center

    Carle, Andrew Jacob

    2012-01-01

    I begin by introducing Virtual Design Apprenticeship (VDA), a learning model--built on a solid foundation of education principles and theories--that promotes learning of design skills via overlay design tools. In VDA, when an individual needs to learn a new design skill or paradigm she is provided accessible, concrete examples that have been…

  12. Crosslayer Survivability in Overlay-IP-WDM Networks

    ERIC Educational Resources Information Center

    Pacharintanakul, Peera

    2010-01-01

    As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…

  13. Recovery of Sublethally Injured Bacteria Using Selective Agar Overlays.

    ERIC Educational Resources Information Center

    McKillip, John L.

    2001-01-01

    This experiment subjects bacteria in a food sample and an environmental sample to conditions of sublethal stress in order to assess the effectiveness of the agar overlay method to recover sublethally injured cells compared to direct plating onto the appropriate selective medium. (SAH)

  14. High order correction and sampling strategy for 45nm immersion lithography overlay control

    NASA Astrophysics Data System (ADS)

    Hsueh, Bo Yun; Huang, George K. C.; Yu, Chun-Chi; Hsu, Jerry K. C.; Huang, Chin-Chou Kevin; Huang, Chien-Jen; Tien, David

    2008-03-01

    As advanced semiconductor companies move forward to the 45nm technology node, traditional overlay sampling and linear correction used in dry lithography become less feasible to bring overlay control into the desired budget. New overlay control methodologies need to be established to meet the needs of much tighter overlay budgets in the immersion lithography process. Overlay source of variance (SOV) was first investigated to understand the major contributor of overlay error sources. The SOVis broken down into wafer, field, and random components in order to utilize the SOV information to prioritize overlay improvement decisions. High order wafer level or field level error components are commonly observed as a significant contributor and requires attention to bring the overlay residual into the desired limit. Optimal sample is determined in considering sample plan robustness and throughput impact while increasing sampling becomes a necessity in 45nm technology node.

  15. Impact of overlay metrology on design rule tolerance and shrinkability

    NASA Astrophysics Data System (ADS)

    Balasinski, A.; Walker, A. J.

    2005-05-01

    Design rule development for next technology generations depends on the progress in the optical and mechanical properties of steppers and photomasks. For two basic types of design rules: those that define minimum critical dimensions (CD, line and space), and those that define overlay/enclosure (OL) between layers, the shrinkpaths with technology nodes are generally unrelated. The min CD rules are dictated by stepper resolution limits and mask minimum features, the overlay rules - by the respective mechanical tolerances of the printing hardware. However, successful shrinks of design databases to the subsequent technology nodes require that all the design rules be scaled, preferably by the same factor. In this work, we first discuss the impact of the different types of rules on the layout architecture. We then show how one derives OL design rules from alignment tolerances. One method is based on the Lynch numbers (LN), corresponding to the misalignment budget ensuring that the OL yield loss is no more than 0.5% per mask level. However, LN"s are not directly measured in the fab. An alternative method is based on the 3s misregistration error. We demonstrate that these two methods show similar results for several types of masks and steppers. Finally, we show how the trend of overlay tolerance (OL) improvement compares with the trend of min feature size (CD) reduction. The data shows an offset between the OL and the CD trends amounting to 14 nm for the 45 nm technology node. This offset, which we call the overlay tolerance gap, means that enclosure rules would, in general, scale at a slower pace compared to the rules dictated by the linear CD shrink. One should note that the OL tolerance is influenced by matching of reticles and steppers and can be improved by the rework of wafers in line. In summary, we discuss theoretical and manufacturing-related aspects of overlay metrology, to advance design rule shrinks aligned with technology roadmap.

  16. Computer-based production of bite mark comparison overlays.

    PubMed

    Sweet, D; Parhar, M; Wood, R E

    1998-09-01

    Bite mark comparison protocols include measurement and analysis of the pattern, size, and shape of teeth against similar characteristics observed in an injury on skin or a mark on an object. The physical comparison of tooth position often depends upon transparent acetate overlays to detect similarities or differences between the teeth and the bite mark. Several methods are used to produce life-sized comparison overlays. The perimeter of the biting edges of the anterior teeth are usually recorded to produce facsimile images called hollow volume overlays. Some investigators hand-trace these outlines from dental study casts, or from bite exemplars produced in wax, styrofoam, or similar materials. Some use hand-traced outlines from xerographic images produced with office photocopiers that are calibrated to produce life-sized final images. Others use radiographic images and toneline photography of wax exemplars filled with radio-opaque materials, such as metal filings or barium sulfate. Dependence upon subjective input by the odontologist to trace these images manually is considered problematic. This is because the errors incorporated at any production stage are increased in the final product. The authors have developed a method to generate accurate hollow volume overlays using computer-based techniques. A PowerPC Macintosh computer, flatbed scanner, and Adobe Photoshop (a popular graphical interface application) are used to acquire, select, arrange and export detailed data from class and individual characteristics of a suspect's teeth to acetate film loaded in a high-resolution laser printer. This paper describes this technique to enable the odontologist to produce high-quality, accurate comparison overlays without subjective input. PMID:9729824

  17. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  18. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  19. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  20. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  1. 33 CFR 66.01-50 - Protection of private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Protection of private aids to... SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids to Navigation Other Than Federal or State § 66.01-50 Protection of private aids to navigation. Private aids to navigation lawfully maintained...

  2. 75 FR 66822 - Study on Extraterritorial Private Rights of Action

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-29

    ... Act'') should be extended to cover transnational securities fraud. The Commission is soliciting... securities fraud. Congress further directed the Commission to conduct a study to determine whether, and to... cases of transnational securities fraud should be extended to private rights of action to the...

  3. Quantum data locking for high-rate private communication

    NASA Astrophysics Data System (ADS)

    Lupo, Cosmo; Lloyd, Seth

    2015-03-01

    We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than one bit below the rate of non-private classical communication. This result is obtained by exploiting the quantum data locking effect. The price to pay to achieve such a high private communication rate is that accessible information security is in general not composable. However, composable security holds against an eavesdropper who is forced to measure her share of the quantum system within a finite time after she gets it.

  4. Modeling the dynamical interaction between epidemics on overlay networks

    NASA Astrophysics Data System (ADS)

    Marceau, Vincent; Noël, Pierre-André; Hébert-Dufresne, Laurent; Allard, Antoine; Dubé, Louis J.

    2011-08-01

    Epidemics seldom occur as isolated phenomena. Typically, two or more viral agents spread within the same host population and may interact dynamically with each other. We present a general model where two viral agents interact via an immunity mechanism as they propagate simultaneously on two networks connecting the same set of nodes. By exploiting a correspondence between the propagation dynamics and a dynamical process performing progressive network generation, we develop an analytical approach that accurately captures the dynamical interaction between epidemics on overlay networks. The formalism allows for overlay networks with arbitrary joint degree distribution and overlap. To illustrate the versatility of our approach, we consider a hypothetical delayed intervention scenario in which an immunizing agent is disseminated in a host population to hinder the propagation of an undesirable agent (e.g., the spread of preventive information in the context of an emerging infectious disease).

  5. Chlorine adsorption on Au(111): chlorine overlayer or surface chloride?

    PubMed

    Gao, Weiwei; Baker, Thomas A; Zhou, Ling; Pinnaduwage, Dilini S; Kaxiras, Efthimios; Friend, Cynthia M

    2008-03-19

    We report the first scanning tunneling microscope (STM) investigation, combined with density functional theory calculations, to resolve controversy regarding the bonding and structure of chlorine adsorbed on Au(111). STM experiments are carried out at 120 K to overcome instability caused by mobile species upon chlorine adsorption at room temperature. Chlorine adsorption initially lifts the herringbone reconstruction. At low coverages (<0.33 ML), chlorine binds to the top of Au(111)-(1 x 1) surface and leads to formation of an overlayer with (square root(3) x square root(3))R30 degree structure at 0.33 ML. At higher coverages, packing chlorine into an overlayer structure is no longer favored. Gold atoms incorporate into a complex superlattice of a Au-Cl surface compound. PMID:18290645

  6. A finite element overlay technique for modeling pinned composite joints

    NASA Technical Reports Server (NTRS)

    Colvin, G. E.; Adams, D. S.

    1986-01-01

    A finite element technique using overlaid plane stress elements is presented for modeling a pinned composite joint. The technique allows for discrete modeling of the pin and web regions of the joint in a two-dimensional (2-D) finite element analysis. Thus, predictive capability is substantially increased without the added complexity of a three-dimensional (3-D) analysis. The overlay technique requires a thorough evaluation of the model constraints between the joint components. Bearing panels are used to account for a reduced compressive modulus under bearing loads. Application of the plane stress overlay technique to the Filament Wound Case (FWC) Program is discussed. The experimental approach to determine bearing panel moduli using a double lap shear test is detailed, and finite element results are correlated with full-scale FWC joint test results.

  7. Daylighting design overlays for equidistant sun-path projections

    SciTech Connect

    Selkowitz, S.

    1981-08-01

    Projections of the Sun's daily and seasonal paths frequently are used to solve building design problems involving site obstructions and shading of fenestration. In the United States, equidistant projections are perhaps the most widely used (compared to other sunpath projections) because of the commercial availability of a complete set of sun-path diagrams for a range of useful latitudes. This paper describes the development of a set of overlays designed for use with sun-path projections to predict illumination on any building surface throughout the year for standard climatological conditions. Illumination is calculated for clear and overcast skies and for direct sunlight using algorithms recommended by the Commission Internationale de l'Eclairage (CIE). Values for illumination incident upon the surface, as well as transmitted through single and double glazing, can be calculated. Similar overlays for solar radiation are being developed.

  8. Ion beam mixing of titanium overlayers with hydroxyapaptite substrates

    SciTech Connect

    Levine, T.E.; Nastasi, M.; Alford, T.L.; Suchicital, C.; Russell, S.; Luptak, K.; Pizziconi, V.; Mayer, J.W.

    1995-01-01

    The mixing of titanium overlayers with hydroxyapatite (HA) substrates via ion irradiation has been demonstrated. Analysis via secondary ion mass spectroscopy (SIMS) indicates an interfacial broadening of titanium and calcium of the implanted sample compared to that of the unimplanted sample. Attendant to the observed ion beam mixing of titanium into the HA, the oxygen signal of the titanium overlayer increases as a result of ion irradiation. It is supposed that this change is evident of diffusion through the metal layer and possibly from titania formation at the free surface and perovskite formation at the film/substrate interface. This possibility is consistent with thermodynamic predictions. Additionally, the force required to separate the film from the substrate increased as a result of ion irradiation, validating the continued study of ion beam processing of Ti/HA systems towards the improvement of long term fixation of implant devices.

  9. Prepenetrant Etchant For Incology(R) 903 Weld Overlays

    NASA Technical Reports Server (NTRS)

    O'Tousa, Joseph E.; Thomas, Clark S.; Foster, Robert E.

    1990-01-01

    Etching solution developed for use prior to type-IVc penetrant inspection of Incology(R) 903 weld overlays. Formulated as follows: 80 g ferric chloride hexahydrate, 300 mL reagent-grade hydrochloric acid, 25 mL food- or reagent-grade phosphoric acid, and 100 mL ethylene glycol. Gives more reasonable range of etching time and reduces probability of overetching and resulting damage. Stored indefinitely.

  10. Security message exchange interoperability scenarios

    SciTech Connect

    Tarman, Thomas

    1998-07-01

    This contribution describes three interoperability scenarios for the ATM Security Message Exchange (SME) protocol. These scenarios include network-wide signaling support for the Security Services Information Element, partial signaling support wherethe SSIE is only supported in private or workgroup ATM networks, and the case where the SSIE is nonsupported by any network elements (exceptthosethat implement security services). Explanatory text is proposed for inclusion infection 2.3 of the ATM Security Specification, Version 1.0.

  11. Hg binding on Pd binary alloys and overlays

    SciTech Connect

    Sasmaz, E.; Aboud, S.; Wilcox, J.

    2009-05-15

    The vast majority of the mercury released from coal combustion is elemental mercury. Noble metals such as Pd, Au, Ag, and Cu have been proposed to capture elemental mercury. Density functional theory calculations are carried out to investigate mercury interactions with Pd binary alloys and overlays in addition to pure Pd, Au, Ag, and Cu surfaces using a projected augmented wave method with the Perdew-Wang generalized 0 gradient approximation. It has been determined that Pd has the highest mercury binding energy in comparison to other noble metals. In addition, Pd is found to be the primary surface atom responsible for improving the interaction of mercury with the surface atoms in both Pd binary alloys and overlays. Deposition of Pd overlays on Au and Ag enhance the reactivity of the surface by shifting the d-states of surface atoms up in energy. Strong mercury binding causes a significant overlap between the s- and p-states of Pd and the d-state of Mercury.

  12. Diffusion Barriers to Increase the Oxidative Life of Overlay Coatings

    NASA Technical Reports Server (NTRS)

    Nesbitt, James A.; Lei, Jih-Fen

    1999-01-01

    Currently, most blades and vanes in the hottest section of aero gas turbine engines require some type of coating for oxidation protection. Newly developed single crystal superalloys have the mechanical potential to operate at increasingly higher component temperatures. However, at these elevated temperatures, coating/substrate interdiffusion can shorten the protective life of the coating. Diffusion barriers between overlay coatings and substrates are being examined to extend the protective life of the coating. A previously- developed finite-difference diffusion model has been modified to predict the oxidative life enhancement due to use of a diffusion barrier. The original diffusion model, designated COSIM, simulates Al diffusion in the coating to the growing oxide scale as well as Al diffusion into the substrate. The COSIM model incorporates an oxide growth and spalling model to provide the rate of Al consumption during cyclic oxidation. Coating failure is predicted when the Al concentration at the coating surface drops to a defined critical level. The modified COSIM model predicts the oxidative life of an overlay coating when a diffusion barrier is present eliminating diffusion of Al from the coating into the substrate. Both the original and the modified diffusion models have been used to predict the effectiveness of a diffusion barrier in extending the protective life of a NiCrAl overlay coating undergoing cyclic oxidation at 1100 C.

  13. An Overlapping Structured P2P for REIK Overlay Network

    NASA Astrophysics Data System (ADS)

    Liu, Wenjun; Song, Jingjing; Yu, Jiguo

    REIK is based on a ring which embedded an inverse Kautz digraph, to enable multi-path P2P routing. It has the constant degree and the logarithmic diameter DHT scheme with constant congestion and Byzantine fault tolerance. However, REIK did not consider the interconnection of many independent smaller networks. In this paper, we propose a new approach to build overlay network, OLS-REIK which is an overlapping structured P2P for REIK overlay network. It is a more flexible interconnecting different REIK network. Peers can belong to several rings, allowing this interconnection. By connecting smaller structured overlay networks in an unstructured way, it provides a cost effective alternative to hierarchical structured P2P systems requiring costly merging. Routing of lookup messages is performed as in REIK within one ring, but a peer belonging to several rings forwards the request to the different rings it belongs to. Furthermore a small number of across point is enough to ensure a high exhaustiveness level.

  14. Securing collaborative environments

    SciTech Connect

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  15. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Physical Security... owned weapons in a vehicle is prohibited. (3) Privately owned weapons carried in a vehicle will...

  16. 32 CFR 552.124 - Transportation of privately owned weapons and ammunition.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... MILITARY RESERVATIONS AND NATIONAL CEMETERIES REGULATIONS AFFECTING MILITARY RESERVATIONS Physical Security... owned weapons in a vehicle is prohibited. (3) Privately owned weapons carried in a vehicle will...

  17. Case study of virtual private network

    NASA Astrophysics Data System (ADS)

    Hernandez, Harold; Chung, Ping-Tsai

    2001-07-01

    In this study, business benefits for this Virtual Private Network (VPN) and protocols, techniques, equipments used in this VPN are reported. In addition, our design experience for fault tolerance, security and network management and administration on this VPN are showed. Finally, the issues for future planning of this VPN is addressed.

  18. 76 FR 6702 - Private Transfer Fees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... fees for comment on ] August 16, 2010 (75 FR 49932) and requested public comments during a 60-day... AGENCY 12 CFR Part 1228 RIN 2590-AA41 Private Transfer Fees AGENCY: Federal Housing Finance Agency... transfer fee covenants and in certain related securities. Such covenants are adverse to the liquidity...

  19. Motivating the Private vs. Public Sector Managers.

    ERIC Educational Resources Information Center

    Khojasteh, Mak

    1993-01-01

    A questionnaire on intrinsic/extrinsic rewards received 362 responses from 380 managers. Pay and security were greater motivators for private than for public sector managers. Recognition had higher motivating potential in the public sector. Both groups were motivated by achievement and advancement. (SK)

  20. Private Quantum Subsystems

    NASA Astrophysics Data System (ADS)

    Jochym-O'Connor, Tomas; Kribs, David W.; Laflamme, Raymond; Plosker, Sarah

    2013-07-01

    We investigate the most general notion of a private quantum code, which involves the encoding of qubits into quantum subsystems and subspaces. We contribute to the structure theory for private quantum codes by deriving testable conditions for private quantum subsystems in terms of Kraus operators for channels, establishing an analogue of the Knill-Laflamme conditions in this setting. For a large class of naturally arising quantum channels, we show that private subsystems can exist even in the absence of private subspaces. In doing so, we also discover the first examples of private subsystems that are not complemented by operator quantum error correcting codes, implying that the complementarity of private codes and quantum error correcting codes fails for the general notion of private quantum subsystems.

  1. Quantum Private Comparison Based on Phase Encoding of Single Photons

    NASA Astrophysics Data System (ADS)

    Li, Yan-Bing; Ma, Ying-Jie; Xu, Sheng-Wei; Huang, Wei; Zhang, Yan-shuo

    2014-09-01

    In this paper, we propose a scheme for quantum private comparison using phase encoding. The analysis indicates that the scheme is secure, and can prevent some familiar attacks. With the use of error-correcting code (ECC), it achieves a limited fault tolerant quantum private comparison. The scheme is easy to be realized in current experiments.

  2. Privatization in Education.

    ERIC Educational Resources Information Center

    Rehfuss, John

    1995-01-01

    Privatization calls for substantially trimming the scope and breadth of government services, replacing them with private or other nongovernmental operators. The attraction of privatization is reduced costs and increased management flexibility. To date, the arrangement has received substantial support from students and parents in situations that…

  3. Private randomness expansion with untrusted devices

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2011-03-01

    Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.

  4. 78 FR 75376 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTP-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-11

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... discuss matters relating to the Classified National Security Information Program for State, Local, Tribal... Administration; 700 Pennsylvania Avenue NW., Jefferson Room; Washington, DC 20408. FOR FURTHER...

  5. Combined overlay, focus and CD metrology for leading edge lithography

    NASA Astrophysics Data System (ADS)

    Ebert, Martin; Cramer, Hugo; Tel, Wim; Kubis, Michael; Megens, Henry

    2011-04-01

    As leading edge lithography moves to 22-nm design rules, low k1 technologies like double patterning are the new resolution enablers, and system control and setup are the new drivers to meet remarkably tight process requirements. The way of thinking and executing setup and control of lithography scanners is changing in four ways. First, unusually tight process tolerances call for very dense sampling [1], which in effect means measurements at high throughput combined with high order modeling and corrections to compensate for wafer spatial fingerprint. Second, complex interactions between scanner and process no longer allow separation of error sources through traditional metrology approaches, which are based on using one set of metrology tools and methods for setup and another for scanner performance control. Moreover, setup and control of overlay is done independently from CD uniformity, which in effect leads to independent and conflicting adjustments for the scanner. Third, traditional CD setup and control is based on the focus and dose calculated from their CD response and not from measurement of their effect on pattern profile, which allows a clean and orthogonal de-convolution of focus and dose variations across the wafer. Fourth, scanner setup and control has to take into consideration the final goal of lithography, which is the accurate printing of a complex pattern describing a real device layout. To this end we introduce a new setup and control metrology step: measuring-to-match scanner 1D and 2D proximity. In this paper we will describe the strategy for setup and control of overlay, focus, CD and proximity based on the YieldStarTM metrology tool and present the resulting performance. YieldStar-200 is a new, high throughput metrology tool based on a high numerical aperture scatterometer concept. The tool can be used stand-alone as well as integrated in a processing track. It is suitable for determining process offsets in X,Y and Z directions through Overlay and Focus measurements respectively. In addition CD profile information can be measured enabling proximity matching applications. By using a technique [2][3][4] to de-convolve dose and focus based on the profile measurement of a well-characterized process monitor target, we show that the dose and focus signature of a high NA 193nm immersion scanner can be effectively measured and corrected. A similar approach was also taken to address overlay errors using the diffraction based overlay capability [5] of the same metrology tool. We demonstrate the advantage of having a single metrology tool solution, which enables us to reduce dose, focus and overlay variability to their minimum non-correctable signatures. This technique makes use of the high accuracy and repeatability of the YieldStar tool and provides a common reference of scanner setup and user process. Using ASML's YieldStar in combination with ASML scanners, and control solutions allows for a direct link from the metrology tool to the system settings, ensuring that the appropriate system settings can be easily and directly updated.

  6. Sampling strategy: optimization and correction for high-order overlay control for 45nm process node

    NASA Astrophysics Data System (ADS)

    Hsueh, Bo Yun; Huang, George K. C.; Yu, Chun-Chi; Huang, Chin-Chou Kevin; Huang, Chien-Jen; Manka, James R.; Tien, David

    2009-03-01

    The tight overlay budgets required for 45nm and beyond make overlay control a very important topic. With the adoption of immersion lithography, the incremental complexity brings much more difficulty to analyzing the source of variation and optimizing the sampling strategy. In this paper, there will be a discussion about how the use of an advanced sampling methodology and strategy can help to overcome this overlay control problem and insure sufficient overlay information to be captured for effective production lot excursion detection as well as rework decision making. There will also be a demonstration of the different correction methodologies to improve overlay control for dual-stage systems in order to maximize the productivity benef its with minimal impact to overlay performance.

  7. Overlay control strategy for 45/32nm RD and production ramp up

    NASA Astrophysics Data System (ADS)

    Yu, Tuan-Yen; Lin, Jun-Hung; Huang, Yong-Fa; Chen, Chien-Hao; Yu, Chun-Chi; Huang, Chin-Chou Kevin; Huang, Chien-Jen; Tien, David

    2010-03-01

    The tight overlay budgets required for 45nm and beyond makes overlay control a very important topic. High order overlay control (HOC) is becoming an essential methodology to remove the immersion induced overlay signatures. However, to implement the high order control into dynamic APC system requires FA infrastructure modification and a stable mass production environment. How to achieve the overlay requirement before the APC-HOC system becomes available is important for RD environment and for product early ramp up phase. In this paper authors would like to demonstrate a field-by-field correction (FxFc) or correction per exposure (CPE) methodology to improve high order overlay signature without changing current APC-linear control system.

  8. Innovative fast technique for overlay accuracy estimation using archer self calibration (ASC)

    NASA Astrophysics Data System (ADS)

    Hsu, Simon C. C.; Chen, Charlie; Yu, Chun Chi; Pai, Yuan Chi; Amit, Eran; Yap, Lipkong; Itzkovich, Tal; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-04-01

    As overlay margins shrink for advanced process nodes, a key overlay metrology challenge is finding the measurement conditions which optimize the yield for every device and layer. Ideally, this setup should be found in-line during the lithography measurements step. Moreover, the overlay measurement must have excellent correlation to the device electrical behavior. This requirement makes the measurement conditions selection even more challenging since it requires information about the response of both the metrology target and device to different process variations. In this work a comprehensive solution for overlay metrology accuracy, used by UMC, is described. This solution ranks the different measurement setups by their accuracy, using Qmerit, as reported by the Archer 500. This ranking was verified to match device overlay using electrical tests. Moreover, the use of Archer Self Calibration (ASC) allows further improvement of overlay measurement accuracy.

  9. Ductile film delamination from compliant substrates using hard overlayers

    PubMed Central

    Cordill, M.J.; Marx, V.M.; Kirchlechner, C.

    2014-01-01

    Flexible electronic devices call for copper and gold metal films to adhere well to polymer substrates. Measuring the interfacial adhesion of these material systems is often challenging, requiring the formulation of different techniques and models. Presented here is a strategy to induce well defined areas of delamination to measure the adhesion of copper films on polyimide substrates. The technique utilizes a stressed overlayer and tensile straining to cause buckle formation. The described method allows one to examine the effects of thin adhesion layers used to improve the adhesion of flexible systems. PMID:25641995

  10. Platinum overlay technique for single carbonized rhenium filaments

    SciTech Connect

    Goheen, M.W.; Scott, F.A.

    1985-01-01

    Plutonium isotopic analyses via a single carbonized rhenium filament has been used for many years. One of the main limitations on the method is the difficulty of maintaining reproducible control of isotopic fractionation. It was previously shown that an electroplated platinum overlay is very effective in controlling the fractionation from rhenium filaments. The overplate of platinum on carbonized rhenium also reduces fractionation and produces a much longer lived stable ion beam over the life time of the sample run. A rapid platinum overplate technique was developed for the carbonized rhenium filament by using thermal decomposition of chloroplatinic acid.

  11. Bandwidth auction for SVC streaming in dynamic multi-overlay

    NASA Astrophysics Data System (ADS)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  12. Effect of a Dielectric Overlay on a Linearly Tapered Slot Antenna Excited by a Coplanar Waveguide

    NASA Technical Reports Server (NTRS)

    Simons, Rainee N.; Lee, Richard Q.; Perl, Thomas D.; Silvestro, John

    1993-01-01

    The effect of a dielectric overlay on a linearly tapered slot antenna (LTSA) is studied. The LTSA under study has very wide bandwidth and excellent radiation patterns. A dielectric overlay improves the patterns and directivity of the antenna by increasing the electrical length and effective aperture of the antenna. A dielectric overlay can also be used to reduce the physical length of the antenna without compromising the pattern quality.

  13. Examination of overlay pipe weldments removed from the Hatch-2 reactor

    SciTech Connect

    Park, J.Y.; Kupperman, D.S.; Shack, W.J.

    1985-02-01

    Laboratory ultrasonic examination (UT), dye penetrant examination (PT), metallography, and sensitization measurements were performed on Type 304 stainless steel overlay pipe weldments from the Hatch-2 BWR to determine the effectiveness of UT through overlays and the effects of the overlays on crack propagation in the weldments. Little correlation was observed between the results of earlier in-service ultrasonic inspection and the results of PT and destructive examination. Considerable difficulty was encountered in correctly detecting the presence of cracks by UT in the laboratory. Blunting of the crack tip by the weld overlay was observed, but there was no evidence of tearing or throughwall extension of the crack beyond the blunted region.

  14. Lithography overlay control improvement using patterned wafer geometry for sub-22nm technology nodes

    NASA Astrophysics Data System (ADS)

    Peterson, Joel; Rusk, Gary; Veeraraghavan, Sathish; Huang, Kevin; Koffas, Telly; Kimani, Peter; Sinha, Jaydeep

    2015-03-01

    The semiconductor industry continues to push the limits of immersion lithography through multiple patterning techniques for printing features with critical dimension 20 nm and below. As a result overlay has become one of the critical lithography control parameters impacting device performance and has a stringent budget for yielding at smaller half pitch nodes. Overlay has several sources of errors related to scanner, lens, mask, and wafer. Lithographers have developed both linear and higher order field and wafer models to successfully compensate for the static fingerprints from different sources of error. After the static modeled portion of the fingerprint is removed, the remaining overlay error can be characterized as unstable modeled error or un-modeled error, commonly called uncorrectable residual error. This paper explores the fundamental relationship of overlay to wafer geometry through mechanisms of process-induced contributions to the wafer overlay, categorized as plastic and elastic wafer deformation. Correlation of overlay to local features such as slip lines is proven experimentally. The paper describes methodologies and geometry-induced overlay metrics for the application of wafer geometry to perform overlay feedback and feed forward applications. Feedback applications allow for process development and controlling semiconductor processes through in-line monitoring of wafers. Feed forward applications could include geometrybased corrections to the scanner for compensating non-static wafer geometry related overlay errors, and grouping wafers based on higher-order geometry.

  15. Quantum Mechanically Defined Critical Thickness in Metallic Overlayer Heteroepitaxy^1

    NASA Astrophysics Data System (ADS)

    Zhang, Zhenyu; Niu, Qian; Shih, Chih-Kang

    1997-03-01

    In a recent study of Ag film growth on GaAs(110), one startling observation was the existence of a critical thickness: an atomically flat overlayer can be formed only if the total Ag coverage exceeds a minimum value of about 7 ML.^2 Here we provide an explanation of the phenomena by invoking the quantum nature of the conduction electrons within an ultrathin metallic overlayer. We show that the discrete levels of the quantum well play a very important role in defining the overall energetics of the system. The critical thickness is found to be the minimal thickness of the film at which the conduction electrons can be truly confined without much charge spilling into the semiconductor. A quantitative comparison with the experiment is made using a thermodynamic analysis based on a simple model. ^1 Supported by DOE, NSF, and the R.A. Welch Foundation. ^2 A. R. Smith, K.-J. Chao, Q. Niu, and C. K. Shih, Science 273, 226 (1996).

  16. Lightweight storage and overlay networks for fault tolerance.

    SciTech Connect

    Oldfield, Ron A.

    2010-01-01

    The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands to millions of processors, In such environments, it is critical to have fault-tolerance mechanisms, including checkpoint/restart, that scale with the size of applications and the percentage of the system on which the applications execute. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a scalable solution. For example, on today's massive-scale systems that execute applications which consume most of the memory of the employed compute nodes, checkpoint operations generate I/O that consumes nearly 80% of the total I/O usage. Motivated by this observation, this project aims to improve I/O performance for application-directed checkpoints through the use of lightweight storage architectures and overlay networks. Lightweight storage provide direct access to underlying storage devices. Overlay networks provide caching and processing capabilities in the compute-node fabric. The combination has potential to signifcantly reduce I/O overhead for large-scale applications. This report describes our combined efforts to model and understand overheads for application-directed checkpoints, as well as implementation and performance analysis of a checkpoint service that uses available compute nodes as a network cache for checkpoint operations.

  17. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  18. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  19. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  20. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  1. 33 CFR 66.05-35 - Private aids to navigation other than State owned.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation other... HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-35 Private aids to navigation other than State owned. (a) No person, public body or other instrumentality...

  2. 76 FR 35006 - Recovery Policy RP9523.4, Demolition of Private Structures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITY Federal Emergency Management Agency Recovery Policy RP9523.4, Demolition of Private Structures..., Demolition of Private Structures. DATES: Comments must be received by July 15, 2011. ADDRESSES: Comments must... private structures under the provisions of the Public Assistance Program. FEMA proposes to include...

  3. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Private aircraft taken abroad by U.S. residents... SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An aircraft belonging to a resident of the U.S. which is taken to...

  4. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Private aircraft taken abroad by U.S. residents... SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An aircraft belonging to a resident of the U.S. which is taken to...

  5. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Private aircraft taken abroad by U.S. residents... SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An aircraft belonging to a resident of the U.S. which is taken to...

  6. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Private aircraft taken abroad by U.S. residents... SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An aircraft belonging to a resident of the U.S. which is taken to...

  7. 19 CFR 122.28 - Private aircraft taken abroad by U.S. residents.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Private aircraft taken abroad by U.S. residents... SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Private Aircraft § 122.28 Private aircraft taken abroad by U.S. residents. An aircraft belonging to a resident of the U.S. which is taken to...

  8. 76 FR 22740 - Comment Request on Existing Private and Public Efforts To Educate Investors

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ... COMMISSION Comment Request on Existing Private and Public Efforts To Educate Investors AGENCY: Securities and... the effectiveness of existing private and public efforts to educate investors. DATES: Comments should... effective existing private and public efforts to educate investors.'' The Office of Investor Education...

  9. Quantum private comparison over noisy channels

    NASA Astrophysics Data System (ADS)

    Siddhu, Vikesh; Arvind

    2015-08-01

    Quantum private comparison (QPC) allows us to protect private information during its comparison. In the past, various three-party quantum protocols have been proposed that claim to work well under noisy conditions. Here, we tackle the problem of QPC under noise. We analyze the EPR-based protocol under depolarizing noise, bit flip and phase flip noise. We show how noise affects the robustness of the EPR-based protocol. We then present a straightforward protocol based on CSS codes to perform QPC which is robust against noise and secure under general attacks.

  10. Incentive compatible quantum secure division

    NASA Astrophysics Data System (ADS)

    Yang, W.; Huang, L. S.; Zhu, Y. W.; Ye, Y.; Meng, P.; Song, F.; Wang, Q. Y.

    2010-11-01

    Secure division serves as an important primitive for secure multi-party computation and has wide applications in many fields, such as data mining, statistical analysis, collaborative benchmarking, etc. How to collaboratively compute the correct division result without leaking any participants's private data becomes the primary goal of secure division schemes. In this paper, we present a quantum secure division scheme via quantum discrete Fourier transform and quantum measurement. The scheme is proven to be secure against semi-honest parties and colluding parties. Furthermore, under the rational assumption that the first priority for every party is to learn the correct result, our scheme is shown to be incentive compatible.

  11. Virtual overlay metrology for fault detection supported with integrated metrology and machine learning

    NASA Astrophysics Data System (ADS)

    Lee, Hong-Goo; Schmitt-Weaver, Emil; Kim, Min-Suk; Han, Sang-Jun; Kim, Myoung-Soo; Kwon, Won-Taik; Park, Sung-Ki; Ryan, Kevin; Theeuwes, Thomas; Sun, Kyu-Tae; Lim, Young-Wan; Slotboom, Daan; Kubis, Michael; Staecker, Jens

    2015-03-01

    While semiconductor manufacturing moves toward the 7nm node for logic and 15nm node for memory, an increased emphasis has been placed on reducing the influence known contributors have toward the on product overlay budget. With a machine learning technique known as function approximation, we use a neural network to gain insight to how known contributors, such as those collected with scanner metrology, influence the on product overlay budget. The result is a sufficiently trained function that can approximate overlay for all wafers exposed with the lithography system. As a real world application, inline metrology can be used to measure overlay for a few wafers while using the trained function to approximate overlay vector maps for the entire lot of wafers. With the approximated overlay vector maps for all wafers coming off the track, a process engineer can redirect wafers or lots with overlay signatures outside the standard population to offline metrology for excursion validation. With this added flexibility, engineers will be given more opportunities to catch wafers that need to be reworked, resulting in improved yield. The quality of the derived corrections from measured overlay metrology feedback can be improved using the approximated overlay to trigger, which wafers should or shouldn't be, measured inline. As a development or integration engineer the approximated overlay can be used to gain insight into lots and wafers used for design of experiments (DOE) troubleshooting. In this paper we will present the results of a case study that follows the machine learning function approximation approach to data analysis, with production overlay measured on an inline metrology system at SK hynix.

  12. Private speech in adolescents.

    PubMed

    Kronk, C M

    1994-01-01

    The main objective of this study was to investigate the occurrence of private speech in adolescents. The data supported the theory that private speech continues to occur during adolescence. Indications were found that prior studies of older children may not have detected private speech due to observer effects. In this study the observer attempted to appear uninterested in the subject's actions to alleviate self-consciousness. Thirty-three female and fourteen male high school upperclassmen and college freshmen took an exam one at a time with a confederate subject who was trained to use private speech. An experimenter recorded all speech produced during the thirty-minute period. The subjects worked in the presence of a confederate who exhibited private speech for the last twenty minutes of the testing session in order to help them believe they could use private speech if they wished to. The relationship found between private speech and observer effects indicates that social situations may have a profound effect upon its occurrence. Private speech was found to be negatively correlated with task performance when uttered before the confederates had begun to speak to themselves. No such correlation was found between private speech and score during the period in which the confederates talked to themselves. The final hypothesis was that the speech emitted would fit into the same categories defined by Berk and Garvin (1984); all but one of their categories were observed. Of the observed categories description of activity and self guidance was correlated with high test scores. PMID:7892791

  13. Quantum private comparison with a malicious third party

    NASA Astrophysics Data System (ADS)

    Sun, Zhiwei; Yu, Jianping; Wang, Ping; Xu, Lingling; Wu, Chunhui

    2015-06-01

    In this paper, we will show that quantum private comparison protocol is secure when a malicious third party is presented. The security of the protocol is considered in a cheat-sensitive model, in which the TP is kept honest by the possibility of being caught cheating. Besides, we enhance the privacy of the quantum private comparison protocol, where the participants' inputs and the comparison result can be preserved. Furthermore, in contrast to pervious protocols requiring a large amount of quantum resources, such as entanglement and quantum memory, our protocol is based on BB84 protocol, which is more feasible for practical applications. Finally, we analyze the security of the presented protocol.

  14. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  15. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  16. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  17. A Unified Approach to Information Security Compliance

    ERIC Educational Resources Information Center

    Adler, M. Peter

    2006-01-01

    The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…

  18. 31 CFR 306.90 - Nontransferable securities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Nontransferable securities. 306.90 Section 306.90 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) FISCAL.... SECURITIES Assignments in Behalf of Private or Public Organizations § 306.90 Nontransferable securities....

  19. Viral concentration determination through plaque assays: using traditional and novel overlay systems.

    PubMed

    Baer, Alan; Kehn-Hall, Kylene

    2014-01-01

    Plaque assays remain one of the most accurate methods for the direct quantification of infectious virons and antiviral substances through the counting of discrete plaques (infectious units and cellular dead zones) in cell culture. Here we demonstrate how to perform a basic plaque assay, and how differing overlays and techniques can affect plaque formation and production. Typically solid or semisolid overlay substrates, such as agarose or carboxymethyl cellulose, have been used to restrict viral spread, preventing indiscriminate infection through the liquid growth medium. Immobilized overlays restrict cellular infection to the immediately surrounding monolayer, allowing the formation of discrete countable foci and subsequent plaque formation. To overcome the difficulties inherent in using traditional overlays, a novel liquid overlay utilizing microcrystalline cellulose and carboxymethyl cellulose sodium has been increasingly used as a replacement in the standard plaque assay. Liquid overlay plaque assays can be readily performed in either standard 6 or 12 well plate formats as per traditional techniques and require no special equipment. Due to its liquid state and subsequent ease of application and removal, microculture plate formats may alternatively be utilized as a rapid, accurate and high throughput alternative to larger scale viral titrations. Use of a non heated viscous liquid polymer offers the opportunity to streamline work, conserves reagents, incubator space, and increases operational safety when used in traditional or high containment labs as no reagent heating or glassware are required. Liquid overlays may also prove more sensitive than traditional overlays for certain heat labile viruses. PMID:25407402

  20. Questioning the Benefits That Coloured Overlays Can Have for Reading in Students with and without Dyslexia

    ERIC Educational Resources Information Center

    Henderson, Lisa M.; Tsogka, Natassa; Snowling, Margaret J.

    2013-01-01

    Visual stress (the experience of visual distortions and discomfort during prolonged reading) is frequently identified and alleviated with coloured overlays or lenses. Previous studies have associated visual stress with dyslexia and as a consequence, coloured overlays are widely distributed to children and adults with reading difficulty. However,…

  1. Viral Concentration Determination Through Plaque Assays: Using Traditional and Novel Overlay Systems

    PubMed Central

    Baer, Alan; Kehn-Hall, Kylene

    2015-01-01

    Plaque assays remain one of the most accurate methods for the direct quantification of infectious virons and antiviral substances through the counting of discrete plaques (infectious units and cellular dead zones) in cell culture. Here we demonstrate how to perform a basic plaque assay, and how differing overlays and techniques can affect plaque formation and production. Typically solid or semisolid overlay substrates, such as agarose or carboxymethyl cellulose, have been used to restrict viral spread, preventing indiscriminate infection through the liquid growth medium. Immobilized overlays restrict cellular infection to the immediately surrounding monolayer, allowing the formation of discrete countable foci and subsequent plaque formation. To overcome the difficulties inherent in using traditional overlays, a novel liquid overlay utilizing microcrystalline cellulose and carboxymethyl cellulose sodium has been increasingly used as a replacement in the standard plaque assay. Liquid overlay plaque assays can be readily performed in either standard 6 or 12 well plate formats as per traditional techniques and require no special equipment. Due to its liquid state and subsequent ease of application and removal, microculture plate formats may alternatively be utilized as a rapid, accurate and high throughput alternative to larger scale viral titrations. Use of a non heated viscous liquid polymer offers the opportunity to streamline work, conserves reagents, incubator space, and increases operational safety when used in traditional or high containment labs as no reagent heating or glassware are required. Liquid overlays may also prove more sensitive than traditional overlays for certain heat labile viruses. PMID:25407402

  2. Questioning the Benefits That Coloured Overlays Can Have for Reading in Students with and without Dyslexia

    ERIC Educational Resources Information Center

    Henderson, Lisa M.; Tsogka, Natassa; Snowling, Margaret J.

    2013-01-01

    Visual stress (the experience of visual distortions and discomfort during prolonged reading) is frequently identified and alleviated with coloured overlays or lenses. Previous studies have associated visual stress with dyslexia and as a consequence, coloured overlays are widely distributed to children and adults with reading difficulty. However,

  3. Ubiquitous map-image access through wireless overlay networks

    NASA Astrophysics Data System (ADS)

    Cai, Jianfei; Huang, Haijie; Ni, Zefeng; Chen, Chang Wen

    2004-10-01

    With the availability of various wireless link-layer technologies, such as Bluetooth, WLAN and GPRS, in one wireless device, ubiquitous communications can be realized through managing vertical handoff in the environment of wireless overlay networks. In this paper, we propose a vertical handoff management system based on mobile IPv6, which can automatically manage the multiple network interfaces on the mobile device, and make decisions on network interface selection according to the current situation. Moreover, we apply our proposed vertical handoff management with JPEG-2000 codec to the wireless application of map image access. The developed system is able to provide seamless communications, as well as fast retrieve any interested map region with any block size, in different resolutions and different color representations directly from the compressed bitstream.

  4. Decentralized Service Allocation in a Broker Overlay Based Grid

    NASA Astrophysics Data System (ADS)

    Azab, Abdulrahman; Meling, Hein

    Grid computing is based on coordinated resource sharing in a dynamic environment of multi-institutional virtual organizations. Data exchanges, and service allocation, are challenging problems in the field of Grid computing. This is due to the decentralization of Grid systems. Building decentralized Grid systems with efficient resource management and software component mechanisms is a need for achieving the required efficiency and usability of Grid systems. In this work, a decentralized Grid system model is presented in which, the system is divided into virtual organizations each controlled by a broker. An overlay network of brokers is responsible for global resource management and managing allocation of services. Experimental results show that, the system achieves dependable performance with various loads of services, and broker failures.

  5. Digital watermarking and steganography via overlays of halftone images

    NASA Astrophysics Data System (ADS)

    Wu, Chai Wah; Thompson, Gerhard R.; Stanich, Mikel J.

    2004-10-01

    Recently, several watermarking schemes have been proposed that embed a watermark into two halftone images such that the watermark can be extracted by overlaying these halftone images. The watermark images in these schemes are binary images and the pixels in the two halftone images are correlated or not depending on whether the corresponding pixel in the watermark is on or off. In these schemes, the watermark is binary and does not contain detailed features. Furthermore, the extracted watermark contains residual patterns from the two images which reduces the fidelity of the extracted watermark image. This paper proposes a watermarking algorithm that addresses these problems. In addition, the proposed scheme admits more general watermark extraction functions and allows embedding of multiple watermark images.

  6. Overlay improvement by exposure map based mask registration optimization

    NASA Astrophysics Data System (ADS)

    Shi, Irene; Guo, Eric; Chen, Ming; Lu, Max; Li, Gordon; Li, Rivan; Tian, Eric

    2015-03-01

    Along with the increased miniaturization of semiconductor electronic devices, the design rules of advanced semiconductor devices shrink dramatically. [1] One of the main challenges of lithography step is the layer-to-layer overlay control. Furthermore, DPT (Double Patterning Technology) has been adapted for the advanced technology node like 28nm and 14nm, corresponding overlay budget becomes even tighter. [2][3] After the in-die mask registration (pattern placement) measurement is introduced, with the model analysis of a KLA SOV (sources of variation) tool, it's observed that registration difference between masks is a significant error source of wafer layer-to-layer overlay at 28nm process. [4][5] Mask registration optimization would highly improve wafer overlay performance accordingly. It was reported that a laser based registration control (RegC) process could be applied after the pattern generation or after pellicle mounting and allowed fine tuning of the mask registration. [6] In this paper we propose a novel method of mask registration correction, which can be applied before mask writing based on mask exposure map, considering the factors of mask chip layout, writing sequence, and pattern density distribution. Our experiment data show if pattern density on the mask keeps at a low level, in-die mask registration residue error in 3sigma could be always under 5nm whatever blank type and related writer POSCOR (position correction) file was applied; it proves random error induced by material or equipment would occupy relatively fixed error budget as an error source of mask registration. On the real production, comparing the mask registration difference through critical production layers, it could be revealed that registration residue error of line space layers with higher pattern density is always much larger than the one of contact hole layers with lower pattern density. Additionally, the mask registration difference between layers with similar pattern density could also achieve under 5nm performance. We assume mask registration excluding random error is mostly induced by charge accumulation during mask writing, which may be calculated from surrounding exposed pattern density. Multi-loading test mask registration result shows that with x direction writing sequence, mask registration behavior in x direction is mainly related to sequence direction, but mask registration in y direction would be highly impacted by pattern density distribution map. It proves part of mask registration error is due to charge issue from nearby environment. If exposure sequence is chip by chip for normal multi chip layout case, mask registration of both x and y direction would be impacted analogously, which has also been proved by real data. Therefore, we try to set up a simple model to predict the mask registration error based on mask exposure map, and correct it with the given POSCOR (position correction) file for advanced mask writing if needed.

  7. Extremely fast hydrogen absorption/desorption through platinum overlayers

    NASA Astrophysics Data System (ADS)

    Połczyński, Piotr; Jurczakowski, Rafał

    2016-02-01

    The hydrogen electrosorption in thin palladium films (50-1000 nm) was investigated at palladium electrodes covered with platinum overlayers. The results for this model system show that the rates of the hydrogen sorption/desorption are orders of magnitude higher for platinized samples with respect to pure palladium. The highest absorption kinetics have been observed for Pd electrodes fully covered with 1-3 platinum monolayers. By means of electrochemical impedance spectroscopy (EIS) we have shown that the process is diffusion limited at platinized Pd layers. Diffusion coefficient, DH, determined in EIS, is two orders of magnitude higher than that previously reported for thin palladium films and approaches DH for bulk palladium. The system stability after hydrogen absorption was assessed and the sorption mechanism was discussed. Surprisingly high durability of the platinized palladium enables its use in a variety of applications where fast and selective response in the presence of hydrogen is required.

  8. Exact and reliable overlay metrology in nanoscale semiconductor devices using an image processing method

    NASA Astrophysics Data System (ADS)

    Park, Jinkook; Shin, ChaeHo; Kim, Minkook; Kim, Junghwan; Park, JeongKyun; Kim, JungSoo; Jun, ChungSam; Yim, Yeny; Lee, Janghee

    2014-10-01

    As semiconductor processing becomes more complicated and pattern sizes shrink, the overlay metrology has become one of the most important issues in the semiconductor industry. Therefore, in order to obtain correct, reliable overlay values in semiconductor fabrication facilities (fab), quantization methods for the efficient management and implementation of a measurement algorithm are required, as well as an understanding of the target structures in the semiconductor device. We implemented correct, reliable overlay values in the pattern using the image processing method. The quantization method, through correlation analysis and a new algorithm for target structures, were able to improve the sensitivity to misalignment in the pattern and enable more stable and credible in-line measurement by decreasing the distribution of the residuals in overlay values. Since overlay values of the pattern in the fab were measured and managed more reliably and quickly, it is expected that our study will be able to contribute to the yield enhancement of semiconductor companies.

  9. Techniques for improving overlay accuracy by using device correlated metrology targets as reference

    NASA Astrophysics Data System (ADS)

    Tzai, Wei Jhe; Hsu, Simon C. C.; Chen, Howard; Chen, Charlie; Pai, Yuan Chi; Yu, Chun-Chi; Lin, Chia Ching; Itzkovich, Tal; Yap, Lipkong; Amit, Eran; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-10-01

    The performance of overlay metrology as total measurement uncertainty, design rule compatibility, device correlation, and measurement accuracy has been challenged at the 2× nm node and below. The process impact on overlay metrology is becoming critical, and techniques to improve measurement accuracy become increasingly important. We present a methodology for improving the overlay accuracy. A propriety quality metric, Qmerit, is used to identify overlay metrology measurement settings with the least process impacts and reliable accuracies. Using the quality metric, a calibration method, Archer self-calibration, is then used to remove the inaccuracies. Accuracy validation can be achieved by correlation to reference overlay data from another independent metrology source such as critical dimension-scanning electron microscopy data collected on a device correlated metrology hybrid target or by electrical testing. Additionally, reference metrology can also be used to verify which measurement conditions are the most accurate. We provide an example of such a case.

  10. Innovative techniques for improving overlay accuracy by using DCM (device correlated metrology) targets as reference

    NASA Astrophysics Data System (ADS)

    Tzai, Wei-Jhe; Hsu, Simon C. C.; Chen, Howard; Chen, Charlie; Pai, Yuan Chi; Yu, Chun-Chi; Lin, Chia Ching; Itzkovich, Tal; Yap, Lipkong; Amit, Eran; Tien, David; Huang, Eros; Kuo, Kelly T. L.; Amir, Nuriel

    2014-04-01

    Overlay metrology performance as Total Measurement Uncertainty (TMU), design rule compatibility, device correlation and measurement accuracy are been challenged at 2x nm node and below. Process impact on overlay metrology becoming critical, and techniques to improve measurement accuracy becomes increasingly important. In this paper, we present an innovative methodology for improving overlay accuracy. A propriety quality metric, Qmerit, is used to identify overlay metrology measurement settings with least process impacts and reliable accuracies. Using the quality metric, an innovative calibration method, ASC (Archer Self Calibration) is then used to remove the inaccuracies. Accuracy validation can be achieved by correlation to reference overlay data from another independent metrology source such as CDSEM data collected on DCM (Device Correlated Metrology) hybrid target or electrical testing. Additionally, reference metrology can also be used to verify which measurement conditions are the most accurate. In this paper we bring an example of such use case.

  11. Integrated production overlay field-by-field control for leading edge technology nodes

    NASA Astrophysics Data System (ADS)

    Chung, Woong Jae; Tristan, John; Gutjahr, Karsten; Subramany, Lokesh; Li, Chen; Sun, Yulei; Yelverton, Mark; Kim, Young Ki; Kim, Jeong Soo; Huang, Chin-Chou Kevin; Pierson, William; Karur-Shanmugam, Ramkumar; Riggs, Brent; Jug, Sven; Robinson, John C.; Yap, Lipkong; Ramanathan, Vidya

    2014-04-01

    As photolithography will continue with 193nm immersion multiple patterning technologies for the leading edge HVM process node, the production overlay requirement for critical layers in logic devices has almost reached the scanner hardware performance limit. To meet the extreme overlay requirements in HVM production environment, this study investigates a new integrated overlay control concept for leading edge technology nodes that combines the run-to-run (R2R) linear or high order control loop, the periodic field-by-field or correction per exposure (CPE) wafer process signature control loop, and the scanner baseline control loop into a single integrated overlay control path through the fab host APC system. The goal is to meet the fab requirements for overlay performance, lower the cost of ownership, and provide freedom of control methodology. In this paper, a detailed implementation of this concept will be discussed, along with some preliminary results.

  12. Fear and Privatization

    ERIC Educational Resources Information Center

    Cooper, Bruce S.; Randall, E. Vance

    2008-01-01

    Supporters of public education fear attempts to privatize schools, while the private sector has always struggled against the monopolistic power of the public schools that educates almost 90% of all K-12 students. This trepidation has recently been intensified by the creation of a "third sector" that includes charter schools, voucher programs, and…

  13. Dialogue on Private Events

    ERIC Educational Resources Information Center

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior…

  14. Financing Private Education.

    ERIC Educational Resources Information Center

    Wallace, Anthony

    Private schools, which educate about 11 percent of all pupils, provide educational diversity and competition with the public schools. The results often take the forms of educational innovation and progress. Because mounting costs of teacher salaries, educational materials, and teaching aids are currently putting pressure on private school finance,…

  15. The Limits of Privatization.

    ERIC Educational Resources Information Center

    Starr, Paul

    Transferring public services and public assets to private ownership is not an entirely new idea. Governments at all levels in the United States have for years contracted out many services. However, under the recently coined label "privatization," such policies now come recommended as a more comprehensive approach to the problems of modern

  16. The Limits of Privatization.

    ERIC Educational Resources Information Center

    Starr, Paul

    Transferring public services and public assets to private ownership is not an entirely new idea. Governments at all levels in the United States have for years contracted out many services. However, under the recently coined label "privatization," such policies now come recommended as a more comprehensive approach to the problems of modern…

  17. Private Speech in Ballet

    ERIC Educational Resources Information Center

    Johnston, Dale

    2006-01-01

    Authoritarian teaching practices in ballet inhibit the use of private speech. This paper highlights the critical importance of private speech in the cognitive development of young ballet students, within what is largely a non-verbal art form. It draws upon research by Russian psychologist Lev Vygotsky and contemporary socioculturalists, to…

  18. Dialogue on private events

    PubMed Central

    Palmer, David C.; Eshleman, John; Brandon, Paul; Layng, T. V. Joe; McDonough, Christopher; Michael, Jack; Schoneberger, Ted; Stemmer, Nathan; Weitzman, Ray; Normand, Matthew

    2004-01-01

    In the fall of 2003, the authors corresponded on the topic of private events on the listserv of the Verbal Behavior Special Interest Group. Extracts from that correspondence raised questions about the role of response amplitude in determining units of analysis, whether private events can be investigated directly, and whether covert behavior differs from other behavior except in amplitude. Most participants took a cautious stance, noting not only conceptual pitfalls and empirical difficulties in the study of private events, but doubting the value of interpretive exercises about them. Others argued that despite such obstacles, in domains where experimental analyses cannot be done, interpretation of private events in the light of laboratory principles is the best that science can offer. One participant suggested that the notion that private events can be behavioral in nature be abandoned entirely; as an alternative, the phenomena should be reinterpreted only as physiological events. PMID:22477293

  19. Application of DBM system to overlay verification and wiggling quantification for advanced process

    NASA Astrophysics Data System (ADS)

    Lee, Taehyeong; Kim, Jungchan; Yoo, Gyun; Park, Chanha; Yang, Hyunjo; Yim, Donggyu; Park, Byoungjun; Maruyama, Kotaro; Yamamoto, Masahiro

    2012-03-01

    With the shrinkage of semiconductor device scales, advanced semiconductor industries face tremendous challenges in process control. As lithography and etch processes are pushed to get smaller dimensions, the overlay and wiggling control are hot issues due to the limiting of pattern performance. Many chip makers are using Double Patterning Technology (DPT) process to overcome design rule limitations but they are also concerned about overlay control. In DPT process, obtaining accurate overlay data by measuring overlay marks with traditional metrology is difficult because of the difference of shape and position between cell pattern and overlay marks. Cell to overlay mark miss-match will occur when there is lens aberration or mask registration error. Therefore, the best way to obtain accurate overlay data without error is to measure the real cell itself. The overlay of the cell array using DPT process can be measured by analyzing the relative position of the 2nd exposed pattern to the 1st exposed pattern. But it is not easy to clearly distinguish a 1st layer and 2nd layer in a patterned cell array image using CD SEM. The Design Based Metrology (DBM)-system can help identify which cell pattern is a 1st or 2nd layer, so overlay error between the 1st and 2nd layers at DPT process can be checked clearly. Another noticeable problem in advanced processing is wiggling. The wiggling of a pattern become severe by the etch process and must be controlled to meet electrical characteristics of what the semiconductor device requires. The 1st stage of wiggling control is to understand the level of wiggling which is crucial to device performance. The DBM-system also can be used for quantification of wiggling by determining specially designed parameters. In this paper we introduce overlay verification and wiggling quantification through new methodology for advanced memory devices.

  20. Multi-Bit Quantum Private Query

    NASA Astrophysics Data System (ADS)

    Shi, Wei-Xu; Liu, Xing-Tong; Wang, Jian; Tang, Chao-Jing

    2015-09-01

    Most of the existing Quantum Private Queries (QPQ) protocols provide only single-bit queries service, thus have to be repeated several times when more bits are retrieved. Wei et al.'s scheme for block queries requires a high-dimension quantum key distribution system to sustain, which is still restricted in the laboratory. Here, based on Markus Jakobi et al.'s single-bit QPQ protocol, we propose a multi-bit quantum private query protocol, in which the user can get access to several bits within one single query. We also extend the proposed protocol to block queries, using a binary matrix to guard database security. Analysis in this paper shows that our protocol has better communication complexity, implementability and can achieve a considerable level of security.

  1. Alternative security

    SciTech Connect

    Weston, B.H. )

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.

  2. Solidification structure and bonding property of specimens after overlaying Stellite 6 on SG cast irons by plasma transferred arc process

    SciTech Connect

    Chan, W.S.; Lui, T.S.; Chen, L.H.

    1996-10-01

    In this investigation, SG cast irons with two different carbon contents were overlaid with Stellite 6 cobalt-base alloy by plasma transferred arc process with various overlaying currents. Results indicated that the solidification structure of the Stellite 6 overlayer after overlaying with low overlaying current is always dendritic regardless of the carbon content of the substrate. The interface region between the overlayer and 3.8C SG cast iron is covered entirely by a hard and brittle carbide-containing interfacial layer. On the other hand, carbide-containing interfacial layer only form locally at the interface region between overlayer and 2.0C SG cast iron. The overlayers are highly diluted by the substrate when the overlaying current is high. These overlayers are rich in iron instead of cobalt. The tearing test after overlaying indicate that fracture always occur at the carbide-containing interfacial layer. The tearing strength of the specimens is low when the interface region is covered entirely by the carbide-containing interfacial layer. Tearing strength increase abruptly when carbide-containing interfacial layer only formed at the interface region locally. On the other hand, fracture always occur at the diluted overlayer when the overlaying current is high.

  3. Tighter process control of poly- and active-to-contact overlay registration via multilayer analysis

    NASA Astrophysics Data System (ADS)

    Lee, Peter M. C.; Knutrud, Paul C.

    2000-06-01

    As process technology in high volume production fabs hits the 180 nm window, overlay metrology of the most critical layers needs to be managed very carefully. As feature sizes and other device characteristics shrink, the overlay requirement becomes a larger component of the overall process specification. It is no longer sufficient to measure overlay for only two layers at a time. In no other part of the process is this more critical than the poly and active layer to first contact. The contact layer needs to be aligned to both active and poly within tight tolerances. Since adjustments to overlay for these levels are not independent, it is essential to understand the relationship between all three layers. TSMC in particular, because it is a foundry, is not able to optimize customer circuit design that would allow two-layer registration to be sufficient. Previously, the only method to accomplish this has been to make two sets of overlay measurements and having an engineer analyze the relative overlay between the three layers. The proposed solution to solve this problem is a multi-layer overlay measurement algorithm and measurement target. This paper will report on the analysis of the process improvements that have and can be achieved using this unique measurement capability.

  4. Diffraction based overlay metrology: accuracy and performance on front end stack

    NASA Astrophysics Data System (ADS)

    Leray, Philippe; Cheng, Shaunee; Kandel, Daniel; Adel, Michael; Marchelli, Anat; Vakshtein, Irina; Vasconi, Mauro; Salski, Bartlomiej

    2008-03-01

    The overlay metrology budget is typically 1/10 of the overlay control budget resulting in overlay metrology total measurement uncertainty requirements of 0.57 nm for the most challenging use cases of the 32nm technology generation. Theoretical considerations show that overlay technology based on differential signal scatterometry (SCOL TM) has inherent advantages, which will allow it to achieve the 32nm technology generation requirements and go beyond it. In this work we present results of an experimental and theoretical study of SCOL. We present experimental results, comparing this technology with the standard imaging overlay metrology. In particular, we present performance results, such as precision and tool induced shift, for different target designs. The response to a large range of induced misalignment is also shown. SCOL performance on these targets for a real stack is reported. We also show results of simulations of the expected accuracy and performance associated with a variety of scatterometry overlay target designs. The simulations were carried out on several stacks including FEOL and BEOL materials. The inherent limitations and possible improvements of the SCOL technology are discussed. We show that with the appropriate target design and algorithms, scatterometry overlay achieves the accuracy required for future technology generations.

  5. Using intrafield high-order correction to achieve overlay requirement beyond sub-40nm node

    NASA Astrophysics Data System (ADS)

    Huang, Chun Yen; Chue, Chuei Fu; Liu, An-Hsiung; Wu, Wen Bin; Shih, Chiang Lin; Chiou, Tsann-Bim; Lee, Juno; Chen, Owen; Chen, Alek

    2009-03-01

    Overlay requirements for semiconductor devices are getting more demanding as the design rule shrinks. According to ITRS expectation[1], on product overlay budget is less than 8nm for the DRAM 40nm technology node. In order to meet this requirement, all overlay error sources have to be analyzed and controlled which include systematic, random, even intrafield high order errors. In this paper, we studied the possibility of achieving <7nm overlay control in mass production by using CPE, Correction Per Exposure mode, and Intra-field high order correction (i-HOPC). CPE is one of the functions in GridMapper package, which is a method to apply correction for each exposure to compensate both systematic and random overlay errors. If the intra-field overlay shows a non-linear fingerprint, e.g. due to either wafer processing or reticle pattern placement errors, the intra-field High Order Process Correction(iHOPC) provided by ASML can be used to compensate for this error . We performed the experiments on an immersion tool which has the GridMapper functionality. In our experiment, the previous layer was exposed on a dry machine. The wet to dry matching represent a more realistic scanner usage in the fab enviroment. Thus, the results contained the additional contribution of immersion-to-dry matched machine overlay. Our test result shows that the overlay can be improved by 70%, and the mean+3sigma of full wafer measurement can achieve near the range of 6 to 5nm. In this paper we also discuss the capability of implementation of CPE in the mass production environment since CPE requires additional wafer mearurement to create the proper overlay correction.

  6. Quantitative determination of the metastability of flat Ag overlayers on GaAs(110).

    PubMed

    Yu, Hongbin; Jiang, C S; Ebert, Ph; Wang, X D; White, J M; Niu, Qian; Zhang, Zhenyu; Shih, C K

    2002-01-01

    Atomically flat ultrathin Ag films on GaAs(110) can be formed through a kinetic pathway. However, such films are metastable and will transform to 3D islands upon high temperature annealing. Using scanning tunneling microscopy, we have measured quantitatively the layer-resolved metastability of flat Ag overlayers as they evolve toward their stable state, and deduced the corresponding kinetic barrier the system has to overcome in reaching the stable state. These results indicate that the metastability of the Ag overlayer is defined by the quantum nature of the conduction electrons confined within the overlayer. PMID:11800970

  7. Lemnos Interoperable Security Program

    SciTech Connect

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems.

  8. Indistinguishability and semantic security for quantum encryption scheme

    NASA Astrophysics Data System (ADS)

    Xiang, Chong; Yang, Li

    2012-11-01

    We investigate the definition of security for encryption scheme in quantum context. We systematically define the indistinguishability and semantic security for quantum public-key and private-key encryption schemes, and for computational security, physical security and information-theoretic security. Based on our definition, we present a necessary and sufficient condition that leads to information-theoretic indistinguishability for quantum encryption scheme. The equivalence between the indistinguishability and semantic security of quantum encryption scheme is also proved.

  9. Ultrasonic Evaluation of Two Dissimilar Metal Weld Overlay Specimens

    SciTech Connect

    Crawford, Susan L.; Cinson, Anthony D.; Prowant, Matthew S.; Moran, Traci L.; Anderson, Michael T.

    2012-06-30

    Two dissimilar metal weld (DMW) pipe-to-nozzle specimens were implanted with thermal fatigue cracks in the 13% to 90% through-wall depth range. The specimens were ultrasonically evaluated with phased-array probes having center frequencies of 0.8, 1.0, 1.5, and 2.0 megahertz (MHz). An Alloy 82/182 weld overlay (WOL) was applied and the specimens were ultrasonically re-evaluated for flaw detection and characterization. The Post-WOL flaw depths were approximately 10% to 56% through-wall. This study has shown the effectiveness of ultrasonic examinations of Alloy 82/182 overlaid DMW specimens. Phased-array probes with center frequency in the 0.8- to 1.0-MHz range provide a strong coherent signal but the greater ultrasonic wavelength and larger beam spot size prevent the reliable detection of small flaws. These small flaws had nominal through-wall depths of less than 15% and length in the 50-60 mm (2-2.4 in.) range. Flaws in the 19% and greater through-wall depth range were readily detected with all four probes. At the higher frequencies, the reflected signals are less coherent but still provide adequate signal for flaw detection and characterization. A single inspection at 2.0 MHz could provide adequate detection and sizing information but a supplemental inspection at 1.0 or 1.5 MHz is recommended.

  10. Quality metric for accurate overlay control in <20nm nodes

    NASA Astrophysics Data System (ADS)

    Klein, Dana; Amit, Eran; Cohen, Guy; Amir, Nuriel; Har-Zvi, Michael; Huang, Chin-Chou Kevin; Karur-Shanmugam, Ramkumar; Pierson, Bill; Kato, Cindy; Kurita, Hiroyuki

    2013-04-01

    The semiconductor industry is moving toward 20nm nodes and below. As the Overlay (OVL) budget is getting tighter at these advanced nodes, the importance in the accuracy in each nanometer of OVL error is critical. When process owners select OVL targets and methods for their process, they must do it wisely; otherwise the reported OVL could be inaccurate, resulting in yield loss. The same problem can occur when the target sampling map is chosen incorrectly, consisting of asymmetric targets that will cause biased correctable terms and a corrupted wafer. Total measurement uncertainty (TMU) is the main parameter that process owners use when choosing an OVL target per layer. Going towards the 20nm nodes and below, TMU will not be enough for accurate OVL control. KLA-Tencor has introduced a quality score named `Qmerit' for its imaging based OVL (IBO) targets, which is obtained on the-fly for each OVL measurement point in X & Y. This Qmerit score will enable the process owners to select compatible targets which provide accurate OVL values for their process and thereby improve their yield. Together with K-T Analyzer's ability to detect the symmetric targets across the wafer and within the field, the Archer tools will continue to provide an independent, reliable measurement of OVL error into the next advanced nodes, enabling fabs to manufacture devices that meet their tight OVL error budgets.

  11. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  12. VCSELs with nematic and cholesteric liquid crystal overlays

    NASA Astrophysics Data System (ADS)

    Panajotov, K.; Dems, M.; Belmonte, C.; Thienpont, H.; Xie, Y.; Beeckman, J.; Neyts, K.

    2013-03-01

    We study theoretically the spectral and polarization threshold characteristics of Vertical-Cavity Surface-Emitting Lasers with nematic and cholesteric liquid crystal overlay: LC-VCSELs. In the first case, we demonstrate the possibility of selecting between two orthogonal directions of linear polarization (LP) of the fundamental mode (x or y LP) by choosing appropriate NLC length and to achieve strong polarization discrimination: threshold gain difference as large as several times the threshold gain. We also demonstrate an active control of light polarization by electro-optically tuning the LC director and show that either polarization switching between x and y LP modes or continuous change of the LP direction is possible. For cholesteric LC-VCSEL we show that it becomes a coupled system with different spectral, threshold and polarization characteristics than the ones of the stand-alone VCSEL. Due to the existence of a band gap for circularly polarized light in the liquid crystal, lasing occurs in almost circularly polarized modes at the LC side.

  13. Design of a synthetic vision overlay for UAV autoland monitoring

    NASA Astrophysics Data System (ADS)

    Tadema, Jochum; Theunissen, Eric

    2008-04-01

    For Unmanned Aerial Vehicles (UAVs), autonomous forms of autoland are being pursued that do not depend on special, deployability restraining, ground-based equipment for the generation of the reference path to the runway. Typically, these forms of autoland use runway location data from an onboard database to generate the reference path to the desired location. Synthetic Vision (SV) technology provides the opportunity to use conformally integrated guidance reference data to 'anchor' the goals of such an autoland system into the imagery of the nose-mounted camera. A potential use of this is to support the operator in determining whether the vehicle is flying towards the right location in the real world, e.g., the desired touchdown position on the runway. Standard conformally integrated symbology, representing e.g., the future pathway and runway boundaries, supports conformance monitoring and detection of latent positioning errors. Additional integration of landing performance criteria into the symbology supports assessment of the severity of these errors, further aiding the operator in the decision whether the automated landing should be allowed to continue or not. This paper presents the design and implementation of an SV overlay for UAV autoland procedures that is intended for conformance and integrity monitoring during final approach. It provides preview of mode changes and decision points and it supports the operator in assessing the integrity of the used guidance solution.

  14. Inverse-photoemission study of ordered Cu, Ag, and Au overlayers on Si(111)

    NASA Astrophysics Data System (ADS)

    Nicholls, J. M.; Salvan, F.; Reihl, B.

    1986-12-01

    Si(111)-(7 × 7) surfaces with deposits of noble metals form ordered overlayers after annealing. Coverages in the monolayer range of Ag and Au result in ( 3 × 3)-R30° overlayer structures and for Cu a pseudo "(5 × 5)" structure is produced, while at higher coverage of Au a (6 × 6) overlayer structure is formed. We have studied all four overlayer structures with k-resolved inverse-photoemission spectroscopy and observed strong surface-state emission at ˜ 2.0 eV above the Fermi level for all these surfaces. This emission can hardly be quenched by exposure to oxygen or hydrogen. Hence we attribute it to the local bonding between the metal atoms and the Si(111) surface. In addition we observe an increased spectral intensity near the Fermi level for the two larger unit-cell surfaces, corresponding to the long-range order and a possible onset of metallization.

  15. A comparison of alignment and overlay performance with varying hardmask materials

    NASA Astrophysics Data System (ADS)

    Yun, Sangho; Ha, Soon Mok; Nam, Young Min; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    In recent semiconductor manufacturing, hardmask is unavoidable requirement to further transfer the patterning from thin photoresist to underlayer. While several types of hardmask materials have been investigated, amorphous carbon has been attractive for good etching resistance and high-aspect-ratio resolution. However, it has fatal problem with lowering overlay controllability due to its high extinction coefficient (k). Thus, the correlation of alignment and overlay performance with varying hardmask materials is required to meet a tight overlay budget of 2x nm node and beyond. In this paper, we have investigated the effects of the hardmask materials with respect to the optical properties on the performance of overlay applicable to 2x nm memory devices.

  16. Origin of spurious ultrasonic echoes in stainless steel piping with weld overlay

    SciTech Connect

    Kupperman, D.S.

    1986-08-01

    The initiation and growth of intergranular stress-corrosion cracking (IGSCC) in the heat affected zone (HAZ) of stainless steel reactor piping welds has been a subject of concern to electric utilities for over ten years. This type of crack can be detected with ultrasonic shear waves during normal maintenance periods with a reliability of up to 80%. Often after an inspection indicating cracks, a utility has been allowed to administer a temporary fix to a pipe which is suspected of being cracked. This fix is a weld metal overlay. The repaired pipes often have to be inspected after the overlay has been put on the pipe. The overlay with a complex, elastically anisotropic microstructure, considerably reduces the reliability of the ultrasonic inspection. This paper addresses the problems arising because of the overlay.

  17. Privatization: Will It Go Away?

    ERIC Educational Resources Information Center

    Johnson, Donald R.

    2001-01-01

    Privatization will not go away. As public schools privatize more and more educational services, differences between enrollment in public and private schools will blur. Private corporations can more easily adopt new service-delivery technologies. States and school districts are responding with public-school choice and tuition tax credits. (MLH)

  18. On cooperative and efficient overlay network evolution based on a group selection pattern.

    PubMed

    Wang, Yufeng; Nakao, Akihiro

    2010-06-01

    In overlay networks, the interplay between network structure and dynamics remains largely unexplored. In this paper, we study dynamic coevolution between individual rational strategies (cooperative or defect) and the overlay network structure, that is, the interaction between peer's local rational behaviors and the emergence of the whole network structure. We propose an evolutionary game theory (EGT)-based overlay topology evolution scheme to drive a given overlay into the small-world structure (high global network efficiency and average clustering coefficient). Our contributions are the following threefold: From the viewpoint of peers' local interactions, we explicitly consider the peer's rational behavior and introduce a link-formation game to characterize the social dilemma of forming links in an overlay network. Furthermore, in the evolutionary link-formation phase, we adopt a simple economic process: Each peer keeps one link to a cooperative neighbor in its neighborhood, which can slightly speed up the convergence of cooperation and increase network efficiency; from the viewpoint of the whole network structure, our simulation results show that the EGT-based scheme can drive an arbitrary overlay network into a fully cooperative and efficient small-world structure. Moreover, we compare our scheme with a search-based economic model of network formation and illustrate that our scheme can achieve the experimental and analytical results in the latter model. In addition, we also graphically illustrate the final overlay network structure; finally, based on the group selection model and evolutionary set theory, we theoretically obtain the approximate threshold of cost and draw the conclusion that the small value of the average degree and the large number of the total peers in an overlay network facilitate the evolution of cooperation. PMID:20199937

  19. On cooperative and efficient overlay network evolution based on a group selection pattern.

    PubMed

    Nakao, Akihiro; Wang, Yufeng

    2010-04-01

    In overlay networks, the interplay between network structure and dynamics remains largely unexplored. In this paper, we study dynamic coevolution between individual rational strategies (cooperative or defect) and the overlay network structure, that is, the interaction between peer's local rational behaviors and the emergence of the whole network structure. We propose an evolutionary game theory (EGT)-based overlay topology evolution scheme to drive a given overlay into the small-world structure (high global network efficiency and average clustering coefficient). Our contributions are the following threefold: From the viewpoint of peers' local interactions, we explicitly consider the peer's rational behavior and introduce a link-formation game to characterize the social dilemma of forming links in an overlay network. Furthermore, in the evolutionary link-formation phase, we adopt a simple economic process: Each peer keeps one link to a cooperative neighbor in its neighborhood, which can slightly speed up the convergence of cooperation and increase network efficiency; from the viewpoint of the whole network structure, our simulation results show that the EGT-based scheme can drive an arbitrary overlay network into a fully cooperative and efficient small-world structure. Moreover, we compare our scheme with a search-based economic model of network formation and illustrate that our scheme can achieve the experimental and analytical results in the latter model. In addition, we also graphically illustrate the final overlay network structure; finally, based on the group selection model and evolutionary set theory, we theoretically obtain the approximate threshold of cost and draw the conclusion that the small value of the average degree and the large number of the total peers in an overlay network facilitate the evolution of cooperation. PMID:19726264

  20. Magnetic Proximity Effects between Single-Layer Mn-Doped Titania Nanosheets and Fe Overlayers

    NASA Astrophysics Data System (ADS)

    Saitou, Natsumi; Hirano, Yuki; Sawada, Masahiro; Namatame, Hirofumi; Taniguchi, Masaki; Taniguchi, Takaaki; Matsumoto, Yasumichi; Hara, Masahiro

    2016-03-01

    We have investigated the magnetic behaviors of molecularly thin Mn-doped titanium oxide nanosheets by X-ray magnetic circular dichroism. Mn atoms in single-layer nanosheets showed a weak ferromagnetic order at room temperature. Fe overlayers deposited on the nanosheets induced a magnetic proximity effect on Mn magnetization. We clearly observed an antiferromagnetic coupling between the Fe overlayers and the Mn-doped nanosheets.

  1. Effects of illumination wavelength on the accuracy of optical overlay metrology

    NASA Astrophysics Data System (ADS)

    Han, Jae-Seong; Kim, Hak; Nam, Jeong-Lim; Han, Myung-Soo; Lim, Soon-Kwon; Yanowitz, Shimon D.; Smith, Nigel P.; Smout, Andrew M.

    1997-07-01

    As the integration density in the manufacturing of IC's increases and tighter design rules are implemented, the accuracy of overlay in the photolithography process is becoming all the more important. Consequently, investigation and characterization of the accuracy (as well as precision) of the overlay measurement are being required to insure that the overlay metrology tool qualifies for the new technologies. In this paper, we analyze the relationship between wafer substrate types and the respective characteristic overlay measurement errors associated with them. We compare results using different illumination wavelengths in the overlay tool. We define the Wafer Induced Shift (WIS) contribution to the measurement accuracy error and introduce a metric for it. And we analyze the relationship between the TIS and WIS. We show that the wavelength of the optical overlay measurement (OL, for short) should be fitted separately to each of the various kinds of overlay measurement targets, or marks. Buried type targets, covered by transparent materials, for which the measurement is made through the transparent interlayer, benefit from wavelength selection due to the possible improvement in contrast associated with an interference effect. Open type targets, on the other hand, in which the measurement signal is collected off the substrate shape itself, do not benefit from that. There is another problem to consider, however. Such targets may show a considerable WIS, even thought TIS and precision are good both before and after etch. The WIS error can be as high as 100 nm. This could create serious OL problem and it means that TIS and precision are not enough to characterize the quality of measurement, and WIS is equally important, it not more so. We look into the causes of WIS in the substrate shape, overlay mark design and fabrication method. We show that with careful selection of illumination wavelength, some layers produce no WIS. On the other layers WIS remains a problem and other methods are still required to control it.

  2. Live 3D image overlay for arterial duct closure with Amplatzer Duct Occluder II additional size.

    PubMed

    Goreczny, Sebstian; Morgan, Gareth J; Dryzek, Pawel

    2016-03-01

    Despite several reports describing echocardiography for the guidance of ductal closure, two-dimensional angiography remains the mainstay imaging tool; three-dimensional rotational angiography has the potential to overcome some of the drawbacks of standard angiography, and reconstructed image overlay provides reliable guidance for device placement. We describe arterial duct closure solely from venous approach guided by live three-dimensional image overlay. PMID:26358032

  3. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign private issuers offered pursuant to certain types of transactions. 239.33 Section 239.33 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER...

  4. Security sonar for water intakes

    SciTech Connect

    Rothenbuhler, D.E.

    1987-07-01

    The security of the water approaches to nuclear facilities has been largely neglected because of the lack of solutions to the intrusion problem. This paper reviews underwater scanning sonar in general, highlights a number of problems encountered in a threat detection system using sonar and suggests some procedures that can help make such a system workable. Information is drawn from recent experience with several security projects in the governmental and private sectors, one of which was a nuclear facility.

  5. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    PubMed

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  6. Mix-and-match overlay performance of the NSR-S622D immersion scanner

    NASA Astrophysics Data System (ADS)

    Makino, Katsushi; Kikuchi, Takahisa; Sasamoto, Satoru; Hongki, Park; Mori, Akiko; Takahashi, Nobuyuki; Wakamoto, Shinji

    2013-04-01

    Current technology nodes, as well as subsequent generations necessitate ongoing improvements to the mix-and-match overlay (MMO) capabilities of lithography scanners. This work will introduce newly developed scanner solutions to address this requirement, and performance data from the latest generation immersion scanner, the NSR-S622D, will be introduced. Enhanced MMO accuracy is imperative for the 22 nm half-pitch and future technology nodes. In order for the matched overlay accuracy to approach single machine overlay (SMO) capabilities, MMO errors must be reduced further. The dominant MMO error sources can be divided into three main areas: SMO, lens distortion matching and wafer grid matching. Nikon continues to decrease these matching error contributors over time, and the latest generation NSRS622D immersion scanner provides a number of innovative solutions to satisfy the most demanding overlay matching requirements ; as a result MMO performance within 3nm is achieved on S622D. Moreover, overlay master system is developed for further product overlay accuracy and stability improvement.

  7. Application Oriented Flow Routing Algorithm for VoIP Overlay Networks

    NASA Astrophysics Data System (ADS)

    Wipusitwarakun, Komwut; Chimmanee, Sanon

    Overlay networks which are dynamically created over underlying IP networks are becoming widely used for delivering multimedia contents since they can provide several additional user-definable services. Multiple overlay paths between a source-destination overlay node pair are designed to improve service robustness against failures and bandwidth fluctuation of the underlying networks. Multimedia traffic can be distributed over those multiple paths in order to maximize paths' utilization and to increase application throughputs. Most of flow-based routing algorithms consider only common metrics such as paths' bandwidth or delay, which may be effective for data applications but not for real-time applications such as Voice over IP (VoIP), in which different levels of such performance metrics may give the same level of the performance experienced by end users. This paper focuses on such VoIP overlay networks and proposes a novel alternative path based flow routing algorithm using an application-specific traffic metric, i.e. “VoIP Path Capacity (VPCap), ” to calculate the maximum number of QoS satisfied VoIP flows which may be distributed over each available overlay path at a moment. The simulation results proved that more QoS-satisfied VoIP sessions can be established over the same multiple overlay paths, comparing to traditional approaches.

  8. Hot cracking susceptibility of Alloy 52M weld overlays onto CF8 stainless steel

    NASA Astrophysics Data System (ADS)

    Chu, H. A.; Young, M. C.; Chu, H. C.; Tsay, L. W.; Chen, C.

    2013-02-01

    In this study, weld overlays of Alloy 52M (a nickel-based filler metal) onto CF8 stainless steel (SS) were performed using the gas tungsten arc welding process. Hot cracking in the weld overlays was observed particularly near the interfacial region of the Alloy 52M/CF8 weld overlay. In general, the hot cracks were most likely to occur at the sites with high dilution rates, e.g., at the weld start/end locations of a single pass or in the first and second passes in multi-pass overlays. The region near the weld interface between Alloy 52M and the CF8 SS had a higher hot cracking tendency than the other regions. It was found that the dilution rate and the formation of eutectic-type constituents (i.e., γ/NbC) both played significant roles in the determination of the hot cracking susceptibility of these weld overlays. Nevertheless, hot cracks were entirely eliminated by proper deposition of a SS buffer layer prior to overlaying with Alloy 52M.

  9. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    SciTech Connect

    Beushausen, Hans Chilwesa, Masuzyo

    2013-11-15

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking.

  10. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast

    PubMed Central

    Gu, Weidong; Zhang, Xinchang; Gong, Bin; Zhang, Wei; Wang, Lu

    2015-01-01

    Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member’s departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs), i.e., multicast VMs (MVMs) and compensation VMs (CVMs). MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD), and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast). The results show that it can obviously enhance the stability of the data distribution. PMID:26562152

  11. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  12. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  13. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  14. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  15. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  16. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  17. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  18. 33 CFR 66.05-100 - Designation of navigable waters as State waters for private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... as State waters for private aids to navigation. 66.05-100 Section 66.05-100 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-100 Designation of navigable waters as State waters for private aids...

  19. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  20. 33 CFR 66.05-10 - State waters for private aids to navigation; designations; revisions, and revocations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false State waters for private aids to... Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION State Aids to Navigation § 66.05-10 State waters for private aids to navigation; designations; revisions,...

  1. 21 CFR 1311.30 - Requirements for storing and using a private key for digitally signing orders.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for storing and using a private key... Digital Certificates for Electronic Orders § 1311.30 Requirements for storing and using a private key for... and private key. (b) The certificate holder must provide FIPS-approved secure storage for the...

  2. Security Evolution.

    ERIC Educational Resources Information Center

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  3. Peruvian projects, privatization proceeding

    SciTech Connect

    Not Available

    1992-10-19

    This paper reports that Petroleos del Peru is forging ahead on several fronts despite Peru's political turmoil and uncertainty over where government ordered-privatization will take it. The state oil company: is expected to sign contract soon related to development of Chambira oil field in the northern jungle; let contract to a group of Peruvian and Brazilian companies for construction of an oil terminal at Talara on the Pacific coast; and received expressions of interest in participating in an operating contract on an offshore block operated by its Petromar SA offshore subsidiary under the government's privatization program.

  4. Minimization of total overlay errors on product wafers using an advanced optimization scheme

    NASA Astrophysics Data System (ADS)

    Levinson, Harry J.; Preil, Moshe E.; Lord, Patrick J.

    1997-07-01

    The matching of wafer steppers is accomplished typically by patterning two successive layers, using different steppers of interest for each layer, and measuring the overlay at many points in the exposure field. Matching is considered to be optimized when some metric, such the sum-of-squares of overlay errors, is minimized over all measured points within the field. This is to be contrasted to the situation which arises during the in-line measurement of overlay errors in production, where a far more limited sampling of points is involved. There are several consequences to limited sampling. Adjustable intrafield overlay components, such as magnification, may appear to vary up to several parts-per- million as a consequence of varying chip size. These variations are substantially larger than the normal variations of these components for fixed field sizes, and so have significant consequences for the application of statistical methodologies to the control of overlay components. The width of the distribution of overlay errors across the field may typically increase between 10 to 20 nm (3(sigma) ), with even larger increases in mean shifts, all varying with field size. Reticles may also introduce similar variations, both random and systematic. Reticle beam-writer errors lead to systematic intrafield errors, particularly asymmetric field magnification and field skew. Steppers may compensate for these systematic reticle errors, and step- and-scan systems are more effective at this compensation than step-and-repeat machines. For steppers which have process dependent alignment, this compensation must be determined on products, which leads back to the problems associated with limited sampling. Correction for the overlay errors induced by limited sampling may be accomplished by look-up tables incorporated into the overlay analysis software. For each pair of steppers and each sampling plan, corrections can be applied at each measurement point in order to bring the full field and limited sampling plans into consistency. This will lead to a true minimization of overlay on product and will stabilize statistical process control of overlay components.

  5. Slouching toward Privatization

    ERIC Educational Resources Information Center

    Dickeson, Robert C.; Figuli, David J.

    2007-01-01

    The past two decades have seen a significant shift in the financial model of American higher education, laying groundwork for a transformation that could reshape people's understanding of the academy. The shift--toward increasing degrees of privatization--is unmistakable and has affected every American college and university to varying extents.

  6. A Private Solution.

    ERIC Educational Resources Information Center

    Hardy, Lawrence

    1999-01-01

    Fairfax County (Virginia) Public Schools sends up to 100 high-risk/expelled students yearly to two privately operated Richard Milburn campuses. The cost is $3,500 per student. Although these schools lack typical high-school amenities, kids appreciate getting more teacher attention. Houston has a similar, more costly last-resort program. (MLH)

  7. Slouching toward Privatization

    ERIC Educational Resources Information Center

    Dickeson, Robert C.; Figuli, David J.

    2007-01-01

    The past two decades have seen a significant shift in the financial model of American higher education, laying groundwork for a transformation that could reshape people's understanding of the academy. The shift--toward increasing degrees of privatization--is unmistakable and has affected every American college and university to varying extents.…

  8. Privatization and Educational Choice.

    ERIC Educational Resources Information Center

    Lieberman, Myron

    This book describes how and why educational choice movements will affect public education. It uses a public-choice approach to argue that both the supporters and opponents of private and school choice have failed to address several critical issues. Following an introductory chapter, chapter 2 is devoted to the rationale for contracting out…

  9. Test Today, Privatize Tomorrow

    ERIC Educational Resources Information Center

    Kohn, Alfie

    2004-01-01

    In this article, the author discusses the No Child Left Behind (NCLB)-required testing and privatization in public education. The author points out that the NCLB is not a step in the right direction. It is a deeply damaging, mostly ill-intentioned law, and no one genuinely committed to improving public schools (or to advancing the interests of…

  10. The Private Sector Beckons.

    ERIC Educational Resources Information Center

    Ramsey, Krista

    1998-01-01

    Whether from frustration, ambition, or financial necessity, administrators are inclined to say "yes" when private companies come calling. Sometimes superintendents initiate contacts themselves and begin new careers as well-credentialed salespeople or behind-the-scenes think tanks. At the Edison Project, former superintendents work in curriculum…

  11. Privatizing University Properties.

    ERIC Educational Resources Information Center

    Doctrow, Jerry; And Others

    1996-01-01

    The University of Maryland at College Park has taken an unusual step in turning over management of some student residences (two graduate student apartment complexes) to a private property management firm. The realty group found ways to convert necessary expenditures for property improvement into substantial revenue for the university. Suggestions…

  12. Asphalt overlay design methods for rigid pavements considering rutting, reflection cracking, and fatigue cracking. Research report September 1996--August 1997

    SciTech Connect

    Cho, Y.H.; Liu, C.; Dossey, T.; McCullough, B.F.

    1998-10-01

    An asphalt concrete pavement (ACP) overlay over a rigid pavement represents a viable rehabilitation strategy. It can provide good serviceability at an initial construction cost that is substantially less than that of a rigid overlay rehabilitation. In addition, ACP overlays require less construction time, which can reduce user costs during construction. However, it may not be the most economical solution for long-term rehabilitation. Because of their relatively short service life, ACP overlays may require maintenance sooner than rigid overlays. And one of the more critical distresses that effectively determine the life span of the structure is reflection cracking. This report investigates alternative strategies that seek to prevent reflection cracking on ACP overlays.

  13. Student Experiential Opportunities in National Security Careers

    SciTech Connect

    2007-12-31

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  14. Comparing replacement rates under private and federal retirement systems.

    PubMed

    Martin, Patricia P

    One measure of the adequacy of retirement income is replacement rate - the percentage of pre-retirement salary that is available to a worker in retirement. This article compares salary replacement rates for private-sector employees of medium and large private establishments with those for federal employees under the Civil Service Retirement System and the Federal Employees Retirement System. Because there is no standard benefit formula to represent the variety of formulas available in the private sector, a composite defined benefit formula was developed using the characteristics of plans summarized in the Bureau of Labor Statistics Medium and Large Employer Plan Survey. The resulting "typical" private-sector defined benefit plan, with an accompanying defined contribution plan, was then compared with the two federal systems. The Civil Service Retirement System (CSRS) is a stand-alone defined benefit plan whose participants are not covered by Social Security. Until passage of the 1983 Amendments to Social Security Act, it was the only retirement plan for most federal civilian employees. Provisions of the 1983 Amendments were designed to restore long-term financial stability to the Social Security trust funds. One provision created the Federal Employees Retirement System (FERS), which covers federal employees hired after 1983. It was one of the provisions designed to restore long-term financial stability to the Social Security trust funds. FERS employees contribute to and are covered by Social Security. FERS, which is a defined benefit plan, also includes a basic benefit and a 401(k)-type plan known as the Thrift Savings Plan (TSP). To compare how retirees would fare under the three different retirement systems, benefits of employees retiring at age 65 with 35 years of service were calculated using hypothetical workers with steady earnings. Workers were classified according to a percentage of the average wage in the economy: low earners (45 percent), average earners (100 percent) high earners (160 percent), and maximum earners (earnings at the taxable maximum amount). Overall, this analysis found that: Excluding Social Security benefits and TSP and defined contribution annuities, CSRS retirees have a higher pre-retirement salary replacement rate than either FERS or private-sector retirees. Private-sector retirees, however, have higher replacement rate than their FERS counterparts. Including Social Security benefits but not TSP and defined contribution plan annuities, CSRS retirees who are maximum earners have a higher pre-retirement salary replacement rate (despite receiving no Social Security benefits) than FERS retirees with the same earnings. Private-sector retirees in all earnings categories have a higher replacement rate than federal retirees with the same earnings. Including Social Security and TSP and defined contribution plan annuities, private-sector retirees in all earnings categories have a higher replacement rate than federal retirees, but their rate is close to that of FERS retirees. The rate is higher for FERS retirees than for CSRS retirees in all earnings categories. This analysis shows that replacement creates could exceed 100 percent for FERS employees who contribute who contribute 6 percent of earnings to the TSP over full working career. Private-sector replacement rates were quite similar for those with both a defined benefit and a defined contribution pension plan. Social Security replacement rates make up the highest proportion of benefits for th private sector's lowest income quartile group. The replacement rate for 401(k) plans and the TSP account for a higher proportion of benefits than does Social Security for all other income groups, assuming the absence of a defined benefit plan. PMID:15218632

  15. Private Stimuli, Covert Responses, and Private Events: Conceptual Remarks

    ERIC Educational Resources Information Center

    Tourinho, E. Z.

    2006-01-01

    In this article, I discuss the concepts of "private stimuli," "covert responses," and "private events," emphasizing three aspects: the conditions under which private stimuli may acquire discriminative functions to verbal responses, the conditions of unobservability of covert responses, and the complexity of events or phenomena described as…

  16. 75 FR 62509 - Technical Advisory Committees; Notice of Recruitment of Private-Sector Members

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Technical Advisory Committees; Notice of Recruitment of Private- Sector Members SUMMARY: Seven Technical Advisory Committees (TACs) advise the Department of Commerce on...

  17. 77 FR 2271 - Technical Advisory Committees; Notice of Recruitment of Private-Sector Members

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Technical Advisory Committees; Notice of Recruitment of Private- Sector Members SUMMARY: Seven Technical Advisory Committees (TACs) advise the Department of Commerce on...

  18. 78 FR 5774 - Technical Advisory Committees; Notice of Recruitment of Private-Sector Members

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-28

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Technical Advisory Committees; Notice of Recruitment of Private- Sector Members SUMMARY: Seven Technical Advisory Committees (TACs) advise the Department of Commerce on...

  19. Infrared differential interference contrast microscopy for overlay metrology on 3D-interconnect bonded wafers

    NASA Astrophysics Data System (ADS)

    Ku, Yi-sha; Shyu, Deh-Ming; Lin, Yeou-Sung; Cho, Chia-Hung

    2013-04-01

    Overlay metrology for stacked layers will be playing a key role in bringing 3D IC devices into manufacturing. However, such bonded wafer pairs present a metrology challenge for optical microscopy tools by the opaque nature of silicon. Using infrared microscopy, silicon wafers become transparent to the near-infrared (NIR) wavelengths of the electromagnetic spectrum, enabling metrology at the interface of bonded wafer pairs. Wafers can be bonded face to face (F2F) or face to back (F2B) which the stacking direction is dictated by how the stacks are carried in the process and functionality required. For example, Memory stacks tend to use F2B stacking enables a better managed design. Current commercial tools use single image technique for F2F bonding overlay measurement because depth of focus is sufficient to include both surfaces; and use multiple image techniques for F2B overlay measurement application for the depth of focus is no longer sufficient to include both stacked wafer surfaces. There is a need to specify the Z coordinate or stacking wafer number through the silicon when visiting measurement wafer sites. Two shown images are of the same (X, Y) but separate Z location acquired at focus position of each wafer surface containing overlay marks. Usually the top surface image is bright and clear; however, the bottom surface image is somewhat darker and noisier as an adhesive layer is used in between to bond the silicon wafers. Thus the top and bottom surface images are further processed to achieve similar brightness and noise level before merged for overlay measurement. This paper presents a special overlay measurement technique, using the infrared differential interference contrast (DIC) microscopy technique to measure the F2B wafer bonding overlay by a single shot image. A pair of thinned wafers at 50 and 150 μm thickness is bonded on top of a carrier wafer to evaluate the bonding overlay. It works on the principle of interferometry to gain information about the optical path length of the stacked wafers, to enhance the image contrast of overlay marks features even though they are locating in different Z plane. A two dimensional mirror-symmetric overlay marks for both top and bottom processing wafers is designed and printed in each die in order to know and realize the best achievable wafer to wafer bonding processing. A self-developed analysis algorithms is used to identify the overlay error between the stacking wafers and the interconnect structures. The experimental overlay results after wafer bonding including inter-die and intra-die analysis results will be report in the full paper. Correlation of overlay alignment offset data to electrical yield, provides an early indication of bonded wafer yield.

  20. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  1. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  2. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  3. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  4. 33 CFR 67.35-10 - Private aids to navigation.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Private aids to navigation. 67.35-10 Section 67.35-10 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION AIDS TO NAVIGATION ON ARTIFICIAL ISLANDS AND FIXED STRUCTURES Applications §...

  5. Implementation and benefits of advanced process control for lithography CD and overlay

    NASA Astrophysics Data System (ADS)

    Zavyalova, Lena; Fu, Chong-Cheng; Seligman, Gary S.; Tapp, Perry A.; Pol, Victor

    2003-05-01

    Due to the rapidly reduced imaging process windows and increasingly stingent device overlay requirements, sub-130 nm lithography processes are more severely impacted than ever by systamic fault. Limits on critical dimensions (CD) and overlay capability further challenge the operational effectiveness of a mix-and-match environment using multiple lithography tools, as such mode additionally consumes the available error budgets. Therefore, a focus on advanced process control (APC) methodologies is key to gaining control in the lithographic modules for critical device levels, which in turn translates to accelerated yield learning, achieving time-to-market lead, and ultimately a higher return on investment. This paper describes the implementation and unique challenges of a closed-loop CD and overlay control solution in high voume manufacturing of leading edge devices. A particular emphasis has been placed on developing a flexible APC application capable of managing a wide range of control aspects such as process and tool drifts, single and multiple lot excursions, referential overlay control, 'special lot' handling, advanced model hierarchy, and automatic model seeding. Specific integration cases, including the multiple-reticle complementary phase shift lithography process, are discussed. A continuous improvement in the overlay and CD Cpk performance as well as the rework rate has been observed through the implementation of this system, and the results are studied.

  6. Design and development of a mobile image overlay system for needle interventions

    PubMed Central

    Anand, M.; King, F.; Ungi, T.; Lasso, A.; Rudan, J.; Jayender, J.; Fritz, J.; Carrino, J. A.; Jolesz, F. A.; Fichtinger, G.

    2015-01-01

    Previously, a static and adjustable image overlay systems were proposed for aiding needle interventions. The system was either fixed to a scanner or mounted over a large articulated counterbalanced arm. Certain drawbacks associated with these systems limited the clinical translation. In order to minimize these limitations, we present the mobile image overlay system with the objective of reduced system weight, smaller dimension, and increased tracking accuracy. The design study includes optimal workspace definition, selection of display device, mirror, and laser source. The laser plane alignment, phantom design, image overlay plane calibration, and system accuracy validation methods are discussed. The virtual image is generated by a tablet device and projected into the patient by using a beamsplitter mirror. The viewbox weight (1.0kg) was reduced by 8.2 times and image overlay plane tracking precision (0.21mm, STD=0.05) was improved by 5 times compared to previous system. The automatic self-calibration of the image overlay plane was achieved in two simple steps and can be done away from patient table. The fiducial registration error of the physical phantom to scanned image volume registration was 1.35mm (STD=0.11). The reduced system weight and increased accuracy of optical tracking should enable the system to be hand held by the physician and explore the image volume over the patient for needle interventions. PMID:25571403

  7. Design and development of a mobile image overlay system for needle interventions.

    PubMed

    Anand, M; King, F; Ungi, T; Lasso, A; Rudan, J; Jayender, J; Fritz, J; Carrino, J A; Jolesz, F A; Fichtinger, G

    2014-01-01

    Previously, a static and adjustable image overlay systems were proposed for aiding needle interventions. The system was either fixed to a scanner or mounted over a large articulated counterbalanced arm. Certain drawbacks associated with these systems limited the clinical translation. In order to minimize these limitations, we present the mobile image overlay system with the objective of reduced system weight, smaller dimension, and increased tracking accuracy. The design study includes optimal workspace definition, selection of display device, mirror, and laser source. The laser plane alignment, phantom design, image overlay plane calibration, and system accuracy validation methods are discussed. The virtual image is generated by a tablet device and projected into the patient by using a beamsplitter mirror. The viewbox weight (1.0 kg) was reduced by 8.2 times and image overlay plane tracking precision (0.21 mm, STD = 0.05) was improved by 5 times compared to previous system. The automatic self-calibration of the image overlay plane was achieved in two simple steps and can be done away from patient table. The fiducial registration error of the physical phantom to scanned image volume registration was 1.35 mm (STD = 0.11). The reduced system weight and increased accuracy of optical tracking should enable the system to be hand held by the physician and explore the image volume over the patient for needle interventions. PMID:25571403

  8. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, January 1994--March 1994

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1994-04-21

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterwalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in circulated fluidized beds.

  9. In die mask overlay control for 14nm double-patterning lithography

    NASA Astrophysics Data System (ADS)

    Chou, William; Cheng, James; Tseng, Alex C. P.; Wu, J. K.; Chang, Chin Kuei; Cheng, Jeffrey; Lee, Adder; Huang, Chain Ting; Peng, N. T.; Hsu, Simon C. C.; Yu, Chun Chi; Lu, Colbert; Yu, Julia; Craig, Peter; Pollock, Chuck; Ham, Young; McMurran, Jeff

    2015-10-01

    According to the ITRS roadmap, semiconductor industry drives the 193nm lithography to its limits, using techniques like Double Pattern Technology (DPT), Source Mask Optimization (SMO) and Inverse Lithography Technology (ILT). In terms of considering the photomask metrology, full in-die measurement capability is required for registration and overlay control with challenging specifications for repeatability and accuracy. Double patterning using 193nm immersion lithography has been adapted as the solution to enable 14nm technology nodes. The overlay control is one of the key figures for the successful realization of this technology. In addition to the various error contributions from the wafer scanner, the reticles play an important role in terms of considering lithographic process contributed errors. Accurate pattern placement of the features on reticles with a registration error below 4nm is mandatory to keep overall photomask contributions to overlay of sub 20nm logic within the allowed error budget. In this paper, we show in-die registration errors using 14nm DPT product masks, by measuring in-die overlay patterns comparing with regular registration patterns. The mask measurements are used to obtain an accurate model to predict mask contribution on wafer overlay of double patterning technology.

  10. Building multiservice Internet protocol virtual private networks

    NASA Astrophysics Data System (ADS)

    Cheung, William

    1999-11-01

    Multiservice Internet Protocol-based Virtual Private Networks (MIP- VPNs) with Quality of Service (QoS) are becoming a reality due to the availability of new standards from the Internet Engineering Task Force (IETF). This paper describes how components including security models, IP tunneling protocols, and service differentiation schemes fit together in order to construct such a VPN. First, the concept and rationale of VPN is presented, followed by a discussion of its supporting components. A comparison is made among the various VPN technologies.

  11. 75 FR 22545 - Safety Zone; Private Fireworks, Wilson Creek, Gloucester, VA

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    ... FR 3316). Public Meeting We do not now plan to hold a public meeting. But you may submit a request... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Private Fireworks, Wilson Creek, Gloucester... establishing a safety zone on Wilson Creek in the vicinity of Gloucester, VA in support of a private...

  12. 31 CFR 1023.620 - Due diligence programs for private banking accounts.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Due diligence programs for private banking accounts. 1023.620 Section 1023.620 Money and Finance: Treasury Regulations Relating to Money and... Dealers in Securities § 1023.620 Due diligence programs for private banking accounts. (a) Refer to §...

  13. 76 FR 80971 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-27

    ...In accordance with the Federal Advisory Committee Act (5 U.S.C. app 2) and implementing regulation 41 CFR 101-6, announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss the matters relating to the Classified National Security Information Program for State, Local, Tribal, and Private Sector...

  14. 77 FR 41204 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-12

    ...In accordance with the Federal Advisory Committee Act (5 U.S.C. app 2) and implementing regulation 41 CFR 101-6, announcement is made for the committee meeting of the State, Local, Tribal, and Private Sector Policy Advisory Committee. To discuss the matters relating to the Classified National Security Information Program for State, Local, Tribal, and Private Sector...

  15. 76 FR 46626 - Safety Zone; Discovery World Private Wedding Firework Displays, Milwaukee, WI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-03

    ... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Discovery World Private Wedding Firework... contrary to the public interest. Background and Purpose The Discovery World Private Wedding fireworks are a... will encompass all waters of Milwaukee Harbor in the vicinity of the Discovery World pier in...

  16. Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-06-01

    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.

  17. The private Higgs

    NASA Astrophysics Data System (ADS)

    Porto, Rafael A.; Zee, A.

    2008-09-01

    We introduce Higgs democracy in the Yukawa sector by constructing a model with a private Higgs and a dark scalar for each fermion thus addressing the large hierarchy among fermion masses. The model has interesting implications for the LHC, while the Standard Model phenomenology is recovered at low energies. We discuss some phenomenological implications such as FCNC, new Higgses at the TeV scale and dark matter candidates.

  18. Apaches push privatization

    SciTech Connect

    Daniels, S.

    1994-03-07

    Trying to drum up business for what would be the first private temporary storage facility for spent nuclear fuel rods, the Mescalero Apaches are inviting officials of 30 utilities to convene March 10 at the tribe`s New Mexico reservation. The state public utilities commission will also attend the meeting, which grew from an agreement the tribe signed last month with Minneapolis-based Northern States Power Co.

  19. 24 CFR 882.414 - Security and utility deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security and utility deposits. 882... Moderate Rehabilitation-Basic Policies § 882.414 Security and utility deposits. (a) If at the time of the... security deposits and utility deposits from its resources and/or other public or private sources. (b) If...

  20. 12 CFR 220.103 - Borrowing of securities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the provision even though the lender is a private individual, and this is true whether the security is... delivery of such securities in the case of short sales, failure to receive securities he is required to deliver, or other similar cases”. The present language of the provision does not require that the...

  1. 12 CFR 220.103 - Borrowing of securities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the provision even though the lender is a private individual, and this is true whether the security is... delivery of such securities in the case of short sales, failure to receive securities he is required to deliver, or other similar cases”. The present language of the provision does not require that the...

  2. 12 CFR 220.103 - Borrowing of securities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the provision even though the lender is a private individual, and this is true whether the security is... delivery of such securities in the case of short sales, failure to receive securities he is required to deliver, or other similar cases”. The present language of the provision does not require that the...

  3. Study of behaviors of aluminum overlayers deposited on uranium via AES, EELS, and XPS

    NASA Astrophysics Data System (ADS)

    Liu, Kezhao; Luo, Lizhu; Zhou, Wei; Yang, Jiangrong; Xiao, Hong; Hong, Zhanglian; Yang, Hui

    2013-04-01

    Aluminum overlayers on uranium were prepared by sputtering at room temperature in an ultra-high vacuum chamber. The growth mode of aluminum overlayers and behaviors of the Al/U interface reaction were studied in situ by auger electron spectroscopy, electron energy loss spectroscopy, and X-ray photoelectron spectroscopy. The results suggested that the interdiffusion took place at the Al/U interface during the initial stage of deposition. The U4f spectra of the Al/U interface showed strong correlation satellites at binding energies of 380.4 and 392.7 eV and plasma loss features at 404.2 eV, respectively. The interactions between aluminum and uranium yielded the intermetallic compound of UAlx, inducing the shift to a low binding energy for Al2p peaks. The results indicated that aluminum overlayers were formed on the uranium by sputtering in an island growth mode.

  4. Dynamics of a metal overlayer on metallic substrates: High temperature effects

    SciTech Connect

    Rahman, T.S.; Black, J.E.; Tian, Zeng Ju

    1992-12-31

    We have explored the structure and the dynamics of a bimetallic system consisting of a hexagonal (almost) overlayer of Ag on a square lattice (Ni(100) and Cu(100)), as a function of the surface temperature. In each case the structure is ``nearly`` incommensurate giving rise to a low frequency Goldstone mode. Also, the overlayer atoms slosh back and forth over the substrate in a corrugated fashion. The calculated dispersion of the Ag/metal vertical mode, at room temperature, is in excellent agreement with experimental data. At higher temperatures floater atoms appear on top of the overlayer displaying a variety of cluster formations and also exchanges with the substrate atoms leading to surface disordering, interdiffusion and melting.

  5. Dynamics of a metal overlayer on metallic substrates: High temperature effects

    SciTech Connect

    Rahman, T.S. ); Black, J.E.; Tian, Zeng Ju . Dept. of Physics)

    1992-01-01

    We have explored the structure and the dynamics of a bimetallic system consisting of a hexagonal (almost) overlayer of Ag on a square lattice (Ni(100) and Cu(100)), as a function of the surface temperature. In each case the structure is nearly'' incommensurate giving rise to a low frequency Goldstone mode. Also, the overlayer atoms slosh back and forth over the substrate in a corrugated fashion. The calculated dispersion of the Ag/metal vertical mode, at room temperature, is in excellent agreement with experimental data. At higher temperatures floater atoms appear on top of the overlayer displaying a variety of cluster formations and also exchanges with the substrate atoms leading to surface disordering, interdiffusion and melting.

  6. Practical Process Applications Of A Commercially Available Electrical Overlay And Linewidth Measuring System

    NASA Astrophysics Data System (ADS)

    Keller, Gerald A.

    1985-07-01

    This paper deals with characterization of a pilot line photo process using an electrical linewidth measurement system.* A functional process for set up of the system is described, as well as the test structures used. Evaluations conducted include overlay stability of a Perkin-Elmer 542 and adjustment, overlay of a Perkin-Elmer 542 to three Perkin-Elmer 240s, overlay to a Perkin-Elmer 542 in another wafer fab, a daily linewidth evaluation on a Perkin-Elmer 542, and a comparison study of the electrical prober to other types of linewidth measuring systems. It will be shown that this tool, with precision in the .001 pm range (3 Q) is capable of providing correlation data for other types of quick feedback, smaller data base systems for linewidth measurement, as well as providing a data base for the proper evaluation of photolithographic processing.

  7. Weld overlay coatings for erosion control. Task A: Literature review, progress report

    SciTech Connect

    Levin, B.; DuPont, J.N.; Marder, A.R.

    1993-03-03

    A literature review was made. In spite of similarities between abrasive wear and solid particle erosion, weld overlay hardfacing alloys that exhibit high abrasion resistance may not necessarily have good erosion resistance. The performance of weld overlay hardfacing alloys in erosive environments has not been studied in detail. It is believed that primary-solidified hard phases such as carbides and intermetallic compounds have a strong influence on erosion resistance of weld overlay hardfacing alloys. However, relationships between size, shape, and volume fraction of hard phases in a hardfacing alloys and erosion resistance were not established. Almost all hardfacing alloys can be separated into two major groups based upon chemical compositions of the primary solidified hard phases: (a) carbide hardening alloys (Co-base/carbide, WC-Co and some Fe base superalloys); and (b) intermetallic hardening alloys (Ni-base alloys, austenitic steels, iron-aluminides).

  8. 40-Gb/s FSK modulated WDM-PON with variable-rate multicast overlay.

    PubMed

    Xin, Xiangjun; Liu, Bo; Zhang, Lijia; Yu, Jianjun

    2011-06-20

    This paper proposes a novel conjugate-driven frequency shift keying (FSK) modulated wavelength division multiplexing passive network (WDM-PON) with variable-rate multicast services. Optical orthogonal frequency division multiplexing (OFDM) is adopted for multicast overlay services with different rate requirements. A differential detection is used for the demodulation of FSK signal, which can eliminate the crosstalk from the OFDM signal. A total 40-Gb/s FSK point to point (P2P) signal and 6.3-Gb/s OFDM overlay with three kinds of variable-rate multicast services are experimentally demonstrated. A physical-layer adaptive identification is proposed for the variable-rate multicast services. After 25 km single mode fiber (SMF) transmission, the power penalties of FSK P2P signal and OFDM multicast overlay are 1.3 dB and 1.7 dB respectively. PMID:21716492

  9. Intermittent-contact scanning capacitance microscopy imaging and modeling for overlay metrology

    SciTech Connect

    Mayo, S.; Kopanski, J. J.; Guthrie, W. F.

    1998-11-24

    Overlay measurements of the relative alignment between sequential layers are one of the most critical issues for integrated circuit (IC) lithography. We have implemented on an AFM platform a new intermittent-contact scanning capacitance microscopy (IC-SCM) mode that is sensitive to the tip proximity to an IC interconnect, thus making it possible to image conductive structures buried under planarized dielectric layers. Such measurements can be used to measure IC metal-to-resist lithography overlay. The AFM conductive cantilever probe oscillating in a vertical plane was driven at frequency {omega}, below resonance. By measuring the tip-to-sample capacitance, the SCM signal is obtained as the difference in capacitance, {delta}C({omega}), at the amplitude extremes. Imaging of metallization structures was obtained with a bars-in-bars aluminum structure embedded in a planarized dielectric layer 1 {mu}m thick. We have also modeled, with a two-dimensional (2D) electrostatic field simulator, IC-SCM overlay data of a metallization structure buried under a planarized dielectric having a patterned photoresist layer deposited on it. This structure, which simulates the metal-to-resist overlay between sequential IC levels, allows characterization of the technique sensitivity. The capacitance profile across identical size electrically isolated or grounded metal lines embedded in a dielectric was shown to be different. The floating line shows capacitance enhancement at the line edges, with a minimum at the line center. The grounded line shows a single capacitance maximum located at the line center, with no edge enhancement. For identical line dimensions, the capacitance is significantly larger for grounded lines making them easier to image. A nonlinear regression algorithm was developed to extract line center and overlay parameters with approximately 3 nm resolution at the 95% confidence level, showing the potential of this technique for sub-micrometer critical dimension metrology. Symmetric test structures contribute to facilitate overlay data extraction.

  10. Computer Security and the Data Encryption Standard. Proceedings of the Conference on Computer Security and the Data Encryption Standard.

    ERIC Educational Resources Information Center

    Branstad, Dennis K., Ed.

    The 15 papers and summaries of presentations in this collection provide technical information and guidance offered by representatives from federal agencies and private industry. Topics discussed include physical security, risk assessment, software security, computer network security, and applications and implementation of the Data Encryption…

  11. A Spatial Overlay Ranking Method for a Geospatial Search of Text Objects

    USGS Publications Warehouse

    Lanfear, Kenneth J.

    2006-01-01

    Earth-science researchers need the capability to find relevant information by location and topic. Conventional geographic techniques that simply check whether polygons intersect can efficiently achieve a high recall on location, but can not achieve precision for ranking results in likely order of importance to the reader. A spatial overlay ranking based upon how well an object's footprint matches the search area provides a more effective way to spatially search a collection of reports, and avoids many of the problems associated with an 'in/out' (True/False) boolean search. Moreover, spatial overlay ranking appears to work well even when spatial extent is defined only by a simple bounding box.

  12. A safety evaluation for overlay disbonding of high-temperature and pressure vessels

    SciTech Connect

    Horita, Ryuichi; Nakajima; Hiroyuki; Tanaka, Kazunori; Murakami, Shunzo; Fujii, Tadaomi

    1995-11-01

    Hydrogen induced disbonding test (autoclave test) of stainless weld-overlaid 2-1/4Cr-1Mo and 2-1/4Cr-1Mo-1/4V steel, and the calculations of residual hydrogen contents at the fusion boundary in the specimens and actual vessels, were performed. The effects of microstructure of weld overlay near the fusion boundary and postweld heat treatment on disbonding resistance were clarified, and critical hydrogen content values in weld overlay to prevent disbonding were obtained. A simple evaluation method for disbonding in actual vessels using Tempering Parameter was established.

  13. Scalable Tool Infrastructure for the Cray XT Using Tree-Based Overlay Networks

    SciTech Connect

    Roth, Philip C; Vetter, Jeffrey S

    2009-01-01

    Performance, debugging, and administration tools are critical for the effective use of parallel computing platforms, but traditional tools have failed to overcome several problems that limit their scalability, such as communication between a large number of tool processes and the management and processing of the volume of data generated on a large number of compute nodes. A tree-based overlay network has proven effective for overcoming these challenges. In this paper, we present our experiences in bringing our MRNet tree-based overlay network infrastructure to the Cray XT platform, including a description of proof-of-concept tools that use MRNet on the Cray XT.

  14. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    SciTech Connect

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-21

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of synchronization on the printing registration was verified experimentally using gravure offset printing. The variations in synchronization result in the differences in the MD scale, and the measured MD scale matches exactly with the modeled MD scale.

  15. Investigation on synchronization of the offset printing process for fine patterning and precision overlay

    NASA Astrophysics Data System (ADS)

    Kang, Dongwoo; Lee, Eonseok; Kim, Hyunchang; Choi, Young-Man; Lee, Seunghyun; Kim, Inyoung; Yoon, Dukkyun; Jo, Jeongdai; Kim, Bongmin; Lee, Taik-Min

    2014-06-01

    Offset printing processes are promising candidates for producing printed electronics due to their capacity for fine patterning and suitability for mass production. To print high-resolution patterns with good overlay using offset printing, the velocities of two contact surfaces, which ink is transferred between, should be synchronized perfectly. However, an exact velocity of the contact surfaces is unknown due to several imperfections, including tolerances, blanket swelling, and velocity ripple, which prevents the system from being operated in the synchronized condition. In this paper, a novel method of measurement based on the sticking model of friction force was proposed to determine the best synchronized condition, i.e., the condition in which the rate of synchronization error is minimized. It was verified by experiment that the friction force can accurately represent the rate of synchronization error. Based on the measurement results of the synchronization error, the allowable margin of synchronization error when printing high-resolution patterns was investigated experimentally using reverse offset printing. There is a region where the patterning performance is unchanged even though the synchronization error is varied, and this may be viewed as indirect evidence that printability performance is secured when there is no slip at the contact interface. To understand what happens at the contact surfaces during ink transfer, the deformation model of the blanket's surface was developed. The model estimates how much deformation on the blanket's surface can be borne by the synchronization error when there is no slip at the contact interface. In addition, the model shows that the synchronization error results in scale variation in the machine direction (MD), which means that the printing registration in the MD can be adjusted actively by controlling the synchronization if there is a sufficient margin of synchronization error to guarantee printability. The effect of synchronization on the printing registration was verified experimentally using gravure offset printing. The variations in synchronization result in the differences in the MD scale, and the measured MD scale matches exactly with the modeled MD scale.

  16. Security Equipment and Systems Certification Program (SESCP)

    SciTech Connect

    Steele, B.J.; Papier, I.I.

    1996-06-20

    Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

  17. Cryptographic Securities Exchanges

    NASA Astrophysics Data System (ADS)

    Thorpe, Christopher; Parkes, David C.

    While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their own information. Traders exploit both the private information in upstairs markets used to trade large orders outside traditional exchanges and the public information present in exchanges' quoted limit order books. Using homomorphic cryptographic protocols, market designers can create "partially transparent" markets in which every matched trade is provably correct and only beneficial information is revealed. In a cryptographic securities exchange, market operators can hide information to prevent its exploitation, and still prove facts about the hidden information such as bid/ask spread or market depth.

  18. Robust Quantum Private Queries

    NASA Astrophysics Data System (ADS)

    Wang, Tian-Yin; Wang, Shu-Yu; Ma, Jian-Feng

    2016-02-01

    We propose a new quantum private query protocol with the technique of decoherence-free states, which is a theoretical study of how decoherence-free states can be used for the protection of quantum information in such a protocol. This protocol can solve the noise problem that will make the user obtain a wrong answer and hence give rise to a bad influence on the reputation of the database provider. Furthermore, this protocol is also flexible, loss-resistant and easily generalized to a large database similar to the previous works.

  19. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... CFR Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO... under the Securities Act of 1933 of securities of certain foreign private issuers offered pursuant to... private issuers offered pursuant to certain types of transactions. This instruction set forth...

  20. C-arm Cone Beam Computed Tomographic Needle Path Overlay for Fluoroscopic-Guided Placement of Translumbar Central Venous Catheters

    SciTech Connect

    Tam, Alda; Mohamed, Ashraf; Pfister, Marcus; Rohm, Esther; Wallace, Michael J.

    2009-07-15

    C-arm cone beam computed tomography is an advanced 3D imaging technology that is currently available on state-of-the-art flat-panel-based angiography systems. The overlay of cross-sectional imaging information can now be integrated with real-time fluoroscopy. This overlay technology was used to guide the placement of three percutaneous translumbar inferior vena cava catheters.

  1. Evaluation of Iron Aluminide Weld Overlays for Erosion-Corrosion Resistant Boiler Tube Coatings in Low NOx Boilers

    SciTech Connect

    Regina, J.R.; Lim, M.; Barbosa, N., DuPont, J.N.; Marder, A.R.

    2000-04-28

    Iron aluminide weld overlays containing ternary additions and thermal spray coatings are being investigated for corrosion protection of boiler tubes in Low NO{sub x} burners. The primary objective of the research is to identify overlay and thermal spray compositions that provide corrosion protection of waterwall boiler tubes.

  2. 78 FR 41959 - State, Local, Tribal, and Private Sector Policy Advisory Committee (SLTPS-PAC); Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-12

    ... RECORDS ADMINISTRATION Information Security Oversight Office State, Local, Tribal, and Private Sector... 20408. Purpose: To discuss the matters relating to the Classified National Security Information Program... Information Security Oversight Office (ISOO) no later than Friday, July 19, 2013. ISOO will provide...

  3. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the…

  4. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions affected--perhaps the

  5. Disbond detection with piezoelectric wafer active sensors in RC structures strengthened with FRP composite overlays

    NASA Astrophysics Data System (ADS)

    Giurgiutiu, Victor; Harries, Kent; Petrou, Michael; Bost, Joel; Quattlebaum, Josh B.

    2003-12-01

    The capability of embedded piezoelectric wafer active sensors (PWAS) to perform in-situ nondestructive evaluation (NDE) for structural health monitoring (SHM) of reinforced concrete (RC) structures strengthened with fiber reinforced polymer (FRP) composite overlays is explored. First, the disbond detection method were developed on coupon specimens consisting of concrete blocks covered with an FRP composite layer. It was found that the presence of a disbond crack drastically changes the electromechanical (E/M) impedance spectrum measured at the PWAS terminals. The spectral changes depend on the distance between the PWAS and the crack tip. Second, large scale experiments were conducted on a RC beam strengthened with carbon fiber reinforced polymer (CFRP) composite overlay. The beam was subject to an accelerated fatigue load regime in a three-point bending configuration up to a total of 807,415 cycles. During these fatigue tests, the CFRP overlay experienced disbonding beginning at about 500,000 cycles. The PWAS were able to detect the disbonding before it could be reliably seen by visual inspection. Good correlation between the PWAS readings and the position and extent of disbond damage was observed. These preliminary results demonstrate the potential of PWAS technology for SHM of RC structures strengthened with FRP composite overlays.

  6. Posterior open occlusion management by registration of overlay removable partial denture: A clinical report.

    PubMed

    Nosouhian, Saeid; Davoudi, Amin; Derhami, Mohammad

    2015-01-01

    This clinical report describes prosthetic rehabilitation of posterior open bite relationship in a patient with several missing teeth and skeletal Class III malocclusion. Primary diagnostic esthetic evaluations were performed by mounting casts in centric relation and estimating lost vertical dimension of occlusion. Exclusive treatments were designated by applying overlay removable partial denture with external attachment systems for higher retentions. PMID:26929544

  7. Semantic Overlays in Educational Content Networks--The hylOs Approach

    ERIC Educational Resources Information Center

    Engelhardt, Michael; Hildebrand, Arne; Lange, Dagmar; Schmidt, Thomas C.

    2006-01-01

    Purpose: The paper aims to introduce an educational content management system, Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.

  8. Fluorogenic membrane overlays to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and seawater

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Three assays were developed to enumerate total coliforms, Escherichia coli, and total Vibrionaceae in shellfish and other foods and in seawater and other environmental samples. Assays involve membrane overlays of overnight colonies on non-selective agar plates to detect ß-glucuronidase and lysyl am...

  9. Frenkel-Kontorova Model of the Dimerized Overlayer System with Vacancies

    NASA Astrophysics Data System (ADS)

    Xu, Hai-Bo; Wang, Guang-Rui; Chen, Shi-Gang

    2000-09-01

    The reconstruction of the dimerized overlayer system with vacancies is studied via a diatomic chain Frenkel-Kontorova model. We present the details of the exactly solvable model and the analytical solution of the atomic displacements in the ground state. Our calculations explain the 2 × N reconstruction observed in Ge/Si(100) and Ga/Si(112).

  10. Assessing the Crossdisciplinarity of Technology-Enhanced Learning with Science Overlay Maps and Diversity Measures

    ERIC Educational Resources Information Center

    Kalz, Marco; Specht, Marcus

    2014-01-01

    This paper deals with the assessment of the crossdisciplinarity of technology-enhanced learning (TEL). Based on a general discussion of the concept interdisciplinarity and a summary of the discussion in the field, two empirical methods from scientometrics are introduced and applied. Science overlay maps and the Rao-Stirling diversity index are…

  11. Semantic Overlays in Educational Content Networks--The hylOs Approach

    ERIC Educational Resources Information Center

    Engelhardt, Michael; Hildebrand, Arne; Lange, Dagmar; Schmidt, Thomas C.

    2006-01-01

    Purpose: The paper aims to introduce an educational content management system, Hypermedia Learning Objects System (hylOs), which is fully compliant to the IEEE LOM eLearning object metadata standard. Enabled through an advanced authoring toolset, hylOs allows the definition of instructional overlays of a given eLearning object mesh.…

  12. Correlation method based mask to mask overlay metrology for 32nm node and beyond

    NASA Astrophysics Data System (ADS)

    Seidel, D.; Arnz, M.; Beyer, D.

    2011-03-01

    The new photomask registration and overlay metrology system PROVETM at Carl Zeiss has been developed and already delivered to customers to meet the increased industry requirements for pattern registration tools in terms of resolution and in-die measurement capability. Main drivers of the tool performance specifications are double exposure and double patterning approaches which will help to extend the 193nm lithography platforms while keeping the semiconductor industry conform to ITRS roadmap requirements. To guarantee the demanding tool performance, PROVETM features highly stable hardware components for the stage and environmental control. Moreover, sophisticated image analysis algorithms as for instance correlation methods have been developed to overcome limitations of standard approaches. In this paper we focus on mask-to-mask overlay metrology as one of the critical components of modern lithography. To achieve the challenging requirements with the PROVETM tool, an overlay reproducibility budget is prepared that takes into account stage, image analysis and global effects like mask loading and environmental control. The corresponding parts of the budget are quantified by means of PROVETM overlay measurements, performed on typical box-in-frame structures. This allows the identification of critical error contributions and the corresponding improvement strategies. In particular, it will be shown, that the new developed correlation methods of PROVETM will significantly reduce image analysis and camera noise contributions.

  13. A new approach to plane-sweep overlay: topological structuring and line-segment classification

    USGS Publications Warehouse

    van Roessel, Jan W.

    1991-01-01

    An integrated approach to spatial overlay was developed with the objective of creating a single function that can perform most of the tasks now assigned to discrete functions in current systems. Two important components of this system are a unique method for topological structuring, and a method for attribute propagation and line-segment classification. -Author

  14. Impact of the back side flatness of a mask on the panel overlay

    NASA Astrophysics Data System (ADS)

    Kemmochi, Daisuke; Yoshikawa, Yutaka; Iwanaga, Yoshinori; Hirano, Termusa; Kinoshita, Hiroshi

    2015-07-01

    Recently, the annual increase in the definition of high-function panels for mobile devices such as smartphones or tablets has led to TFT-LCD and TFT-OLED (Organic Light Emitting Diode) circuits becoming increasingly miniaturized and densified. TFT circuits are comprised of a superposition of layers such as gates, acts and contact holes, with a certain amount of allowance between each layer. However, that allowance has now disappeared due to the high density of the circuit. Therefore, a high-precision mask overlay is essential in order to realize circuits with even higher density. In the mask manufacturing process, the mask is placed on a writer tool, during which the back side surface of the mask makes contact with the stage. This contact alters the front side flatness of the mask. Moreover, once the circuit pattern has been drawn on the mask, it is removed from the writer tool, thus altering the front side flatness and coordinates of the mask. In this paper, we evaluated the overlay of a panel that underwent exposure using a number of masks with different back side flatness. As a result, we confirmed that deviations in the back side flatness of each mask manifest themselves in the panel overlay. Therefore, we need to improve the flatness of the back side of masks hereafter in order to further enhance the panel overlay.

  15. Robotic weld overlay coatings for erosion control. Final technical progress report, July 1992--July 1995

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1995-10-15

    The erosion behavior of weld overlay coatings has been studied. Eleven weld overlay alloys were deposited on 1018 steel substrates using the plasma arc welding process and erosion tested at 400{degrees}C at 90{degrees} and 30{degrees} particle impact angles. The microstructure of each coating was characterized before erosion testing. A relative ranking of the coatings erosion resistance was developed by determining the steady state erosion rates. Ultimet, Inconel-625, and 316L SS coatings showed the best erosion resistance at both impact angles. It was found that weld overlays that exhibit good abrasion resistance did not show good erosion resistance. Erosion tests were also performed for selected wrought materials with chemical composition similar to weld overlays. Eroded surfaces of the wrought and weld alloys were examined by Scanning Electron Microscopy (SEM). Microhardness tests were performed on the eroded samples below the erosion surface to determine size of the plastically deformed region. It was found that one group of coatings experienced significant plastic deformation as a result of erosion while the other did not. It was also established that, in the steady state erosion regime, the size of the plastically deformed region is constant.

  16. Arbitration Intervention Worker (AIW) Services: Case Management Overlay in a Juvenile Diversion Program

    ERIC Educational Resources Information Center

    Poythress, Norman G.; Dembo, Richard; DuDell, Gary; Wareham, Jennifer

    2006-01-01

    In this issue we describe a clinical trials study of the impact of adding specific case manager overlay services to "treatment as usual" services for youths in a Juvenile Arbitration Program. In this first article we describe the experimental intervention, the Arbitration Intervention Worker (AIW) service, which was provided to a randomly selected…

  17. Private sector involvement in civil space remote sensing. Volume 1: Report

    NASA Technical Reports Server (NTRS)

    1979-01-01

    A survey of private sector developers, users, and interpreters of Earth resources data was conducted in an effort to encourage private investment and participation in remote sensing systems. Results indicate positive interest in participation beyond the current hardware contracting level, however, there is a substantial gap between current market levels and system costs. Issues identified include the selection process for an operating entity, the public/private interface, data collection and access policies, price and profit regulation in a subsidized system, international participation, and the responsibility for research and development. It was agreed that the cost, complexity, and security implications of integrated systems need not be an absolute bar to their private operation.

  18. 17 CFR 240.3b-4 - Definition of “foreign government,” “foreign issuer” and “foreign private issuer”.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities Exchange Act of 1934 Definitions § 240.3b-4 Definition of “foreign government,” “foreign issuer” and “foreign private issuer”. (a) The term...

  19. Practical private database queries based on a quantum-key-distribution protocol

    SciTech Connect

    Jakobi, Markus; Simon, Christoph; Gisin, Nicolas; Bancal, Jean-Daniel; Branciard, Cyril; Walenta, Nino; Zbinden, Hugo

    2011-02-15

    Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions in order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.

  20. High order overlay modeling and APC simulation with Zernike-Legendre polynomials

    NASA Astrophysics Data System (ADS)

    Ju, JawWuk; Kim, MinGyu; Lee, JuHan; Sherwin, Stuart; Hoo, George; Choi, DongSub; Lee, Dohwa; Jeon, Sanghuck; Lee, Kangsan; Tien, David; Pierson, Bill; Robinson, John C.; Levy, Ady; Smith, Mark D.

    2015-03-01

    Feedback control of overlay errors to the scanner is a well-established technique in semiconductor manufacturing [1]. Typically, overlay errors are measured, and then modeled by least-squares fitting to an overlay model. Overlay models are typically Cartesian polynomial functions of position within the wafer (Xw, Yw), and of position within the field (Xf, Yf). The coefficients from the data fit can then be fed back to the scanner to reduce overlay errors in future wafer exposures, usually via a historically weighted moving average. In this study, rather than using the standard Cartesian formulation, we examine overlay models using Zernike polynomials to represent the wafer-level terms, and Legendre polynomials to represent the field-level terms. Zernike and Legendre polynomials can be selected to have the same fitting capability as standard polynomials (e.g., second order in X and Y, or third order in X and Y). However, Zernike polynomials have the additional property of being orthogonal over the unit disk, which makes them appropriate for the wafer-level model, and Legendre polynomials are orthogonal over the unit square, which makes them appropriate for the field-level model. We show several benefits of Zernike/Legendre-based models in this investigation in an Advanced Process Control (APC) simulation using highly-sampled fab data. First, the orthogonality property leads to less interaction between the terms, which makes the lot-to-lot variation in the fitted coefficients smaller than when standard polynomials are used. Second, the fitting process itself is less coupled - fitting to a lower-order model, and then fitting the residuals to a higher order model gives very similar results as fitting all of the terms at once. This property makes fitting techniques such as dual pass or cascading [2] unnecessary, and greatly simplifies the options available for the model recipe. The Zernike/Legendre basis gives overlay performance (mean plus 3 sigma of the residuals) that is the same as standard Cartesian polynomials, but with stability similar to the dual-pass recipe. Finally, we show that these properties are intimately tied to the sample plan on the wafer, and that the model type and sampling must be considered at the same time to demonstrate the benefits of an orthogonal set of functions.

  1. Wastewater privatization: A beneficial alternative

    SciTech Connect

    Wakeman, R.F.; Drewry, W.A.

    1999-07-01

    Municipalities with wastewater operations face increasing requirements to maximize efficiency, implement capital improvements, and ensure environmental compliance. Privatization is a relatively unused alternative offering benefits in the areas of cost-effective operations, flexible financing, technology access, and compliance assurance. Recent executive direction and tax code changes have opened new doors for mutually beneficial public-private partnerships. Wastewater privatization has historically consisted of short-term contract agreements for treatment operations, but looming infrastructure recapitalization and development requirements have catalyzed an exploration of non-traditional alternatives that include private sector financing, development, and operation of entire wastewater systems, The purpose of this paper is to show why privatization must be considered, evaluate the different levels available, and generate an analytical aid for communities taking their first look at privatization opportunities.

  2. 31 CFR 306.86 - Change of name and succession of private organizations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Change of name and succession of... REGULATIONS GOVERNING U.S. SECURITIES Assignments in Behalf of Private or Public Organizations § 306.86 Change..., its securities may be assigned in behalf of the organization in its new name or that of its...

  3. 78 FR 45059 - Safety Zone; Sherman Private Party Fireworks, Lake Michigan, Winnetka, IL

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-26

    .... SUPPLEMENTARY INFORMATION: Table of Acronyms DHS Department of Homeland Security FR Federal Register NPRM Notice... SECURITY Coast Guard 33 CFR Part 165 RIN 1625-AA00 Safety Zone; Sherman Private Party Fireworks, Lake... establishing a temporary safety zone on Lake Michigan near Winnetka, IL. This safety zone is intended...

  4. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... 275.203(m)-1 Section 275.203(m)-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund adviser exemption. (a) United States investment advisers. For purposes of section 203(m) of the Act (15...

  5. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... 275.203(m)-1 Section 275.203(m)-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund adviser exemption. (a) United States investment advisers. For purposes of section 203(m) of the Act (15...

  6. 17 CFR 275.203(m)-1 - Private fund adviser exemption.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... 275.203(m)-1 Section 275.203(m)-1 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) RULES AND REGULATIONS, INVESTMENT ADVISERS ACT OF 1940 § 275.203(m)-1 Private fund adviser exemption. (a) United States investment advisers. For purposes of section 203(m) of the Act (15...

  7. Overlay excursion management through sample plan optimization and cycle time reduction

    NASA Astrophysics Data System (ADS)

    Chen, Xuemei; Hung, Ming-Yeon; Kuo, Kelly; Fu, Steven; Shanthikumar, Geoge; Mao, Zhoujie; Deng, Shiming; Hazari, Viral; Monahan, Kevin M.; Slessor, Mike D.; Lev, Amir

    2003-05-01

    As fabs transition from 200 to 300mm wafers with shrinking design rules, the risk and cost associated with overlay excursions become more severe. This significantly impacts the overall litho-cell efficiency. Effective detection, identification, and reduction of overlay excursions are essential for realizing the productivity and cost benefits of the technology shifts. We have developed a comprehensive overlay excursion management method that encompasses baseline variation analysis, statistical separation and characterization of excursion signatures and their frequencies, as well as selection of sampling plans and control methods that minimize material at risk due to excursion. A novel baseline variance estimation method is developed that takes into account the spatial signature and temporal behavior of the litho-cell overlay correction mechanisms. Spatial and temporal excursion signatures are identified and incorporated in a cost model that estimates the material at risk in an excursion cycle. The material at risk associated with various sampling plans, control charts, and cycle times is assessed considering various lot disposition and routing decisions. These results are then used in determining an optimal sampling and control strategy for effective excursion management. In this paper, we describe and demonstrate the effectiveness of the methods using actual 300mm fab overlay data from several critical layers. With a thorough assessment of the actual baseline and excursion distributions, we quantify the amount of wafer-to-wafer and within-wafer sampling necessary for detecting excursions with minimal material at risk. We also evaluate the impact of shorter cycle time and faster response to excursion, which is made possible through automation and alternative metrology configurations.

  8. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  9. 49 CFR 1580.101 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... private cars, including business/office cars and circus trains, on or connected to the general railroad...) Serves as the primary contact for intelligence information and security-related activities...

  10. Security in Full-Force

    NASA Technical Reports Server (NTRS)

    2002-01-01

    When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.

  11. TWRS privatization bibliography

    SciTech Connect

    1996-03-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. This bibliography is not, nor is intended to be, exhaustive or complete. It was prepared with the intent of providing a sampling of representative documents potentially helpful to Offerors. The documents referenced herein have been identified as representative of those potentially helpful to Offerors. This list of documents does not represent the full extent of available and potentially helpful information, nor should it be taken as a representation of documents determined to be of greater importance than other documents not referenced herein. There are numerous documents available to the public that are NOT cited in this bibliography; the Offeror is encouraged to perform searches for alternate sources of information.

  12. TWRS privatization bibliography

    SciTech Connect

    1996-02-01

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. The organization of this bibliography is by subject area. Some of the documents overlap subject areas, and may be presented in more than one. Additionally, assignment of a document to one subject area does not necessarily preclude that document from containing information relevant to other subject areas not identified. The subject areas include, in order of presentation:. Waste Characterization; Pre-treatment; High-level Waste Immobilization; Low-level Waste Immobilization; Low-level Waste Melter Test Program; Performance Assessment; and General Safety.

  13. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  14. Private Stimuli, Covert Responses, and Private Events: Conceptual Remarks

    PubMed Central

    Tourinho, Emmanuel Zagury

    2006-01-01

    In this article, I discuss the concepts of private stimuli, covert responses, and private events, emphasizing three aspects: the conditions under which private stimuli may acquire discriminative functions to verbal responses, the conditions of unobservability of covert responses, and the complexity of events or phenomena described as private. I argue that the role of private stimuli in the control of self-descriptive verbal responses is dependent on a relation (correlation or equivalence relation) with public stimuli, and that responses vary along a continuum of observability. These remarks on private stimuli and covert responses are introductory to an examination of the varying complexity of phenomena described as private. I argue that private events is a verbal response emitted under the control of phenomena of different degrees of complexity, and I interpret these phenomena, based on the principle of selection by consequences. I introduce the notion of inclusiveness to suggest that some phenomena related to privacy are less or more complex as they include relations of a phylogenetic, ontogenetic, and cultural origin. PMID:22478451

  15. 49 CFR 1580.201 - Rail security coordinator.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., Historic and Excursion Operators, and Private Cars 1580.201 Rail security coordinator. (a) Applicability..., including heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and monorail systems. (4) Each operator of private cars, including business/office cars and...

  16. IMPERMEABLE THIN AL2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-12-16

    To improve the hot corrosion resistance of YSZ thermal barrier coatings, a 25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. However, a thick Al{sub 2}O{sub 3} overlay was harmful for TBC by increasing compressive stress which causes crack and spalling of YSZ coating. As a result, a dense and thin Al{sub 2}O{sub 3} overlay is critical for simultaneously preventing YSZ from hot corrosion and spalling. In the next reporting period, we will measure or calculate the residue stress within Al{sub 2}O{sub 3} overlay and YSZ coating to study the mechanism of effect of Al{sub 2}O{sub 3} overlay on spalling of YSZ coating.

  17. Private Loans: Facts and Trends

    ERIC Educational Resources Information Center

    Institute for College Access & Success, 2014

    2014-01-01

    Private loans are one of the riskiest ways to finance a college education. Like credit cards, they typically have variable interest rates. Both variable and fixed rates are higher for those who can least afford them--as high as 13% in June 2014. Private loans are not eligible for the important deferment, income-based repayment, or loan forgiveness…

  18. The Law and Private Colleges.

    ERIC Educational Resources Information Center

    Grace, James L., Jr.

    This paper discusses the law as it applies to private colleges as distinct from public institutions. First, it analyzes how private colleges and universities may be held to the constitutional standards of public institutions if they are engaged in state action or, in other words, in activities closely involved with a public function or purpose.…

  19. Michigan School Privatization Survey 2008

    ERIC Educational Resources Information Center

    Hohman, James M.; Freeland, William L. E.

    2008-01-01

    Privatization of school support services is a time-tested means for lowering educational costs. The three major services that school districts in Michigan contract out for are food, custodial and transportation. The Mackinac Center for Public Policy's survey of privatization is the longest running and most comprehensive source of school support…

  20. Signed Soliloquy: Visible Private Speech

    ERIC Educational Resources Information Center

    Zimmermann, Kathrin; Brugger, Peter

    2013-01-01

    Talking to oneself can be silent (inner speech) or vocalized for others to hear (private speech, or soliloquy). We investigated these two types of self-communication in 28 deaf signers and 28 hearing adults. With a questionnaire specifically developed for this study, we established the visible analog of vocalized private speech in deaf signers.…

  1. Public/Private Partnership Programs.

    ERIC Educational Resources Information Center

    District of Columbia Public Schools, Washington, DC.

    This document presents the Public/Private Partnership Programs, a school-community project developed in 1981 by the District of Columbia public schools and the private sector community to provide career-focused high school programs. The project was designed to motivate and support young people to stay in school, graduate from high school, and…

  2. Michigan School Privatization Survey 2010

    ERIC Educational Resources Information Center

    Hohman, James M.; Anderson, Dustin D.

    2010-01-01

    Privatization of support services has been a method that Michigan school districts have used for several years to lower costs. More than ever before, Michigan school districts are privatizing the three main support services they offer--food, custodial and transportation. The annual survey finds that 48.8 percent of Michigan school districts are…

  3. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2002-11-30

    In order to improve the hot corrosion resistance of conventional YSZ TBC system, the Al{sub 2}O{sub 3} overlay coating has been successfully produced on the surface of YSZ by the Sol-gel route. The YSZ substrates were coated with boehmite sol by dip coating process, dried to form a gel film and calcined at 1200 C to form {alpha}-Al{sub 2}O{sub 3} overlay. The microstructures of TBC and Al{sub 2}O{sub 3} overlay were examined by scanning electron microscopy (SEM). The results showed that micro-pores ranged from 3 {micro}m to 20 {micro}m and micro-cracks could be clearly seen on the surface of APS YSZ coating. The thickness of alumina overlay increased with increasing the number of dip coating circles. The small microcracks (0.5-1.0 {micro}m width) on the YSZ surface could be filled and blocked by calcined alumina particles, whereas large pores remained empty and the alumina overlay was un-continuous after one time dip coating circle. Alumina overlay thicker than 5 m m obtained by five times dip coating circles largely cracked after calcinations. As a result, multiple dip coatings up to three times were ideal for getting high quality, crack- free and continuous overlay. The optimal thickness of alumina overlay was in the range of 2.5-3.5 {micro}m. In the next reporting period, we will study the hot corrosion behaviors of YSZ TBC with Al{sub 2}O{sub 3} overlay coating produced by sol gel route by exposure the samples to molten salts mixtures (Na{sub 2}SO{sub 4} + 5%V{sub 2}O{sub 5}) at 950 C.

  4. A novel approach for latent print identification using accurate overlays to prioritize reference prints.

    PubMed

    Gantz, Daniel T; Gantz, Donald T; Walch, Mark A; Roberts, Maria Antonia; Buscaglia, JoAnn

    2014-10-24

    A novel approach to automated fingerprint matching and scoring that produces accurate locally and nonlinearly adjusted overlays of a latent print onto each reference print in a corpus is described. The technology, which addresses challenges inherent to latent prints, provides the latent print examiner with a prioritized ranking of candidate reference prints based on the overlays of the latent onto each candidate print. In addition to supporting current latent print comparison practices, this approach can make it possible to return a greater number of AFIS candidate prints because the ranked overlays provide a substantial starting point for latent-to-reference print comparison. To provide the image information required to create an accurate overlay of a latent print onto a reference print, "Ridge-Specific Markers" (RSMs), which correspond to short continuous segments of a ridge or furrow, are introduced. RSMs are reliably associated with any specific local section of a ridge or a furrow using the geometric information available from the image. Latent prints are commonly fragmentary, with reduced clarity and limited minutiae (i.e., ridge endings and bifurcations). Even in the absence of traditional minutiae, latent prints contain very important information in their ridges that permit automated matching using RSMs. No print orientation or information beyond the RSMs is required to generate the overlays. This automated process is applied to the 88 good quality latent prints in the NIST Special Database (SD) 27. Nonlinear overlays of each latent were produced onto all of the 88 reference prints in the NIST SD27. With fully automated processing, the true mate reference prints were ranked in the first candidate position for 80.7% of the latents tested, and 89.8% of the true mate reference prints ranked in the top ten positions. After manual post-processing of those latents for which the true mate reference print was not ranked first, these frequencies increased to 90.9% (1st rank) and 96.6% (top ten), respectively. Because the computational process is highly parallelizable, it is feasible for this method to work with a reference corpus of several thousand prints. PMID:25447189

  5. Privatization and management development in the healthcare sector of Georgia.

    PubMed

    West, Daniel J; Costello, Michael; Ramirez, Bernardo

    2011-01-01

    Healthcare reforms in Georgia parallel some of the major changes made by other Central and Eastern European countries. This is especially true of efforts to privatize the health sector and secure capital investments from Western Europe. Privatization of Georgian healthcare requires an understanding of the Soviet-era healthcare system and ideological orientation. Many of the issues and problems of privatization in Georgia require new knowledge to enhance equity outcomes, improve financial performance, increase access to care and encourage healthcare competition. Training existing and future healthcare leaders in modern management theory and practice is paramount. A university based health-management education partnership model was developed and implemented between several universities in the United States and Europe, along with two Georgian universities, to address workforce demands, changing market conditions, management knowledge and leadership competencies. Health-management education concentrations were developed and implemented along with several short courses to meet market demand for trained leaders and managers. PMID:21677531

  6. British coal privatization procedures

    SciTech Connect

    Not Available

    1994-06-01

    The form in which British Coal is to be privatized has finally been announced. Offers are to be invited for the operating underground and opencast mines which will be grouped into five regionally based companies. Additionally, offers will be invited for a number of collieries which are currently under care and maintenance. The five Regional Coal Companies to be formed are Central North, which will comprise the assets in the Yorkshire and Durham coalfields, including the five collieries in the Selby Complex; Central South, which will contain the assets located in the Nottinghamshire, Leicestershire, Derbyshire, and Warwickshire coalfields; North East, which has four opencast sites, Scotland, which has nine operating open-cast sites and a single underground mine, Longannet; and South Wales with its nine operating opencast sites. Tower colliery, the last underground mine in South Wales, was finally put on care and maintenance on April 20, 1994. Details of the five Regional Coal Companies are given. A new public sector body, the Coal Authority will be set up to which all British Coal's title to unworked coal and coal mines will be transferred. All the relevant property rights and liabilities of British Coal will be transferred into the Regional Coal Companies prior to their sun.

  7. Implementing a secure client/server application

    SciTech Connect

    Kissinger, B.A.

    1994-08-01

    There is an increasing rise in attacks and security breaches on computer systems. Particularly vulnerable are systems that exchange user names and passwords directly across a network without encryption. These kinds of systems include many commercial-off-the-shelf client/server applications. A secure technique for authenticating computer users and transmitting passwords through the use of a trusted {open_quotes}broker{close_quotes} and public/private keys is described in this paper.

  8. Secure sequential transmission of quantum information

    NASA Astrophysics Data System (ADS)

    Jeong, Kabgyun; Kim, Jaewan

    2015-09-01

    We propose a quantum communication protocol that can be used to transmit any quantum state, one party to another via several intermediate nodes, securely on quantum communication network. The scheme makes use of the sequentially chained and approximate version of private quantum channels satisfying certain commutation relation of n-qubit Pauli operations. In this paper, we study the sequential structure, security analysis, and efficiency of the quantum sequential transmission protocol in depth.

  9. A hierarchical P2P overlay network for interest-based media contents lookup

    NASA Astrophysics Data System (ADS)

    Lee, HyunRyong; Kim, JongWon

    2006-10-01

    We propose a P2P (peer-to-peer) overlay architecture, called IGN (interest grouping network), for contents lookup in the DHC (digital home community), which aims to provide a formalized home-network-extended construction of current P2P file sharing community. The IGN utilizes the Chord and de Bruijn graph for its hierarchical overlay network construction. By combining two schemes and by inheriting its features, the IGN efficiently supports contents lookup. More specifically, by introducing metadata-based lookup keyword, the IGN offers detailed contents lookup that can reflect the user interests. Moreover, the IGN tries to reflect home network environments of DHC by utilizing HG (home gateway) of each home network as a participating node of the IGN. Through experimental and analysis results, we show that the IGN is more efficient than Chord, a well-known DHT (distributed hash table)-based lookup protocol.

  10. Overlay metrology for dark hard mask process: simulation and experiment study

    NASA Astrophysics Data System (ADS)

    Shin, Jangho; Chalykh, Roman; Kang, Hyunjae; Kim, SeongSue; Lee, SukJoo; Cho, Han-Ku

    2007-03-01

    Simulation and experimental study results are reported to solve align/overlay problem in dark hard mask process in lithography. For simulation part, an in-house simulator, which is based on rigorous coupled wave analysis and Fourier optics method of high NA imaging, is used. According to the simulation and experiment study, image quality of alignment and overlay marks can be optimized by choosing hard mask and sub-film thickness carefully for a given process condition. In addition, it is important to keep the specification of film thickness uniformity within a certain limit. Simulation results are confirmed by experiment using the state of art memory process in Samsung semiconductor R&D facility.

  11. Detection and characterization of heparin-binding proteins with a gel overlay procedure

    SciTech Connect

    Mehlman, T.; Burgess, W.H. )

    1990-07-01

    The binding of {sup 125}I-labeled derivatives of heparin has been used by several investigators to identify heparin-binding fragments of different heparin-binding proteins. In this report we utilize the procedure described by J.W. Smith and D.J. Knauer (1987, Anal. Biochem. 160, 105-114) to produce {sup 125}I-fluorescein-heparin. Using this derivative, we compare the use of gel overlay procedures with Western blot procedures for the detection of heparin-binding proteins following polyacrylamide gel electrophoresis in the presence of sodium dodecyl sulfate. We show that the gel overlay procedure is a relatively simple and sensitive method for visualizing heparin-binding proteins. In addition, we use the procedure to characterize the heparin-binding properties of heparin-binding growth factor 1 (acidic fibroblast growth factor) with synthetic peptide competitors and site-directed mutants of the growth factor.

  12. Relative humidity sensor based on an optical microfiber knot resonator with a polyvinyl alcohol overlay

    NASA Astrophysics Data System (ADS)

    Yoon, Min-Seok; Yoo, Kwang Wook; Han, Young-Geun

    2015-09-01

    A highly sensitive RH sensor based on the MKR with the PVA overlay is investigated. After making a tie using the microfiber with a diameter of 2 μm, the MRK with a loop diameter of 90 μm is fabricated and coated by using a PVA which can absorb humidity. The optical spectra of the MRK with the PVA overlay are converted to the spatial frequency spectra by using the FFT for precise measurement. The absorption of humidity in the proposed MKR-based sensing probe effectively changes the spatial frequency of the MKR. The RH sensitivities of the proposed MKR-based RH sensing prober with higher order modes can be dramatically improved.

  13. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. Irwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, mobile network operators’ spectral capacity will be overwhelmed by the demand brought on by new devices and applications. To augment capacity and meet this demand, operators may choose to deploy a Dynamic Spectrum Access (DSA) overlay. The signaling and functionality required by such an overlay have not yet been fully considered in the architecture of the planned Long Term Evolution Advanced (LTE+) networks. This paper presents a Spectrum Accountability framework to be integrated into LTE+ architectures, defining specific element functionality, protocol interfaces, and signaling flow diagrams required to enforce the rights and responsibilities of primary and secondary users. We also quantify, through integer programs, the benefits of using DSA channels to augment capacity under a scenario in which LTE+ network can opportunistically use TV and GSM spectrum. The framework proposed here may serve as a guide in the development of future LTE+ network standards that account for DSA.

  14. Cast titanium overlay denture for a geriatric patient with a reduced vertical dimension.

    PubMed

    Guttal, Satyabodh; Patil, Narendra P

    2005-12-01

    An older patient reporting to the dental surgery for his/her dental treatment is becoming a common occurrence. Improved oral hygiene has meant that teeth are retained for a longer time, along with the potential problems of attrition, decreased vertical dimension, temporomandibular joint discomfort/strain, and poor aesthetics. The case in question is that of a 65-year-old male patient who had severe attrition in the lower arch, temporomandibular joint pain and reduced vertical dimension. The maxillary arch had previously been restored with a fixed partial prosthesis. For restoration of the lower teeth, a removable cast titanium overlay denture was fabricated incorporating an increased vertical dimension. Porcelain facings were placed to restore the aesthetics of the anterior teeth. The titanium was cast in a semi-automatic electric arc, pressure type casting machine. A titanium overlay denture with porcelain facing on the anterior teeth may provide a means of restoring a patient's concerns regarding aesthetics and function. PMID:16329234

  15. Automatic Generation of Overlays and Offset Values Based on Visiting Vehicle Telemetry and RWS Visuals

    NASA Technical Reports Server (NTRS)

    Dunne, Matthew J.

    2011-01-01

    The development of computer software as a tool to generate visual displays has led to an overall expansion of automated computer generated images in the aerospace industry. These visual overlays are generated by combining raw data with pre-existing data on the object or objects being analyzed on the screen. The National Aeronautics and Space Administration (NASA) uses this computer software to generate on-screen overlays when a Visiting Vehicle (VV) is berthing with the International Space Station (ISS). In order for Mission Control Center personnel to be a contributing factor in the VV berthing process, computer software similar to that on the ISS must be readily available on the ground to be used for analysis. In addition, this software must perform engineering calculations and save data for further analysis.

  16. Robotic weld overlay coatings for erosion control. [Quarterly report, July--September 1993

    SciTech Connect

    Levin, B.F.; DuPont, J.N.; Marder, A.R.

    1993-10-20

    In the previous period of work, twelve overlay hardfacing alloys were selected for erosion testing based upon a literature review. All twelve coatings were deposited on 1018 steel substrates using the plasma arc welding process. Ten samples from each coating were prepared for erosion testing. The coating deposition and sample preparation procedures were described in the previous quarterly report. During the past quarter, all the coatings were erosion tested at 400 C. The erosion resistance of each coating was evaluated by determining the steady state erosion rate. In addition, the microstructure of each coating was characterized before and after the erosion tests. This progress report describes the erosion test results and coating microstructures. Also, a preliminary analysis on the relationships, between weld overlay coating hardness, microstructure, and erosion resistance will be discussed.

  17. Private Information and Insurance Rejections

    PubMed Central

    Hendren, Nathaniel

    2013-01-01

    Across a wide set of non-group insurance markets, applicants are rejected based on observable, often high-risk, characteristics. This paper argues that private information, held by the potential applicant pool, explains rejections. I formulate this argument by developing and testing a model in which agents may have private information about their risk. I first derive a new no-trade result that theoretically explains how private information could cause rejections. I then develop a new empirical methodology to test whether this no-trade condition can explain rejections. The methodology uses subjective probability elicitations as noisy measures of agents beliefs. I apply this approach to three non-group markets: long-term care, disability, and life insurance. Consistent with the predictions of the theory, in all three settings I find significant amounts of private information held by those who would be rejected; I find generally more private information for those who would be rejected relative to those who can purchase insurance; and I show it is enough private information to explain a complete absence of trade for those who would be rejected. The results suggest private information prevents the existence of large segments of these three major insurance markets. PMID:24187381

  18. RESTORING A DAMAGED 16-YEAR -OLD INSULATING POLYMER CONCRETE DIKE OVERLAY: REPAIR MATERIALS AND TECHNOLOGIES.

    SciTech Connect

    SUGAMA,T.

    2007-01-01

    The objective of this program was to design and formulate organic polymer-based material systems suitable for repairing and restoring the overlay panels of insulating lightweight polymer concrete (ILPC) from the concrete floor and slope wall of a dike at KeySpan liquefied natural gas (LNG) facility in Greenpoint, Brooklyn, NY, just over sixteen years ago. It also included undertaking a small-scale field demonstration to ensure that the commercial repairing technologies were applicable to the designed and formulated materials.

  19. Quantitative surface analysis of molecular overlayers by resonantly enhanced multiphoton ionization of sputtered molecules

    NASA Astrophysics Data System (ADS)

    Schnieders, A.; Rüschenschmidt, K.; Schröder, M.; Benninghoven, A.; Arlinghaus, H. F.

    2001-08-01

    Laser postionization of sputtered neutrals in combination with resonantly enhanced multiphoton ionization is a more quantitative analytical technique for organic surface analysis than secondary ion mass spectrometry due to the reduced matrix effect. Nevertheless, we observed a remaining sputter-induced matrix effect. We have investigated this matrix effect by comparing the secondary neutral and ion emissions from UHV-deposited molecular overlayers of adenine and β-alanine on Ag substrates under Ar+, Xe+, and SF5+ primary ion bombardment.

  20. Microeconomics-based resource allocation in overlay networks by using non-strategic behavior modeling

    NASA Astrophysics Data System (ADS)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    2011-01-01

    Behavior modeling has recently been investigated for designing self-organizing mechanisms in the context of communication networks in order to exploit the natural selfishness of the users with the goal of maximizing the overall utility. In strategic behavior modeling, the users of the network are assumed to be game players who seek to maximize their utility with taking into account the decisions that the other players might make. The essential difference between the aforementioned researches and this work is that it incorporates the non-strategic decisions in order to design the mechanism for the overlay network. In this solution concept, the decisions that a peer might make does not affect the actions of the other peers at all. The theory of consumer-firm developed in microeconomics is a model of the non-strategic behavior that we have adopted in our research. Based on it, we have presented distributed algorithms for peers' "joining" and "leaving" operations. We have modeled the overlay network as a competitive economy in which the content provided by an origin server can be viewed as commodity and the origin server and the peers who multicast the content to their downside are considered as the firms. On the other hand, due to the dual role of the peers in the overlay network, they can be considered as the consumers as well. On joining to the overlay economy, each peer is provided with an income and tries to get hold of the service regardless to the behavior of the other peers. We have designed the scalable algorithms in such a way that the existence of equilibrium price (known as Walrasian equilibrium price) is guaranteed.

  1. In-die photomask registration and overlay metrology with PROVE using 2D correlation methods

    NASA Astrophysics Data System (ADS)

    Seidel, D.; Arnz, M.; Beyer, D.

    2011-11-01

    According to the ITRS roadmap, semiconductor industry drives the 193nm lithography to its limits, using techniques like double exposure, double patterning, mask-source optimization and inverse lithography. For photomask metrology this translates to full in-die measurement capability for registration and critical dimension together with challenging specifications for repeatability and accuracy. Especially, overlay becomes more and more critical and must be ensured on every die. For this, Carl Zeiss SMS has developed the next generation photomask registration and overlay metrology tool PROVE which serves the 32nm node and below and which is already well established in the market. PROVE features highly stable hardware components for the stage and environmental control. To ensure in-die measurement capability, sophisticated image analysis methods based on 2D correlations have been developed. In this paper we demonstrate the in-die capability of PROVE and present corresponding measurement results for shortterm and long-term measurements as well as the attainable accuracy for feature sizes down to 85nm using different illumination modes and mask types. Standard measurement methods based on threshold criteria are compared with the new 2D correlation methods to demonstrate the performance gain of the latter. In addition, mask-to-mask overlay results of typical box-in-frame structures down to 200nm feature size are presented. It is shown, that from overlay measurements a reproducibility budget can be derived that takes into account stage, image analysis and global effects like mask loading and environmental control. The parts of the budget are quantified from measurement results to identify critical error contributions and to focus on the corresponding improvement strategies.

  2. Effect of oil overlay on inhibition potential of roscovitine in sheep cumulus-oocyte complexes.

    PubMed

    Crocomo, L F; Marques Filho, W C; Ulian, C M V; Branchini, N S; Silva, D T; Ackermann, C L; Landim-Alvarenga, F C; Bicudo, S D

    2015-06-01

    Inhibitors of cyclin-dependent kinases, as roscovitine, have been used to prevent the spontaneous resumption of meiosis in vitro and to improve the oocyte developmental competence. In this study, the interference of oil overlay on the reversible arrest capacity of roscovitine in sheep oocytes as well as its effects on cumulus expansion was evaluated. For this, cumulus-oocyte complexes (COCs) were cultured for 20h in TCM 199 with 10% foetal bovine serum (Control) containing 75?m roscovitine (Rosco). Subsequently, they were in vitro matured (IVM) for further 18h in inhibitor-free medium with LH and FSH. The culture was performed in Petri dishes under mineral oil (+) or in 96 well plates without oil overlay (-) at 38.5C and 5% CO2 . At 20 and 38h, the cumulus expansion and nuclear maturation were evaluated under stereomicroscope and by Hoechst 33342 staining, respectively. No group presented cumulus expansion at 20h. After additional culture with gonadotrophins, a significant rate of COCs from both Control groups (+/-) exhibited total expansion while in both Rosco groups (+/-) the partial expansion prevailed. Among the oocytes treated with roscovitine, 65.2% were kept at GV in the absence of oil overlay while 40.6% of them reached MII under oil cover (p<0.05). This meiotic arrest was reversible, and proper meiosis progression also occurred in the Control groups (+/-). So, the culture system without oil overlay improved the meiotic inhibition promoted by roscovitine without affecting the cumulus expansion rate or the subsequent meiosis progression. PMID:25726754

  3. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  4. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  5. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  6. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  7. 33 CFR 66.01-12 - May I continue to use the private aid to navigation I am currently using?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false May I continue to use the private aid to navigation I am currently using? 66.01-12 Section 66.01-12 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY AIDS TO NAVIGATION PRIVATE AIDS TO NAVIGATION Aids...

  8. 75 FR 22674 - U.S. Department of State Advisory Committee on Private International Law Study Group Notice of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-29

    .... Department of State Advisory Committee on Private International Law Study Group Notice of Meeting on the... of the Legal Adviser, Private International Law and the U.S. Patent and Trademark Office will convene... Transactions (``the Guide'') dealing with security rights in intellectual property, as well as possible...

  9. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  10. Physical Security

    SciTech Connect

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  11. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  12. 75 FR 49932 - Private Transfer Fee Covenants

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... AGENCY Private Transfer Fee Covenants AGENCY: Federal Housing Finance Agency. ACTION: Notice of proposed... Guidance, ``Guidance on Private Transfer Fee Covenants,'' to the Federal National Mortgage Association... mortgages on properties encumbered by private transfer fee covenants. Such covenants appear adverse...

  13. Image overlay solution based on threshold detection for a compact near infrared fluorescence goggle system

    PubMed Central

    Gao, Shengkui; Mondal, Suman B.; Zhu, Nan; Liang, RongGuang; Achilefu, Samuel; Gruev, Viktor

    2015-01-01

    Abstract. Near infrared (NIR) fluorescence imaging has shown great potential for various clinical procedures, including intraoperative image guidance. However, existing NIR fluorescence imaging systems either have a large footprint or are handheld, which limits their usage in intraoperative applications. We present a compact NIR fluorescence imaging system (NFIS) with an image overlay solution based on threshold detection, which can be easily integrated with a goggle display system for intraoperative guidance. The proposed NFIS achieves compactness, light weight, hands-free operation, high-precision superimposition, and a real-time frame rate. In addition, the miniature and ultra-lightweight light-emitting diode tracking pod is easy to incorporate with NIR fluorescence imaging. Based on experimental evaluation, the proposed NFIS solution has a lower detection limit of 25 nM of indocyanine green at 27 fps and realizes a highly precise image overlay of NIR and visible images of mice in vivo. The overlay error is limited within a 2-mm scale at a 65-cm working distance, which is highly reliable for clinical study and surgical use. PMID:25607724

  14. Image overlay solution based on threshold detection for a compact near infrared fluorescence goggle system

    NASA Astrophysics Data System (ADS)

    Gao, Shengkui; Mondal, Suman B.; Zhu, Nan; Liang, RongGuang; Achilefu, Samuel; Gruev, Viktor

    2015-01-01

    Near infrared (NIR) fluorescence imaging has shown great potential for various clinical procedures, including intraoperative image guidance. However, existing NIR fluorescence imaging systems either have a large footprint or are handheld, which limits their usage in intraoperative applications. We present a compact NIR fluorescence imaging system (NFIS) with an image overlay solution based on threshold detection, which can be easily integrated with a goggle display system for intraoperative guidance. The proposed NFIS achieves compactness, light weight, hands-free operation, high-precision superimposition, and a real-time frame rate. In addition, the miniature and ultra-lightweight light-emitting diode tracking pod is easy to incorporate with NIR fluorescence imaging. Based on experimental evaluation, the proposed NFIS solution has a lower detection limit of 25 nM of indocyanine green at 27 fps and realizes a highly precise image overlay of NIR and visible images of mice in vivo. The overlay error is limited within a 2-mm scale at a 65-cm working distance, which is highly reliable for clinical study and surgical use.

  15. Epicardial ablation guidance using coronary arterial models and live fluoroscopic overlay registrations

    NASA Astrophysics Data System (ADS)

    Manzke, R.; Thiagalingam, A.; Movassaghi, B.; d'Avila, A.; Reddy, V. Y.; Chan, R. C.

    2008-03-01

    Knowledge of patient-specific cardiac anatomy is required for catheter-based ablation in epicardial ablation procedures such as ventricular tachycardia (VT) ablation interventions. In particular, knowledge of critical structures such as the coronary arteries is essential to avoid collateral damage. In such ablation procedures, ablation catheters are brought in via minimally-invasive subxiphoid access. The catheter is then steered to ablation target sites on the left ventricle (LV). During the ablation and catheter navigation it is of vital importance to avoid damage of coronary structures. Contrast-enhanced rotational X-ray angiography of the coronary arteries delivers a 3D impression of the anatomy during the time of intervention. Vessel modeling techniques have been shown to be able to deliver accurate 3D anatomical models of the coronary arteries. To simplify epicardial navigation and ablation, we propose to overlay coronary arterial models, derived from rotational X-ray angiography and vessel modeling, onto real-time X-ray fluoroscopy. In a preclinical animal study, we show that overlay of intra-operatively acquired 3D arterial models onto X-ray helps to place ablation lesions at a safe distance from coronary structures. Example ablation lesions have been placed based on the model overlay at reasonable distances between key arterial vessels and on top of marginal branches.

  16. Enhancement of electron-phonon coupling in Cs-overlayered intercalated bilayer graphene.

    PubMed

    Kleeman, J; Sugawara, K; Sato, T; Takahashi, T

    2016-05-25

    We have performed high-resolution angle-resolved photoemission spectroscopy (ARPES) on cesium (Cs) intercalated bilayer graphene with a Cs overlayer (Cs-C8CsC8). Low-energy electron diffraction shows a (2  ×  2) pattern consistent with intercalation of a Cs layer similar to bulk C8Cs, in addition to the signature of a nearly commensurate superstructure created by the Cs overlayer. ARPES results reveal folding of the π bands due to the periodic (2  ×  2) potential of the intercalated Cs atoms, together with a free-electron-like state at the [Formula: see text] point. Significant mass renormalization is observed in the band dispersion near the Fermi level, indicative of strong electron-phonon coupling. Based on analysis of the self-energy, we find anisotropic electron-phonon coupling with an estimated strength of [Formula: see text]  ±  0.02 in the K-[Formula: see text] direction, and [Formula: see text] in the K-M direction. This coupling is much larger than that of other doped graphenes, and comparable to superconducting bulk GICs. We attribute this large electron-phonon coupling constant to the presence of the Cs overlayer, which highly dopes [Formula: see text] bands, and creates a structure similar to stage-I graphite intercalation compounds. PMID:27094681

  17. Structural evolution of the Pb/Si(111) interface with metal overlayer thickness

    NASA Astrophysics Data System (ADS)

    Souto-Casares, Jaime; Chan, Tzu-Liang; Chelikowsky, James R.; Ho, Kai-Ming; Wang, Cai-Zhuang; Zhang, S. B.

    2015-09-01

    We employ a real-space pseudopotential method to compute the structural energies of a prototypical metal-semiconductor interface. Specifically, we examine a Pb(111) film overlaid on a Si(111) substrate as a function of the metal thickness. For each layer of Pb, we fully relax the atomic coordinates and determine the lowest-energy structure. Owing to the lattice mismatch between the Pb and Si crystal structures, we consider a large supercell containing up to 1505 atoms for the largest system. Systems of this size remain challenging for most current computational approaches and require algorithms specifically designed for highly parallel computational platforms. We examine the structural properties of the interface with respect to the thickness of the metal overlayer, e.g., the corrugation of the profile of the Pb overlayer. The combined influence of the Si substrate and quantum confinement results in a rich profile for a transition between a thin overlayer (less than a few monolayers), where the corrugation is strong, and the bulk region (more than a half-dozen layers), where the overlaid Pb film is atomically flat. This work proves the feasibility of handling systems with such a level of complexity.

  18. Overlay of thermal and visual medical images using skin detection and image registration.

    PubMed

    Schaefer, Gerald; Tait, Roger; Zhu, Shao Ying

    2006-01-01

    Thermography captures the temperature distribution of the human skin and is employed in various medical applications. Often it is useful to cross-reference the resulting thermograms with visual images of the patient, either to see which part of the anatomy is affected by a certain disease or to judge the efficacy of the treatment. An attractive approach to provide this information is to overlay the two image types and show a composite image to the clinician. Producing such an overlay however is a non-trivial task due to differences in image capturing conditions of the two modalities. In this paper we introduce an approach that produces accurate overlays of thermal and visual medical images. First unnecessary background information of the visual part are removed by an image segmentation step based on skin detection. The thermal image is then aligned through an intensity based image registration technique. Experimental results based on an set of visual-thermal image pairs demonstrate the effectiveness of the proposed approach. PMID:17946430

  19. Enhancement of electron–phonon coupling in Cs-overlayered intercalated bilayer graphene

    NASA Astrophysics Data System (ADS)

    Kleeman, J.; Sugawara, K.; Sato, T.; Takahashi, T.

    2016-05-01

    We have performed high-resolution angle-resolved photoemission spectroscopy (ARPES) on cesium (Cs) intercalated bilayer graphene with a Cs overlayer (Cs-C8CsC8). Low-energy electron diffraction shows a (2  ×  2) pattern consistent with intercalation of a Cs layer similar to bulk C8Cs, in addition to the signature of a nearly commensurate superstructure created by the Cs overlayer. ARPES results reveal folding of the π bands due to the periodic (2  ×  2) potential of the intercalated Cs atoms, together with a free-electron-like state at the Γ point. Significant mass renormalization is observed in the band dispersion near the Fermi level, indicative of strong electron–phonon coupling. Based on analysis of the self-energy, we find anisotropic electron–phonon coupling with an estimated strength of λ =0.38   ±  0.02 in the K-Γ direction, and λ =0.60+/- 0.02 in the K-M direction. This coupling is much larger than that of other doped graphenes, and comparable to superconducting bulk GICs. We attribute this large electron–phonon coupling constant to the presence of the Cs overlayer, which highly dopes {π\\ast} bands, and creates a structure similar to stage-I graphite intercalation compounds.

  20. Double patterning overlay and CD budget for 32 nm technology node

    NASA Astrophysics Data System (ADS)

    Iessi, Umberto; Loi, Sara; Salerno, Antonio; Rigolli, Pierluigi; De Chiara, Elio; Turco, Catia; Colombo, Roberto; Polli, Marco; Mani, Antonio

    2008-03-01

    Double patterning is the best technique which allows 193nm immersion lithography to anticipate the 32 nm node, before EUV lithography. The final device pattern is formed by two independent patterning steps where the dense pitch is doubled. This allows printing each patterning step with higher k1 imaging factor. In this paper we present the overlay and CD budget applied to a double patterning (DP) technique for the definition of a 32nm technology node device, using an immersion scanner tool. A balance among different factors which affects the final CD of the device is necessary to optimize the imaging and the alignment performances of the exposure tool. A preliminary activity is also necessary to choose the most suitable mask splitting strategy. Adopting a single mask, which is exposed twice with the appropriate shift - the final pitch - , makes the overlay between the two exposures less critical than splitting the complementary layouts on two different masks. Finally, the CD uniformity of the pooled distributions from the two exposures is evaluated in order to define the requested tool performances in terms of overlay, CD control and metrology.

  1. Food and nutrition security.

    PubMed

    1997-01-01

    This article discusses the deficits in food security in India. It is recommended that India commit to nutrition security by direct actions. Programs should provide essential staples and a nutrient distribution system with affordable prices. India should adopt an Employment Guarantee Program. Creches should provide maternal-child health care, nutrition, literacy, and employment. Government must resolve the internal conflicts of interest between overlapping sectors. India should resolve the "dysfunction" between macroeconomic policies and anti-poverty strategies. Interventions should be people oriented, rely on social mobilization, and provide information and financial resources in a nonconflict context. Efforts will require the cooperation between the private sector, voluntary organizations, state agencies, and local self-governing decentralized agencies. There is a need to build capacity and viable institutions. Poverty agencies do not have access to the minimum required cereals for the poor. The Public Distribution System (PDS) does not guarantee a minimum quantity of foodstuffs per household regardless of income level. More high quality varieties of rice are produced due to higher prices in the marketplace. Most state governments do not provide staple cereals to the PDS at affordable prices. The government sets fair prices for sugar, but not cereal. The government sells more cereal in the open market than to PDS. PDS should target poor households; that is, the 29.9% who live below the poverty line. Lack of nutrition security is due to poverty that is enhanced by ignorance and the lack of health and nutrition education. PMID:12293896

  2. Operating private hospitals in Mexico.

    PubMed

    Barcie, Joseph S

    2015-01-01

    Mexico is one of the richest countries in Latin America and over the last several decades there have been many changes in the healthcare delivery systems, from universal healthcare coverage for all Mexicans to the fast paced expansion of private healthcare. Like many countries, Mexico has both private and public health systems and hospital administrators are facing challenges on multiple fronts in addition to facing exciting new opportunities. In this article you will get a bird's eye view of this ever changing panorama. How the new growing middle class consumerism has impacted physicians, health insurance and private healthcare industry. PMID:26521381

  3. Peru turnaround tied to privatization

    SciTech Connect

    Not Available

    1993-04-19

    Petroleos del Peru predicts a 10% increase in Peru's oil production this year and a further increase in 1994. Petroperu also forecasts a sharp increase in drilling in Peru this year. After several years of declining oil production, a gradual turnaround in the cash strapped country's petroleum industry is largely tied to its progress in privatization. The government last year began a campaign to privatize all state owned companies by the end of July 1995. The paper discusses forecasts by Petroperu; the contract of Occidental del Amazonas Inc.; the Petromar privatization; Great Western's contract; development of the Aguaytia gas field; and refinery contracts.

  4. Study of spread spectrum multiple access systems for satellite communications with overlay on current services: Executive summary

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1987-01-01

    Two different methods of generating spread spectrum signals for an overlay service are discussed, and the data rate and efficiency which can be achieved while maintaining low interference with existing traffic are examined.

  5. Ellipsometric study of ambient-produced overlayer growth rate on YBa2Cu3O(7-x) films

    NASA Technical Reports Server (NTRS)

    Sieg, Robert M.; Alterovitz, Samuel A.; Warner, Joseph D.

    1993-01-01

    An ellipsometric study of ambient-reaction-produced BaCO3 overlayer growth on laser-ablated YBCO is presented as a function of time. The effects of the anisotropy of YBCO on the ellipsometric data inversion process are discussed, and it is concluded that with certain restrictions on the data acquisition method, the anisotropic substrate can be adequately modeled by its isotropic pseudodielectric function for the purpose of overlayer thickness estimation. It is found that after an initial period of rapid growth attributed to the chemical reaction of the exposed surface bonds, the BaCO3 overlayer growth is linear at 1-2 A per day. This slow growth rate is attributed to the complexity of the BaCO3-forming reaction, together with the need for ambient reactants to diffuse through the overlayer.

  6. Intra-field on-product overlay improvement by application of RegC and TWINSCAN corrections

    NASA Astrophysics Data System (ADS)

    Sharoni, Ofir; Dmitriev, Vladimir; Graitzer, Erez; Perets, Yuval; Gorhad, Kujan; van Haren, Richard; Cekli, Hakki E.; Mulkens, Jan

    2015-03-01

    The on product overlay specification and Advanced Process Control (APC) is getting extremely challenging particularly after the introduction of multi-patterning applications like Spacer Assisted Double Patterning (SADP) and multipatterning techniques like N-repetitive Litho-Etch steps (LEN, N >= 2). When the latter is considered, most of the intrafield overlay contributors drop out of the overlay budget. This is a direct consequence of the fact that the scanner settings (like dose, illumination settings, etc.) as well as the subsequent processing steps can be made very similar for two consecutive Litho-Etch layers. The major overlay contributor that may require additional attention is the Image Placement Error (IPE). When the inter-layer overlay is considered, controlling the intra-field overlay contribution gets more complicated. In addition to the IPE contribution, the TWINSCANTM lens fingerprint in combination with the exposure settings is going to play a role as well. Generally speaking, two subsequent functional layers have different exposure settings. This results in a (non-reticle) additional overlay contribution. In this paper, we have studied the wafer overlay correction capability by RegC® in addition to the TWINSCANTM intrafield corrections to improve the on product overlay performance. RegC® is a reticle intra-volume laser writing technique that causes a predictable deformation element (RegC® deformation element) inside the quartz (Qz) material of a reticle. This technique enables to post-process an existing reticle to correct for instance for IPE. Alternatively, a pre-determined intra-field fingerprint can be added to the reticle such that it results in a straight field after exposure. This second application might be very powerful to correct for instance for (cold) lens fingerprints that cannot be corrected by the scanner itself. Another possible application is the intra-field processing fingerprint. One should realize that a RegC® treatment of a reticle generally results in global distortion of the reticle. This is not a problem as long as these global distortions can be corrected by the TWINSCANTM system (currently up to the third order). It is anticipated that the combination of the RegC® and the TWINSCANTM corrections act as complementary solutions. These solutions perfectly fit into the ASML Litho InSight (LIS) product in which feedforward and feedback corrections based on YieldStar overlay measurements are used to improve the on product overlay.

  7. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-03-10

    In order to improve the hot corrosion resistance of conventional YSZ TBC system, a thin and dense {alpha}-Al{sub 2}O{sub 3} overlay has been deposited on the YSZ surface by the composite-sol-gel route (CSG). The YSZ substrates were dipped with boehmite sol containing calcined {alpha}-Al{sub 2}O{sub 3} particles, dried to form a gel film and calcined at 1200 C to form {alpha}-Al{sub 2}O{sub 3} overlay. Hot corrosion tests were carried out on the TBCs with and without Al{sub 2}O{sub 3} coating in molten salt mixtures (Na{sub 2}SO{sub 4} + 5% V{sub 2}O{sub 5}) at 950 C for 10 hours. The results showed that besides a thin and dense alumina overlay with the thickness of about 100-500 nm formed on the YSZ surface, the microcracks and porous near the surface in YSZ was also occupied by alumina because of penetration of the low viscosity precursor. As a result, the Al{sub 2}O{sub 3} overlay remarkably refrained the infiltration of the molten salt into the YSZ coating. The amount of M-phase in the TBC coating with Al{sub 2}O{sub 3} overlay was substantially reduced comparing to that without alumina overlay. In the next reporting period, we will prepare the alumina overlay by CSG route with different thickness and study the hot corrosion mechanism of YSZ TBC with thin Al{sub 2}O{sub 3} overlay coating produced by CSG.

  8. Is there a human right to private health care?

    PubMed

    Gross, Aeyal

    2013-01-01

    In recent years we have noticed an increase in the turn to rights analysis in litigation relating to access to health care. Examining litigation, we can notice a contradiction between on the one hand the ability of the right to health to reinforce privatization and commodification of health care, by rearticulating claims to private health care in terms of human rights, and on the other hand, its ability to reinforce and reinstate public values, especially that of equality, against the background of privatization and commodification. While many hope that rights discourse will do the latter, and secure that access to health care should occur on the basis of need as opposed to ability to pay, it has actually been used to attempt to advance arguments that will allow access to private or semiprivate health insurance in ways that may exacerbate inequality. These types of arguments won ground in the Canadian Supreme Court, but were rejected by the Israeli Supreme Court. In order to avoid this co-optation of right to health, a notion of rights that incorporates the principles of substantive equality is required. Otherwise, one of the unintended consequences of inserting rights analysis into public health care may be that it will reinforce rather than challenge privatization in a way that may increase inequalities. PMID:23581662

  9. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their

  10. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  11. Private Colleges Headed for Extinction.

    ERIC Educational Resources Information Center

    USA Today, 1979

    1979-01-01

    Without additional public support, the 1500 private colleges and universities in America will drop to 170 in the next 30 years, according to a forecast by Donald A. Pyke, coordinator of academic planning, University of Southern California. (Author)

  12. State Regulation of Private Education.

    ERIC Educational Resources Information Center

    Lines, Patricia M.

    1982-01-01

    Examines state laws and the actions of various courts on home instruction and unauthorized educational programs. Suggests reforming the regulation of private education through legislative action that requires periodic testing as an alternative to compulsory school attendance. (Author/MLF)

  13. House Calls in Private Practice.

    ERIC Educational Resources Information Center

    Whittington, Ronaele

    1985-01-01

    Relates the experiences of a social worker in private practice who offered house calls as an ongoing setting for counseling and psychotherapy to individuals and families. Describes advantages and disadvantages, liability, and target populations. (JAC)

  14. Tighter security for electronic information

    SciTech Connect

    Moore, T.

    1996-11-01

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  15. Pattern recognition and data mining techniques to identify factors in wafer processing and control determining overlay error

    NASA Astrophysics Data System (ADS)

    Lam, Auguste; Ypma, Alexander; Gatefait, Maxime; Deckers, David; Koopman, Arne; van Haren, Richard; Beltman, Jan

    2015-03-01

    On-product overlay can be improved through the use of context data from the fab and the scanner. Continuous improvements in lithography and processing performance over the past years have resulted in consequent overlay performance improvement for critical layers. Identification of the remaining factors causing systematic disturbances and inefficiencies will further reduce overlay. By building a context database, mappings between context, fingerprints and alignment & overlay metrology can be learned through techniques from pattern recognition and data mining. We relate structure (`patterns') in the metrology data to relevant contextual factors. Once understood, these factors could be moved to the known effects (e.g. the presence of systematic fingerprints from reticle writing error or lens and reticle heating). Hence, we build up a knowledge base of known effects based on data. Outcomes from such an integral (`holistic') approach to lithography data analysis may be exploited in a model-based predictive overlay controller that combines feedback and feedforward control [1]. Hence, the available measurements from scanner, fab and metrology equipment are combined to reveal opportunities for further overlay improvement which would otherwise go unnoticed.

  16. Robust Public Key Cryptography — A New Cryptosystem Surviving Private Key Compromise

    NASA Astrophysics Data System (ADS)

    Shaik, Cheman

    A weakness of the present-day public key cryptosystems is that these cryptosystems do not survive private-key compromise attacks resulting from an internal breach of trust. In a competitive business environment, private key compromise is a common incident that voids the strength of public key cryptosystems such as RSA and ECC. Bribing corporate employees to disclose their secret keys and inadvertently disclosing secret information are among a plethora of practical attacks that occur at the implementation level. Once a breach of trust takes place and subsequently the private key is revealed, any public key cryptosystem fails to secure electronic data in Internet communications. The revealed key may be used by an attacker to decipher the intercepted data at an intermediary router. This weakness of public key cryptography calls for an additional security measure that enables encryptions to survive private key compromise attacks.

  17. 24 CFR 886.315 - Security and utility deposits.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Security and utility deposits. 886... utility deposits. (a) Amount of deposits. If at the time of the initial execution of the Lease the Owner... security deposits and utility deposits from its resources and/or other public or private sources. (b)...

  18. The Graduate MIS Security Course: Objectives and Challenges

    ERIC Educational Resources Information Center

    Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew

    2009-01-01

    Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…

  19. Harden Security of High-Risk and Critical Supply Chains

    SciTech Connect

    Harrison, Glen

    2009-01-01

    This article focuses on the security risk in the container supply chain. It provides an overview of the technical and policy initiatives that are being implemented by international organizations, governments, and the private sector to enhance security in the container supply chain.

  20. 49 CFR 37.165 - Lift and securement use.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and private entities. (b) All common wheelchairs and their users shall be transported in the entity's vehicles or other conveyances. The entity is not required to permit wheelchairs to ride in places other... complying with part 38 of this title, the entity shall use the securement system to secure wheelchairs...

  1. Secure PVM

    SciTech Connect

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  2. Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party

    NASA Astrophysics Data System (ADS)

    Zhang, Bo; Liu, Xingtong; Wang, Jian; Tang, Chaojing

    2015-12-01

    Recently, Lin et al. proposed a novel quantum private comparison protocol without a third party (Quantum Inf. Process. 13:239-247, 2014). This paper points out two security loopholes in Lin et al.'s protocol, in which one dishonest party can disclose the other's private information without being detected and the comparison result can be manipulated completely by either party. In addition, improvements are proposed to avoid these loopholes.

  3. Security Detail.

    ERIC Educational Resources Information Center

    Epstein, Marc A.

    2003-01-01

    Describes problems of maintaining discipline and security at Jamaica High School in Queens, New York. Argues that court decisions and school regulations have allowed minority of aggressive and disruptive students to destabilize the learning environment. (PKP)

  4. Secure portal.

    SciTech Connect

    Nelson, Cynthia Lee

    2007-09-01

    There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allow special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal concept.

  5. [The private vaccines market in Brazil: privatization of public health].

    PubMed

    Temporão, José Gomes

    2003-01-01

    The main objective of this article is to analyze the vaccines market in Brazil, which is characterized as consisting of two segments with distinct practices and logics: the public segment, focused on supply within the Unified National Health System (SUS) and the private segment, organized around private clinics, physicians' offices, and similar private health facilities. The private vaccines market segment, studied here for the first time, is characterized in relation to the supply and demand structure. Historical aspects of its structure are analyzed, based on the creation of one of the first immunization clinics in the country. The attempt was to analyze this segment in relation to its economic dimensions (imports and sales), principal manufacturers, and products marketed. It economic size proved much greater than initially hypothesized. The figures allow one to view it as one of the main segments in the pharmaceutical industry in Brazil as measured by sales volume. One detects the penetration of a privatizing logic in a sphere that has always been essentially public, thereby introducing into the SUS a new space for disregarding the principles of equity and universality. PMID:14666214

  6. IMPERMEABLE THIN Al{sub 2}O{sub 3} OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2004-06-30

    In order to further improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay of 58 {micro}m thick was deposited on the surface of YSZ by electron-beam physical vapor deposition. Hot corrosion tests were performed on the YSZ coatings with {gamma}-Al{sub 2}O{sub 3} overlay and {alpha}-Al{sub 2}O{sub 3} overlay in molten salt mixture (Na2SO4 + 5wt%V2O5) at 950 C. The {alpha}-Al{sub 2}O{sub 3} overlay was obtained by the post-annealing of g-Al{sub 2}O{sub 3} overlay at 1200 C for 1h. The results showed that compared with the hot corrosion resistance of YSZ coating with 25 {micro}m thick {gamma}-Al{sub 2}O{sub 3} overlay, either thickening {gamma}-Al{sub 2}O{sub 3} overlay or employing {alpha}-Al{sub 2}O{sub 3} overlay could impair the hot corrosion resistance of YSZ coating, because the tensile stresses developed in the alumina overlay in both cases due to the mismatch in thermal expansion coefficient (TEC) between alumina and zirconia resulted in cracking of Al{sub 2}O{sub 3} overlay. The formation of cracks increased contact area between molten salt and Al{sub 2}O{sub 3} overlay, and also the penetration rate of molten salt into Al{sub 2}O{sub 3} overlay and YSZ coating, leading a faster and greater degradation of YSZ coating upon exposure. In the next reporting period, we will study the effect of Al{sub 2}O{sub 3} overlay thickness on hot corrosion and spalling of YSZ coatings.

  7. Secure and Scalable Protocols for Multiple Issues Negotiations

    NASA Astrophysics Data System (ADS)

    Fujita, Katsuhide; Ito, Takayuki; Klein, Mark

    Multi-issue negotiation protocols represent a promising field since most negotiation problems in the real world involve multiple issues. Our work focuses on negotiation with multiple interdependent issues in which agent utility functions are nonlinear. Existing works have not yet concerned with agents' private information that should be concealed from others in negotiations. In this paper, we propose Distributed Mediator Protocol and Take it or Leave it Protocol for negotiation that can reach agreements and completely conceal agents' private information. Moreover, we propose Hybrid Secure Protocol that combines Distributed Mediator Protocol with Take it or Leave it Protocol. The Hybrid Secure Protocol can also reach agreements while completely concealing agents' private information. Furthermore, the Hybrid Secure Protocol achieves high optimality and uses less communication cost. We demonstrate that Hybrid Secure Protocol can improve communication cost more than DMP with high optimality.

  8. Resources to Manage a Private Practice.

    ERIC Educational Resources Information Center

    Aigner, John; Cheek, Fredricka; Donati, Georgia; Zuravicky, Dori

    1997-01-01

    Includes four theme articles: "The Digital Toolkit: Electronic Necessities for Private Practice" (John Aigner); "Organizing a Private Practice: Forms, Fees, and Physical Set-up (Fredricka Cheek); "Career Development Resources: Guidelines for Setting Up a Private Practice Library" (Georgia Donati); and "Books to Enhance Private Practice Management

  9. An Analysis of Private School Closings

    ERIC Educational Resources Information Center

    Pandey, Lakshmi; Sjoquist, David L.; Walker, Mary Beth

    2009-01-01

    We add to the small literature on private school supply by exploring exits of K-12 private schools. We find that the closure of private schools is not an infrequent event and use national survey data from the National Center for Education Statistics to study closures of private schools. We assume that the probability of an exit is a function of…

  10. The "Decline" of Private Higher Education

    ERIC Educational Resources Information Center

    Levy, Daniel C.

    2013-01-01

    No topic in private higher education study has attracted as great attention globally as has growth. This is appropriate as private growth has soared to nearly a third of the world's total higher education enrolment. But while private growth continues to be the dominant trend, important declines in private shares have emerged. These must be…

  11. Student Housing: Is It Time To Privatize?

    ERIC Educational Resources Information Center

    Yeatts, G. Dewey

    2001-01-01

    Explores the issue of university-owned and managed student housing and how to decide whether to shift to privatization. How privatization works, identification of current and future student housing needs, the cost of privatization, and issues to consider when privatization is pursued are examined. (GR)

  12. Conflicting interests in private hospital care.

    PubMed

    O'Loughlin, Mary Ann

    2002-01-01

    This article looks at key changes impacting on private hospital care: the increasing corporate ownership of private hospitals; the Commonwealth Government's support for private health; the significant increase in health fund membership; and the contracting arrangements between health funds and private hospitals. The changes highlight the often conflicting interests of hospitals, doctors, Government, health funds and patients in the provision of private hospital care. These conflicts surfaced in the debate around allegations of 'cherry picking' by private hospitals of more profitable patients. This is also a good illustration of the increasing entanglement of the Government in the fortunes of the private health industry. PMID:12474506

  13. Secure Multiparty Quantum Computation for Summation and Multiplication

    NASA Astrophysics Data System (ADS)

    Shi, Run-Hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics.

  14. Secure Multiparty Quantum Computation for Summation and Multiplication.

    PubMed

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  15. Secure Multiparty Quantum Computation for Summation and Multiplication

    PubMed Central

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to securely compute the summation and multiplication of multiparty private inputs, respectively. Compared to classical solutions, our proposed approach can ensure the unconditional security and the perfect privacy protection based on the physical principle of quantum mechanics. PMID:26792197

  16. Adaptive on-line estimation and control of overlay tool bias

    NASA Astrophysics Data System (ADS)

    Martinez, Victor M.; Finn, Karen; Edgar, Thomas F.

    2003-06-01

    Modern lithographic manufacturing processes rely on various types of exposure tools, used in a mix-and-match fashion. The motivation to use older tools alongside state-of-the-art tools is lower cost and one of the tradeoffs is a degradation in overlay performance. While average prices of semiconductor products continue to fall, the cost of manufacturing equipment rises with every product generation. Lithography processing, including the cost of ownership for tools, accounts for roughly 30% of the wafer processing costs, thus the importance of mix-and-match strategies. Exponentially Weighted Moving Average (EWMA) run-by-run controllers are widely used in the semiconductor manufacturing industry. This type of controller has been implemented successfully in volume manufacturing, improving Cpk values dramatically in processes like photolithography and chemical mechanical planarization. This simple, but powerful control scheme is well suited for adding corrections to compensate for Overlay Tool Bias (OTB). We have developed an adaptive estimation technique to compensate for overlay variability due to differences in the processing tools. The OTB can be dynamically calculated for each tool, based on the most recent measurements available, and used to correct the control variables. One approach to tracking the effect of different tools is adaptive modeling and control. The basic premise of an adaptive system is to change or adapt the controller as the operating conditions of the system change. Using closed-loop data, the adaptive control algorithm estimates the controller parameters using a recursive estimation technique. Once an updated model of the system is available, modelbased control becomes feasible. In the simplest scenario, the control law can be reformulated to include the current state of the tool (or its estimate) to compensate dynamically for OTB. We have performed simulation studies to predict the impact of deploying this strategy in production. The results for high running parts show rework reductions of about 10%, while low running parts improve by over 50%.

  17. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, October 1994--December 1994

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1995-01-25

    Research is presently being conducted to develop a criteria for selecting weld overlay coatings for erosion mitigation in Circulated Fluidized Beds. Initially, eleven weld overlay alloys were selected for erosion testing based upon a literature review. All eleven coatings were deposited on 1018 steel substrates using the plasma arc welding process. Ten samples from each coating were prepared for erosion testing. The coating deposition and sample preparation procedures were described in the second quarterly report. All selected coatings were erosion tested at 400{degree}C and their erosion resistance was evaluated by determining the steady state erosion rate. In addition, the microstructure of each coating was characterized before and after the erosion tests. The results of the tests are discussed in the third quarterly report. No correlations were found between room temperature hardness of the weld overlay coatings and their erosion resistance at elevated temperature. During the last quarter tensile tests were performed at 400{degree}C for the Ultimet, Inconel-625, 316L SS, C-22, and Stellite-6 wrought alloys. The erosion tests for these materials at 400{degree}C are in progress. The results of mechanical and erosion tests will be used to correlate mechanical properties of selected wrought alloys such as tensile toughness, ductility, strain hardening coefficient and yield strength to their erosion resistance at 400{degree}C. Also, the erosion behavior of the wrought alloys compared with similar weld alloys will be analyzed. The experimental procedure and results of the tensile tests are presented in this progress report.

  18. Surface states of clean and metal-overlayer-covered Cr(001) films

    NASA Astrophysics Data System (ADS)

    Feibelman, Peter J.; Hamann, D. R.

    1985-01-01

    Electronic-structure calculations for a clean Cr(001) film and for Cr(001) films covered with Au, Pt, or Ir monolayers predict a surface band localized on the outer Cr layer near the Fermi level. The high density of surface states in the Au adsorption case may help explain the recent observation of 3-K superconductivity in Au-Cr-Au sandwiches. The stability of the surface band against overlayer adsorption indicates the necessity of refining the test usually used to identify spectroscopic peaks as surface states.

  19. Two-dimensional Ostwald ripening on a patterned support and in a mixed overlayer

    NASA Astrophysics Data System (ADS)

    Zhdanov, Vladimir P.

    2016-02-01

    The author presents lattice Monte Carlo simulations of Ostwald ripening of islands formed of monomers with attractive nearest-neighbor interaction in two situations. The first one implies that monomers of one kind are located on a heterogeneous support which itself includes embedded frozen patterns of the Ostwald type. This feature is demonstrated to be able to terminate the island ripening. In the second case, the support is considered to be uniform while the overlayer is assumed to contain monomers of two kinds. This complicating factor is found to nearly not modify the ripening kinetics or make it somewhat slower despite appreciable correlations in the arrangement of different monomers.

  20. Robotic weld overlay coatings for erosion control. Quarterly technical progress report, April 1993--June 1993

    SciTech Connect

    Levin, B.F.; Dupont, J.N.; Marder, A.R.

    1993-07-20

    Twelve weld overlay hardfacing alloys have been selected for preliminary erosion testing based upon a literature review. Four of the selected coatings were deposited on a 1018 steel substrate using plasma arc welding process. During the past quarter, the remaining eight coatings were deposited in the same manner. Ten samples from each coatings were prepared for erosion testing. Microstructural characterization of each coating is in progress. This progress report describes coating deposition and sample preparation procedures. Relation between coatings hardness and formation of cracks in coatings is discussed.

  1. Nasal bone grafts from the removed hump used as overlay grafts to camouflage concave lateral crura.

    PubMed

    Kubilay, Utku; Erdogdu, Suleyman; Sezen, Ozan Seymen

    2014-01-01

    Alar cartilage consists of a medial crus, middle crus and lateral crus. The lateral crus is an important aesthetic and functional structure of the nose. A 32-year-old male patient with concave lateral crura was operated by the authors. An open rhinoplasty with a dorsal approach to the septum is preferred. The nasal bones harvested from the hump, which is an autogenous graft trimmed and sutured on both concave lateral crura as an overlay camouflage grafts. Satisfactory result was achieved. PMID:24533419

  2. Security in the Schools.

    ERIC Educational Resources Information Center

    Nelson, Jesse

    1997-01-01

    Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)

  3. TWRS privatization process technical baseline

    SciTech Connect

    Orme, R.M.

    1996-09-13

    The U.S. Department of Energy (DOE) is planning a two-phased program for the remediation of Hanford tank waste. Phase 1 is a pilot program to demonstrate the procurement of treatment services. The volume of waste treated during the Phase 1 is a small percentage of the tank waste. During Phase 2, DOE intends to procure treatment services for the balance of the waste. The TWRS Privatization Process Technical Baseline (PPTB) provides a summary level flowsheet/mass balance of tank waste treatment operations which is consistent with the tank inventory information, waste feed staging studies, and privatization guidelines currently available. The PPTB will be revised periodically as privatized processing concepts are crystallized.

  4. 76 FR 5209 - Notice of Availability of the Environmental Assessment for New Low Security Beds

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-28

    ... approximately 1,000 low-security adult male inmates that are primarily criminal aliens. The BOP is seeking to reduce prison overcrowding by requesting additional contract beds for low-security male criminal aliens... one private contractor to house approximately 1,000 Federal, low-security, adult male,...

  5. The reaction of private physicians to price deregulation in France.

    PubMed

    Carrere, M O

    1991-01-01

    French private physicians are paid on a fee-for-service basis and nearly all of them are under contract to the Social Security, which refunds part of the medical fee to the whole population. Previously the prices of medical services were fixed, but since 1980, a new option has been possible: a doctor can choose to fix the price of his services freely, provided he pays a higher social insurance contribution. But the amount refunded by Social Security does not vary, so that the consumer has to bear the extra charge. Our purpose here is to identify the factors that influence the physician's option. In Section 2, we define a model of the private physician's economic behaviour, of the classic income-leisure type. In Section 3, empirical tests are performed on a sample of observations in 95 'départements', gathering information about private GPs on the one hand, and the whole population on the other. According to our results, GPs' decisions depend on characteristics of both supply of and demand for GPs' services. One of our conclusions is that GPs seem to make up for low activity levels with higher prices, on condition the income of their practice allows it. PMID:1776035

  6. LBNL SecureMessaging

    Energy Science and Technology Software Center (ESTSC)

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanentmore » and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.« less

  7. LBNL SecureMessaging

    SciTech Connect

    Pery, Marcia; Agarwal, Deb

    2003-03-17

    The LBNLSecureMessaging application enables collaboration among colocated or geograhically dispersed users by supporting secure synchronous and asynchronous communication. This application is the graphical user interface client that is meant to be used in conjunction with servers (LBNL's PCCEServer and a customized IRC server) to allow group and one-to-one conversations via text-based instant messaging. Conversations may be private (by invitation only) or public (open to any member of a collaboratory group_ and they may be permanent and on-going or temporary and ad hoc. Users may leave notes for other people who are online or offline. By providing presence and awareness information, collaborators can easily locate each other and rendezvous. Written in Java/Swing, this application is cross-platform. To gain access to functionality, users have to be registered with an authorization server (PCCEServer) that maintains an access control list. Thus a collaboration group is comprised of a set of PCCE-registered users. Registered users can log in via either X.509 certificate or a username and password combination. PKI and SSL are used to authenticate servers and clients and to encrypt messages sent over the network. The LBNLSecureMessaging application offers instant messaging capabilities in a secure environment that provides data integrity, privacyk authorization, and authentication.

  8. Public Schools, Private Markets: A Reporter's Guide to Privatization

    ERIC Educational Resources Information Center

    Elliott, Scott

    2005-01-01

    More and more, private for-profit and non-profit organizations are involved in schools. No longer limited to support services like transportation and food services, companies are providing tutoring, directing classroom instruction and managing public and charter schools. School reform has raised the stakes for schools and students, asking for…

  9. Assessment of Potential Location of High Arsenic Contamination Using Fuzzy Overlay and Spatial Anisotropy Approach in Iron Mine Surrounding Area

    PubMed Central

    Wirojanagud, Wanpen; Srisatit, Thares

    2014-01-01

    Fuzzy overlay approach on three raster maps including land slope, soil type, and distance to stream can be used to identify the most potential locations of high arsenic contamination in soils. Verification of high arsenic contamination was made by collection samples and analysis of arsenic content and interpolation surface by spatial anisotropic method. A total of 51 soil samples were collected at the potential contaminated location clarified by fuzzy overlay approach. At each location, soil samples were taken at the depth of 0.00-1.00 m from the surface ground level. Interpolation surface of the analysed arsenic content using spatial anisotropic would verify the potential arsenic contamination location obtained from fuzzy overlay outputs. Both outputs of the spatial surface anisotropic and the fuzzy overlay mapping were significantly spatially conformed. Three contaminated areas with arsenic concentrations of 7.19 ± 2.86, 6.60 ± 3.04, and 4.90 ± 2.67 mg/kg exceeded the arsenic content of 3.9 mg/kg, the maximum concentration level (MCL) for agricultural soils as designated by Office of National Environment Board of Thailand. It is concluded that fuzzy overlay mapping could be employed for identification of potential contamination area with the verification by surface anisotropic approach including intensive sampling and analysis of the substances of interest. PMID:25110751

  10. Cyanide adsorption on silver and gold overlayers on island films as determined by surface enhanced Raman scattering

    NASA Astrophysics Data System (ADS)

    Murray, Cherry A.; Bodoff, Stephanie

    1986-07-01

    Cyanide adsorption in air on silver, gold, and overlayers of gold on silver and silver on gold is investigated by surface enhanced Raman scattering, using island films to enhance the CN Raman scattering by ˜4 orders of magnitude. We studied pure metal island films as well as either silver or gold islands coated with the other metal with overlayer thicknesses ranging from 0.2 to 4 monolayers (Ml). We studied the coverage dependence of the cyanide adsorption for CN coverages ranging from 0.01 to ˜1 Ml. The Raman spectra reveal both considerable adsorption similarities and noteworthy differences for CN adsorption on the pure metals as compared to the overlayers. The spectra also reveal the order of adsorption of the CN into various possible sites, including the substrate metal sites. For each substrate system studied, we find two new distinct linear, on-top CN species adsorbed to two different types of surface site. The harmonic force constants and vibrational modes of the chemisorbed CN differ substantially on silver and gold, and are yet again different for the thin overlayer systems, due to the incomplete buildup of the overlayer three dimensional band structure.

  11. IMPERMEABLE THIN Al2O3 OVERLAY FOR TBC PROTECTION FROM SULFATE AND VANADATE ATTACK IN GAS TURBINES

    SciTech Connect

    Scott X. Mao

    2003-06-10

    In order to improve the hot corrosion resistance of yttria-stabilized zirconia (YSZ), an Al{sub 2}O{sub 3} overlay has been deposited on the surface of YSZ by electron-beam physical vapor deposition. Currently, hot corrosion tests were performed on the YSZ coatings with and without Al{sub 2}O{sub 3} overlay in molten salt mixture (Na{sub 2}SO{sub 4} + 0 {approx} 15wt%V{sub 2}O{sub 5}) at 950 C in order to investigate the effect of amount of vanadate on the hot corrosion behaviors. The results showed that the presence of in V{sub 2}O{sub 5} the molten salt exacerbates the degradation of both the monolithic YSZ coating and the composite YSZ/Al{sub 2}O{sub 3} system. The formation of low-melting Na{sub 2}O-V{sub 2}O{sub 5}-Al{sub 2}O{sub 3} liquid phase is responsible for degradation of the Al{sub 2}O{sub 3} overlay. The Al{sub 2}O{sub 3} overlay acts as a barrier against the infiltration of the molten salt into the YSZ coating during exposure to the molten salt mixture with <5wt% vanadate. In the next reporting period, we will use XPS and SIMS to study the interactions between alumina overlay and molten salt containing vanadate.

  12. Impermeable thin AI2O3 overlay for TBC protection from sulfate and vanadate attack in gas turbines

    SciTech Connect

    Scott X. Mao

    2005-01-31

    25 {micro}m and a 2 {micro}m thick Al{sub 2}O{sub 3} overlay were deposited by HVOF thermal spray and by sol-gel coating method, respectively, onto to the surface of YSZ coating. Indenter test was employed to investigate the spalling of YSZ with and without Al{sub 2}O{sub 3} overlay after hot corrosion. The results showed that Al{sub 2}O{sub 3} overlay acted as a barrier against the infiltration of the molten salt into the YSZ coating during exposure, thus significantly reduced the amount of M-phase of ZrO{sub 2} in YSZ coating. Thick Al{sub 2}O{sub 3} overlay will increase compressive stress and failure in TBC. During next reporting time, Al{sub 2}O{sub 3} overlay will be deposited on the YSZ surface by the composite-sol-gel route (CSG). Hot corrosion tests will be carried out on the TBC.

  13. Hydrogen on and in Selected Overlayer Near-Surface Alloys and the Effect of Subsurface Hydrogen on the Reactivity of Alloy Surfaces

    SciTech Connect

    Kandoi, Shampa; Ferrin, Peter A.; Mavrikakis, Manos

    2010-05-01

    The interaction of hydrogen with the closepacked facets of seventeen transition metals overlaid with 1 ML of five transition metals (Au, Ag, Cu, Pt, and Pd) has been studied using periodic self-consistent (GGA-PW91) density functional theory (DFT) calculations. For noble metal overlayers (Au, Ag, and Cu), hydrogen at the hostmetal/ overlayer interface (subsurface hydrogen) is more stable than subsurface hydrogen in the pure host. For certain Au and Ag overlayers, subsurface hydrogen is more stable than surface hydrogen in the same system. The presence of subsurface hydrogen was found to have a significant effect on the electronic structure of the overlayer, resulting in its modified surface reactivity.

  14. Small Private Key PKS on an Embedded Microprocessor

    PubMed Central

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic ( ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  15. Small private key MQPKS on an embedded microprocessor.

    PubMed

    Seo, Hwajeong; Kim, Jihyun; Choi, Jongseok; Park, Taehwan; Liu, Zhe; Kim, Howon

    2014-01-01

    Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. As a result of this, at CHES2011 (Cryptographic Hardware and Embedded Systems, 2011), a small public key MQ scheme, was proposed, and its feasible implementation on an embedded microprocessor was reported at CHES2012. However, the implementation of a small private key MQ scheme was not reported. For efficient implementation, random number generators can contribute to reduce the key size, but the cost of using a random number generator is much more complex than computing MQ on modern microprocessors. Therefore, no feasible results have been reported on embedded microprocessors. In this paper, we propose a feasible implementation on embedded microprocessors for a small private key MQ scheme using a pseudo-random number generator and hash function based on a block-cipher exploiting a hardware Advanced Encryption Standard (AES) accelerator. To speed up the performance, we apply various implementation methods, including parallel computation, on-the-fly computation, optimized logarithm representation, vinegar monomials and assembly programming. The proposed method reduces the private key size by about 99.9% and boosts signature generation and verification by 5.78% and 12.19% than previous results in CHES2012. PMID:24651722

  16. Study of spread spectrum multiple access systems for satellite communications with overlay on current services

    NASA Technical Reports Server (NTRS)

    Ha, Tri T.; Pratt, Timothy

    1989-01-01

    The feasibility of using spread spectrum techniques to provide a low-cost multiple access system for a very large number of low data terminals was investigated. Two applications of spread spectrum technology to very small aperture terminal (VSAT) satellite communication networks are presented. Two spread spectrum multiple access systems which use a form of noncoherent M-ary FSK (MFSK) as the primary modulation are described and the throughput analyzed. The analysis considers such factors as satellite power constraints and adjacent satellite interference. Also considered is the effect of on-board processing on the multiple access efficiency and the feasibility of overlaying low data rate spread spectrum signals on existing satellite traffic as a form of frequency reuse is investigated. The use of chirp is examined for spread spectrum communications. In a chirp communication system, each data bit is converted into one or more up or down sweeps of frequency, which spread the RF energy across a broad range of frequencies. Several different forms of chirp communication systems are considered, and a multiple-chirp coded system is proposed for overlay service. The mutual interference problem is examined in detail and a performance analysis undertaken for the case of a chirp data channel overlaid on a video channel.

  17. Overlay coating degradation by simultaneous oxidation and coating/substrate interdiffusion. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Nesbitt, J. A.

    1983-01-01

    Degradation of NiCrAlZr overlay coatings on various NiCrAl substrates was examined after cyclic oxidation. Concentration/distance profiles were measured in the coating and substrate after various oxidation exposures at 1150 C. For each stubstrate, the Al content in the coating decreased rapidly. The concentration/distance profiles, and particularly that for Al, reflected the oxide spalling resistance of each coated substrate. A numerical model was developed to simulate diffusion associated with overlay-coating degradation by oxidation and coating/substrate interdiffusion. Input to the numerical model consisted of the Cr and Al content of the coating and substrate, ternary diffusivities, and various oxide spalling parameters. The model predicts the Cr and Al concentrations in the coating and substrate after any number of oxidation/thermal cycles. The numerical model also predicts coating failure based on the ability of the coating to supply sufficient Al to the oxide scale. The validity of the model was confirmed by comparison of the predicted and measured concentration/distance profiles. The model was subsequently used to identify the most critical system parameters affecting coating life.

  18. Development of a novel accelerometer based on an overlay detection bridge

    NASA Astrophysics Data System (ADS)

    Chunhui, Du; Changde, He; Xiaoyang, Ge; Yongping, Zhang; Jiaqi, Yu; Xiaopeng, Song; Wendong, Zhang

    2013-02-01

    This paper describes the design, simulation, processing and test result of a high sensitivity accelerometer based on the piezoresistive effect which uses an overlay bridge detection method. The structure of this accelerometer is supersymmetric “mass-beams". This accelerometer has 8 beams, where two varistors are put in the two ends. Four varistors compose a Wheatstone bridge and the output voltages of the 4 Wheatstone bridges have been superimposed as the final output voltage. The sensitivity of the accelerometer can be improved effectively by these clever methods. A simplified mathematical model has been created to analyze the mechanical properties of the sensor, then the finite element modeling and simulation have been used to verify the feasibility of the accelerometer. The results show that the sensitivity of the accelerometer is 1.1381 mV/g, which is about four times larger than that of the single bridge accelerometers and series bridge sensor. The bandwidth is 0-1000 Hz which is equal to that of the single bridge accelerometers and the series bridge sensor. The comparison reveals that the new overlay detection bridge method can improve the sensitivity of the sensor in the same bandwidth. Meanwhile, this method provides an effective method to improve the sensitivity of piezoresistive sensors.

  19. Automated overlay recipe setup in high-volume manufacturing: improving performance, efficiency, and robustness

    NASA Astrophysics Data System (ADS)

    Sparka, Christian; Golotsvan, Anna; Avrahamov, Yosef; Sitzmann, Wolfgang; Tien, David

    2009-03-01

    As the semiconductor industry continues to drive toward smaller design nodes, overlay error budgets will continue to shrink making metrology ever more challenging. Moreover, this challenge is compounded by the need to continue to drive down costs and increase productivity, especially given the competitive and macro-economic landscape going forward. In order to satisfy these two contradicting requirements, new ways of maintaining metrology tools and recipes are needed. Traditionally, recipes are generated manually by operators or even metrology engineers, involving both tool time and engineering resources. Furthermore, the influence of individual skill levels can lead to undesirable variations and is a potential source of errors that could result in yield loss. By means of automatic recipe generation both engineering and capital equipment resources can be minimized. Implementation of an automated recipe creation process will also result in improved recipe integrity. In this study, we show a methodology of a highly automated recipe generation for overlay measurements. We will outline the benefits of such an implementation and comment on the value for all segments of the semiconductor industry as well as provide data from production fabs demonstrating these capabilities and benefits.

  20. Unravelling the hydrogen absorption process in Pd overlayers on a Au(111) surface.

    PubMed

    Quaino, Paola M; Nazmutdinov, Renat; Peiretti, Leonardo F; Santos, Elizabeth

    2016-02-01

    The hydrogen absorption into overlayers of Pd deposited on Au(111) has been investigated by density functional theory (DFT). Hydrogen concentrations, absorption environments, and geometrical and electronic effects have been analyzed, seeking for a better understanding of the general principles governing the process and the effect of foreign supports. The results show that the absorption is more favored than in pure Pd leading to lower absorption energies and less repulsive interactions due to the surface expansion induced by the gold larger lattice constant. Our findings also suggest that the hydrogen absorption process is more favorable for a less number of Pd overlayers. This situation changes gradually until the substrate influence is no longer detected and the pure palladium nature appears. An entangled combination of repulsive forces, strain effect, structural ordering and chemical affinity has been found. The kinetics of hydrogen absorption has been studied as well. Two cases were explored: (1) the absorption of an adsorbed hydrogen atom and (2) the bond-breaking and penetration of a H2 molecule. PMID:26758287

  1. Vision-based overlay of a virtual object into real scene for designing room interior

    NASA Astrophysics Data System (ADS)

    Harasaki, Shunsuke; Saito, Hideo

    2001-10-01

    In this paper, we introduce a geometric registration method for augmented reality (AR) and an application system, interior simulator, in which a virtual (CG) object can be overlaid into a real world space. Interior simulator is developed as an example of an AR application of the proposed method. Using interior simulator, users can visually simulate the location of virtual furniture and articles in the living room so that they can easily design the living room interior without placing real furniture and articles, by viewing from many different locations and orientations in real-time. In our system, two base images of a real world space are captured from two different views for defining a projective coordinate of object 3D space. Then each projective view of a virtual object in the base images are registered interactively. After such coordinate determination, an image sequence of a real world space is captured by hand-held camera with tracking non-metric measured feature points for overlaying a virtual object. Virtual objects can be overlaid onto the image sequence by taking each relationship between the images. With the proposed system, 3D position tracking device, such as magnetic trackers, are not required for the overlay of virtual objects. Experimental results demonstrate that 3D virtual furniture can be overlaid into an image sequence of the scene of a living room nearly at video rate (20 frames per second).

  2. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    SciTech Connect

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  3. A high-accuracy surgical augmented reality system using enhanced integral videography image overlay.

    PubMed

    Zhang, Xinran; Chen, Guowen; Liao, Hongen

    2015-08-01

    Image guided surgery has been used in clinic to improve the surgery safety and accuracy. Augmented reality (AR) technique, which can provide intuitive image guidance, has been greatly evolved these years. As one promising approach of surgical AR systems, integral videography (IV) autostereoscopic image overlay has achieved accurate fusion of full parallax guidance into surgical scene. This paper describes an image enhanced high-accuracy IV overlay system. A flexible optical image enhancement system (IES) is designed to increase the resolution and quality of IV image. Furthermore, we introduce a novel IV rendering algorithm to promote the spatial accuracy with the consideration of distortion introduced by micro lens array. Preliminary experiments validated that the image accuracy and resolution are improved with the proposed methods. The resolution of the IV image could be promoted to 1 mm for a micro lens array with pitch of 2.32 mm and IES magnification value of 0.5. The relative deviation of accuracy in depth and lateral directions are -4.68 ± 0.83% and -9.01 ± 0.42%. PMID:26737223

  4. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  5. Hot Corrosion of Inconel 625 Overlay Weld Cladding in Smelting Off-Gas Environment

    NASA Astrophysics Data System (ADS)

    Mohammadi Zahrani, E.; Alfantazi, A. M.

    2013-10-01

    Degradation mechanisms and hot corrosion behavior of weld overlay alloy 625 were studied. Phase structure, morphology, thermal behavior, and chemical composition of deposited salt mixture on the weld overlay were characterized utilizing XRD, SEM/EDX, DTA, and ICP/OES, respectively. Dilution level of Fe in the weldment, dendritic structure, and degradation mechanisms of the weld were investigated. A molten phase formed on the weld layer at the operating temperature range of the boiler, which led to the hot corrosion attack in the water wall and the ultimate failure. Open circuit potential and weight-loss measurements and potentiodynamic polarization were carried out to study the hot corrosion behavior of the weld in the simulated molten salt medium at 873 K, 973 K, and 1073 K (600 °C, 700 °C, and 800 °C). Internal oxidation and sulfidation plus pitting corrosion were identified as the main hot corrosion mechanisms in the weld and boiler tubes. The presence of a significant amount of Fe made the dendritic structure of the weld susceptible to preferential corrosion. Preferentially corroded (Mo, Nb)-depleted dendrite cores acted as potential sites for crack initiation from the surface layer. The penetration of the molten phase into the cracks accelerated the cracks' propagation mainly through the dendrite cores and further crack branching/widening.

  6. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP. PMID:24217358

  7. Public-Private Manpower Policies.

    ERIC Educational Resources Information Center

    Weber, Arnold R., Ed.; And Others

    This book deals with the question of identifying the optimal mix between public and private programs and provides some guides concerning the appropriate role of government in the manpower area. There is a need for public manpower programs which give some long range direction to manpower policies and which give continuing emphasis to the…

  8. Financing a Private School Education

    ERIC Educational Resources Information Center

    Torres, Amanda

    2014-01-01

    A recent National Association of Independent Schools (NAIS) survey of more than 1,200 individuals who filed financial aid forms underscores the central role financial aid plays in their ability to pursue a private education for their children. This article highlights the survey findings, demonstrating why school leaders need to thoroughly analyze…

  9. Private Tutoring and Social Cohesion

    ERIC Educational Resources Information Center

    Heyneman, Stephen P.

    2011-01-01

    Mastering the public school curriculum is so important to a child's occupational future that in many regions of the world "shadow" education outside of the public system has now become the norm. In one way, this is excellent news because private investment in human capital is a strong contributor to economic and social development. However,

  10. Financing of Private Outdoor Recreation.

    ERIC Educational Resources Information Center

    Bureau of Outdoor Recreation (Dept. of Interior), Washington, DC.

    A survey of financial institutions was undertaken by the Bureau of Outdoor Recreation to evaluate the demand and availability of private credit for enterprises that provide outdoor recreation. The survey provided basic information for (1) evaluating legislative proposals for loan guarantee programs, (2) nationwide planning, and (3) assessing the…

  11. Financing a Private School Education

    ERIC Educational Resources Information Center

    Torres, Amanda

    2014-01-01

    A recent National Association of Independent Schools (NAIS) survey of more than 1,200 individuals who filed financial aid forms underscores the central role financial aid plays in their ability to pursue a private education for their children. This article highlights the survey findings, demonstrating why school leaders need to thoroughly analyze

  12. The Privatization of Public Education

    ERIC Educational Resources Information Center

    Hunter, Richard

    2010-01-01

    For-profit education is not a new focus for public schools in the United States. It has been around for several decades, has stimulated considerable controversy, and has been heralded by some as a panacea for improving learning for the nation's public school students. For-profit schools are run by private, for-profit companies or organizations…

  13. Privatization and the Public Good

    ERIC Educational Resources Information Center

    Lambert, Matthew T.

    2015-01-01

    After two centuries of public higher education in the United States, the covenant between public colleges and universities and the public that created and funded them is under strain. In a time of scarce resources and changing policy in many corners of the country and around the globe, privatization has emerged as a possible replacement for the

  14. Ins and Outs of Privatization.

    ERIC Educational Resources Information Center

    Daneman, Kathy

    1998-01-01

    Discusses the pros and cons of privatization as a way of saving money while improving non-educational operations. Questions about why some services should be kept in-house are addressed, as well as what to look for when considering outsourcing. One school's experience with outsourcing health-care services is highlighted. (GR)

  15. Public Schools: Make Them Private.

    ERIC Educational Resources Information Center

    Friedman, Milton

    1997-01-01

    A voucher system enabling parents to choose freely the schools their children attend is the most feasible way to improve education. Vouchers will encourage privatization. That will unleash the drive, imagination, and energy of competitive free enterprise to revolutionize the education process. Government schools will be forced to improve to retain…

  16. The Administration's Private Pension Proposal.

    ERIC Educational Resources Information Center

    American Enterprise Inst. for Public Policy Research, Washington, DC.

    This report examines legislation proposed by the Nixon administration to (1) make available to employed workers a new type of personal retirement plan having tax-deferral advantages, (2) apply pre-retirement vesting requirements to the private pension system, and (3) broaden tax-deferred retirement plans presently available to the self-employed…

  17. Privatization and the Public Good

    ERIC Educational Resources Information Center

    Lambert, Matthew T.

    2015-01-01

    After two centuries of public higher education in the United States, the covenant between public colleges and universities and the public that created and funded them is under strain. In a time of scarce resources and changing policy in many corners of the country and around the globe, privatization has emerged as a possible replacement for the…

  18. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  19. A van der Waals density functional study of adenine on graphene: Single molecular adsorption and overlayer binding

    SciTech Connect

    Berland, Kristian; Cooper, Valentino R; Langreth, David C.; Schroder, Prof. Elsebeth; Chakarova-Kack, Svetla

    2011-01-01

    The adsorption of an adenine molecule on graphene is studied using a first-principles van der Waals functional (vdW-DF) [Dion et al., Phys. Rev. Lett. 92, 246401 (2004)]. The cohesive energy of an ordered adenine overlayer is also estimated. For the adsorption of a single molecule, we determine the optimal binding configuration and adsorption energy by translating and rotating the molecule. The adsorption energy for a single molecule of adenine is found to be 711 meV, which is close to the calculated adsorption energy of the similar-sized naphthalene. Based on the single molecular binding configuration, we estimate the cohesive energy of a two-dimensional ordered overlayer. We find a significantly stronger binding energy for the ordered overlayer than for single-molecule adsorption.

  20. Maxillary and mandibular overlay removable partial dentures for the treatment of posterior open-occlusal relationship: a clinical report.

    PubMed

    Del Castillo, Rafael; Lamar, Frank; Ercoli, Carlo

    2002-06-01

    This clinical report describes the use of maxillary and mandibular overlay removable partial dentures to treat a patient with class III skeletal malocclusion and a posterior open-occlusal relationship. Overlay removable partial denture therapy was used as an alternative to other options such as orthodontics and combined orthodontic/oral surgery procedures; it satisfied the esthetic and functional requirements of the patient and provided a stable occlusion. Overlay removable partial dentures are a reversible and relatively inexpensive treatment for patients with congenital or acquired anomalies, but the potential disadvantages of these prostheses include compromised esthetics when the dentures are removed; caries and periodontal disease as a result of poor oral hygiene; and veneer material fracture, debonding, discoloration, and wear. PMID:12131878