Keystroke Dynamics-Based Credential Hardening Systems
NASA Astrophysics Data System (ADS)
Bartlow, Nick; Cukic, Bojan
abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
Preventing Shoulder-Surfing Attack with the Concept of Concealing the Password Objects' Information
Ho, Peng Foong; Kam, Yvonne Hwei-Syn; Wee, Mee Chin
2014-01-01
Traditionally, picture-based password systems employ password objects (pictures/icons/symbols) as input during an authentication session, thus making them vulnerable to “shoulder-surfing” attack because the visual interface by function is easily observed by others. Recent software-based approaches attempt to minimize this threat by requiring users to enter their passwords indirectly by performing certain mental tasks to derive the indirect password, thus concealing the user's actual password. However, weaknesses in the positioning of distracter and password objects introduce usability and security issues. In this paper, a new method, which conceals information about the password objects as much as possible, is proposed. Besides concealing the password objects and the number of password objects, the proposed method allows both password and distracter objects to be used as the challenge set's input. The correctly entered password appears to be random and can only be derived with the knowledge of the full set of password objects. Therefore, it would be difficult for a shoulder-surfing adversary to identify the user's actual password. Simulation results indicate that the correct input object and its location are random for each challenge set, thus preventing frequency of occurrence analysis attack. User study results show that the proposed method is able to prevent shoulder-surfing attack. PMID:24991649
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
Exploring the Use of Discrete Gestures for Authentication
NASA Astrophysics Data System (ADS)
Chong, Ming Ki; Marsden, Gary
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
NASA Astrophysics Data System (ADS)
Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao
2015-11-01
In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).
Provably Secure Password-based Authentication in TLS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier
2005-12-20
In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised tomore » the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.« less
MPI Enhancements in John the Ripper
NASA Astrophysics Data System (ADS)
Sykes, Edward R.; Lin, Michael; Skoczen, Wesley
2010-11-01
John the Ripper (JtR) is an open source software package commonly used by system administrators to enforce password policy. JtR is designed to attack (i.e., crack) passwords encrypted in a wide variety of commonly used formats. While parallel implementations of JtR exist, there are several limitations to them. This research reports on two distinct algorithms that enhance this password cracking tool using the Message Passing Interface. The first algorithm is a novel approach that uses numerous processors to crack one password by using an innovative approach to workload distribution. In this algorithm the candidate password is distributed to all participating processors and the word list is divided based on probability so that each processor has the same likelihood of cracking the password while eliminating overlapping operations. The second algorithm developed in this research involves dividing the passwords within a password file equally amongst available processors while ensuring load-balanced and fault-tolerant behavior. This paper describes John the Ripper, the design of these two algorithms and preliminary results. Given the same amount of time, the original JtR can crack 29 passwords, whereas our algorithms 1 and 2 can crack an additional 35 and 45 passwords respectively.
The Effect of Password Management Procedures on the Entropy of User Selected Passwords
ERIC Educational Resources Information Center
Enamait, John D.
2012-01-01
Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…
Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chevassut, Olivier; Milner, Joseph; Pointcheval, David
2008-04-21
The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on anmore » analysis of relevant patents in the area.« less
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han; Lin, Tsung-Hung
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.
Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps
Lee, Tian-Fu; Hsiao, Chia-Hung; Hwang, Shi-Han
2017-01-01
A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes. PMID:28759615
27 CFR 73.12 - What security controls must I use for identification codes and passwords?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...
Implications of What Children Know about Computer Passwords
ERIC Educational Resources Information Center
Coggins, Porter E.
2013-01-01
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Password-free network security through joint use of audio and video
NASA Astrophysics Data System (ADS)
Civanlar, Mehmet R.; Chen, Tsuhan
1997-01-01
REmote authentication is vital for many network based applications. As the number of such applications increases, user friendliness of the authentication process, particularly as it relates to password management, becomes as important as its reliability. The multimedia capabilities of the modern terminal equipment can provide the basis for a dependable and easy to use authentication system which does not require the user to memorize passwords. This paper outlines our implementation of an authentication system based on the joint use of the speech and facial video of a user. Our implementation shows that the voice and the video of the associated lip movements, when used together, can be very effective for password free authentication.
Password-only authenticated three-party key exchange with provable security in the standard model.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.
Encryption Characteristics of Two USB-based Personal Health Record Devices
Wright, Adam; Sittig, Dean F.
2007-01-01
Personal health records (PHRs) hold great promise for empowering patients and increasing the accuracy and completeness of health information. We reviewed two small USB-based PHR devices that allow a patient to easily store and transport their personal health information. Both devices offer password protection and encryption features. Analysis of the devices shows that they store their data in a Microsoft Access database. Due to a flaw in the encryption of this database, recovering the user’s password can be accomplished with minimal effort. Our analysis also showed that, rather than encrypting health information with the password chosen by the user, the devices stored the user’s password as a string in the database and then encrypted that database with a common password set by the manufacturer. This is another serious vulnerability. This article describes the weaknesses we discovered, outlines three critical flaws with the security model used by the devices, and recommends four guidelines for improving the security of similar devices. PMID:17460132
2009-12-01
other services for early UNIX systems at Bell labs. In many UNIX based systems, the field added to ‘etc/ passwd ’ file to carry GCOS ID information was...charset, and external. struct options_main { /* Option flags */ opt_flags flags; /* Password files */ struct list_main * passwd ; /* Password file...object PASSWD . It is part of several other data structures. struct PASSWD { int id; char *login; char *passwd_hash; int UID
Security analysis and improvements to the PsychoPass method.
Brumen, Bostjan; Heričko, Marjan; Rozman, Ivan; Hölbl, Marko
2013-08-13
In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength.
Security Analysis and Improvements to the PsychoPass Method
2013-01-01
Background In a recent paper, Pietro Cipresso et al proposed the PsychoPass method, a simple way to create strong passwords that are easy to remember. However, the method has some security issues that need to be addressed. Objective To perform a security analysis on the PsychoPass method and outline the limitations of and possible improvements to the method. Methods We used the brute force analysis and dictionary attack analysis of the PsychoPass method to outline its weaknesses. Results The first issue with the Psychopass method is that it requires the password reproduction on the same keyboard layout as was used to generate the password. The second issue is a security weakness: although the produced password is 24 characters long, the password is still weak. We elaborate on the weakness and propose a solution that produces strong passwords. The proposed version first requires the use of the SHIFT and ALT-GR keys in combination with other keys, and second, the keys need to be 1-2 distances apart. Conclusions The proposed improved PsychoPass method yields passwords that can be broken only in hundreds of years based on current computing powers. The proposed PsychoPass method requires 10 keys, as opposed to 20 keys in the original method, for comparable password strength. PMID:23942458
Decryption-decompression of AES protected ZIP files on GPUs
NASA Astrophysics Data System (ADS)
Duong, Tan Nhat; Pham, Phong Hong; Nguyen, Duc Huu; Nguyen, Thuy Thanh; Le, Hung Duc
2011-10-01
AES is a strong encryption system, so decryption-decompression of AES encrypted ZIP files requires very large computing power and techniques of reducing the password space. This makes implementations of techniques on common computing system not practical. In [1], we reduced the original very large password search space to a much smaller one which surely containing the correct password. Based on reduced set of passwords, in this paper, we parallel decryption, decompression and plain text recognition for encrypted ZIP files by using CUDA computing technology on graphics cards GeForce GTX295 of NVIDIA, to find out the correct password. The experimental results have shown that the speed of decrypting, decompressing, recognizing plain text and finding out the original password increases about from 45 to 180 times (depends on the number of GPUs) compared to sequential execution on the Intel Core 2 Quad Q8400 2.66 GHz. These results have demonstrated the potential applicability of GPUs in this cryptanalysis field.
Mishra, Raghavendra; Barnwal, Amit Kumar
2015-05-01
The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Nam, Junghyun; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon
2014-01-01
Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks. PMID:24977229
Secure Biometric Multi-Logon System Based on Current Authentication Technologies
NASA Astrophysics Data System (ADS)
Tait, Bobby L.
The need for accurate authentication in the current IT world is of utmost importance. Users rely on current IT technologies to facilitate in day to day interactions with nearly all environments. Strong authentication technologies like the various biometric technologies have been in existence for many years. Many of these technologies, for instance fingerprint biometrics, have reached maturity. However, passwords and pins are still the most commonly used authentication mechanisms at this stage. An average user has to be authenticated in various situations during daily interaction with his or her environment, by means of a pin or a password. This results in many different passwords and pins that the user has to remember. The user will eventually either start documenting these passwords and pins, or often, simply use the same password and pin for all authentication situations.
NASA Technical Reports Server (NTRS)
Collins, Earl R., Jr.
1990-01-01
Authorized users respond to changing challenges with changing passwords. Scheme for controlling access to computers defeats eavesdroppers and "hackers". Based on password system of challenge and password or sign, challenge, and countersign correlated with random alphanumeric codes in matrices of two or more dimensions. Codes stored on floppy disk or plug-in card and changed frequently. For even higher security, matrices of four or more dimensions used, just as cubes compounded into hypercubes in concurrent processing.
Storage-based Intrusion Detection: Watching storage activity for suspicious behavior
2002-10-01
password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access pat- terns seen at the storage...example, consider a UNIX system password file (/etc/ passwd ), which con- sists of a set of well-defined records. Records are delimited by a line-break, and...etc/ passwd and verify that they conform to a set of basic integrity rules: 7-field records, non-empty password field, legal default shell, legal home
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
User Account Passwords | High-Performance Computing | NREL
Account Passwords User Account Passwords For NREL's high-performance computing (HPC) systems, learn about user account password requirements and how to set up, log in, and change passwords. Password Logging In the First Time After you request an HPC user account, you'll receive a temporary password. Set
A Password System Based on Sketches
2016-07-12
than traditional passwords. Biometrics include biological properties such as fingerprints, voices, faces, and even handwriting . Fingerprints have been...perturbation of the sketch495 results in a corresponding change in the model, which is exactly what we imply when we say that model is (locally...Conf. on Frontiers in Handwriting Recognition (2010) 339–344.690 [29] M. Martinez-Diaz, J. Fierrez, J. Galbally, The DooDB Graphical Password Database: Data Analysis and Benchmark Results, IEEE Access 1 (2013) 596–605. 32 33
Prevalence of Sharing Access Credentials in Electronic Medical Records
Korach, Tzfania; Shreberk-Hassidim, Rony; Thomaidou, Elena; Uzefovsky, Florina; Ayal, Shahar; Ariely, Dan
2017-01-01
Objectives Confidentiality of health information is an important aspect of the physician patient relationship. The use of digital medical records has made data much more accessible. To prevent data leakage, many countries have created regulations regarding medical data accessibility. These regulations require a unique user ID for each medical staff member, and this must be protected by a password, which should be kept undisclosed by all means. Methods We performed a four-question Google Forms-based survey of medical staff. In the survey, each participant was asked if he/she ever obtained the password of another medical staff member. Then, we asked how many times such an episode occurred and the reason for it. Results A total of 299 surveys were gathered. The responses showed that 220 (73.6%) participants reported that they had obtained the password of another medical staff member. Only 171 (57.2%) estimated how many time it happened, with an average estimation of 4.75 episodes. All the residents that took part in the study (45, 15%) had obtained the password of another medical staff member, while only 57.5% (38/66) of the nurses reported this. Conclusions The use of unique user IDs and passwords to defend the privacy of medical data is a common requirement in medical organizations. Unfortunately, the use of passwords is doomed because medical staff members share their passwords with one another. Strict regulations requiring each staff member to have it's a unique user ID might lead to password sharing and to a decrease in data safety. PMID:28875052
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
2011-08-31
2011 4 . TITLE AND SUBTITLE Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms 5a. CONTRACT...large numbers of hashed passwords (Booz Allen Hamilton, HBGary, Gawker, Sony Playstation , etc.), coupled with the availability of botnets that offer...when evaluating the strength of different password-composition policies. 4 . We investigate the effectiveness of entropy as a measure of password
A resettable and reprogrammable DNA-based security system to identify multiple users with hierarchy.
Li, Hailong; Hong, Wei; Dong, Shaojun; Liu, Yaqing; Wang, Erkang
2014-03-25
Molecular-level security devices have raised ever-increasing interest in recent years to protect data and information from illegal invasion. Prior molecular keypad locks have an output signal dependent upon not only the appropriate combination but also the exact sequence of inputs, but it cannot be reset or reprogrammed. Here, a DNA-based security system with reset and never-reported reprogram function is successfully developed in proof-of-principle, with which one can change the password in case that the system is cracked. The previous password becomes invalid in the reprogrammed security system. Interestingly, more than one password is designed to permit multiple users to access. By harnessing the intrinsic merit of the different passwords, the system can distinguish different user who is endowed with prior authority. The intelligent device is addressed on solid support and facilitates electronic processes, avoiding chemical accumulation in the system by simple removal of the electrode from the input solution and indicating a main avenue for its further development.
Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho
2016-03-01
Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.
Are Password Management Applications Viable? An Analysis of User Training and Reactions
ERIC Educational Resources Information Center
Ciampa, Mark
2011-01-01
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Internet Address Space Management in Digital
1992-09-01
password: % passwd Changing password for wade Old password: New password: Retype new password: 3. Log out of the cluster center machine by typing...that on some machine, you can use the " passwd " command on the machine where the change is needed. 16
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
Mishra, Dheerendra
2015-01-01
Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Biometrics based authentication scheme for session initiation protocol.
Xie, Qi; Tang, Zhixiong
2016-01-01
Many two-factor challenge-response based session initiation protocol (SIP) has been proposed, but most of them are vulnerable to smart card stolen attacks and password guessing attacks. In this paper, we propose a novel three-factor SIP authentication scheme using biometrics, password and smart card, and utilize the pi calculus-based formal verification tool ProVerif to prove that the proposed protocol achieves security and authentication. Furthermore, our protocol is highly efficient when compared to other related protocols.
Alternative Fuels Data Center: Forgot Your Password?
AFDC Printable Version Share this resource Send a link to Alternative Fuels Data Center: Forgot Your Password? to someone by E-mail Share Alternative Fuels Data Center: Forgot Your Password? on to share Alternative Fuels Data Center: Forgot Your Password? on AddThis.com... Forgot Your Password
NASA Technical Reports Server (NTRS)
Bishop, Matt
1990-01-01
Password selection has long been a difficult issue; traditionally, passwords are either assigned by the computer or chosen by the user. When the computer does the assignment, the passwords are often hard to remember; when the user makes the selection, the passwords are often easy to guess. This paper describes a technique, and a mechanism, to allow users to select passwords which to them are easy to remember but to others would be very difficult to guess. The technique is site, user, and group compatible, and allows rapid changing of constraints imposed upon the password. Although experience with this technique is limited, it appears to have much promise.
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
NASA Astrophysics Data System (ADS)
Imamah; Djunaidy, A.; Rachmad, A.; Damayanti, F.
2018-01-01
Password is needed to access the computing services. Text password is a combination between characters, numbers and symbols. One of issues is users will often choose guessable passwords, e.g. date of birth, name of pet, or anniversary date. To address this issue, we proposed password generator using Coupled Congruential method (CLCG). CLCG is a method to solve the weakness of Linear Congruential generator (LCG). In this research, we want to prove that CLCG is really good to generate random password compared to LCG method. The result of this research proves that the highest password strength is obtained by CLCG with score 77.4%. Besides of those things, we had proved that term of LCG is also applicable to CLCG.
[Application of password manager software in health care].
Ködmön, József
2016-12-01
When using multiple IT systems, handling of passwords in a secure manner means a potential source of problem. The most frequent issues are choosing the appropriate length and complexity, and then remembering the strong passwords. Password manager software provides a good solution for this problem, while greatly increasing the security of sensitive medical data. This article introduces a password manager software and provides basic information of the application. It also discusses how to select a really secure password manager software and suggests a practical application to efficient, safe and comfortable use for health care. Orv. Hetil., 2016, 157(52), 2066-2073.
Cazier, Joseph A; Medlin, B Dawn
2006-09-27
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.
Cazier, Joseph A; Medlin, B. Dawn
2006-01-01
For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed. PMID:18066366
NASA Astrophysics Data System (ADS)
Coggins, Porter E.
2015-04-01
The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.
Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel
2002-05-01
Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.
The Emperor’s New Password Manager: Security Analysis of Web-based Password Managers
2014-07-07
POST re- quest, LastPass will store h’ as authenticating Alice. Mallory can then use otp’ to log-in to LastPass us- ing otp’. Of course , decrypting the...everywhere. [36] M. Rochkind. Security, forms, and error handling. In Expert PHP and MySQL , pages 191–247. Springer, 2013. [37] D. Silver, S. Jana, E
Privacy Enhancements for Inexact Biometric Templates
NASA Astrophysics Data System (ADS)
Ratha, Nalini; Chikkerur, Sharat; Connell, Jonathan; Bolle, Ruud
Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns.
Multi-agent integrated password management (MIPM) application secured with encryption
NASA Astrophysics Data System (ADS)
Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd
2017-10-01
Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.
Mishra, Dheerendra; Mukhopadhyay, Sourav; Chaturvedi, Ankita; Kumari, Saru; Khan, Muhammad Khurram
2014-06-01
Remote user authentication is desirable for a Telecare Medicine Information System (TMIS) for the safety, security and integrity of transmitted data over the public channel. In 2013, Tan presented a biometric based remote user authentication scheme and claimed that his scheme is secure. Recently, Yan et al. demonstrated some drawbacks in Tan's scheme and proposed an improved scheme to erase the drawbacks of Tan's scheme. We analyze Yan et al.'s scheme and identify that their scheme is vulnerable to off-line password guessing attack, and does not protect anonymity. Moreover, in their scheme, login and password change phases are inefficient to identify the correctness of input where inefficiency in password change phase can cause denial of service attack. Further, we design an improved scheme for TMIS with the aim to eliminate the drawbacks of Yan et al.'s scheme.
Voice Biometrics as a Way to Self-service Password Reset
NASA Astrophysics Data System (ADS)
Hohgräfe, Bernd; Jacobi, Sebastian
Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.
BACTrack: A Surveillance Technique for Detecting and Locating Bioagent Attacks
2003-06-10
Implementation • Location History – Location tracking/storage using cell - phone network (geo-location mandated by 2006) • Subscription Services...Reporting – User reports symptoms through automated cell - phone interface using password Individual reports only releasable with password Summary...Earlier detection and location relative to medical surveillance • The cell - phone location based service market can offer a means to implement BACTrack and to distribute its costs
Welding and brazing of nickel and nickel-base alloys
NASA Technical Reports Server (NTRS)
Mortland, J. E.; Evans, R. M.; Monroe, R. E.
1972-01-01
The joining of four types of nickel-base materials is described: (1) high-nickel, nonheat-treatable alloys, (2) solid-solution-hardening nickel-base alloys, (3) precipitation-hardening nickel-base alloys, and (4) dispersion-hardening nickel-base alloys. The high-nickel and solid-solution-hardening alloys are widely used in chemical containers and piping. These materials have excellent resistance to corrosion and oxidation, and retain useful strength at elevated temperatures. The precipitation-hardening alloys have good properties at elevated temperature. They are important in many aerospace applications. Dispersion-hardening nickel also is used for elevated-temperature service.
A Secure Mobile-Based Authentication System for e-Banking
NASA Astrophysics Data System (ADS)
Rifà-Pous, Helena
Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable. We propose a challenge-response based one-time password (OTP) scheme that uses symmetric cryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks. Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their own trusted computers.
How strong are passwords used to protect personal health information in clinical trials?
El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth
2011-02-11
Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.
How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?
Moreau, Katherine; Jonker, Elizabeth
2011-01-01
Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106
Code of Federal Regulations, 2010 CFR
2010-07-01
... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...
One-Time Password Tokens | High-Performance Computing | NREL
One-Time Password Tokens One-Time Password Tokens For connecting to NREL's high-performance computing (HPC) systems, learn how to set up a one-time password (OTP) token for remote and privileged a one-time pass code from the HPC Operations team. At the sign-in screen Enter your HPC Username in
Simpler and Safer: One Password Opens Many Online Doors
ERIC Educational Resources Information Center
Carnevale, Dan
2007-01-01
Going online nowadays often requires more log-ins and passwords than most people can remember. Faculty and staff members will sometimes write their various passwords on yellow sticky notes and post them on their computer monitors--leaving confidential data wide open to any passer-by. What if there were just one password? A single log-on for e-mail…
Design and implementation of face recognition system based on Windows
NASA Astrophysics Data System (ADS)
Zhang, Min; Liu, Ting; Li, Ailan
2015-07-01
In view of the basic Windows login password input way lacking of safety and convenient operation, we will introduce the biometrics technology, face recognition, into the computer to login system. Not only can it encrypt the computer system, also according to the level to identify administrators at all levels. With the enhancement of the system security, user input can neither be a cumbersome nor worry about being stolen password confidential.
Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan
2016-12-01
Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.
One-Time Password Registration Key Code Request | High-Performance
Computing | NREL One-Time Password Registration Key Code Request One-Time Password Registration Key Code Request Use this form to request a one-time password (OTP) registration key code for using . Alternate Email In case there is a second email where we might contact you Phone In case we need to contact
Code of Federal Regulations, 2010 CFR
2010-07-01
..., password, and any other form(s) of authentication we may require. We will treat any transactions conducted using your password as having been authorized by you. We are not liable for any loss, liability, cost, or expense that you may incur as a result of transactions made using your password. [72 FR 30978...
Meter, Diana J; Bauman, Sheri
2015-08-01
Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.
Entity Resolution Workflow Installation Process and User Guide
2013-07-01
Program Files\\PostgreSQL\\9.1\\data superuser ( postgres ), service account ( postgres ) password : "password" Port #: 5432 Add an environment variable...in this report. • Run the script found in <GG_HOME>\\ globalgraph-dist-1.4.6-final\\schema- ddl\\postgresSetup.bat. This script will set up Postgres ...Username: postgres DB Admin PWD: password GlobalGraph App User: gguser GlobalGraph App PWD: password • Restart the Postgres service using the Windows
Individual differences in cyber security behaviors: an examination of who is sharing passwords.
Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.
Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords
Doodson, James; Creese, Sadie; Hodges, Duncan
2015-01-01
Abstract In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns. PMID:25517697
1989-09-27
a run is always the @RUN statement, which can specify user-id, account number, and project-id. The @ PASSWD statement specifies password and security...Every-Page-Label Options PASSWD password for batch; F36 User-id validation chang for demand; comp, nent set for batch LEV change Clearance Level F33...clearance level @@PASS Change password F36 Current valid password must @@ PASSWD be specified @@SEND Display a print file F16 Sym to user-id or site-id that is
NASA Technical Reports Server (NTRS)
Bishop, Matt
1988-01-01
The organization of some tools to help improve passwork security at a UNIX-based site is described along with how to install and use them. These tools and their associated library enable a site to force users to pick reasonably safe passwords (safe being site configurable) and to enable site management to try to crack existing passworks. The library contains various versions of a very fast implementation of the Data Encryption Standard and of the one-way encryption functions used to encryp the password.
Software For Computer-Security Audits
NASA Technical Reports Server (NTRS)
Arndt, Kate; Lonsford, Emily
1994-01-01
Information relevant to potential breaches of security gathered efficiently. Automated Auditing Tools for VAX/VMS program includes following automated software tools performing noted tasks: Privileged ID Identification, program identifies users and their privileges to circumvent existing computer security measures; Critical File Protection, critical files not properly protected identified; Inactive ID Identification, identifications of users no longer in use found; Password Lifetime Review, maximum lifetimes of passwords of all identifications determined; and Password Length Review, minimum allowed length of passwords of all identifications determined. Written in DEC VAX DCL language.
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
NASA Astrophysics Data System (ADS)
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.
Runs [ Open Access : Password Protected ] CESM Development CESM Runs [ Open Access : Password Protected ] WRF Development WRF Runs [ Open Access : Password Protected ] Climate Modeling Home Projects Links Literature Manuscripts Publications Polar Group Meeting (2012) ASGC Home ASGC Jobs Web Calendar Wiki Internal
The Characteristics of User-Generated Passwords
1990-03-01
electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-20
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
NASA Astrophysics Data System (ADS)
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-01
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288
Liu, Xin; Zhang, Ruisheng; Liu, Qidong
2017-01-01
Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research.
Das, Ashok Kumar; Bruhadeshwar, Bezawada
2013-10-01
Recently Lee and Liu proposed an efficient password based authentication and key agreement scheme using smart card for the telecare medicine information system [J. Med. Syst. (2013) 37:9933]. In this paper, we show that though their scheme is efficient, their scheme still has two security weaknesses such as (1) it has design flaws in authentication phase and (2) it has design flaws in password change phase. In order to withstand these flaws found in Lee-Liu's scheme, we propose an improvement of their scheme. Our improved scheme keeps also the original merits of Lee-Liu's scheme. We show that our scheme is efficient as compared to Lee-Liu's scheme. Further, through the security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our scheme is secure against passive and active attacks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Walkup, Elizabeth
Passwords are an ubiquitous, established part of the Internet today, but they are also a huge security headache. Single sign-on, OAuth, and password managers are some of the solutions to this problem. OAuth is a new, popular method that allows people to use large, common authentication providers for many web applications. However, it comes at the expense of some privacy: OAuth makes users easy to track across websites, applications, and devices. Password managers put the power in the hands of the users, but this vulnerability survey reveals that you have to be extremely careful which program you choose. All inmore » all, password managers are the solution of choice for home users and small organizations, but large companies will probably want to invest in their own SSO solutions.« less
DDN Trusted Guard Gateway. Trusted Guard Gateway (TGG) Technology Assessment. Phase 2
1989-02-02
strengthened via removal of the encrypted passwords from the password/group files, and imposition of limits on root, login, passwd , and super users. For...amongst these are the removal of the list of encoded passwords from the etc/ passwd file, and the removal of any special privileges from the root ID
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... Contracts and Non-Vessel-Operating Service Arrangements; Transmission of Approved Log-In ID and Passwords... advise applicants for log-in IDs and passwords. DATES: The Final Rule is effective March 3, 2011. FOR... the U.S. Mail to transmit approved log-on IDs and password to registrants in the Commission's...
Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!
2014-10-01
have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Juang, Kevin; Greenstein, Joel
2018-04-01
We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.
Group Management Method of RFID Passwords for Privacy Protection
NASA Astrophysics Data System (ADS)
Kobayashi, Yuichi; Kuwana, Toshiyuki; Taniguchi, Yoji; Komoda, Norihisa
When RFID tag is used in the whole item lifecycle including a consumer scene or a recycle scene, we have to protect consumer privacy in the state that RFID tag is stuck on an item. We use the low cost RFID tag that has the access control function using a password, and we propose a method which manages RFID tags by passwords identical to each group of RFID tags. This proposal improves safety of RFID system because the proposal method is able to reduce the traceability for a RFID tag, and hold down the influence for disclosure of RFID passwords in the both scenes.
Advanced Terrain Representation for the Microticcit Workstation: System Maintenance Manual
1986-02-01
enter the */ /* password. */ /* Inputs: passwd - password to compare userfs entry to */ /* Outputs: TRUE - if password entered correctly...include "atrdefs.h" #include "ctype.h" extern char window[]; /* useable portion of screen */ 1 i getpw( passwd ) char passwd []; { int c...blank input window */ pcvgcp(&row,*col); curs_off(); nchars - ntries - 0; len « strlen( passwd ); pcvwca(len,• *,REVIDEO); /* process keys till user
Privacy-Preserving Authentication of Users with Smart Cards Using One-Time Credentials
NASA Astrophysics Data System (ADS)
Park, Jun-Cheol
User privacy preservation is critical to prevent many sophisticated attacks that are based on the user's server access patterns and ID-related information. We propose a password-based user authentication scheme that provides strong privacy protection using one-time credentials. It eliminates the possibility of tracing a user's authentication history and hides the user's ID and password even from servers. In addition, it is resistant against user impersonation even if both a server's verification database and a user's smart card storage are disclosed. We also provide a revocation scheme for a user to promptly invalidate the user's credentials on a server when the user's smart card is compromised. The schemes use lightweight operations only such as computing hashes and bitwise XORs.
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme. PMID:24892078
A robust and effective smart-card-based remote user authentication mechanism using hash function.
Das, Ashok Kumar; Odelu, Vanga; Goswami, Adrijit
2014-01-01
In a remote user authentication scheme, a remote server verifies whether a login user is genuine and trustworthy, and also for mutual authentication purpose a login user validates whether the remote server is genuine and trustworthy. Several remote user authentication schemes using the password, the biometrics, and the smart card have been proposed in the literature. However, most schemes proposed in the literature are either computationally expensive or insecure against several known attacks. In this paper, we aim to propose a new robust and effective password-based remote user authentication scheme using smart card. Our scheme is efficient, because our scheme uses only efficient one-way hash function and bitwise XOR operations. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. We perform the simulation for the formal security analysis using the widely accepted AVISPA (Automated Validation Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. Furthermore, our scheme supports efficiently the password change phase always locally without contacting the remote server and correctly. In addition, our scheme performs significantly better than other existing schemes in terms of communication, computational overheads, security, and features provided by our scheme.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Islam, S K Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.
Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong
2015-01-01
Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, T.
SPI/U3.1 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Inspector Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, Tony
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
SPI/U3.2. Security Profile Inspector for UNIX Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bartoletti, A.
1994-08-01
SPI/U3.2 consists of five tools used to assess and report the security posture of computers running the UNIX operating system. The tools are: Access Control Test: A rule-based system which identifies sequential dependencies in UNIX access controls. Binary Authentication Tool: Evaluates the release status of system binaries by comparing a crypto-checksum to provide table entries. Change Detection Tool: Maintains and applies a snapshot of critical system files and attributes for purposes of change detection. Configuration Query Language: Accepts CQL-based scripts (provided) to evaluate queries over the status of system files, configuration of services and many other elements of UNIX systemmore » security. Password Security Inspector: Tests for weak or aged passwords. The tools are packaged with a forms-based user interface providing on-line context-sensistive help, job scheduling, parameter management and output report management utilities. Tools may be run independent of the UI.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Adamson, Ryan M.
Password management solutions exist, but few are designed for enterprise systems administrators sharing oncall rotations. Due to the Multi-Factor Level of Assurance 4 effort, DOE is now distributing PIV cards with cryptographically signed certificate and private key pairs to administrators and other security-significant users. We utilize this public key infrastructure (PKI) to encrypt passwords for other recipients in a secure way. This is cross platform (works on OSX and Linux systems), and has already been adopted internally by the NCCS systems administration staff to replace their old password book system.
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Genetics and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Pregnancy and Rheumatic Disease
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
American College of Rheumatology
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Granulomatosis with Polyangiitis (Wegener's)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Calcium Pyrophosphate Deposition (CPPD)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
NSAIDs (Nonsteroidal Anti-inflammatory Drugs)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Osteonecrosis of the Jaw (ONJ)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Cryopyrin-Associated Autoinflammatory Syndromes (CAPS) - Juvenile
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Simple protocols for oblivious transfer and secure identification in the noisy-quantum-storage model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schaffner, Christian
2010-09-15
We present simple protocols for oblivious transfer and password-based identification which are secure against general attacks in the noisy-quantum-storage model as defined in R. Koenig, S. Wehner, and J. Wullschleger [e-print arXiv:0906.1030]. We argue that a technical tool from Koenig et al. suffices to prove security of the known protocols. Whereas the more involved protocol for oblivious transfer from Koenig et al. requires less noise in storage to achieve security, our ''canonical'' protocols have the advantage of being simpler to implement and the security error is easier control. Therefore, our protocols yield higher OT rates for many realistic noise parameters.more » Furthermore, a proof of security of a direct protocol for password-based identification against general noisy-quantum-storage attacks is given.« less
NASA Technical Reports Server (NTRS)
Holanda, R.
1984-01-01
The thermoelectric properties alloys of the nickel-base, iron-base, and cobalt-base groups containing from 1% to 25% 106 chromium were compared and correlated with the following material characteristics: atomic percent of the principle alloy constituent; ratio of concentration of two constituents; alloy physical property (electrical resistivity); alloy phase structure (percent precipitate or percent hardener content); alloy electronic structure (electron concentration). For solid-solution-type alloys the most consistent correlation was obtained with electron concentration, for precipitation-hardenable alloys of the nickel-base superalloy group, the thermoelectric potential correlated with hardener content in the alloy structure. For solid-solution-type alloys, no problems were found with thermoelectric stability to 1000; for precipitation-hardenable alloys, thermoelectric stability was dependent on phase stability. The effects of the compositional range of alloy constituents on temperature measurement uncertainty are discussed.
Kawano, Tomonori
2013-03-01
There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hagans, K.G.; Clough, R.E.
2000-04-25
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam ofmore » light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.« less
Hagans, Karla G.; Clough, Robert E.
2000-01-01
An optical key system comprises a battery-operated optical key and an isolated lock that derives both its operating power and unlock signals from the correct optical key. A light emitting diode or laser diode is included within the optical key and is connected to transmit a bit-serial password. The key user physically enters either the code-to-transmit directly, or an index to a pseudorandom number code, in the key. Such person identification numbers can be retained permanently, or ephemeral. When a send button is pressed, the key transmits a beam of light modulated with the password information. The modulated beam of light is received by a corresponding optical lock with a photovoltaic cell that produces enough power from the beam of light to operate a password-screen digital logic. In one application, an acceptable password allows a two watt power laser diode to pump ignition and timing information over a fiberoptic cable into a sealed engine compartment. The receipt of a good password allows the fuel pump, spark, and starter systems to each operate. Therefore, bypassing the lock mechanism as is now routine with automobile thieves is pointless because the engine is so thoroughly disabled.
Development of Ballistic Protection Based on Precipitation-Hardened Composite Material
NASA Astrophysics Data System (ADS)
Chernyshov, E. A.; Romanov, A. D.; Romanova, E. A.; Myl'nikov, V. V.
2018-03-01
The possibility of application of an aluminum-based precipitation-hardened composite material for purposes of ballistic protection is considered. Experimental data on A6 aluminum-based alloy reinforced with alumina particles are presented.
Immune System and Its Link to Rheumatic Diseases
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
Periodic Fever, Aphthous Stomatitis, Pharyngitis, Adenitis Syndrome (PFAPA)
... Keep me signed in Passwords are Case Sensitive. Ex. Enter smith as follows: Smith Forgot Username/Password? ... Erythematosus (Juvenile) Takayasu's Arteritis Tendinitis & Bursitis Tumor Necrosis Factor Receptor Associated Periodic Syndrome (Juvenile) Vasculitis Enfermedades y ...
NASA Astrophysics Data System (ADS)
Zhang, Yingtao; Wang, Gang; Shi, Wankai; Yang, Lin; Li, Zhichao
2017-07-01
Spiral bevel gears are widely used to transmit energy between intersecting axes. The strength and fatigue life of the gears are improved by carburizing and quenching. A die quenching process is used to control the deformation of the gear. The deformation is determined by the variations in the hardenability for a certain die quenching process. The relationship between hardenability, phase transformation and deformation needs to be studied to minimize deformation during the adjustment of the die quenching process parameters. In this paper, material properties for 22CrMoH steel are determined by the results of Jominy tests, dilatometry experiments and static mechanical property tests. The material models were built based on testing results under the consideration of hardenability variation. An finite element analysis model was developed to couple the phase transformation and deformation history of the complete carburizing and die quenching process for the spiral bevel gears. The final microstructures in the gear were bainite for low hardenability steel and a mixture of bainite and ferrite for high hardenability steel. The largest buckling deformation at the gear bottom surface is 0.375 mm at the outer circle for the low hardenability gear and 0.091 mm at the inner circle for the high hardenability gear.
76 FR 30408 - Agency Forms Submitted for OMB Review, Request for Comments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... conduct business with the agency electronically. As part of the system, the RRB collects information..., the requestor can apply for a PIN/ Password online. Once the PIN/Password has been established, the...
Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)
NASA Astrophysics Data System (ADS)
Koishibayev, Timur; Umarova, Zhanat
2016-04-01
This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.
Rethinking Defensive Information Warfare
2004-06-01
Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion
NASA Astrophysics Data System (ADS)
Chen, Siyu; Zhang, Hanming; Li, Lei; Xi, Xiaoqi; Han, Yu; Yan, Bin
2016-10-01
X-ray computed tomography (CT) has been extensively applied in industrial non-destructive testing (NDT). However, in practical applications, the X-ray beam polychromaticity often results in beam hardening problems for image reconstruction. The beam hardening artifacts, which manifested as cupping, streaks and flares, not only debase the image quality, but also disturb the subsequent analyses. Unfortunately, conventional CT scanning requires that the scanned object is completely covered by the field of view (FOV), the state-of-art beam hardening correction methods only consider the ideal scanning configuration, and often suffer problems for interior tomography due to the projection truncation. Aiming at this problem, this paper proposed a beam hardening correction method based on radon inversion transform for interior tomography. Experimental results show that, compared to the conventional correction algorithms, the proposed approach has achieved excellent performance in both beam hardening artifacts reduction and truncation artifacts suppression. Therefore, the presented method has vitally theoretic and practicable meaning in artifacts correction of industrial CT.
What Is the PE Password? Incorporating Vocabulary in Your Elementary PE Program
ERIC Educational Resources Information Center
Robelee, Margaret E.
2016-01-01
This article describes a novel program for third through fifth grade called "What is the PE Password?" that teaches vocabulary words and concepts without sacrificing activity time in order to support Common Core learning.
Effects of TEA·HCl hardening accelerator on the workability of cement-based materials
NASA Astrophysics Data System (ADS)
Pan, Wenhao; Ding, Zhaoyang; Chen, Yanwen
2017-03-01
The aim of the test is to research the influence rules of TEA·HCl on the workability of cement paste and concrete. Based on the features of the new hardening accelerator, an experimental analysis system were established through different dosages of hardening accelerator, and the feasibility of such accelerator to satisfy the need of practical engineering was verified. The results show that adding of the hardening accelerator can accelerate the cement hydration, and what’s more, when the dosage was 0.04%, the setting time was the shortest while the initial setting time and final setting time were 130 min and 180 min, respectively. The initial fluidity of cement paste of adding accelerator was roughly equivalent compared with that of blank. After 30 min, fluidity loss would decrease with the dosage increasing, but fluidity may increase. The application of the hardening accelerator can make the early workability of concrete enhance, especially the slump loss of 30 min can improve more significantly. The bleeding rate of concrete significantly decreases after adding TEA·HCl. The conclusion is that the new hardening accelerator can meet the need of the workability of cement-based materials in the optimum dosage range.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-11-30
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.
Simulating the influence of scatter and beam hardening in dimensional computed tomography
NASA Astrophysics Data System (ADS)
Lifton, J. J.; Carmignato, S.
2017-10-01
Cone-beam x-ray computed tomography (XCT) is a radiographic scanning technique that allows the non-destructive dimensional measurement of an object’s internal and external features. XCT measurements are influenced by a number of different factors that are poorly understood. This work investigates how non-linear x-ray attenuation caused by beam hardening and scatter influences XCT-based dimensional measurements through the use of simulated data. For the measurement task considered, both scatter and beam hardening are found to influence dimensional measurements when evaluated using the ISO50 surface determination method. On the other hand, only beam hardening is found to influence dimensional measurements when evaluated using an advanced surface determination method. Based on the results presented, recommendations on the use of beam hardening and scatter correction for dimensional XCT are given.
Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths
Jiao, Z. B.; Luan, J. H.; Miller, M. K.; ...
2016-02-19
The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for twomore » interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. Lastly, the co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications.« less
Group precipitation and age hardening of nanostructured Fe-based alloys with ultra-high strengths
Jiao, Z. B.; Luan, J. H.; Miller, M. K.; Yu, C. Y.; Liu, C. T.
2016-01-01
The precipitation of nanoparticles plays a key role in determining the properties of many structural materials, and the understanding of their formation and stabilization mechanisms has been a long standing interest in the material field. However, the critical issues involving the group precipitation of various nanoparticles and their cooperative hardening mechanism remain elusive in the newly discovered Fe-based alloys with nanostructures. Here we quantitatively elucidate the nucleation mechanism, evolution kinetics and hardening effects of the group-precipitated nanoparticles in the Fe-Cu-Ni-Al-based alloys by atom probe tomography together with both first-principles and thermodynamic calculations. Our results provide the compelling evidence for two interesting but complex group precipitation pathways of nanoparticles, i.e., the Cu-rich and NiAl-based precipitations. The co-existence of the two precipitation pathways plays a key role in age hardening kinetics and ultimately enhances the hardening response, as compared to the single particle type of strengthening, therefore providing an effective new approach for strengthening materials for structural applications. PMID:26892834
Connecting to HPC VPN | High-Performance Computing | NREL
and password will match your NREL network account login/password. From OS X or Linux, open a terminal finalized. Open a Remote Desktop connection using server name WINHPC02 (this is the login node). Mac Mac
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Password Cracking Using Sony Playstations
NASA Astrophysics Data System (ADS)
Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet
Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.
Backup key generation model for one-time password security protocol
NASA Astrophysics Data System (ADS)
Jeyanthi, N.; Kundu, Sourav
2017-11-01
The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.
Radiation Hardened 10BASE-T Ethernet Physical Layer (PHY)
NASA Technical Reports Server (NTRS)
Lin, Michael R. (Inventor); Petrick, David J. (Inventor); Ballou, Kevin M. (Inventor); Espinosa, Daniel C. (Inventor); James, Edward F. (Inventor); Kliesner, Matthew A. (Inventor)
2017-01-01
Embodiments may provide a radiation hardened 10BASE-T Ethernet interface circuit suitable for space flight and in compliance with the IEEE 802.3 standard for Ethernet. The various embodiments may provide a 10BASE-T Ethernet interface circuit, comprising a field programmable gate array (FPGA), a transmitter circuit connected to the FPGA, a receiver circuit connected to the FPGA, and a transformer connected to the transmitter circuit and the receiver circuit. In the various embodiments, the FPGA, transmitter circuit, receiver circuit, and transformer may be radiation hardened.
Alternative Fuels Data Center: Petroleum and Emission Reduction Planning
Add Goal à Log In You need an account to save your plans. If you already have an account, log in below. Otherwise, create an account. Email address: Password: Confirm password: LOG IN Cancel Forgot
Deep Drawing Simulations With Different Polycrystalline Models
NASA Astrophysics Data System (ADS)
Duchêne, Laurent; de Montleau, Pierre; Bouvier, Salima; Habraken, Anne Marie
2004-06-01
The goal of this research is to study the anisotropic material behavior during forming processes, represented by both complex yield loci and kinematic-isotropic hardening models. A first part of this paper describes the main concepts of the `Stress-strain interpolation' model that has been implemented in the non-linear finite element code Lagamine. This model consists of a local description of the yield locus based on the texture of the material through the full constraints Taylor's model. The texture evolution due to plastic deformations is computed throughout the FEM simulations. This `local yield locus' approach was initially linked to the classical isotropic Swift hardening law. Recently, a more complex hardening model was implemented: the physically-based microstructural model of Teodosiu. It takes into account intergranular heterogeneity due to the evolution of dislocation structures, that affects isotropic and kinematic hardening. The influence of the hardening model is compared to the influence of the texture evolution thanks to deep drawing simulations.
Radiation-hardened backside-illuminated 512 x 512 charge-coupled device
NASA Astrophysics Data System (ADS)
Bates, Philip A.; Levine, Peter A.; Sauer, Donald J.; Hsueh, Fu-Lung; Shallcross, Frank V.; Smeltzer, Ronald K.; Meray, Grazyna M.; Taylor, Gordon C.; Tower, John R.
1995-04-01
A four-port 512 X 512 charge coupled device (CCD) imager hardened against proton displacement damage and total dose degradation has been fabricated and tested. The device is based upon an established thinned, backside illuminated, triple polysilicon, buried channel CCD process technology. The technology includes buried blooming drains. A three step approach has been taken to hardening the device. The first phase addressed hardening against proton displacement damage. The second phase addressed hardening against both proton displacement damage and total dose degradation. The third phase addresses final optimization of the design. Test results from the first and second phase efforts are presented. Plans for the third phase are discussed.
75 FR 5579 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-03
... with re-entry controlled by passwords. The DLA Enterprise Hotline Program Database is also password...: * * * * * System location: Delete entry and replace with ``Director, DLA Accountability Office (DA), Headquarters....'' * * * * * Retention and disposal: Delete entry and replace with ``Records are destroyed/deleted 10 years after...
ERIC Educational Resources Information Center
Mattord, Herbert J.
2012-01-01
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
2015-03-01
In the January 2015 issue of Cyberpsychology, Behavior, and Social Networking (vol. 18, no. 1, pp. 3–7), the article "Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords." by Prof. Monica Whitty et al., has an error in wording in the abstract. The sentence in question was originally printed as: Contrary to our hypotheses, we found older people and individuals who score high on self-monitoring were more likely to share passwords. It should read: Contrary to our hypotheses, we found younger people and individuals who score high on self-monitoring were more likely to share passwords. The authors wish to apologize for the error.
Study on stress-strain response of multi-phase TRIP steel under cyclic loading
NASA Astrophysics Data System (ADS)
Dan, W. J.; Hu, Z. G.; Zhang, W. G.; Li, S. H.; Lin, Z. Q.
2013-12-01
The stress-strain response of multi-phase TRIP590 sheet steel is studied in cyclic loading condition at room temperature based on a cyclic phase transformation model and a multi-phase mixed kinematic hardening model. The cyclic martensite transformation model is proposed based on the shear-band intersection, where the repeat number, strain amplitude and cyclic frequency are used to control the phase transformation process. The multi-phase mixed kinematic hardening model is developed based on the non-linear kinematic hardening rule of per-phase. The parameters of transformation model are identified with the relationship between the austenite volume fraction and the repeat number. The parameters in Kinematic hardening model are confirmed by the experimental hysteresis loops in different strain amplitude conditions. The responses of hysteresis loop and stress amplitude are evaluated by tension-compression data.
Radiation Hardened Electronics for Space Environments (RHESE)
NASA Technical Reports Server (NTRS)
Keys, Andrew S.; Adams, James H.; Frazier, Donald O.; Patrick, Marshall C.; Watson, Michael D.; Johnson, Michael A.; Cressler, John D.; Kolawa, Elizabeth A.
2007-01-01
Radiation Environmental Modeling is crucial to proper predictive modeling and electronic response to the radiation environment. When compared to on-orbit data, CREME96 has been shown to be inaccurate in predicting the radiation environment. The NEDD bases much of its radiation environment data on CREME96 output. Close coordination and partnership with DoD radiation-hardened efforts will result in leveraged - not duplicated or independently developed - technology capabilities of: a) Radiation-hardened, reconfigurable FPGA-based electronics; and b) High Performance Processors (NOT duplication or independent development).
A Risk-based, Practice-centered Approach to Project Management for HPCMP CREATE
2015-10-05
form of videoconferencing. These impediments have been mitigated to some extent by using browser-based Software as a Service ( SaaS ) access to CREATE...one-time password (OTP), and OpenID. Security is managed within the DREN, as opposed to every desktop. As a “Software as a Service” ( SaaS
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http://alaskafisheries.noaa.gov. (2... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
50 CFR 679.91 - Amendment 80 Program annual harvester privileges.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) Hand delivery or carrier: NMFS, Room 713, 709 West 9th Street, Juneau, AK 99801. (iv) Electronic: http... using the transferor's NMFS ID, password, and Transfer Key and submitting the transfer request, the... on the computer screen. By using the transferee's NMFS ID, password and Transfer Key, the designated...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 21 Food and Drugs 1 2011-04-01 2011-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN... attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational...
Beyond Passwords: Usage and Policy Transformation
2007-03-01
case scenario for lost productivity due to users leaving their CAC at work, in their computer, is costing 261 work years per year with an estimated ...one for your CAC) are you currently using? ..................................................................................................... 43...PASSWORDS: USAGE AND POLICY TRANSFORMATION I. Introduction Background Currently , the primary method for network authentication on the
21 CFR 11.300 - Controls for identification codes/passwords.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 21 Food and Drugs 1 2012-04-01 2012-04-01 false Controls for identification codes/passwords. 11.300 Section 11.300 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Electronic Signatures § 11.300 Controls for...
Xie, Qi; Liu, Wenhao; Wang, Shengbao; Han, Lidong; Hu, Bin; Wu, Ting
2014-09-01
Patient's privacy-preserving, security and mutual authentication between patient and the medical server are the important mechanism in connected health care applications, such as telecare medical information systems and personally controlled health records systems. In 2013, Wen showed that Das et al.'s scheme is vulnerable to the replay attack, user impersonation attacks and off-line guessing attacks, and then proposed an improved scheme using biometrics, password and smart card to overcome these weaknesses. However, we show that Wen's scheme is still vulnerable to off-line password guessing attacks, does not provide user's anonymity and perfect forward secrecy. Further, we propose an improved scheme to fix these weaknesses, and use the applied pi calculus based formal verification tool ProVerif to prove the security and authentication.
NASA Astrophysics Data System (ADS)
Daneyko, O. I.; Kulaeva, N. A.; Kovalevskaya, C. A.; Kolupaeva, S. N.
2015-07-01
A mathematical model of plastic deformation of dispersion-hardened materials with an fcc matrix containing strengthening particles with an L12 superstructure having a coherent relationship with the matrix is presented. The model is based on the balance equations of deformation defects of different types with taking into account their transformation during plastic deformation. The influence of scale characteristics of the hardening phase, temperature, and deformation rate on the evolution of the dislocation subsystem and strain hardening of an alloy with an fcc matrix hardened by particles with an L12 super structure is studied. A temperature anomaly of mechanical properties is found for the materials with different fcc matrices (Al,Cu, Ni). It is shown that the temperature anomaly is more pronounced for the material with larger volume fraction of the hardening phase.
Improving precipitation hardening behavior of Mg−Zn based alloys with Ce−Ca microalloying additions
DOE Office of Scientific and Technical Information (OSTI.GOV)
Langelier, B., E-mail: langelb@mcmaster.ca
2016-10-15
The precipitation hardening behavior of newly developed Mg−Zn−Ca−Ce alloys, with modified texture and improved ductility, is studied to delineate the microstructural characteristics that lead to effective hardening upon ageing treatments. Advanced electron microscopy and atom probe techniques are used to analyze the structural characteristics in relevance to the hardening potential. It has been found that the formation of a new basal precipitate phase, which evolves from a single atomic layer GP zone, and is finely distributed in both under-aged and peak-aged microstructures, has a significant impact in the improvement of the hardening response compared with the base Mg−Zn alloys. Itmore » has also been found that the β′{sub 1} rod precipitates, commonly formed during ageing treatments of Mg−Zn alloys, have their size and distribution significantly refined in the Ca−Ce containing alloys. The role of alloy chemistry in the formation of the fine basal plate GP zones and the refinement in β′{sub 1} precipitation and their relationships to the hardening behavior are discussed. It is proposed that Ca microalloying governs the formation of the GP zones and the enhancement of hardening, particularly in the under-aged conditions, but that this is aided by a beneficial effect from Ce. - Highlights: • Ce−Ca microalloying additions improve hardening in Mg−Zn, over Ce or Ca alone. • Improved hardening is due to refined β′{sub 1} rods, and fine basal plate precipitates. • Atom probe tomography identifies Ca in both β′{sub 1} and the fine basal plates. • The fine basal plates originate as ordered monolayer GP zones with 1:1 Zn:Ca (at.%). • With ageing GP zones become more Zn-rich and transform to the fine basal plates.« less
Analysis of the regimes in the scanner-based laser hardening process
NASA Astrophysics Data System (ADS)
Martínez, S.; Lamikiz, A.; Ukar, E.; Calleja, A.; Arrizubieta, J. A.; Lopez de Lacalle, L. N.
2017-03-01
Laser hardening is becoming a consolidated process in different industrial sectors such as the automotive industry or in the die and mold industry. The key to ensure the success in this process is to control the surface temperature and the hardened layer thickness. Furthermore, the development of reliable scanners, based on moving optics for guiding high power lasers at extremely fast speeds allows the rapid motion of laser spots, resulting on tailored shapes of swept areas by the laser. If a scanner is used to sweep a determined area, the laser energy density distribution can be adapted by varying parameters such us the scanning speed or laser power inside this area. Despite its advantages in terms of versatility, the use of scanners for the laser hardening process has not yet been introduced in the thermal hardening industry because of the difficulty of the temperature control and possible non-homogeneous hardness thickness layers. In the present work the laser hardening process with scanning optics applied to AISI 1045 steel has been studied, with special emphasis on the influence of the scanning speed and the results derived from its variation, the evolution of the hardened layer thickness and different strategies for the control of the process temperature. For this purpose, the hardened material has been studied by measuring microhardness at different points and the shape of the hardened layer has also been evaluated. All tests have been performed using an experimental setup designed to keep a nominal temperature value using a closed-loop control. The tests results show two different regimes depending on the scanning speed and feed rate values. The experimental results conclusions have been validated by means of thermal simulations at different conditions.
RSA-Based Password-Authenticated Key Exchange, Revisited
NASA Astrophysics Data System (ADS)
Shin, Seonghan; Kobara, Kazukuni; Imai, Hideki
The RSA-based Password-Authenticated Key Exchange (PAKE) protocols have been proposed to realize both mutual authentication and generation of secure session keys where a client is sharing his/her password only with a server and the latter should generate its RSA public/private key pair (e, n), (d, n) every time due to the lack of PKI (Public-Key Infrastructures). One of the ways to avoid a special kind of off-line (so called e-residue) attacks in the RSA-based PAKE protocols is to deploy a challenge/response method by which a client verifies the relative primality of e and φ(n) interactively with a server. However, this kind of RSA-based PAKE protocols did not give any proof of the underlying challenge/response method and therefore could not specify the exact complexity of their protocols since there exists another security parameter, needed in the challenge/response method. In this paper, we first present an RSA-based PAKE (RSA-PAKE) protocol that can deploy two different challenge/response methods (denoted by Challenge/Response Method1 and Challenge/Response Method2). The main contributions of this work include: (1) Based on the number theory, we prove that the Challenge/Response Method1 and the Challenge/Response Method2 are secure against e-residue attacks for any odd prime e (2) With the security parameter for the on-line attacks, we show that the RSA-PAKE protocol is provably secure in the random oracle model where all of the off-line attacks are not more efficient than on-line dictionary attacks; and (3) By considering the Hamming weight of e and its complexity in the. RSA-PAKE protocol, we search for primes to be recommended for a practical use. We also compare the RSA-PAKE protocol with the previous ones mainly in terms of computation and communication complexities.
Chang, I-Pin; Lee, Tian-Fu; Lin, Tsung-Hung; Liu, Chuan-Ming
2015-01-01
Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs). Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost. PMID:26633396
Laser Surface Hardening of Groove Edges
NASA Astrophysics Data System (ADS)
Hussain, A.; Hamdani, A. H.; Akhter, R.; Aslam, M.
2013-06-01
Surface hardening of groove-edges made of 3Cr13 Stainless Steel has been carried out using 500 W CO2 laser with a rectangular beam of 2.5×3 mm2. The processing speed was varied from 150-500 mm/min. It was seen that the hardened depth increases with increase in laser interaction time. A maximum hardened depth of around 1mm was achieved. The microhardness of the transformed zone was 2.5 times the hardness of base metal. The XRD's and microstructural analysis were also reported.
Characterization and Strain-Hardening Behavior of Friction Stir-Welded Ferritic Stainless Steel
NASA Astrophysics Data System (ADS)
Sharma, Gaurav; Dwivedi, Dheerendra Kumar; Jain, Pramod Kumar
2017-12-01
In this study, friction stir-welded joint of 3-mm-thick plates of 409 ferritic stainless steel (FSS) was characterized in light of microstructure, x-ray diffraction analysis, hardness, tensile strength, ductility, corrosion and work hardening properties. The FSW joint made of ferritic stainless steel comprises of three distinct regions including the base metal. In stir zone highly refined ferrite grains with martensite and some carbide precipitates at the grain boundaries were observed. X-ray diffraction analysis also revealed precipitation of Cr23C6 and martensite formation in heat-affected zone and stir zone. In tensile testing of the transverse weld samples, the failure eventuated within the gauge length of the specimen from the base metal region having tensile properties overmatched to the as-received base metal. The tensile strength and elongation of the longitudinal (all weld) sample were found to be 1014 MPa and 9.47%, respectively. However, in potentiodynamic polarization test, the corrosion current density of the stir zone was highest among all the three zones. The strain-hardening exponent for base metal, transverse and longitudinal (all weld) weld samples was calculated using various equations. Both the transverse and longitudinal weld samples exhibited higher strain-hardening exponents as compared to the as-received base metal. In Kocks-Mecking plots for the base metal and weld samples at least two stages of strain hardening were observed.
Microstructure, Tensile Properties and Work Hardening Behavior of GTA-Welded Dual-Phase Steels
NASA Astrophysics Data System (ADS)
Ashrafi, H.; Shamanian, M.; Emadi, R.; Saeidi, N.
2017-03-01
In the present study, microstructure, tensile properties and work hardening behavior of a DP700 steel after gas tungsten arc welding were investigated. Formation of bainite in the fusion zone resulted in a hardness increase compared to that for the base metal (BM), whereas tempering of the pre-existing martensite in the subcritical heat-affected zone (HAZ) led to softening. The GTA-welded joint exhibited a continuous yielding behavior and a yield strength close to that for the BM, while its ultimate tensile strength and total elongation were lower than those for the BM owing to the formation of soft zone in the HAZ. A joint efficiency of about 81% was obtained for the GTA-welded joint, and it failed in the softened HAZ. Analysis of work hardening based on the Kocks-Mecking approach showed one stage of hardening behavior corresponding to the stage III for both the DP700 BM and welded sample. It was also revealed that the DP700 BM has larger values of work hardening exponent and magnitude of work hardening compared with the welded sample. Analysis of fractured surfaces showed that the dominant fracture mode for both the DP700 BM and welded joint was ductile.
Resistance of dichromated gelatin as photoresist
NASA Astrophysics Data System (ADS)
Lin, Pang; Yan, Yingbai; Jin, Guofan; Wu, Minxian
1999-09-01
Based on the photographic chemistry, chemically hardening method was selected to enhance the anti-etch capability of gelatin. With the consideration of hardener and permeating processing, formaldehyde is the most ideal option due to the smallest molecule size and covalent cross-link with gelatin. After hardened in formaldehyde, the resistance of the gelatin was obtained by etched in 1% HF solution. The result showed that anti-etch capability of the gelatin layer increased with tanning time, but the increasing rate reduced gradually and tended to saturation. Based on the experimental results, dissolving-flaking hypothesis for chemically hardening gelatin was presented. Sol-gel coatings were etched with 1% HF solution. Compared with the etching rate of gelatin layer, it showed that gelatin could be used as resist to fabricate optical elements in sol-gel coating. With the cleaving-etch method and hardening of dichromated gelatin (DCG), DCG was used as a photoresist for fabricating sol-gel optical elements. As an application, a sol-gel random phase plate was fabricated.
Lifton, Joseph J; Malcolm, Andrew A; McBride, John W
2015-01-01
X-ray computed tomography (CT) is a radiographic scanning technique for visualising cross-sectional images of an object non-destructively. From these cross-sectional images it is possible to evaluate internal dimensional features of a workpiece which may otherwise be inaccessible to tactile and optical instruments. Beam hardening is a physical process that degrades the quality of CT images and has previously been suggested to influence dimensional measurements. Using a validated simulation tool, the influence of spectrum pre-filtration and beam hardening correction are evaluated for internal and external dimensional measurements. Beam hardening is shown to influence internal and external dimensions in opposition, and to have a greater influence on outer dimensions compared to inner dimensions. The results suggest the combination of spectrum pre-filtration and a local gradient-based surface determination method are able to greatly reduce the influence of beam hardening in X-ray CT for dimensional metrology.
2014-06-01
layer of epoxy and ensure crack is filled in. Let sit for at least 1 hour, but no longer than 3 hours. (Do not allow base layer to harden before...10 mmHg and hold for 8 hours. • Once hardened remove excess epoxy and test sample. C. TENSILE TESTING For the purpose of this study, total fracture...hardened remove excess epoxy and test sample. 2. Final Changes Changes were made from this initial sample preparation to the final one shown in the
Alternative Fuels Data Center: Plug-In Electric Vehicle Readiness Scorecard
track progress toward PEV readiness. Get started evaluating your community. Create Account Log in to your account. Email Password Forgot your password? LOG IN Public reporting burden for this collection of information is estimated to average (20.5 hours) per response, including the time for reviewing
A Comparison of Password Techniques for Multilevel Authentication Mechanisms
1990-06-01
an individual user’s perceptions, personal interests and personal history . This information is unique to the individual and is neither commonly...a user may associative passwords profile around the Beatles . In this case, cues may include "abbey", "john", "yellow" and "george" and have responses
General Framework for Evaluating Password Complexity and Strength
2015-11-15
stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New...Proceedings of the Eighth Symposium on Usable Privacy and Security, ser. SOUPS ’12. New York, NY, USA: ACM, 2012, pp. 1–20. [22] P. Kelley, S. Komanduri
75 FR 6339 - California Public Utilities Commission Petition for Rulemaking
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-09
... (NORS). The CPUC also requests password-protected access to California- specific disruption and outage... ``limited to California-specific disruption and outage data.'' NORS is the Web-based filing system through which certain communications providers submit reports to the Commission of disruptions to communications...
Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Xie, Dong; Yang, Yixian
2015-06-01
The Telecare Medicine Information Systems (TMISs) provide an efficient communicating platform supporting the patients access health-care delivery services via internet or mobile networks. Authentication becomes an essential need when a remote patient logins into the telecare server. Recently, many extended chaotic maps based authentication schemes using smart cards for TMISs have been proposed. Li et al. proposed a secure smart cards based authentication scheme for TMISs using extended chaotic maps based on Lee's and Jiang et al.'s scheme. In this study, we show that Li et al.'s scheme has still some weaknesses such as violation the session key security, vulnerability to user impersonation attack and lack of local verification. To conquer these flaws, we propose a chaotic maps and smart cards based password authentication scheme by applying biometrics technique and hash function operations. Through the informal and formal security analyses, we demonstrate that our scheme is resilient possible known attacks including the attacks found in Li et al.'s scheme. As compared with the previous authentication schemes, the proposed scheme is more secure and efficient and hence more practical for telemedical environments.
Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.
Forming an age hardenable aluminum alloy with intermediate annealing
NASA Astrophysics Data System (ADS)
Wang, Kaifeng; Carsley, John E.; Stoughton, Thomas B.; Li, Jingjing; Zhang, Lianhong; He, Baiyan
2013-12-01
A method to improve formability of aluminum sheet alloys by a two-stage stamping process with intermediate annealing was developed for a non-age hardenable Al-Mg alloy where the annealing heat treatment provided recovery of cold work from the initial stamping and recrystallization of the microstructure to enhance the forming limits of the material. This method was extended to an age hardenable, Al-Mg-Si alloy, which is complicated by the competing metallurgical effects during heat treatment including recovery (softening effect) vs. precipitation (hardening effect). An annealing heat treatment process condition was discovered wherein the stored strain energy from an initial plastic deformation can be sufficiently recovered to enhance formability in a second deformation; however, there is a deleterious effect on subsequent precipitation hardening. The improvement in formability was quantified with uniaxial tensile tests as well as with the forming limit diagram. Since strain-based forming limit curves (FLC) are sensitive to pre-strain history, both stress-based FLCs and polar-effective-plastic-strain (PEPS) FLCs, which are path-independent, were used to evaluate the forming limits after preform annealing. A technique was developed to calculate the stress-based FLC in which a residual-effective-plastic-strain (REPS) was determined by overlapping the hardening curve of the pre-strained and annealed material with that of the simply-annealed- material. After converting the strain-based FLCs using the constant REPS method, it was found that the stress-based FLCs and the PEPS FLCs of the post-annealed materials were quite similar and both tools are applicable for evaluating the forming limits of Al-Mg-Si alloys for a two-step stamping process with intermediate annealing.
User Authentication: A State-of-the-Art Review
1991-09-01
etc/ passwd , is publicly readable. Although the passwords in the file are encrypted, the encryption routine is read:.ly accessible. Encrypting a guess...version 4.0, and AT&T’s System V release 3.2 and System V/MLS, have addressed the problem by moving the passwords from /etc/ passwd into a shadow file that
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2010 CFR
2010-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and on GPO Access. ...
NASA Astrophysics Data System (ADS)
Sarac, Abdulhamit; Kysar, Jeffrey W.
2018-02-01
We present a new methodology for experimental validation of single crystal plasticity constitutive relationships based upon spatially resolved measurements of the direction of the Net Burgers Density Vector, which we refer to as the β-field. The β-variable contains information about the active slip systems as well as the ratios of the Geometrically Necessary Dislocation (GND) densities on the active slip systems. We demonstrate the methodology by comparing single crystal plasticity finite element simulations of plane strain wedge indentations into face-centered cubic nickel to detailed experimental measurements of the β-field. We employ the classical Peirce-Asaro-Needleman (PAN) hardening model in this study due to the straightforward physical interpretation of its constitutive parameters that include latent hardening ratio, initial hardening modulus and the saturation stress. The saturation stress and the initial hardening modulus have relatively large influence on the β-variable compared to the latent hardening ratio. A change in the initial hardening modulus leads to a shift in the boundaries of plastic slip sectors with the plastically deforming region. As the saturation strength varies, both the magnitude of the β-variable and the boundaries of the plastic slip sectors change. We thus demonstrate that the β-variable is sensitive to changes in the constitutive parameters making the variable suitable for validation purposes. We identify a set of constitutive parameters that are consistent with the β-field obtained from the experiment.
The Effects of Stress State on the Strain Hardening Behaviors of TWIP Steel
NASA Astrophysics Data System (ADS)
Liu, F.; Dan, W. J.; Zhang, W. G.
2017-05-01
Twinning-Induced Plasticity (TWIP) steels have received great attention due to their excellent mechanical properties as a result of austenite twinning during straining. In this paper, the effects of stress state on the strain hardening behaviors of Fe-20Mn-1.2C TWIP steel were studied. A twinning model considering stress state was presented based on the shear-band framework, and a strain hardening model was proposed by taking dislocation mixture evolution into account. The models were verified by the experimental results of uniaxial tension, simple shear and rolling processes. The strain hardening behaviors of TWIP steel under different stress states were predicted. The results show that the stress state can improve the austenite twining and benefit the strain hardening of TWIP steel.
The cyclic stress-strain behavior of a nickel-base superalloy at 650 C
NASA Technical Reports Server (NTRS)
Gabb, T. P.; Welsch, G. E.
1986-01-01
It is pointed out that examinations of the monotonic tensile and fatigue behaviors of single crystal nickel-base superalloys have disclosed orientation-dependent tension-compression anisotropies and significant differences in the mechanical response of octahedral and cube slip at intermediate temperatures. An examination is conducted of the cyclic hardening response of the single crystal superalloy PWA 1480 at 650 C. In the considered case, tension-compression anisotropy is present, taking into account primarily conditions under which a single slip system is operative. Aspects of a deformation by single slip are considered along with cyclic hardening anisotropy in tension and compression. It is found that specimens deforming by octahedral slip on a single slip system have similar hardening responses in tensile and low cycle fatigue loading. Cyclic strain hardening is very low for specimens displaying single slip.
Hachouf, N; Kharfi, F; Boucenna, A
2012-10-01
An ideal neutron radiograph, for quantification and 3D tomographic image reconstruction, should be a transmission image which exactly obeys to the exponential attenuation law of a monochromatic neutron beam. There are many reasons for which this assumption does not hold for high neutron absorbing materials. The main deviations from the ideal are due essentially to neutron beam hardening effect. The main challenges of this work are the characterization of neutron transmission through boron enriched steel materials and the observation of beam hardening. Then, in our work, the influence of beam hardening effect on neutron tomographic image, for samples based on these materials, is studied. MCNP and FBP simulation are performed to adjust linear attenuation coefficients data and to perform 2D tomographic image reconstruction with and without beam hardening corrections. A beam hardening correction procedure is developed and applied based on qualitative and quantitative analyses of the projections data. Results from original and corrected 2D reconstructed images obtained shows the efficiency of the proposed correction procedure. Copyright © 2012 Elsevier Ltd. All rights reserved.
Quantitative Residual Strain Analyses on Strain Hardened Nickel Based Alloy
NASA Astrophysics Data System (ADS)
Yonezawa, Toshio; Maeguchi, Takaharu; Goto, Toru; Juan, Hou
Many papers have reported about the effects of strain hardening by cold rolling, grinding, welding, etc. on stress corrosion cracking susceptibility of nickel based alloys and austenitic stainless steels for LWR pipings and components. But, the residual strain value due to cold rolling, grinding, welding, etc. is not so quantitatively evaluated.
Joining precipitation-hardened nickel-base alloys by friction welding
NASA Technical Reports Server (NTRS)
Moore, T. J.
1972-01-01
Solid state deformation welding process, friction welding, has been developed for joining precipitation hardened nickel-base alloys and other gamma prime-strengthened materials which heretofore have been virtually unweldable. Method requires rotation of one of the parts to be welded, but where applicable, it is an ideal process for high volume production jobs.
Practical security and privacy attacks against biometric hashing using sparse recovery
NASA Astrophysics Data System (ADS)
Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan
2016-12-01
Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.
Characterization and correction of cupping effect artefacts in cone beam CT
Hunter, AK; McDavid, WD
2012-01-01
Objective The purpose of this study was to demonstrate and correct the cupping effect artefact that occurs owing to the presence of beam hardening and scatter radiation during image acquisition in cone beam CT (CBCT). Methods A uniform aluminium cylinder (6061) was used to demonstrate the cupping effect artefact on the Planmeca Promax 3D CBCT unit (Planmeca OY, Helsinki, Finland). The cupping effect was studied using a line profile plot of the grey level values using ImageJ software (National Institutes of Health, Bethesda, MD). A hardware-based correction method using copper pre-filtration was used to address this artefact caused by beam hardening and a software-based subtraction algorithm was used to address scatter contamination. Results The hardware-based correction used to address the effects of beam hardening suppressed the cupping effect artefact but did not eliminate it. The software-based correction used to address the effects of scatter resulted in elimination of the cupping effect artefact. Conclusion Compensating for the presence of beam hardening and scatter radiation improves grey level uniformity in CBCT. PMID:22378754
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2011 CFR
2011-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
46 CFR Appendix A to Part 530 - Instructions for the Filing of Service Contracts
Code of Federal Regulations, 2010 CFR
2010-10-01
... file service contracts. BTCL will direct OIRM to provide approved filers with a log-on ID and password. Filers who wish a third party (publisher) to file their service contracts must so indicate on Form FMC-83... home page, http://www.fmc.gov. A. Registration, Log-on ID and Password To register for filing, a...
17 CFR 249.446 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... log on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
17 CFR 269.7 - Form ID, uniform application for access codes to file on EDGAR.
Code of Federal Regulations, 2011 CFR
2011-04-01
... on to the EDGAR system, submit filings, and change its CCC. (d) Password Modification Authorization Code (PMAC)—allows a filer, filing agent or training agent to change its Password. [69 FR 22710, Apr... Sections Affected, which appears in the Finding Aids section of the printed volume and at at www.fdsys.gov. ...
Apple OS X VPN Set Up | High-Performance Computing | NREL
software using that conf file and your UserID Start the connection using your password plus the 6-digit OTP . Configure the Client Software Start the Endian Connect App (It should have installed into Applications in an password" link, and add your UserID. Start the app, and begin configuring the connection by clicking
Pre-Employment Testing on the Internet: Put Candidates a Click Away and Hire at Modem Speed.
ERIC Educational Resources Information Center
Mooney, John
2002-01-01
The experience of a county government illustrates factors to consider in implementing online employment testing for job candidates: (1) selection of the appropriate Internet-based test; (2) passwords, timing, security, and technical difficulties; and (3) provisions for applicants who lack Internet access. (SK)
System of end-to-end symmetric database encryption
NASA Astrophysics Data System (ADS)
Galushka, V. V.; Aydinyan, A. R.; Tsvetkova, O. L.; Fathi, V. A.; Fathi, D. V.
2018-05-01
The article is devoted to the actual problem of protecting databases from information leakage, which is performed while bypassing access control mechanisms. To solve this problem, it is proposed to use end-to-end data encryption, implemented at the end nodes of an interaction of the information system components using one of the symmetric cryptographic algorithms. For this purpose, a key management method designed for use in a multi-user system based on the distributed key representation model, part of which is stored in the database, and the other part is obtained by converting the user's password, has been developed and described. In this case, the key is calculated immediately before the cryptographic transformations and is not stored in the memory after the completion of these transformations. Algorithms for registering and authorizing a user, as well as changing his password, have been described, and the methods for calculating parts of a key when performing these operations have been provided.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
Comparison of single and consecutive dual frequency induction surface hardening of gear wheels
NASA Astrophysics Data System (ADS)
Barglik, J.; Ducki, K.; Kukla, D.; Mizera, J.; Mrówka-Nowotnik, G.; Sieniawski, J.; Smalcerz, A.
2018-05-01
Mathematical modelling of single and consecutive dual - frequency induction surface hardening systems are presented and compared. The both models are solved by the 3D FEM-based professional software supported by a number of own numerical procedures. The methodology is illustrated with some examples of surface induction hardening of a gear wheel made of steel 41Cr4. The computations are in a good accordance with experiments provided on the laboratory stand.
Work Hardening Behavior of 1020 Steel During Cold-Beating Simulation
NASA Astrophysics Data System (ADS)
CUI, Fengkui; LING, Yuanfei; XUE, Jinxue; LIU, Jia; LIU, Yuhui; LI, Yan
2017-03-01
The present research of cold-beating formation mainly focused on roller design and manufacture, kinematics, constitutive relation, metal flow law, thermo-mechanical coupling, surface micro-topography and microstructure evolution. However, the research on surface quality and performance of workpieces in the process of cold-beating is rare. Cold-beating simulation experiment of 1020 steel is conducted at room temperature and strain rates ranging from 2000 to 4000 s-1 base on the law of plastic forming. According to the experimental data, the model of strain hardening of 1020 steel is established, Scanning Electron Microscopy(SEM) is conducted, the mechanism of the work hardening of 1020 steel is clarified by analyzing microstructure variation of 1020 steel. It is found that the strain rate hardening effect of 1020 steel is stronger than the softening effect induced by increasing temperatures, the process of simulation cold-beating cause the grain shape of 1020 steel significant change and microstructure elongate significantly to form a fibrous tissue parallel to the direction of deformation, the higher strain rate, the more obvious grain refinement and the more hardening effect. Additionally, the change law of the work hardening rate is investigated, the relationship between dislocation density and strain, the relationship between work hardening rate and dislocation density is obtained. Results show that the change trend of the work hardening rate of 1020 steel is divided into two stages, the work hardening rate decreases dramatically in the first stage and slowly decreases in the second stage, finally tending toward zero. Dislocation density increases with increasing strain and strain rate, work hardening rate decreases with increasing dislocation density. The research results provide the basis for solving the problem of improving the surface quality and performance of workpieces under cold-beating formation of 1020 steel.
Kline, Jeffrey A; Johnson, Charles L; Webb, William B; Runyon, Michael S
2004-01-01
Background Design and test the reliability of a web-based system for multicenter, real-time collection of data in the emergency department (ED), under waiver of authorization, in compliance with HIPAA. Methods This was a phase I, two-hospital study of patients undergoing evaluation for possible pulmonary embolism. Data were collected by on-duty clinicians on an HTML data collection form (prospective e-form), populated using either a personal digital assistant (PDA) or personal computer (PC). Data forms were uploaded to a central, offsite server using secure socket protocol transfer. Each form was assigned a unique identifier, and all PHI data were encrypted, but were password-accessible by authorized research personnel to complete a follow-up e-form. Results From April 15, 2003-April 15 2004, 1022 prospective e-forms and 605 follow-up e-forms were uploaded. Complexities of PDA use compelled clinicians to use PCs in the ED for data entry for most forms. No data were lost and server log query revealed no unauthorized entry. Prospectively obtained PHI data, encrypted upon server upload, were successfully decrypted using password-protected access to allow follow-up without difficulty in 605 cases. Non-PHI data from prospective and follow-up forms were available to the study investigators via standard file transfer protocol. Conclusions Data can be accurately collected from on-duty clinicians in the ED using real-time, PC-Internet data entry in compliance with the Privacy Rule. Deidentification-reidentification of PHI was successfully accomplished by a password-protected encryption-deencryption mechanism to permit follow-up by approved research personnel. PMID:15479471
NASA Astrophysics Data System (ADS)
Raimondo, Marialuigia; Guadagno, Liberata; Naddeo, Carlo; Longo, Pasquale; Mariconda, Annaluisa; Agovino, Anna
2017-02-01
The development of smart materials in aeronautical structures consisting of compounds based on epoxy resins having self-repair capability has been hampered by some criticalities. One of the main critical points is related to the impossibility to use primary amines (e.g.: 4,4‧-diaminodiphenyl sulfone, DDS) as hardeners, because they can poison the catalyst responsible for the healing mechanisms. In this paper, the synthesis, characterization and some tests of applicability of a new hardener, the tetramethylated diaminodiphenyl sulfone (tm-DDS), are shown. The tm-DDS is able to rapidly react with epoxy resin, giving a composite material having some characteristics significantly better than composites hardened with different tertiary amines. The new hardener is able to increase the glass transition temperature (Tg) of about 90 °C with respect to the more common hardener, ancamine K54, already used in self-healing epoxy formulations.
Kent, Alexander Dale [Los Alamos, NM
2008-09-02
Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.
NASA Astrophysics Data System (ADS)
Juels, Ari
The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.
Verifying Secrets and Relative Secrecy
2000-01-01
Systems that authenticate a user based on a shared secret (such as a password or PIN) normally allow anyone to query whether the secret is a given...value. For example, an ATM machine allows one to ask whether a string is the secret PIN of a (lost or stolen) ATM card. Yet such queries are prohibited
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
A more secure anonymous user authentication scheme for the integrated EPR information system.
Wen, Fengtong
2014-05-01
Secure and efficient user mutual authentication is an essential task for integrated electronic patient record (EPR) information system. Recently, several authentication schemes have been proposed to meet this requirement. In a recent paper, Lee et al. proposed an efficient and secure password-based authentication scheme used smart cards for the integrated EPR information system. This scheme is believed to have many abilities to resist a range of network attacks. Especially, they claimed that their scheme could resist lost smart card attack. However, we reanalyze the security of Lee et al.'s scheme, and show that it fails to protect off-line password guessing attack if the secret information stored in the smart card is compromised. This also renders that their scheme is insecure against user impersonation attacks. Then, we propose a new user authentication scheme for integrated EPR information systems based on the quadratic residues. The new scheme not only resists a range of network attacks but also provides user anonymity. We show that our proposed scheme can provide stronger security.
2018-01-01
The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619
Statistical thermodynamics of strain hardening in polycrystalline solids
Langer, James S.
2015-09-18
This paper starts with a systematic rederivation of the statistical thermodynamic equations of motion for dislocation-mediated plasticity proposed in 2010 by Langer, Bouchbinder, and Lookman. The paper then uses that theory to explain the anomalous rate-hardening behavior reported in 1988 by Follansbee and Kocks and to explore the relation between hardening rate and grain size reported in 1995 by Meyers et al. A central theme is the need for physics-based, nonequilibrium analyses in developing predictive theories of the strength of polycrystalline materials.
NASA Astrophysics Data System (ADS)
Zand, Ramtin; DeMara, Ronald F.
2017-12-01
In this paper, we have developed a radiation-hardened non-volatile lookup table (LUT) circuit utilizing spin Hall effect (SHE)-magnetic random access memory (MRAM) devices. The design is motivated by modeling the effect of radiation particles striking hybrid complementary metal oxide semiconductor/spin based circuits, and the resistive behavior of SHE-MRAM devices via established and precise physics equations. The models developed are leveraged in the SPICE circuit simulator to verify the functionality of the proposed design. The proposed hardening technique is based on using feedback transistors, as well as increasing the radiation capacity of the sensitive nodes. Simulation results show that our proposed LUT circuit can achieve multiple node upset (MNU) tolerance with more than 38% and 60% power-delay product improvement as well as 26% and 50% reduction in device count compared to the previous energy-efficient radiation-hardened LUT designs. Finally, we have performed a process variation analysis showing that the MNU immunity of our proposed circuit is realized at the cost of increased susceptibility to transistor and MRAM variations compared to an unprotected LUT design.
Physico-chemical studies of hardened cement paste structure with micro-reinforcing fibers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steshenko, Aleksei, E-mail: steshenko.alexey@gmail.com; Kudyakov, Aleksander; Konusheva, Viktoriya
The results of physico-chemical studies of modified hardened cement paste with micro-reinforcing fibers are given in this article. The goal was to study the reasons of the increase of strength properties of modified hardened cement paste by the method of X-ray diffraction and electron microscopy. It is shown that the use of mineral fibers in the production of cement based material has positive effect on its properties. The study found out that the increase in the strength of the hardened cement paste with micro-reinforcing fibers is due to the increase of the rate of hydration of cement without a significantmore » change in the phase composition in comparison with hardened cement paste without additive. The results of microstructure investigation (of control samples and samples of the reinforced hardened cement paste) have shown that introduction of mineral fibers in the amount of 0.1-2 % by weight of cement provides the structure of the homogeneous microporous material with uniform distribution of the crystalline phase provided by densely packed hydrates.« less
Xie, Wei-Qi; Gong, Yi-Xian; Yu, Kong-Xian
2017-06-01
We demonstrate a reaction headspace gas chromatographic method for quantifying anhydride groups in anhydride-based epoxy hardeners. In this method, the conversion process of anhydride groups can be realized by two steps. In the first step, anhydride groups in anhydride-based epoxy hardeners completely reacted with water to form carboxyl groups. In the second step, the carboxyl groups reacted with sodium bicarbonate solution in a closed sample vial. After the complete reaction between the carboxyl groups and sodium bicarbonate, the CO 2 formed from this reaction was then measured by headspace gas chromatography. The data showed that the reaction in the closed headspace vial can be completed in 15 min at 55°C, the relative standard deviation of the reaction headspace gas chromatography method in the precision test was less than 3.94%, the relative differences between the new method and a reference method were no more than 9.38%. The present reaction method is automated, efficient and can be a reliable tool for quantifying the anhydride groups in anhydride-based epoxy hardeners and related research. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
From Legion to Avaki: The Persistence of Vision
2006-01-01
person, but what component, is requesting an action. 5.3.1 Authentication Users authenticate themselves to a Legion grid with the login paradigm...password supplied during login is compared to the password in the state of the authentication object in order to permit or deny subsequent access to...In either case, the credential is protected by the security of the underlying operating system. Although login is the most commonly used method
Cybersecurity Education for Military Officers
2017-12-01
lecture showed the math behind the possible combinations of passwords of different lengths, and made the recommendation to increase your password to...2. Math the system to the real world: Use of effective metaphors and real world language wherever possible. 3. User Control: Try to give the user...given any training on this topic outside of annual NKO courses. I was a math major for my undergraduate degree, so I have no computer science
ERIC Educational Resources Information Center
Svetcov, Eric
2004-01-01
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
NASA Astrophysics Data System (ADS)
Lan, Hongzhi; Venkatesh, T. A.
2014-01-01
A comprehensive understanding of the relationship between the hardness and the elastic and plastic properties for a wide range of materials is obtained by analysing the hardness characteristics (that are predicted by experimentally verified indentation analyses) of over 9000 distinct combinations of material properties that represent isotropic, homogeneous, power-law hardening metallic materials. Finite element analysis has been used to develop the indentation algorithms that provide the relationships between the elastic and plastic properties of the indented material and its indentation hardness. Based on computational analysis and virtual testing, the following observations are made. The hardness (H) of a material tends to increase with an increase in the elastic modulus (E), yield strength (σy) and the strain-hardening exponent (n). Several materials with different combinations of elastic and plastic properties can exhibit identical true hardness (for a particular indenter geometry/apex angle). In general, combinations of materials that exhibit relatively low elastic modulus and high yield strength or strain-hardening exponents and those that exhibit relatively high elastic modulus and low yield strength or strain-hardening exponents exhibit similar hardness properties. Depending on the strain-hardening characteristics of the indented material, (i.e. n = 0 or ?), the ratio H/σy ranges, respectively, from 2.2 to 2.6 or 2 to 20 (for indentations with a cone angle of 70.3°). The materials that have lower σy/E and higher n exhibit higher H/σy ratios. The commonly invoked relationship between hardness and the yield strength, i.e. H ≈ 3σy, is not generally valid or applicable for all power-law hardening materials. The indentation hardness of a power law hardening material can be taken as following the relationship H ≈ (2.1-2.8)σr where σr is the representative stress based on Tabor's representative strain for a wide range of materials.
US Astronomers Access to SIMBAD in Strasbourg
NASA Technical Reports Server (NTRS)
Oliversen, Ronald (Technical Monitor); Eichhorn, Guenther
2004-01-01
During the last year the US SIMBAD Gateway Project continued to provide services like user registration to the US users of the SIMBAD database in France. Currently there are over 4500 US users registered. We also provided user support by answering questions from users and handling requests for lost passwords when still necessary. Even though almost all users now access SIMBAD without a password, based on hostnames/IP addresses, there are still some users that need individual passwords. We continued to maintain the mirror copy of the SIMBAD database on a server at SAO. This allows much faster access for the US users. During the past year we again moved this mirror to a faster server to improve access for the US users. We again supported a demonstration of the SIMBAD database at the meeting of the American Astronomical Society in January. We provided support for the demonstration activities at the SIMBAD booth. We paid part of the fee for the SIMBAD demonstration. We continued to improve the cross-linking between the SIMBAD project and the Astrophysics Data System. This cross-linking between these systems is very much appreciated by the users of both the SIMBAD database and the ADS Abstract Service. The mirror of the SIMBAD database at SA0 makes this connection faster for the US astronomers. We exchange information between the ADS and SIMBAD on a daily basis. During the last year we also installed a mirror copy of the Vizier system from the CDS, in addition to the SIMBAD mirror.
A microstructure-based yield stress and work-hardening model for textured 6xxx aluminium alloys
NASA Astrophysics Data System (ADS)
Khadyko, M.; Myhr, O. R.; Dumoulin, S.; Hopperstad, O. S.
2016-04-01
The plastic properties of an aluminium alloy are defined by its microstructure. The most important factors are the presence of alloying elements in the form of solid solution and precipitates of various sizes, and the crystallographic texture. A nanoscale model that predicts the work-hardening curves of 6xxx aluminium alloys was proposed by Myhr et al. The model predicts the solid solution concentration and the particle size distributions of different types of metastable precipitates from the chemical composition and thermal history of the alloy. The yield stress and the work hardening of the alloy are then determined from dislocation mechanics. The model was largely used for non-textured materials in previous studies. In this work, a crystal plasticity-based approach is proposed for the work hardening part of the nanoscale model, which allows including the influence of the crystallographic texture. The model is evaluated by comparison with experimental data from uniaxial tensile tests on two textured 6xxx alloys in five temper conditions.
System Connection via SSH Gateway | High-Performance Computing | NREL
;@peregrine.hpc.nrel.gov First time logging in? If this is the first time you've logged in with your new account, you will password. You will be prompted to enter it a second time, then you will be logged off. Just reconnect with your HPC password at any time, you can simply use the passwd command. Remote Users If you're connecting
One Time Passwords in Everything (OPIE): Experiences with Building and Using Stringer Authentication
1995-01-01
opiepasswd(1). The name change brings it more in line with its UNIX counterpart passwd (1), which should make both programs easier to remember for users. This...char * passwd ) int opiehash(char *x, unsigned algorithm) The one-time password schemes implemented in OPIE, as rst described in [Hal94], compute a...seed, passwd ); while (sequence-- != 0) opiehash(result, algorithm); opiebtoe(result,words); Send words. : : : 6 Deployment Every machine that has
Teoh, Andrew B J; Goh, Alwyn; Ngo, David C L
2006-12-01
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.
NASA Astrophysics Data System (ADS)
Velicheti, Dheeraj; Nagy, Peter B.; Hassan, Waled
2017-02-01
We investigated the feasibility of residual stress assessment based on Hall coefficient measurements in precipitation hardened IN718 nickel-base superalloy. As a first step, we studied the influence of microstructural variations on the galvanomagnetic properties of IN718 nickel-base superalloy. We found that the Hall coefficient of IN718 increases from ≈ 8.0×10-11 m3/C in its fully annealed state of 15 HRC Rockwell hardness to ≈ 9.4×10-11 m3/C in its fully hardened state of 45 HRC. We also studied the influence of cold work, i.e., plastic deformation, at room temperature and found that cold work had negligible effect on the Hall coefficient of fully annealed IN718, but significantly reduced it in hardened states of the material. For example, measurements conducted on fully hardened IN718 specimens showed that the Hall coefficient decreased more or less linearly with cold work from its peak value of ≈ 9.4×10-11 m3/C in its intact state to ≈ 9.0×10-11 m3/C in its most deformed state of 22% plastic strain. We also studied the influence of applied stress and found that elastic strain significantly increases the Hall coefficient of IN718 regardless of the state of hardening. The relative sensitivity of the Hall coefficient to elastic strain was measured as a unitless gauge factor K that is defined as the ratio of the relative change of the Hall coefficient ΔRH/RH divided by the axial strain ɛ = σ/E, where σ is the applied uniaxial stress and E is the Young's modulus of the material. We determined that the galvanomagnetic gauge factor of IN718 is κ ≈ 2.6 - 2.9 depending on the hardness level. Besides the fairly high value of the gauge factor, it is important that it is positive, which means that compressive stress in surface-treated components decreases the Hall coefficient in a similar way as plastic deformation does, therefore the unfortunate cancellation that occurs in fully hardened IN718 in the case of electric conductivity measurements will not happen in this case. Additionally, the temperature dependence of the Hall coefficient was measured at three different hardness levels and the influence of thermal exposure was studied in fully hardened IN718 up to 700 °C.
Mathematical Modelling and the Learning Trajectory: Tools to Support the Teaching of Linear Algebra
ERIC Educational Resources Information Center
Cárcamo Bahamonde, Andrea Dorila; Fortuny Aymemí, Josep Maria; Gómez i Urgellés, Joan Vicenç
2017-01-01
In this article we present a didactic proposal for teaching linear algebra based on two compatible theoretical models: emergent models and mathematical modelling. This proposal begins with a problematic situation related to the creation and use of secure passwords, which leads students toward the construction of the concepts of spanning set and…
ERIC Educational Resources Information Center
Gale, Doug
2006-01-01
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Bimis, A; Karalekas, D; Bouropoulos, N; Mouzakis, D; Zaoutsos, S
2016-07-01
This study initially deals with the investigation of the induced strains during hardening stage of a self-setting calcium phosphate bone cement using fiber-Bragg grating (FBG) optical sensors. A complementary Scanning Electron Microscopy (SEM) investigation was also conducted at different time intervals of the hardening period and its findings were related to the FBG recordings. From the obtained results, it is demonstrated that the FBG response is affected by the microstructural changes taking place when the bone cement is immersed into the hardening liquid media. Subsequently, the FBG sensor was used to monitor the absorption process and hygroscopic response of the hardened and dried biocement when exposed to a liquid/humid environment. From the FBG-based calculated hygric strains as a function of moisture concentration, the coefficient of moisture expansion (CME) of the examined bone cement was obtained, exhibiting two distinct linear regions. Copyright © 2016 Elsevier Ltd. All rights reserved.
Effect of strain rate on bake hardening response of BH220 steel
NASA Astrophysics Data System (ADS)
Das, Anindya; Tarafder, Soumitro; Sivaprasad, S.; Chakrabarti, Debalay
2015-09-01
This study aims at understanding the bake hardening ability of ultra low carbon BH220 steel at different strain rates. The as-received material has been pre-strained to four different levels and then deformed in tension under (a) as pre-strained state and (b) after baking at 170 ∘C for 20 minutes, at three different strain rates of 0.001, 0.1 and 100/s. In both the conditions, yield stress increased with pre-strain and strain rate, but bake hardening ability was found to decrease when strain rate was increased. The strain rate sensitivity of the material was also found to decrease with bake hardening. Generation of dislocation forests and their subsequent immobility during baking treatment enables them to act as long range obstacles during further deformation. At higher strain rates, less amount of dislocations are produced which can interact with themselves and produce hardening, because of which bake hardening ability and the strain rate drops. A dislocation based strengthening model, as proposed by Larour et al. 2011 [7], was used to predict the yield stress values obtained at different conditions. The equation produced excellent co-relation with the experimental data.
Cognitive work hardening: a return-to-work intervention for people with depression.
Wisenthal, Adeena; Krupa, Terry
2013-01-01
Mental health claims in the workplace are rising, particularly those due to depression. Associated with this is an increase in disability costs for the employer and the disability insurer, but even more important is the human suffering that results. While treatments are available for the depression there is a gap in interventions that specifically target return-to-work preparation. This paper presents cognitive work hardening, a treatment intervention that can bridge this gap by addressing the unique functional issues inherent in depression with a view to increasing return-to-work success. Cognitive work hardening applies the proven principles of classical work hardening (which has typically been applied to people with physical injuries) to the mental health domain. This paper explains how the occupational therapy principle of occupation and the core competency, enablement, are utilized and applied in cognitive work hardening. Key skills of the occupational therapist are also discussed. In addition, the paper considers the relationship of cognitive work hardening to recovery and mental illness, and the role it plays among workplace-based return-to-work interventions in the current movement toward non-clinical return-to-work interventions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wen, Wei; Capolungo, Laurent; Patra, Anirban
This Report addresses the Milestone M2MS-16LA0501032 of NEAMS Program (“Develop hardening model for FeCrAl cladding), with a deadline of 09/30/2016. Here we report a constitutive law for thermal creep of FeCrAl. This Report adds to and complements the one for Milestone M3MS-16LA0501034 (“Interface hardening models with MOOSE-BISON”), where we presented a hardening law for irradiated FeCrAl. The last component of our polycrystal-based constitutive behavior, namely, an irradiation creep model for FeCrAl, will be developed as part of the FY17 Milestones, and the three regimes will be coupled and interfaced with MOOSE-BISON.
Twinning-induced plasticity (TWIP) and work hardening in Ti-based metallic glass matrix composites.
Fan, J; Qiao, J W; Wang, Z H; Rao, W; Kang, G Z
2017-05-12
The present study demonstrates that Ti-based metallic glass matrix composites (MGMCs) with a normal composition of Ti 43 Zr 32 Ni 6 Ta 5 Be 14 containing ductile dendrites dispersed in the glass matrix has been developed, and deformation mechanisms about the tensile property have been investigated by focusing on twinning-induced plasticity (TWIP) effect. The Ti-based MGMC has excellent tensile properties and pronounced tensile work-hardening capacity, with a yield strength of 1100 MPa and homogeneous elongation of 4%. The distinguished strain hardening is ascribed to the formation of deformation twinning within the dendrites. Twinning generated in the dendrites works as an obstacle for the rapid propagation of shear bands, and then, the localized necking is avoided, which ensures the ductility of such kinds of composites. Besides, a finite-element model (FEM) has been established to explain the TWIP effect which brings out a work-hardening behavior in the present MGMC instead of a localized strain concentration. According to the plasticity theory of traditional crystal materials and some new alloys, TWIP effect is mainly controlled by stacking fault energy (SFE), which has been analyzed intensively in the present MGMC.
How to Prevent Type-Flaw Guessing Attacks on Password Protocols
2003-01-01
How to prevent type-flaw guessing attacks on password protocols∗ Sreekanth Malladi , Jim Alves-Foss Center for Secure and Dependable Systems...respectively. R Retagging 〈−(t, f),+(t′, f)〉. The retagging strand captures the concept of receiving a message of one type and sending it, with a claim of a...referrees for insightful comments. Thanks are also due to Ricardo Corin for many helpful technical discus- sions. References [AN94] M. Abadi and R
2007-01-15
it can detect specifically proscribed content changes to critical files (e.g., illegal shells inserted into /etc/ passwd ). Fourth, it can detect the...UNIX password management involves a pair of inter-related files (/etc/ passwd and /etc/shadow). The corresponding access patterns seen at the storage...content integrity verification is utilized. As a concrete example, consider a UNIX system password file (/etc/ passwd ), which consists of a set of well
Implementing an Intrusion Detection System in the Mysea Architecture
2008-06-01
password for each user passwd <username> then follow the prompts 2. PostgreSQL 7.4.18 Installation Perform the following steps as root: 1. Copy...password changed Repeat for user snort. exit After making the groups and users the group and passwd file needs to be updated. Set security and...untrusted/bin/xtsmkgroup > /etc/group chmod 644 /etc/group /xts/untrusted/bin/xtsmkpasswd > /etc/ passwd chmod 644 /etc/ passwd 3. PostgreSQL 7.4.18
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Shah, Peer Azmat; Hasbullah, Halabi B; Lawal, Ibrahim A; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO).
Radiation hardening of optical fibers and fiber sensors for space applications: recent advances
NASA Astrophysics Data System (ADS)
Girard, S.; Ouerdane, Y.; Pinsard, E.; Laurent, A.; Ladaci, A.; Robin, T.; Cadier, B.; Mescia, L.; Boukenter, A.
2017-11-01
In these ICSO proceedings, we review recent advances from our group concerning the radiation hardening of optical fiber and fiber-based sensors for space applications and compare their benefits to state-of-the-art results. We focus on the various approaches we developed to enhance the radiation tolerance of two classes of optical fibers doped with rare-earths: the erbium (Er)-doped ones and the ytterbium/erbium (Er/Yb)-doped ones. As a first approach, we work at the component level, optimizing the fiber structure and composition to reduce their intrinsically high radiation sensitivities. For the Erbium-doped fibers, this has been achieved using a new structure for the fiber that is called Hole-Assisted Carbon Coated (HACC) optical fibers whereas for the Er/Ybdoped optical fibers, their hardening was successfully achieved adding to the fiber, the Cerium element, that prevents the formation of the radiation-induced point defects responsible for the radiation induced attenuation in the infrared part of the spectrum. These fibers are used as part of more complex systems like amplifiers (Erbium-doped Fiber Amplifier, EDFA or Yb-EDFA) or source (Erbium-doped Fiber Source, EDFS or Yb- EDFS), we discuss the impact of using radiation-hardened fibers on the system radiation vulnerability and demonstrate the resistance of these systems to radiation constraints associated with today and future space missions. Finally, we will discuss another radiation hardening approach build in our group and based on a hardening-by-system strategy in which the amplifier is optimized during its elaboration for its future mission considering the radiation effects and not in-lab.
An improved authenticated key agreement protocol for telecare medicine information system.
Liu, Wenhao; Xie, Qi; Wang, Shengbao; Hu, Bin
2016-01-01
In telecare medicine information systems (TMIS), identity authentication of patients plays an important role and has been widely studied in the research field. Generally, it is realized by an authenticated key agreement protocol, and many such protocols were proposed in the literature. Recently, Zhang et al. pointed out that Islam et al.'s protocol suffers from the following security weaknesses: (1) Any legal but malicious patient can reveal other user's identity; (2) An attacker can launch off-line password guessing attack and the impersonation attack if the patient's identity is compromised. Zhang et al. also proposed an improved authenticated key agreement scheme with privacy protection for TMIS. However, in this paper, we point out that Zhang et al.'s scheme cannot resist off-line password guessing attack, and it fails to provide the revocation of lost/stolen smartcard. In order to overcome these weaknesses, we propose an improved protocol, the security and authentication of which can be proven using applied pi calculus based formal verification tool ProVerif.
Tan, Zuowen
2014-03-01
The telecare medicine information system enables the patients gain health monitoring at home and access medical services over internet or mobile networks. In recent years, the schemes based on cryptography have been proposed to address the security and privacy issues in the telecare medicine information systems. However, many schemes are insecure or they have low efficiency. Recently, Awasthi and Srivastava proposed a three-factor authentication scheme for telecare medicine information systems. In this paper, we show that their scheme is vulnerable to the reflection attacks. Furthermore, it fails to provide three-factor security and the user anonymity. We propose a new three-factor authentication scheme for the telecare medicine information systems. Detailed analysis demonstrates that the proposed scheme provides mutual authentication, server not knowing password and freedom of password, biometric update and three-factor security. Moreover, the new scheme provides the user anonymity. As compared with the previous three-factor authentication schemes, the proposed scheme is more secure and practical.
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
J-PAKE: Authenticated Key Exchange without PKI
NASA Astrophysics Data System (ADS)
Hao, Feng; Ryan, Peter
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication between two parties solely based on a shared password without requiring a Public Key Infrastructure (PKI). After more than a decade of extensive research in this field, there have been several PAKE protocols available. The EKE and SPEKE schemes are perhaps the two most notable examples. Both techniques are however patented. In this paper, we review these techniques in detail and summarize various theoretical and practical weaknesses. In addition, we present a new PAKE solution called J-PAKE. Our strategy is to depend on well-established primitives such as the Zero-Knowledge Proof (ZKP). So far, almost all of the past solutions have avoided using ZKP for the concern on efficiency. We demonstrate how to effectively integrate the ZKP into the protocol design and meanwhile achieve good efficiency. Our protocol has comparable computational efficiency to the EKE and SPEKE schemes with clear advantages on security.
Microencapsulation of Polyfunctional Amines for Self-Healing of Epoxy-Based Composites
2008-01-01
MICROENCAPSULATION OF POLYFUNCTIONAL AMINES FOR SELF-HEALING OF EPOXY-BASED COMPOSITES David A. McIlroy*§, Ben J. Blaiszik,¥ Paul V. Braun... microcapsules containing an amine hardener (DEH-52, Dow Chemical) for use as the hardener in a 2-part epoxy healing system consisting of epoxy...microscope. Scanning electron microscopy was performed on a Philips XL30 ESEM-FEG instrument. Microencapsulation Procedure. 10 g of a 2:1 v/v
2011-12-01
developed to address the two main research questions (see Annex A). Exact wording of the questions varied during interviews to accommodate the...centre at DMS 3rd floor. All electronic files (including digital audio and video recordings) with participant data are being encrypted and password...locked filing cabinet at the University of Ottawa. Electronic files will remain encrypted, password protected and stored on a server to which only the
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Nonlinear behavior of shells of revolution under cyclic loading.
NASA Technical Reports Server (NTRS)
Levine, H. S.; Armen, H., Jr.; Winter, R.; Pifko, A.
1973-01-01
A large deflection elastic-plastic analysis is presented applicable to orthotropic axisymmetric plates and shells of revolution subjected to monotonic and cyclic loading conditions. The analysis is based on the finite-element method. It employs a new higher order, fully compatible, doubly curved orthotropic shell-of-revolution element using cubic Hermitian expansions for both meridional and normal displacements. Both perfectly plastic and strain hardening behavior are considered. Strain hardening is incorporated through use of the Prager-Ziegler kinematic hardening theory, which predicts an ideal Bauschinger effect. Numerous sample problems involving monotonic and cyclic loading conditions are analyzed.
NASA Astrophysics Data System (ADS)
Evseev, D. G.; Savrukhin, A. V.; Neklyudov, A. N.
2018-01-01
Computer simulation of the kinetics of thermal processes and structural and phase transformations in the wall of a bogie side frame produced from steel 20GL is performed with allowance for the differences in the cooling intensity under volume-surface hardening. The simulation is based on the developed method employing the diagram of decomposition of austenite at different cooling rates. The data obtained are used to make conclusion on the effect of the cooling intensity on propagation of martensite structure over the wall section.
Two Back Stress Hardening Models in Rate Independent Rigid Plastic Deformation
NASA Astrophysics Data System (ADS)
Yun, Su-Jin
In the present work, the constitutive relations based on the combination of two back stresses are developed using the Armstrong-Frederick, Phillips and Ziegler’s type hardening rules. Various evolutions of the kinematic hardening parameter can be obtained by means of a simple combination of back stress rate using the rule of mixtures. Thus, a wide range of plastic deformation behavior can be depicted depending on the dominant back stress evolution. The ultimate back stress is also determined for the present combined kinematic hardening models. Since a kinematic hardening rule is assumed in the finite deformation regime, the stress rate is co-rotated with respect to the spin of substructure obtained by incorporating the plastic spin concept. A comparison of the various co-rotational rates is also included. Assuming rigid plasticity, the continuum body consists of the elastic deformation zone and the plastic deformation zone to form a hybrid finite element formulation. Then, the plastic deformation behavior is investigated under various loading conditions with an assumption of the J2 deformation theory. The plastic deformation localization turns out to be strongly dependent on the description of back stress evolution and its associated hardening parameters. The analysis for the shear deformation with fixed boundaries is carried out to examine the deformation localization behavior and the evolution of state variables.
On the Spectral Hardening at gsim300 keV in Solar Flares
NASA Astrophysics Data System (ADS)
Li, G.; Kong, X.; Zank, G.; Chen, Y.
2013-05-01
It has long been noted that the spectra of observed continuum emissions in many solar flares are consistent with double power laws with a hardening at energies gsim300 keV. It is now widely believed that at least in electron-dominated events, the hardening in the photon spectrum reflects an intrinsic hardening in the source electron spectrum. In this paper, we point out that a power-law spectrum of electrons with a hardening at high energies can be explained by the diffusive shock acceleration of electrons at a termination shock with a finite width. Our suggestion is based on an early analytical work by Drury et al., where the steady-state transport equation at a shock with a tanh profile was solved for a p-independent diffusion coefficient. Numerical simulations with a p-dependent diffusion coefficient show hardenings in the accelerated electron spectrum that are comparable with observations. One necessary condition for our proposed scenario to work is that high-energy electrons resonate with the inertial range of the MHD turbulence and low-energy electrons resonate with the dissipation range of the MHD turbulence at the acceleration site, and the spectrum of the dissipation range ~k -2.7. A ~k -2.7 dissipation range spectrum is consistent with recent solar wind observations.
Economy, David Ross; Mara, Nathan A.; Schoeppner, R.; ...
2016-01-13
In complex loading conditions (e.g. sliding contact), mechanical properties, such as strain hardening and initial hardness, will dictate the long-term performance of materials systems. With this in mind, the strain hardening behaviors of Cu/Nb nanoscale metallic multilayer systems were examined by performing nanoindentation tests within nanoscratch wear boxes and undeformed, as-deposited regions. Both the architecture and substrate influence were examined by utilizing three different individual layer thicknesses (2, 20, and 100 nm) and two total film thicknesses (1 and 10 μm). After nano-wear deformation, multilayer systems with thinner layers showed less volume loss as measured by laser scanning microscopy. Additionally,more » the hardness of the deformed regions significantly rose with respect to the as-deposited measurements, which further increased with greater wear loads. Strain hardening exponents for multilayers with thinner layers (2 and 20 nm, n ≈ 0.018 and n ≈ 0.022 respectively) were less than was determined for 100 nm systems (n ≈ 0.041). These results suggest that singledislocation based deformation mechanisms observed for the thinner systems limit the extent of achievable strain hardening. This conclusion indicates that impacts of both architecture strengthening and strain hardening must be considered to accurately predict multilayer performance during sliding contact across varying length scales.« less
Efficient simulation of press hardening process through integrated structural and CFD analyses
DOE Office of Scientific and Technical Information (OSTI.GOV)
Palaniswamy, Hariharasudhan; Mondalek, Pamela; Wronski, Maciek
Press hardened steel parts are being increasingly used in automotive structures for their higher strength to meet safety standards while reducing vehicle weight to improve fuel consumption. However, manufacturing of sheet metal parts by press hardening process to achieve desired properties is extremely challenging as it involves complex interaction of plastic deformation, metallurgical change, thermal distribution, and fluid flow. Numerical simulation is critical for successful design of the process and to understand the interaction among the numerous process parameters to control the press hardening process in order to consistently achieve desired part properties. Until now there has been no integratedmore » commercial software solution that can efficiently model the complete process from forming of the blank, heat transfer between the blank and tool, microstructure evolution in the blank, heat loss from tool to the fluid that flows through water channels in the tools. In this study, a numerical solution based on Altair HyperWorks® product suite involving RADIOSS®, a non-linear finite element based structural analysis solver and AcuSolve®, an incompressible fluid flow solver based on Galerkin Least Square Finite Element Method have been utilized to develop an efficient solution for complete press hardening process design and analysis. RADIOSS is used to handle the plastic deformation, heat transfer between the blank and tool, and microstructure evolution in the blank during cooling. While AcuSolve is used to efficiently model heat loss from tool to the fluid that flows through water channels in the tools. The approach is demonstrated through some case studies.« less
Setting a disordered password on a photonic memory
NASA Astrophysics Data System (ADS)
Su, Shih-Wei; Gou, Shih-Chuan; Chew, Lock Yue; Chang, Yu-Yen; Yu, Ite A.; Kalachev, Alexey; Liao, Wen-Te
2017-06-01
An all-optical method of setting a disordered password on different schemes of photonic memory is theoretically studied. While photons are regarded as ideal information carriers, it is imperative to implement such data protection on all-optical storage. However, we wish to address the intrinsic risk of data breaches in existing schemes of photonic memory. We theoretically demonstrate a protocol using spatially disordered laser fields to encrypt data stored on an optical memory, namely, encrypted photonic memory. To address the broadband storage, we also investigate a scheme of disordered echo memory with a high fidelity approaching unity. The proposed method increases the difficulty for the eavesdropper to retrieve the stored photon without the preset password even when the randomized and stored photon state is nearly perfectly cloned. Our results pave ways to significantly reduce the exposure of memories, required for long-distance communication, to eavesdropping and therefore restrict the optimal attack on communication protocols. The present scheme also increases the sensitivity of detecting any eavesdropper and so raises the security level of photonic information technology.
NASA Astrophysics Data System (ADS)
Bai, Xian-Ming; Ke, Huibin; Zhang, Yongfeng; Spencer, Benjamin W.
2017-11-01
Neutron irradiation in light water reactors can induce precipitation of nanometer sized Cu clusters in reactor pressure vessel steels. The Cu precipitates impede dislocation gliding, leading to an increase in yield strength (hardening) and an upward shift of ductile-to-brittle transition temperature (embrittlement). In this work, cluster dynamics modeling is used to model the entire Cu precipitation process (nucleation, growth, and coarsening) in a Fe-0.3at.%Cu alloy under neutron irradiation at 300°C based on the homogenous nucleation mechanism. The evolution of the Cu cluster number density and mean radius predicted by the modeling agrees well with experimental data reported in literature for the same alloy under the same irradiation conditions. The predicted precipitation kinetics is used as input for a dispersed barrier hardening model to correlate the microstructural evolution with the radiation hardening and embrittlement in this alloy. The predicted radiation hardening agrees well with the mechanical test results in the literature. Limitations of the model and areas for future improvement are also discussed in this work.
Investigation of radiation hardened SOI wafer fabricated by ion-cut technique
NASA Astrophysics Data System (ADS)
Chang, Yongwei; Wei, Xing; Zhu, Lei; Su, Xin; Gao, Nan; Dong, Yemin
2018-07-01
Total ionizing dose (TID) effect on Silicon-on-Insulator (SOI) wafers due to inherent buried oxide (BOX) is a significant concern as it leads to the degradation of electrical properties of SOI-based devices and circuits, even failures of the systems associated with them. This paper reports the radiation hardening implementation of SOI wafer fabricated by ion-cut technique integrated with low-energy Si+ implantation. The electrical properties and radiation response of pseudo-MOS transistors are analyzed. The results demonstrate that the hardening process can significantly improve the TID tolerance of SOI wafers by generating Si nanocrystals (Si-NCs) within the BOX. The presence of Si-NCs created through Si+ implantation is evidenced by high-resolution transmission electron microscopy (HR-TEM). Under the pass gate (PG) irradiation bias, the anti-radiation properties of H-gate SOI nMOSFETs suggest that the radiation hardened SOI wafers with optimized Si implantation dose can perform effectively in a radiation environment. The radiation hardening process provides an excellent way to reinforce the TID tolerance of SOI wafers.
Effects of Annealing Process on the Formability of Friction Stir Welded Al-Li Alloy 2195 Plates
NASA Technical Reports Server (NTRS)
Chen, Po-Shou; Bradford, Vann; Russell, Carolyn
2011-01-01
Large rocket cryogenic tank domes have typically been fabricated using Al-Cu based alloys like Al-Cu alloy 2219. The use of aluminum-lithium based alloys for rocket fuel tank domes can reduce weight because aluminum-lithium alloys have lower density and higher strength than Al-Cu alloy 2219. However, Al-Li alloys have rarely been used to fabricate rocket fuel tank domes because of the inherent low formability characteristic that make them susceptible to cracking during the forming operations. The ability to form metal by stretch forming or spin forming without excessive thinning or necking depends on the strain hardening exponent "n". The stain hardening exponent is a measure of how rapidly a metal becomes stronger and harder. A high strain hardening exponent is beneficial to a material's ability to uniformly distribute the imposed strain. Marshall Space Flight Center has developed a novel annealing process that can achieve a work hardening exponent on the order of 0.27 to 0.29, which is approximately 50% higher than what is typically obtained for Al-Li alloys using the conventional method. The strain hardening exponent of the Al-Li alloy plates or blanks heat treated using the conventional method is typically on the order of 0.17 to 0.19. The effects of this novel annealing process on the formability of friction stir welded Al-Li alloy blanks are being studied at Marshall Space Flight Center. The formability ratings will be generated using the strain hardening exponent, strain rate sensitivity and forming range. The effects of forming temperature on the formability will also be studied. The objective of this work is to study the deformation behavior of the friction stir welded Al-Li alloy 2195 blank and determine the formability enhancement by the new annealing process.
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Electronic patient data confidentiality practices among surgical trainees: questionnaire study.
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-10-01
The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.
Anneal-Hardening Behavior of Cr-Fe-C Alloy Deposits Prepared in a Cr3+-Based Bath with Fe2+ Ions
Huang, Ching An; Chen, Jhih You; Wang, Hai
2017-01-01
Cr-Fe-C alloy deposits were successfully prepared on high-carbon tool steel in a Cr3+-based electroplating bath containing Fe2+ ions and suitable complex agents. A Cr-based alloy deposit was obtained with an electroplating current density higher than 25 Adm−2, and a Fe-based alloy deposit was obtained using a current density of 20 Adm−2. Following electroplating, these alloy deposited specimens were annealed via rapid thermal annealing (RTA) at 500 °C for different periods up to 30 s. The experimental results show that Cr- and Fe-based alloy deposits could be significantly hardened after RTA at 500 °C for a few seconds. The maximum hardness was that of the Cr-Fe-C alloy deposit annealed at 500 °C for 10 s. The maximum hardness of 1205 Hv was detected from the annealed Cr-based alloy deposit prepared with 30 ASD. The hardening mechanism of annealed Cr- and Fe-based alloy deposits is attributed to the precipitation of C-related membranes. The hardness values of the annealed Cr- and Fe-based alloy deposits increase with the increasing degree of crystallization of the C-related membranes. PMID:29206206
Nonlinear behavior of shells of revolution under cyclic loading
NASA Technical Reports Server (NTRS)
Levine, H. S.; Armen, H., Jr.; Winter, R.; Pifko, A.
1972-01-01
A large deflection elastic-plastic analysis is presented, applicable to orthotropic axisymmetric plates and shells of revolution subjected to monotonic and cyclic loading conditions. The analysis is based on the finite-element method. It employs a new higher order, fully compatible, doubly curved orthotropic shell-of-revolution element using cubic Hermitian expansions for both meridional and normal displacements. Both perfectly plastic and strain hardening behavior are considered. Strain hardening is incorporated through use of the Prager-Ziegler kinematic hardening theory, which predicts an ideal Bauschinger effect. Numerous sample problems involving monotonic and cyclic loading conditions are analyzed. The monotonic results are compared with other theoretical solutions.
Statistical Analysis of High-Cycle Fatigue Behavior of Friction Stir Welded AA5083-H321
2011-01-01
durable structures are: (a) FSW is 111being used in a serial production of aluminum alloy -based 112ferryboat deck structures in Finland; (b) Al-Mg- Si -based...and strain-hardened/stabilized Al-Mg-Mn alloy ) are characterized by a relatively large statistical scatter. This scatter is closely related to the...associated with friction stir-welded (FSW) joints of AA5083-H321 (a solid-solution-strengthened and strain-hardened/stabilized Al-Mg-Mn alloy ) are
Radiation Tolerant, FPGA-Based SmallSat Computer System
NASA Technical Reports Server (NTRS)
LaMeres, Brock J.; Crum, Gary A.; Martinez, Andres; Petro, Andrew
2015-01-01
The Radiation Tolerant, FPGA-based SmallSat Computer System (RadSat) computing platform exploits a commercial off-the-shelf (COTS) Field Programmable Gate Array (FPGA) with real-time partial reconfiguration to provide increased performance, power efficiency and radiation tolerance at a fraction of the cost of existing radiation hardened computing solutions. This technology is ideal for small spacecraft that require state-of-the-art on-board processing in harsh radiation environments but where using radiation hardened processors is cost prohibitive.
Insecure Behaviors on Mobile Devices Under Stress
2014-04-08
a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user
The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)
2001-10-16
default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find
Shah, Peer Azmat; Hasbullah, Halabi B.; Lawal, Ibrahim A.; Aminu Mu'azu, Abubakar; Tang Jung, Low
2014-01-01
Due to the proliferation of handheld mobile devices, multimedia applications like Voice over IP (VoIP), video conferencing, network music, and online gaming are gaining popularity in recent years. These applications are well known to be delay sensitive and resource demanding. The mobility of mobile devices, running these applications, across different networks causes delay and service disruption. Mobile IPv6 was proposed to provide mobility support to IPv6-based mobile nodes for continuous communication when they roam across different networks. However, the Route Optimization procedure in Mobile IPv6 involves the verification of mobile node's reachability at the home address and at the care-of address (home test and care-of test) that results in higher handover delays and signalling overhead. This paper presents an enhanced procedure, time-based one-time password Route Optimization (TOTP-RO), for Mobile IPv6 Route Optimization that uses the concepts of shared secret Token, time based one-time password (TOTP) along with verification of the mobile node via direct communication and maintaining the status of correspondent node's compatibility. The TOTP-RO was implemented in network simulator (NS-2) and an analytical analysis was also made. Analysis showed that TOTP-RO has lower handover delays, packet loss, and signalling overhead with an increased level of security as compared to the standard Mobile IPv6's Return-Routability-based Route Optimization (RR-RO). PMID:24688398
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
NASA Astrophysics Data System (ADS)
Looney, Craig W.
2009-10-01
Wolfram|Alpha (http://www.wolframalpha.com/), a free internet-based mathematical engine released earlier this year, represents an orders-of magnitude advance in mathematical power freely available - without money, passwords, or downloads - on the web. Wolfram|Alpha is based on Mathematica, so it can plot functions, take derivatives, solve systems of equations, perform symbolic and numerical integration, and more. These capabilities (especially plotting and integration) will be explored in the context of topics covered in upper level undergraduate physics courses.
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization
2016-05-30
Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i
Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization
2016-03-30
Hide and Seek: Exploiting and Hardening Leakage -Resilient Code Randomization Robert Rudd MIT Lincoln Laboratory Thomas Hobson MIT Lincoln Laboratory...Irvine Ahmad-Reza Sadeghi TU Darmstadt Hamed Okhravi MIT Lincoln Laboratory Abstract Information leakage vulnerabilities can allow adversaries to...bypass mitigations based on code randomization. This discovery motivates numerous techniques that diminish direct and indirect information leakage : (i
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hosoda, Hideki; Mishima, Yoshinao; Suzuki, Tomoo
Yield stress and work hardening coefficient of B2-stabilized NiTi alloys are investigated using compression tests. Compositions of NiTi alloys are based on Ni-49mol.%Ti, to which Cr, Co and Al are chosen as ternary elements which reduce martensitic transformation temperatures of the B2 phase. Mechanical tests are carried out in liquid nitrogen at 77 K, air at room temperature (R.T.) and in an argon atmosphere between 473 K and 873 K. Only at 77 K, some alloys show characteristic stress-strain curves which indicate stress induced martensitic transformation (SIMT), but the others do not. Work hardening coefficient is found to be betweenmore » 2 and 11GPa in all the test temperature range. The values are extremely high compared with Young`s modulus of B2 NiTi. Yield stress and work hardening coefficient increase with test temperature between R.T. and about 650 K in most alloys. The anomalous temperature dependence of mechanical properties is not related to SIMT but to precipitation hardening and/or anomalous dislocation motion similar to B2-type CoTi. Solution hardening by adding ternary elements is evaluated to be small for Cr and Co additions, and large for Al addition, depending on difference in atomic size of the ternary element with respect to Ni or Ti.« less
Unconditional security from noisy quantum storage
NASA Astrophysics Data System (ADS)
Wehner, Stephanie
2010-03-01
We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).
Low cycle fatigue of MAR-M 200 single crystals at 760 and 870 deg C
NASA Technical Reports Server (NTRS)
Milligan, W. W.; Jayaraman, N.; Bill, R. C.
1984-01-01
Fully reversed low cycle fatigue tests were conducted on single crystals of the nickel-base superalloys Mar-M 200 at 760 C and 870 C. At 760 C, planar slip (octahedral) lead to orientation-dependent strain hardening and cyclic lives. Multiple slip crystals strain hardened the most, resulting in relatively high stress ranges and low lives. Single slip crystals strain hardened the least, resulting in relatively low stress ranges and higher lives. A preferential crack initiation site which was related to slip plane geometry was observed in single slip orientated crystals. At 870 C, the trends were quite different, and the slip character was much more homogeneous. As the tensile axis orientation deviated from 001 , the stress ranges increased and the cyclic lives decreased. Two possible mechanisms were proposed to explain the behavior: one is based on Takeuchi and Kuramoto's cube cross-slip model, and the other is based on orientation-dependent creep rates.
High Energy Rate Forming Induced Phase Transition in Austenitic Steel
NASA Astrophysics Data System (ADS)
Kovacs, T.; Kuzsella, L.
2017-02-01
In this study, the effects of explosion hardening on the microstructure and the hardness of austenitic stainless steel have been studied. The optimum explosion hardening technology of austenitic stainless steel was researched. In case of the explosive hardening used new idea means indirect hardening setup. Austenitic stainless steels have high plasticity and can be cold formed easily. However, during cold processing the hardening phenomena always occurs. Upon the explosion impact, the deformation mechanism indicates a plastic deformation and this deformation induces a phase transformation (martensite). The explosion hardening enhances the mechanical properties of the material, includes the wear resistance and hardness [1]. In case of indirect hardening as function of the setup parameters specifically the flayer plate position the hardening increased differently. It was find a relationship between the explosion hardening setup and the hardening level.
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Update on radiation-hardened microcomputers for robotics and teleoperated systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sias, F.R. Jr.; Tulenko, J.S.
1993-12-31
Since many programs sponsored by the Department of Defense are being canceled, it is important to select carefully radiation-hardened microprocessors for projects that will mature (or will require continued support) several years in the future. At the present time there are seven candidate 32-bit processors that should be considered for long-range planning for high-performance radiation-hardened computer systems. For Department of Energy applications it is also important to consider efforts at standardization that require the use of the VxWorks operating system and hardware based on the VMEbus. Of the seven processors, one has been delivered and is operating and other systemsmore » are scheduled to be delivered late in 1993 or early in 1994. At the present time the Honeywell-developed RH32, the Harris RH-3000 and the Harris RHC-3000 are leading contenders for meeting DOE requirements for a radiation-hardened advanced 32-bit microprocessor. These are all either compatible with or are derivatives of the MIPS R3000 Reduced Instruction Set Computer. It is anticipated that as few as two of the seven radiation-hardened processors will be supported by the space program in the long run.« less
Electronic Patient Data Confidentiality Practices Among Surgical Trainees: Questionnaire Study
Mole, Damian J; Fox, Colin; Napolitano, Giulio
2006-01-01
INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended. PMID:17059715
RUASN: a robust user authentication framework for wireless sensor networks.
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.
Scintillation-Hardened GPS Receiver
NASA Technical Reports Server (NTRS)
Stephens, Donald R.
2015-01-01
CommLargo, Inc., has developed a scintillation-hardened Global Positioning System (GPS) receiver that improves reliability for low-orbit missions and complies with NASA's Space Telecommunications Radio System (STRS) architecture standards. A software-defined radio (SDR) implementation allows a single hardware element to function as either a conventional radio or as a GPS receiver, providing backup and redundancy for platforms such as the International Space Station (ISS) and high-value remote sensing platforms. The innovation's flexible SDR implementation reduces cost, weight, and power requirements. Scintillation hardening improves mission reliability and variability. In Phase I, CommLargo refactored an open-source GPS software package with Kalman filter-based tracking loops to improve performance during scintillation and also demonstrated improved navigation during a geomagnetic storm. In Phase II, the company generated a new field-programmable gate array (FPGA)-based GPS waveform to demonstrate on NASA's Space Communication and Navigation (SCaN) test bed.
Influence of Cooling Condition on the Performance of Grinding Hardened Layer in Grind-hardening
NASA Astrophysics Data System (ADS)
Wang, G. C.; Chen, J.; Xu, G. Y.; Li, X.
2018-02-01
45# steel was grinded and hardened on a surface grinding machine to study the effect of three different cooling media, including emulsion, dry air and liquid nitrogen, on the microstructure and properties of the hardened layer. The results show that the microstructure of material surface hardened with emulsion is pearlite and no hardened layer. The surface roughness is small and the residual stress is compressive stress. With cooling condition of liquid nitrogen and dry air, the specimen surface are hardened, the organization is martensite, the surface roughness is also not changed, but high hardness of hardened layer and surface compressive stress were obtained when grinding using liquid nitrogen. The deeper hardened layer grinded with dry air was obtained and surface residual stress is tensile stress. This study provides an experimental basis for choosing the appropriate cooling mode to effectively control the performance of grinding hardened layer.
Collaborative, Trust-Based Security Mechanisms for a National Utility Intranet
2007-09-01
time_message_ceated … username bearnold operation_type copy from_file C:/etc/ passwd \\MPLpw.txt from_file_data_type ND //network data...time_message_created … username bearnold operation_type paste from_file C:\\etc\\ passwd \\MPLpw.txt //logon server password file...from_file_data_type ND from_file_caveat restricted-release to_file F:\\Copy of C:\\etc\\ passwd \\MPLpw.txt //removable drive //end message data
Phase Composition and Hardening of Castable Al - Ca - Ni - Sc Alloys Containing 0.3% Sc
NASA Astrophysics Data System (ADS)
Belov, N. A.; Naumova, E. A.; Bazlova, T. A.; Doroshenko, V. V.
2017-05-01
The phase composition of aluminum alloys of the Al - Ca - Ni - Sc system containing 0.3 wt.% Sc is studied. It is shown that the aluminum solid solution may be in equilibrium not only with binary phases (Al4Ca, Al3Sc and Al3Ni) but also with a ternary Al9NiCa compound. The temperature of attainment of maximum hardening due to precipitation of nanoparticles of phase Al3Sc is determined for all the alloys studied. Principal possibility of creation of castable alloys based on an (Al) + Al4Ca + Al9NiCa eutectic, the hardening heat treatment of which does not require quenching, is substantiated.
NASA Astrophysics Data System (ADS)
Cho, Hiroaki; Ashida, Yasunori; Nakamura, Shuhei; Shimizu, Wataru; Murakami, Yasushi
Room temperature vulcanizing (RTV) elastic silicone usually employs organic tin compounds as a hardener. It is well known that they are strong biohazardous. Thus, European Union is going to regulate the use of organic tin compounds and to exclude them from industrial products till 2015. Authors have succeeded in making a substitute of organic tin compounds as a hardener for RTV elastic silicone by using titanium alkoxide and a carboxylate ester as a hardener and a promoter, respectively. In this paper, composites of RTV elastic silicone made with silica particles and a silane coupling agent are studied based on the mechanical, heat-resistive and adhesive properties.
Wang, Yuhui; Shi, Baodong; He, Yanming; Zhang, Hongwang; Peng, Yan
2018-01-01
A Fe-34.5 wt % Mn-0.04 wt % C ultra-high Mn steel with a fully recrystallised fine-grained structure was produced by cold rolling and subsequent annealing. The steel exhibited excellent cryogenic temperature properties with enhanced work hardening rate, high tensile strength, and high uniform elongation. In order to capture the unique mechanical behaviour, a constitutive model within finite strain plasticity framework based on Hill-type yield function was established with standard Armstrong-Frederick type isotropic hardening. In particular, the evolution of isotropic hardening was determined by the content of martensite; thus, a relationship between model parameters and martensite content is built explicitly. PMID:29414840
Goal Structured Notation in a Radiation Hardening Safety Case for COTS-Based Spacecraft
NASA Technical Reports Server (NTRS)
Witulski, Arthur; Austin, Rebekah; Reed, Robert; Karsai, Gabor; Mahadevan, Nag; Sierawski, Brian; Evans, John; LaBel, Ken
2016-01-01
A systematic approach is presented to constructing a radiation assurance case using Goal Structured Notation (GSN) for spacecraft containing COTS parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat November 2016. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.
Properties and Commercial Application of Manual Plasma Hardening
NASA Astrophysics Data System (ADS)
Korotkov, V. A.
2016-11-01
A new method and a device for plasma hardening of various parts are considered. Installation of the new device does not require too much investment (the active mechanical productions are appropriate for its accommodation) and special choice of personnel (welders train to use it without difficulty). Plasma hardening does not deform and worsen the smoothness of the surface, which makes it possible to employ many hardened parts without finishing mechanical treatment required after bulk or induction hardening. The hardened layer (about 1 mm) produced by plasma hardening exhibits better wear resistance than after bulk hardening with tempering, which prolongs the service life of the parts.
NASA Astrophysics Data System (ADS)
Jeong, S. W.; Kang, U. G.; Choi, J. Y.; Nam, W. J.
2012-09-01
Strain aging and hardening behaviors of a 304 stainless steel containing deformation-induced martensite were investigated by examining mechanical properties and microstructural evolution for different aging temperature and time. Introduced age hardening mechanisms of a cold rolled 304 stainless steel were the additional formation of α'-martensite, hardening of α'-martensite, and hardening of deformed austenite. The increased amount of α'-martensite at an aging temperature of 450 °C confirmed the additional formation of α'-martensite as a hardening mechanism in a cold rolled 304 stainless steel. Additionally, the increased hardness in both α'-martensite and austenite phases with aging temperature proved that hardening of both α'-martensite and austenite phases would be effective as hardening mechanisms in cold rolled and aged 304 stainless steels. The results suggested that among hardening mechanisms, hardening of an α'-martensite phase, including the diffusion of interstitial solute carbon atoms to dislocations and the precipitation of fine carbide particles would become a major hardening mechanism during aging of cold rolled 304 stainless steels.
A novel approach to transformed biometrics using successive projections
NASA Astrophysics Data System (ADS)
Gopi, E. S.
2010-02-01
Unlike user created password, number of biometrics is limited for creating account in different organizations. Transformed biometrics attempts to solve the problem by transforming the biometric into another form, which is unique to the particular organization. This makes the availability of different transformed biometrics in different organizations transformed from the same biometrics and helps in foolproof transactions. In this article a novel approach to transformed biometrics using successive projection technique is suggested .In the proposed technique, the user can register up to 5*4n-1 organizations if the length of the biometric password is 'n'.
Features of surface phase formation during case-hardening of iron- and titanium-based alloys
NASA Astrophysics Data System (ADS)
Vintaikin, B. E.; Kamynin, A. V.; Kraposhin, V. S.; Smirnov, A. E.; Terezanova, K. V.; Cherenkova, S. A.; Sheykina, V. I.
2017-11-01
The article provides a detailed analysis of formation features for surface phases in technical iron and Cr20-Ni80 alloy samples that undergo case-hardening at a temperature of 850°C for 2, 4 and 6 hours of saturation in two different environments: acetylene, and molten salt consisting of sodium tetraborate and amorphous boron. We carried out an X-ray phase analysis to determine the phase structure of surface material layers that formed as a result of the case-hardening process. We discovered that after carburising it was possible to detect Fe3C and Fe-α phases on the surface of technical iron samples, and after boriding we found FeB, Fe2B and Fe3B phases; we noted a lack of characteristic Fe-α and Fe-γ peaks on the X-ray diffraction pattern. We detected many different phases in the Cr20-Ni80 alloy after the same type of case-hardening. Titanium oxides appeared after case-hardening of titanium in air at 800°C. We provide data on surface structure of samples subjected to vacuum carburising: over a 2 to 6 hour interval, the layer thickness is a parabolic function of time. When carrying out electrolysis-free liquid boriding, increasing exposure time from 2 to 6 hours alters the thickness of the strengthened layer only slightly, so, when carrying out case-hardening, it is less efficient to increase saturation time in molten salt containing sodium tetraborate and amorphous boron.
Surface Fatigue Resistance with Induction Hardening
NASA Technical Reports Server (NTRS)
Townsend, Dennis; Turza, Alan; Chapman, Mike
1996-01-01
Induction hardening has been used for some years to harden the surface and improve the strength and service life of gears and other components. Many applications that employ induction hardening require a relatively long time to finish the hardening process and controlling the hardness of the surface layer and its depth often was a problem. Other surface hardening methods, ie., carbonizing, take a very long time and tend to cause deformations of the toothing, whose elimination requires supplementary finishing work. In double-frequency induction hardening, one uses a low frequency for the preheating of the toothed wheel and a much higher frequency for the purpose of rapidly heating the surface by way of surface hardening.
NASA Astrophysics Data System (ADS)
Schumacher, David; Sharma, Ravi; Grager, Jan-Carl; Schrapp, Michael
2018-07-01
Photon counting detectors (PCD) offer new possibilities for x-ray micro computed tomography (CT) in the field of non-destructive testing. For large and/or dense objects with high atomic numbers the problem of scattered radiation and beam hardening severely influences the image quality. This work shows that using an energy discriminating PCD based on CdTe allows to address these problems by intrinsically reducing both the influence of scattering and beam hardening. Based on 2D-radiographic measurements it is shown that by energy thresholding the influence of scattered radiation can be reduced by up to in case of a PCD compared to a conventional energy-integrating detector (EID). To demonstrate the capabilities of a PCD in reducing beam hardening, cupping artefacts are analyzed quantitatively. The PCD results show that the higher the energy threshold is set, the lower the cupping effect emerges. But since numerous beam hardening correction algorithms exist, the results of the PCD are compared to EID results corrected by common techniques. Nevertheless, the highest energy thresholds yield lower cupping artefacts than any of the applied correction algorithms. As an example of a potential industrial CT application, a turbine blade is investigated by CT. The inner structure of the turbine blade allows for comparing the image quality between PCD and EID in terms of absolute contrast, as well as normalized signal-to-noise and contrast-to-noise ratio. Where the absolute contrast can be improved by raising the energy thresholds of the PCD, it is found that due to lower statistics the normalized contrast-to-noise-ratio could not be improved compared to the EID. These results might change to the contrary when discarding pre-filtering of the x-ray spectra and thus allowing more low-energy photons to reach the detectors. Despite still being in the early phase in technological progress, PCDs already allow to improve CT image quality compared to conventional detectors in terms of scatter and beam hardening reduction.
Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft
NASA Technical Reports Server (NTRS)
Witulski, Arthur; Austin, Rebekah; Evans, John; Mahadevan, Nag; Karsai, Gabor; Sierawski, Brian; LaBel, Ken; Reed, Robert; Schrimpf, Ron
2016-01-01
A systematic approach is presented to constructing a radiation assurance case using Goal Structuring Notation (GSN) for spacecraft containing commercial-off-the-shelf (COTS) parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat November 2016. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.
NASA Astrophysics Data System (ADS)
Memon, Fareed Ahmed; Nuruddin, Muhd Fadhil; Shafiq, Nasir
2013-02-01
The effect of silica fume on the fresh and hardened properties of fly ash-based self-compacting geopolymer concrete (SCGC) was investigated in this paper. The work focused on the concrete mixes with a fixed water-to-geopolymer solid (W/Gs) ratio of 0.33 by mass and a constant total binder content of 400 kg/m3. The mass fractions of silica fume that replaced fly ash in this research were 0wt%, 5wt%, 10wt%, and 15wt%. The workability-related fresh properties of SCGC were assessed through slump flow, V-funnel, and L-box test methods. Hardened concrete tests were limited to compressive, splitting tensile and flexural strengths, all of which were measured at the age of 1, 7, and 28 d after 48-h oven curing. The results indicate that the addition of silica fume as a partial replacement of fly ash results in the loss of workability; nevertheless, the mechanical properties of hardened SCGC are significantly improved by incorporating silica fume, especially up to 10wt%. Applying this percentage of silica fume results in 4.3% reduction in the slump flow; however, it increases the compressive strength by 6.9%, tensile strength by 12.8% and flexural strength by 11.5%.
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-01-01
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
NASA Astrophysics Data System (ADS)
Wei, Haoyang
A new critical plane-energy model is proposed in this thesis for multiaxial fatigue life prediction of homogeneous and heterogeneous materials. Brief review of existing methods, especially on the critical plane-based and energy-based methods, are given first. Special focus is on one critical plane approach which has been shown to work for both brittle and ductile metals. The key idea is to automatically change the critical plane orientation with respect to different materials and stress states. One potential drawback of the developed model is that it needs an empirical calibration parameter for non-proportional multiaxial loadings since only the strain terms are used and the out-of-phase hardening cannot be considered. The energy-based model using the critical plane concept is proposed with help of the Mroz-Garud hardening rule to explicitly include the effect of non-proportional hardening under fatigue cyclic loadings. Thus, the empirical calibration for non-proportional loading is not needed since the out-of-phase hardening is naturally included in the stress calculation. The model predictions are compared with experimental data from open literature and it is shown the proposed model can work for both proportional and non-proportional loadings without the empirical calibration. Next, the model is extended for the fatigue analysis of heterogeneous materials integrating with finite element method. Fatigue crack initiation of representative volume of heterogeneous materials is analyzed using the developed critical plane-energy model and special focus is on the microstructure effect on the multiaxial fatigue life predictions. Several conclusions and future work is drawn based on the proposed study.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Economy, David Ross; Mara, Nathan A.; Schoeppner, R.
In complex loading conditions (e.g. sliding contact), mechanical properties, such as strain hardening and initial hardness, will dictate the long-term performance of materials systems. With this in mind, the strain hardening behaviors of Cu/Nb nanoscale metallic multilayer systems were examined by performing nanoindentation tests within nanoscratch wear boxes and undeformed, as-deposited regions. Both the architecture and substrate influence were examined by utilizing three different individual layer thicknesses (2, 20, and 100 nm) and two total film thicknesses (1 and 10 μm). After nano-wear deformation, multilayer systems with thinner layers showed less volume loss as measured by laser scanning microscopy. Additionally,more » the hardness of the deformed regions significantly rose with respect to the as-deposited measurements, which further increased with greater wear loads. Strain hardening exponents for multilayers with thinner layers (2 and 20 nm, n ≈ 0.018 and n ≈ 0.022 respectively) were less than was determined for 100 nm systems (n ≈ 0.041). These results suggest that singledislocation based deformation mechanisms observed for the thinner systems limit the extent of achievable strain hardening. This conclusion indicates that impacts of both architecture strengthening and strain hardening must be considered to accurately predict multilayer performance during sliding contact across varying length scales.« less
A new approach for beam hardening correction based on the local spectrum distributions
NASA Astrophysics Data System (ADS)
Rasoulpour, Naser; Kamali-Asl, Alireza; Hemmati, Hamidreza
2015-09-01
Energy dependence of material absorption and polychromatic nature of x-ray beams in the Computed Tomography (CT) causes a phenomenon which called "beam hardening". The purpose of this study is to provide a novel approach for Beam Hardening (BH) correction. This approach is based on the linear attenuation coefficients of Local Spectrum Distributions (LSDs) in the various depths of a phantom. The proposed method includes two steps. Firstly, the hardened spectra in various depths of the phantom (or LSDs) are estimated based on the Expectation Maximization (EM) algorithm for arbitrary thickness interval of known materials in the phantom. The performance of LSD estimation technique is evaluated by applying random Gaussian noise to transmission data. Then, the linear attenuation coefficients with regarding to the mean energy of LSDs are obtained. Secondly, a correction function based on the calculated attenuation coefficients is derived in order to correct polychromatic raw data. Since a correction function has been used for the conversion of the polychromatic data to the monochromatic data, the effect of BH in proposed reconstruction must be reduced in comparison with polychromatic reconstruction. The proposed approach has been assessed in the phantoms which involve less than two materials, but the correction function has been extended for using in the constructed phantoms with more than two materials. The relative mean energy difference in the LSDs estimations based on the noise-free transmission data was less than 1.5%. Also, it shows an acceptable value when a random Gaussian noise is applied to the transmission data. The amount of cupping artifact in the proposed reconstruction method has been effectively reduced and proposed reconstruction profile is uniform more than polychromatic reconstruction profile.
NASA Astrophysics Data System (ADS)
Kumar, Gautam; Maji, Kuntal
2018-04-01
This article deals with the prediction of strain-and stress-based forming limit curves for advanced high strength steel DP590 sheet using Marciniak-Kuczynski (M-K) method. Three yield criteria namely Von-Mises, Hill's 48 and Yld2000-2d and two hardening laws i.e., Hollomon power and Swift hardening laws were considered to predict the forming limit curves (FLCs) for DP590 steel sheet. The effects of imperfection factor and initial groove angle on prediction of FLC were also investigated. It was observed that the FLCs shifted upward with the increase of imperfection factor value. The initial groove angle was found to have significant effects on limit strains in the left side of FLC, and insignificant effect for the right side of FLC for certain range of strain paths. The limit strains were calculated at zero groove angle for the right side of FLC, and a critical groove angle was used for the left side of FLC. The numerically predicted FLCs considering the different combinations of yield criteria and hardening laws were compared with the published experimental results of FLCs for DP590 steel sheet. The FLC predicted using the combination of Yld2000-2d yield criterion and swift hardening law was in better coorelation with the experimental data. Stress based forming limit curves (SFLCs) were also calculated from the limiting strain values obtained by M-K model. Theoretically predicted SFLCs were compared with that obtained from the experimental forming limit strains. Stress based forming limit curves were seen to better represent the forming limits of DP590 steel sheet compared to that by strain-based forming limit curves.
The Effect of Grain Size on the Strain Hardening Behavior for Extruded ZK61 Magnesium Alloy
NASA Astrophysics Data System (ADS)
Zhang, Lixin; Zhang, Wencong; Chen, Wenzhen; Duan, Junpeng; Wang, Wenke; Wang, Erde
2017-12-01
The effects of grain size on the tensile and compressive strain hardening behaviors for extruded ZK61 alloys have been investigated by uniaxial tensile and compressive tests along the extrusion directions. Cylindrical tension and compression specimens of extruded ZK61 alloys with various sized grain were fabricated by annealing treatments. Tensile and compressive tests at ambient temperature were conducted at a strain rate of 0.5 × 10-3 s-1. The results indicate that both tensile strain hardening and compressive strain hardening of ZK61 alloys with different grain sizes have an athermal regime of dislocation accumulation in early deformation. The threshold stress value caused dynamic recovery is predominantly related to grain size in tensile strain hardening, but the threshold stress values for different grain sizes are almost identical in compressive strain hardening. There are obvious transition points on the tensile strain hardening curves which indicate the occurrence of dynamic recrystallization (DRX). The tensile strain hardening rate of the coarse-grained alloy obviously decreases faster than that of fine-grained alloys before DRX and the tensile strain hardening curves of different grain sizes basically tend to parallel after DRX. The compressive strain hardening rate of the fine-grained alloy obviously increases faster than that of coarse-grained alloy for twin-induced strain hardening, but compressive strain hardening curves also tend to parallel after twinning is exhausted.
Superplasticizer Addition to Carbon Fly Ash Geopolymers Activated at Room Temperature.
Carabba, Lorenza; Manzi, Stefania; Bignozzi, Maria Chiara
2016-07-18
Present concerns about global warming due to the greenhouse emissions in the atmosphere have pushed the cement industry to research alternatives to ordinary Portland cement (OPC). Geopolymer binder may constitute a possible breakthrough in the development of sustainable materials: understanding the effectiveness and the influences of superplasticizers on geopolymer systems is one of the essential requirements for its large-scale implementation. This study aims to investigate the possibility of using commercially available chemical admixtures designed for OPC concrete, to improve fresh properties of fly ash-based geopolymers and mortars. A special emphasis is laid upon evaluating their influence on mechanical and microstructural characteristics of the hardened material realized under room-temperature curing conditions. Results indicate that the addition of a polycarboxylic ether-based superplasticizer, in the amount of 1.0 wt. % by mass of fly ash, promotes an improvement in workability without compromising the final strength of the hardened material. Moreover, the addition of the polycarboxylic ether- and acrylic-based superplasticizers induces a refinement in the pore structure of hardened mortar leading to a longer water saturation time.
Superplasticizer Addition to Carbon Fly Ash Geopolymers Activated at Room Temperature
Carabba, Lorenza; Manzi, Stefania; Bignozzi, Maria Chiara
2016-01-01
Present concerns about global warming due to the greenhouse emissions in the atmosphere have pushed the cement industry to research alternatives to ordinary Portland cement (OPC). Geopolymer binder may constitute a possible breakthrough in the development of sustainable materials: understanding the effectiveness and the influences of superplasticizers on geopolymer systems is one of the essential requirements for its large-scale implementation. This study aims to investigate the possibility of using commercially available chemical admixtures designed for OPC concrete, to improve fresh properties of fly ash-based geopolymers and mortars. A special emphasis is laid upon evaluating their influence on mechanical and microstructural characteristics of the hardened material realized under room-temperature curing conditions. Results indicate that the addition of a polycarboxylic ether-based superplasticizer, in the amount of 1.0 wt. % by mass of fly ash, promotes an improvement in workability without compromising the final strength of the hardened material. Moreover, the addition of the polycarboxylic ether- and acrylic-based superplasticizers induces a refinement in the pore structure of hardened mortar leading to a longer water saturation time. PMID:28773707
2005-12-01
hardening exponent and Cimp is the impression strain-rate hardening coefficient. The strain-rate hardening exponent m is a parameter that is...exponent and Cimp is the impression strain-rate hardening coefficient. The strain-rate hardening exponent m is a parameter that is related to the creep
Simulation Study of Single-Event Burnout in Power Trench ACCUFETs
NASA Astrophysics Data System (ADS)
Yu, Cheng-Hao; Wang, Ying; Fei, Xin-Xing; Cao, Fei
2016-10-01
This paper presents 2-D numerical simulation results of single-event burnout (SEB) in power trench accumulation mode field effect transistor (ACCUFET) for the first time. In this device, a p+ base region is used to deplete the n- base region to achieve a low leakage current density, and the blocking voltage is supported by the n- drift region. We find that the depth of the p+ base region determines both the leakage current density and SEB performance, as a result, there is a tradeoff relationship between the two characteristics. The 60 V hardened power ACCUFET shown in this paper could demonstrate much better SEB performance without sacrificing the current handling capability compared with the standard UMOSFET. The hardened structure mentioned in this paper indicates that an n buffer layer is added between the epitaxial layer and substrate layer based on a basic power device. As a result, the safe operating area (SOA) of the 60 V, 80 V and 100 V hardened ACCUFET discussed in this paper could reach the value of breakdown voltage when the buffer layer is over a certain value, that can realize safety operation throughout entire LET range.
Fluid casting of particle-based articles
Menchhofer, Paul
1995-01-01
A method for the production of articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is introduced into an immiscible, heated fluid. The slurry sets or hardens into a shape determined by the physical characteristics of the fluid and the manner of introduction of the slurry into the fluid. For example, the slurry is pulse injected into the fluid to provide spherical articles. The hardened spheres may then be sintered to consolidate the particles and provide a high density product.
Gamma prime hardened nickel-iron based superalloy
Korenko, Michael K.
1978-01-01
A low swelling, gamma prime hardened nickel-iron base superalloy useful for fast reactor duct and cladding applications is described having from about 7.0 to about 10.5 weight percent (wt%) chromium, from about 24 to about 35 wt% nickel, from about 1.7 to about 2.5 wt% titanium, from about 0.3 to about 1.0 wt% aluminum, from about 2.0 to about 3.3 wt% molybdenum, from about 0.05 to about 1.0 wt% silicon, from about 0.03 to about 0.06 wt% carbon, a maximum of about 2 wt% manganese, and the balance iron.
NASA Astrophysics Data System (ADS)
Savaria, Vincent
The optimization of gearing for aeronautical engines depends on the development of surface hardening processes to significantly improve in-service durability. Induction heating followed by quenching is a treatment increasingly used in this field to improve the fatigue resistance of critical components such as gears. In this context, this thesis studies the impact of the induction process parameters on residual stresses and the effects of those stresses on the bending fatigue of induction hardened gears. Two existing residual stress measurement techniques, X-ray diffraction and the contour method, were adapted for induction hardened components. The residual stress measurement by X-ray diffraction technique has been significantly improved in this thesis by the consideration of the variation of the X-ray elastic constant at different locations in the hardened layer and the development of a finite element based layer removal correction method that enabled more accurate in-depth residual stress measurements in all sort of geometries. The contour method is clearly a powerful tool for residual stress mapping at the core of parts but proved to be inaccurate for near-surface measurements in the case of thin hardened layers. These methods were used to show the effects of several parameters (initial hardness, preheating, final heating, tempering) with discs and aeronautical spur gears. The results indicate that two induction treatments can sometimes produce two different residual stress distributions (amplitude, severity of gradient in the transition zone, etc.) for a similar hardened depth. The bending fatigue of those gears was studied experimentally with a single tooth bending test rig and numerically with the proposition of a fatigue model for the calculation of the bending endurance limit. The calibration of the model was based on fatigue tests results on traction and torsion specimens. Bending fatigue testing results on gears confirmed the overall accuracy of the proposed model predictions. The Crossland criterion without the gradient effect gave better predictions when compared with the experimental results for that particular case. This 3D multiaxial fatigue prediction model represents a significant improvement over previous approaches by the simultaneous consideration of the so-called gradient effect, residual stresses, surface roughness and the variation of properties caused by the surface hardening. The induction treatments used in this study improved the bending fatigue resistance of spur gears by 45 to 71 % depending on the case.
Wu, Fan; Xu, Lili
2013-08-01
Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.
Press-hardening of zinc coated steel - characterization of a new material for a new process
NASA Astrophysics Data System (ADS)
Kurz, T.; Larour, P.; Lackner, J.; Steck, T.; Jesner, G.
2016-11-01
Press-hardening of zinc-coated PHS has been limited to the indirect process until a pre-cooling step was introduced before the hot forming to prevent liquid metal embrittlement. Even though that's only a minor change in the process itself it does not only eliminate LME, but increases also the demands on the base material especially in terms of hardenability or phase transformations at temperatures below 700 °C in general. This paper deals with the characterization of a modified zinc-coated material for press-hardening with pre-cooling that assures a robust process. The pre-cooling step itself and especially the transfer of the blank in the hot-forming die is more demanding than the standard 22MnB5 can stand to ensure full hardenability. Therefore the transformation behavior of the modified material is shown in CCT and TTT diagrams. Of the same importance are the changed hot forming temperature and flow curves for material at lower temperatures than typically used in direct hot forming. The resulting mechanical properties after hardening from tensile testing and bending tests are shown in detail. Finally some results from side impact crash tests and correlations of the findings with mechanical properties such as fracture elongation, tensile strength, VDA238 bending angle at maximum force as well as postuniform bending slope are given as well. Fracture elongation is shown to be of little help for damage prediction in side impact crash. Tensile strength and VDA bending properties enable however some accurate prediction of the PHS final damage behavior in bending dominated side impact load case.
Surface hardening of 30CrMnSiA steel using continuous electron beam
NASA Astrophysics Data System (ADS)
Fu, Yulei; Hu, Jing; Shen, Xianfeng; Wang, Yingying; Zhao, Wansheng
2017-11-01
30CrMnSiA high strength low alloy (HSLA) carbon structural steel is typically applied in equipment manufacturing and aerospace industries. In this work, the effects of continuous electron beam treatment on the surface hardening and microstructure modifications of 30CrMnSiA are investigated experimentally via a multi-purpose electron beam machine Pro-beam system. Micro hardness value in the electron beam treated area shows a double to triple increase, from 208 HV0.2 on the base metal to 520 HV0.2 on the irradiated area, while the surface roughness is relatively unchanged. Surface hardening parameters and mechanisms are clarified by investigation of the microstructural modification and the phase transformation both pre and post irradiation. The base metal is composed of ferrite and troostite. After continuous electron beam irradiation, the micro structure of the electron beam hardened area is composed of acicular lower bainite, feathered upper bainite and part of lath martensite. The optimal input energy density for 30CrMnSiA steel in this study is of 2.5 kJ/cm2 to attain the proper hardened depth and peak hardness without the surface quality deterioration. When the input irradiation energy exceeds 2.5 kJ/cm2 the convective mixing of the melted zone will become dominant. In the area with convective mixing, the cooling rate is relatively lower, thus the micro hardness is lower. The surface quality will deteriorate. Chemical composition and surface roughness pre and post electron beam treatment are also compared. The technology discussed give a picture of the potential of electron beam surface treatment for improving service life and reliability of the 30CrMnSiA steel.
Ishizuka, W; Ono, K; Hara, T; Goto, S
2015-01-01
To avoid winter frost damage, evergreen coniferous species develop cold hardiness with suitable phenology for the local climate regime. Along the elevational gradient, a genetic cline in autumn phenology is often recognised among coniferous populations, but further quantification of evolutionary adaptation related to the local environment and its responsible signals generating the phenological variation are poorly understood. We evaluated the timing of cold hardening among populations of Abies sachalinensis, based on time series freezing tests using trees derived from four seed source populations × three planting sites. Furthermore, we constructed a model to estimate the development of hardening from field temperatures and the intraspecific variations occurring during this process. An elevational cline was detected such that high-elevation populations developed cold hardiness earlier than low-elevation populations, representing significant genetic control. Because development occurred earlier at high-elevation planting sites, the genetic trend across elevation overlapped with the environmental trend. Based on the trade-off between later hardening to lengthen the active growth period and earlier hardening to avoid frost damage, this genetic cline would be adaptive to the local climate. Our modelling approach estimated intraspecific variation in two model components: the threshold temperature, which was the criterion for determining whether the trees accumulated the thermal value, and the chilling requirement for trees to achieve adequate cold hardiness. A higher threshold temperature and a lower chilling requirement could be responsible for the earlier phenology of the high-elevation population. These thermal responses may be one of the important factors driving the elevation-dependent adaptation of A. sachalinensis. © 2014 German Botanical Society and The Royal Botanical Society of the Netherlands.
Effect of preheating on fatigue resistance of gears in spin induction coil hardening process
NASA Astrophysics Data System (ADS)
Kumar, Pawan; Aggarwal, M. L.
2018-02-01
Spin hardening inductors are typically used for fine-sized teeth gear geometry. With the proper selection of several design parameters, only the gear teeth can be case surface hardened without affecting the other surface of gear. Preheating may be done to reach an adapted high austenitizing temperature in the root circle to avoid overheating of the tooth tip during final heating. The effect of preheating of gear on control of compressive residual stresses and case hardening has been experimentally discussed in this paper. Present work is about analysing single frequency mode, preheat hardening treatment and compressive residual stresses field for hardening process of spur gear using spin hardening inductors.
Multi-factor challenge/response approach for remote biometric authentication
NASA Astrophysics Data System (ADS)
Al-Assam, Hisham; Jassim, Sabah A.
2011-06-01
Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.
National Authentication Framework Implementation Study
2009-12-01
Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...written on paper disclosed; passwords stored in electronic file copied. 1,2,3,4 Eaves‐ dropping The token secret or authenticator is revealed to...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which
Surface hardening of titanium alloys with melting depth controlled by heat sink
Oden, Laurance L.; Turner, Paul C.
1995-01-01
A process for forming a hard surface coating on titanium alloys includes providing a piece of material containing titanium having at least a portion of one surface to be hardened. The piece having a portion of a surface to be hardened is contacted on the backside by a suitable heat sink such that the melting depth of said surface to be hardened may be controlled. A hardening material is then deposited as a slurry. Alternate methods of deposition include flame, arc, or plasma spraying, electrodeposition, vapor deposition, or any other deposition method known by those skilled in the art. The surface to be hardened is then selectively melted to the desired depth, dependent on the desired coating thickness, such that a molten pool is formed of the piece surface and the deposited hardening material. Upon cooling a hardened surface is formed.
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
NASA Technical Reports Server (NTRS)
Arnold, S. M.; Saleeb, A. F.
2003-01-01
Given the previous complete-potential structure framework together with the notion of strain- and stress-partitioning in terms of separate contributions of several submechanisms (viscoelastic and viscoplastic) to the thermodynamic functions (stored energy and dissipation) a detailed viscoelastoplastic multimechanism characterization of a specific hardening functional form of the model is presented and discussed. TIMETAL 21S is the material of choice as a comprehensive test matrix, including creep, relaxation, constant strain-rate tension tests, etc. are available at various temperatures. Discussion of these correlations tests, together with comparisons to several other experimental results, are given to assess the performance and predictive capabilities of the present model particularly with regard to the notion of hardening saturation as well as the interaction of multiplicity of dissipative (reversible/irreversible) mechanisms.
NASA Astrophysics Data System (ADS)
Bergner, F.; Pareige, C.; Hernández-Mayoral, M.; Malerba, L.; Heintze, C.
2014-05-01
An attempt is made to quantify the contributions of different types of defect-solute clusters to the total irradiation-induced yield stress increase in neutron-irradiated (300 °C, 0.6 dpa), industrial-purity Fe-Cr model alloys (target Cr contents of 2.5, 5, 9 and 12 at.% Cr). Former work based on the application of transmission electron microscopy, atom probe tomography, and small-angle neutron scattering revealed the formation of dislocation loops, NiSiPCr-enriched clusters and α‧-phase particles, which act as obstacles to dislocation glide. The values of the dimensionless obstacle strength are estimated in the framework of a three-feature dispersed-barrier hardening model. Special attention is paid to the effect of measuring errors, experimental details and model details on the estimates. The three families of obstacles and the hardening model are well capable of reproducing the observed yield stress increase as a function of Cr content, suggesting that the nanostructural features identified experimentally are the main, if not the only, causes of irradiation hardening in these model alloys.
Local relative density modulates failure and strength in vertically aligned carbon nanotubes.
Pathak, Siddhartha; Mohan, Nisha; Decolvenaere, Elizabeth; Needleman, Alan; Bedewy, Mostafa; Hart, A John; Greer, Julia R
2013-10-22
Micromechanical experiments, image analysis, and theoretical modeling revealed that local failure events and compressive stresses of vertically aligned carbon nanotubes (VACNTs) were uniquely linked to relative density gradients. Edge detection analysis of systematically obtained scanning electron micrographs was used to quantify a microstructural figure-of-merit related to relative local density along VACNT heights. Sequential bottom-to-top buckling and hardening in stress-strain response were observed in samples with smaller relative density at the bottom. When density gradient was insubstantial or reversed, bottom regions always buckled last, and a flat stress plateau was obtained. These findings were consistent with predictions of a 2D material model based on a viscoplastic solid with plastic non-normality and a hardening-softening-hardening plastic flow relation. The hardening slope in compression generated by the model was directly related to the stiffness gradient along the sample height, and hence to the local relative density. These results demonstrate that a microstructural figure-of-merit, the effective relative density, can be used to quantify and predict the mechanical response.
NASA Astrophysics Data System (ADS)
Garcia-Giron, A.; Romano, J. M.; Liang, Y.; Dashtbozorg, B.; Dong, H.; Penchev, P.; Dimov, S. S.
2018-05-01
The paper reports a laser patterning method for producing surfaces with dual scale topographies on ferritic stainless steel plates that are hardened by low temperature plasma surface alloying. Nitrogen and carbon based gasses were used in the alloying process to obtain surface layers with an increased hardness from 172 HV to 1001 HV and 305 HV, respectively. Then, a nanosecond infrared laser was used to pattern the plasma treated surfaces and thus to obtain super-hydrophobicity, by creating cell- or channel-like surface structures. The combined surface hardening and laser patterning approach allowed super-hydrophobic surfaces to be produced on both nitrided and carburised stainless steel plates with effective contact angles higher than 150°. The hardened layers on nitrided samples had cracks and was delaminated after the laser patterning while on plasma carburised samples remained intact. The results showed that by applying the proposed combined approach it is possible to retain the higher hardness of the nitrided stainless steel plates and at the same time to functionalise them to obtain super-hydrophobic properties.
Mechanically activated fly ash as a high performance binder for civil engineering
NASA Astrophysics Data System (ADS)
Rieger, D.; Kullová, L.; Čekalová, M.; Novotný, P.; Pola, M.
2017-01-01
This study is aimed for investigation of fly ash binder with suitable properties for civil engineering needs. The fly ash from Czech brown coal power plant Prunerov II was used and mechanically activated to achieve suitable particle size for alkaline activation of hardening process. This process is driven by dissolution of aluminosilicate content of fly ash and by subsequent development of inorganic polymeric network called geopolymer. Hardening kinetics at 25 and 30 °C were measured by strain controlled small amplitude oscillatory rheometry with strain of 0.01 % and microstructure of hardened binder was evaluated by scanning electron microscopy. Strength development of hardened binder was investigated according to compressional and flexural strength for a period of 180 days. Our investigation finds out, that mechanically activated fly ash can be comparable to metakaolin geopolymers, according to setting time and mechanical parameters even at room temperature curing. Moreover, on the bases of long time strength development, achieved compressional strength of 134.5 after 180 days is comparable to performance of high grade Portland cement concretes.
Fujiwara, M.; Waseda, A.; Nojima, R.; Moriai, S.; Ogata, W.; Sasaki, M.
2016-01-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km). PMID:27363566
Fujiwara, M; Waseda, A; Nojima, R; Moriai, S; Ogata, W; Sasaki, M
2016-07-01
Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir's (k, n)-threshold scheme, in which the data are split into n pieces (shares) for storage and at least k pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold k, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution, and demonstrate it in the Tokyo metropolitan area (≤90 km).
A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.
RUASN: A Robust User Authentication Framework for Wireless Sensor Networks
Kumar, Pardeep; Choudhury, Amlan Jyoti; Sain, Mangal; Lee, Sang-Gon; Lee, Hoon-Jae
2011-01-01
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card) concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost. PMID:22163888
A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices
Koong, Chorng-Shiuh; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864
Strain hardening in startup shear of long-chain branched polymer solutions.
Liu, Gengxin; Cheng, Shiwang; Lee, Hyojoon; Ma, Hongwei; Xu, Hongde; Chang, Taihyun; Quirk, Roderic P; Wang, Shi-Qing
2013-08-09
We show for the first time that entangled polymeric liquids containing long-chain branching can exhibit strain hardening upon startup shear. As the significant long-chain branching impedes chain disentanglement, Gaussian coils between entanglements can deform to reach the finite extensibility limit where the intrachain retraction force exceeds the value expected from the usual conformational entropy loss evaluated based on Gaussian chain statistics. The phenomenon is expected to lead to further theoretical understanding.
Development of Press Hardening Steel with High Resistance to Hydrogen Embrittlement
NASA Astrophysics Data System (ADS)
Bian, Jian; Mohrbacher, Hardy; Lu, Hongzhou; Wang, Wenjun
Press hardening has become the state-of-art technology in the car body manufacturing to enhance safety standard and to reduce CO2 emission of new vehicles. However the delayed cracking due to hydrogen embrittlement remains to be a critical issue. Generally press hardening steel is susceptible to hydrogen embrittlement due to ultra-high strength and martensitic microstructure. The hydrogen charging tests clearly demonstrate that only a few ppm of diffusible hydrogen is sufficient to cause such embrittlement. Currently the hydrogen embrittlement cannot be detected in the press hardened components and the embitteled components could collapse in the crash situation with fatal consequences arisen through dramatic loss in both strength and ductility. This paper introduces a new metallurgical solution to increase the resistance to hydrogen embrittlement of conventional press hardening steel based on 22MnB5 by Nb microalloying. In the hydrogen embrittlement and permeation tests the impact of Nb microalloying on the hydrogen embrittlement behavior was investigated under different hydrogen charging conditions and constant load. The test results revealed that Nb addition increases the resistance to hydrogen embrittlement due to reduced hydrogen diffusivity. The focus of this paper is to investigate the precipitation behavior of microalloying elements by using TEM and STEM and to find out the mechanisms leading to higher performance against hydrogen embrittlement of Nb alloyed steels.
NASA Astrophysics Data System (ADS)
Prasad, Kartik; Sarkar, Rajdeep; Rao, K. Bhanu Sankara; Sundararaman, M.
2016-10-01
Thermomechanical fatigue behavior of Ti-alloy Timetal 834 has been studied at two temperature intervals viz. 573 K to 723 K (300 °C to 450 °C) and 723 K to 873 K (450 °C to 600 °C) under mechanical strain-controlled cycling. Among the temperatures studied, the alloy exhibited initial cyclic softening followed by cyclic hardening at 723 K (450 °C) in the temperature interval of 573 K to 723 K (300 °C to 450 °C). However, continuous cyclic hardening was observed at 723 K (450 °C) in 723 K to 873 K (450 °C to 600 °C). At 573 K (300 °C) and 873 K (600 °C), cyclic softening was observed in the cyclic stress response curves in both the temperature intervals. The dislocation substructure was observed to be planar in both the modes of TMF loading. Based on TEM microstructures and few unconventional fatigue tests, the observed cyclic hardening is attributed to dynamic strain aging. The reduced fatigue life at 723 K to 873 K (450 °C to 600 °C) under OP-TMF loading was attributed to the combined effect of cyclic hardening (leading to early strain localization and crack initiation), oxidation, and development of tensile mean stresses.
Update on slip and wear in multi-layer azimuth track systems
NASA Astrophysics Data System (ADS)
Juneja, Gunjeet; Kan, Frank W.; Antebi, Joseph
2006-06-01
Many antennas, such as the 100-m Green Bank Telescope, use a wheel-on-track systems in which the track segments consist of wear plates mounted on base plates. The wear plates are typically 2 to 3 inches thick and are case hardened or through hardened. The base plates are usually 3 to 4 times thicker than the wear plates and are not hardened. The wear plates are typically connected to the base plates using bolts. The base plates are supported on grout and anchored to the underlying concrete foundation. For some antennas, slip has been observed between the wear plate and base plate, and between the base plate and the grout, with the migration in the wheel rolling direction. In addition, there has been wear at the wear plate/base plate interface. This paper is an update on the evaluation of GBT track retrofit. The paper describes the use of three-dimensional non-linear finite element analyses to understand and evaluate the behavior of (1) the existing GBT wheel-on-track system with mitered joints, and (2) the various proposed modifications. The modifications include welding of the base plate joints, staggering of the wear plate joints from the base plate joints, changing thickness of the wear plate, and increasing bolt diameter and length. Parameters included in the evaluation were contact pressure, relative slip, wear at the wear plate/base plate interface, and bolt shears and moments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rojacz, H., E-mail: rojacz@ac2t.at
2016-08-15
Strain hardening is commonly used to reach the full potential of materials and can be beneficial in tribological contacts. 2-body abrasive wear was simulated in a scratch test, aimed at strain hardening effects in various steels. Different working conditions were examined at various temperatures and velocities. Strain hardening effects and microstructural changes were analysed with high resolution scanning electron microscopy (HRSEM), electron backscatter diffraction (EBSD), micro hardness measurements and nanoindentation. Statistical analysing was performed quantifying the influence of different parameters on microstructures. Results show a crucial influence of temperature and velocity on the strain hardening in tribological contacts. Increased velocitymore » leads to higher deformed microstructures and higher increased surface hardness at a lower depth of the deformed zones at all materials investigated. An optimised surface hardness can be achieved knowing the influence of velocity (strain rate) and temperature for a “tailor-made” surface hardening in tribological systems aimed at increased wear resistance. - Highlights: •Hardening mechanisms and their intensity in tribological contacts are dependent on relative velocity and temperature. •Beneficial surface hardened zones are formed at certain running-in conditions; the scientific background is presented here. •Ferritic-pearlitic steels strain hardens via grain size reduction and decreasing interlamellar distances in pearlite. •Austenitic steels show excellent surface hardening (120% hardness increase) by twinning and martensitic transformation. •Ferritic steels with hard phases harden in the ferrite phase as per Hall-Petch equation and degree of deformation.« less
US Astronomers Access to SIMBAD in Strasbourg, France
NASA Technical Reports Server (NTRS)
Eichhorn, G.; Oliverson, Ronald J. (Technical Monitor)
2003-01-01
During the last year the US SIMBAD Gateway Project continued to provide services like user registration to the US users of the SIMBAD database in France. Currently there are over 4300 US users registered. We also provided user support by answering questions from users and handling requests for lost passwords when still necessary. Even though almost all users now access SIMBAD without a password, based on hostnames/IP addresses, there are still some users that need individual passwords. We continued to maintain the mirror copy of the SIMBAD database on a server at SAO. This allows much faster access for the US users. During the past year we moved this mirror to a faster server to improve access for the US users. We again supported a demonstration of the SIMBAD database at the meeting of the American Astronomical Society in January. We provided support for the demonstration activities at the SIMBAD booth. We paid part of the fee for the SIMBAD demonstration. We continued to improve the cross-linking between the SIMBAD project and the Astrophysics Data System. This cross-linking between these systems is very much appreciated by the users of both the SIMBAD database and the ADS Abstract Service. The mirror of the SIMBAD database at SAO makes this connection faster for the US astronomers. We exchange information between the ADS and SIMBAD on a daily basis. The close cooperation between the CDS in Strasbourg and SAO, facilitated by this project, is an important part of the astronomy-wide digital library initiative. It has proven to be a model in how different data centers can collaborate and enhance the value of their products by linking with other data centers. We continue this collaboration in order to provide better services to both the US and European astronomical community. This collaboration is even more important in light of the developments for the Virtual Observatory projects in the different countries.
Schwartze, J; Haarbrandt, B; Fortmeier, D; Haux, R; Seidel, C
2014-01-01
Integration of electronic signatures embedded in health care processes in Germany challenges health care service and supply facilities. The suitability of the signature level of an eligible authentication procedure is confirmed for a large part of documents in clinical practice. However, the concrete design of such a procedure remains unclear. To create a summary of usable user authentication systems suitable for clinical workflows. A Systematic literature review based on nine online bibliographic databases. Search keywords included authentication, access control, information systems, information security and biometrics with terms user authentication, user identification and login in title or abstract. Searches were run between 7 and 12 September 2011. Relevant conference proceedings were searched manually in February 2013. Backward reference search of selected results was done. Only publications fully describing authentication systems used or usable were included. Algorithms or purely theoretical concepts were excluded. Three authors did selection independently. DATA EXTRACTION AND ASSESSMENT: Semi-structured extraction of system characteristics was done by the main author. Identified procedures were assessed for security and fulfillment of relevant laws and guidelines as well as for applicability. Suitability for clinical workflows was derived from the assessments using a weighted sum proposed by Bonneau. Of 7575 citations retrieved, 55 publications meet our inclusion criteria. They describe 48 different authentication systems; 39 were biometric and nine graphical password systems. Assessment of authentication systems showed high error rates above European CENELEC standards and a lack of applicability of biometric systems. Graphical passwords did not add overall value compared to conventional passwords. Continuous authentication can add an additional layer of safety. Only few systems are suitable partially or entirely for use in clinical processes. Suitability strongly depends on national or institutional requirements. Four authentication systems seem to fulfill requirements of authentication procedures for clinical workflows. Research is needed in the area of continuous authentication with biometric methods. A proper authentication system should combine all factors of authentication implementing and connecting secure individual measures.
De Diego, N; Saiz-Fernández, I; Rodríguez, J L; Pérez-Alfocea, P; Sampedro, M C; Barrio, R J; Lacuesta, M; Moncaleán, P
2015-09-01
Studies of metabolic and physiological bases of plant tolerance and hardening against drought are essential to improve genetic breeding programs, especially in productive species such as Pinus radiata. The exposure to different drought cycles is a highly effective tool that improves plant conditioning, but limited information is available about the mechanisms that modulate this process. To clarify this issue, six P. radiata breeds with well-known differences in drought tolerance were analyzed after two consecutive drought cycles. Survival rate, concentration of several metabolites such as free soluble amino acids and polyamines, and main plant hormones varied between them after drought hardening, while relative growth ratio and water potential at both predawn and dawn did not. Hardening induced a strong increase in total soluble amino acids in all breeds, accumulating mainly those implicated in the glutamate metabolism (GM), especially L-proline, in the most tolerant breeds. Other amino acids from GM such as γ-aminobutyric acid (GABA) and L-arginine (Arg) were also strongly increased. GABA pathway could improve the response against drought, whereas Arg acts as precursor for the synthesis of spermidine. This polyamine showed a positive relationship with the survival capacity, probably due to its role as antioxidant under stress conditions. Finally, drought hardening also induced changes in phytohormone content, showing each breed a different profile. Although all of them accumulated indole-3-acetic acid and jasmonic acid and reduced zeatin content in needles, significant differences were observed regarding abscisic acid, salicylic acid and mainly zeatin riboside. These results confirm that hardening is not only species-dependent but also an intraspecific processes controlled through metabolite changes. Copyright © 2015 Elsevier GmbH. All rights reserved.
Structural heredity influence upon principles of strain wave hardening
NASA Astrophysics Data System (ADS)
Kiricheck, A. V.; Barinov, S. V.; Yashin, A. V.
2017-02-01
It was established experimentally that by penetration of a strain wave through material hardened not only the technological modes of processing, but also a technological heredity - the direction of the fibers of the original macrostructure have an influence upon the diagram of microhardness. By penetration of the strain wave along fibers, the degree of hardening the material is less, however, a product is hardened throughout its entire section mainly along fibers. In the direction of the strain waves across fibers of the original structure of material, the degree of material hardening is much higher, the depth of the hardened layer with the degree of hardening not less than 50% makes at least 3 mm. It was found that under certain conditions the strain wave can completely change the original structure of the material. Thus, a heterogeneously hardened structure characterized by the interchange of harder and more viscous areas is formed, which is beneficial for assurance of high operational properties of material.
Fluid casting of particle-based articles
Menchhofer, P.
1995-03-28
A method is disclosed for the production of articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is introduced into an immiscible, heated fluid. The slurry sets hardens into a shape determined by the physical characteristics of the fluid and the manner of introduction of the slurry into the fluid. For example, the slurry is pulse injected into the fluid to provide spherical articles. The hardened spheres may then be sintered to consolidate the particles and provide a high density product. 1 figure.
Casting of particle-based hollow shapes
Menchhofer, P.
1997-09-09
A method is disclosed for the production of hollow articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is coated onto a prewarmed continuous surface in a relatively thin layer so that the slurry is substantially uniformly coated on the surface. The heat of the prewarmed surface conducts to the slurry to initiate a reaction which causes the slurry to set or harden in a shape conforming to the surface. The hardened configurations may then be sintered to consolidate the particles and provide a high density product. 9 figs.
Casting of particle-based hollow shapes
Menchhofer, P.
1995-05-30
A method is disclosed for the production of hollow articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is coated onto a prewarmed continuous surface in a relatively thin layer so that the slurry is substantially uniformly coated on the surface. The heat of the prewarmed surface conducts to the slurry to initiate a reaction which causes the slurry to set or harden in a shape conforming to the surface. The hardened configurations may then be sintered to consolidate the particles and provide a high density product. 9 figs.
Casting of particle-based hollow shapes
Menchhofer, Paul
1997-01-01
A method for the production of hollow articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is coated onto a prewarmed continuous surface in a relatively thin layer so that the slurry is substantially uniformly coated on the surface. The heat of the prewarmed surface conducts to the slurry to initiate a reaction which causes the slurry to set or harden in a shape conforming to the surface. The hardened configurations may then be sintered to consolidate the particles and provide a high density product.
Casting of particle-based hollow shapes
Menchhofer, Paul
1995-01-01
A method for the production of hollow articles made of a particle-based material; e.g., ceramics and sintered metals. In accordance with one aspect of the invention, a thermally settable slurry containing a relatively high concentration of the particles is coated onto a prewarmed continuous surface in a relatively thin layer so that the slurry is substantially uniformly coated on the surface. The heat of the prewarmed surface conducts to the slurry to initiate a reaction which causes the slurry to set or harden in a shape conforming to the surface. The hardened configurations may then be sintered to consolidate the particles and provide a high density product.
Polymer-based platform for microfluidic systems
Benett, William [Livermore, CA; Krulevitch, Peter [Pleasanton, CA; Maghribi, Mariam [Livermore, CA; Hamilton, Julie [Tracy, CA; Rose, Klint [Boston, MA; Wang, Amy W [Oakland, CA
2009-10-13
A method of forming a polymer-based microfluidic system platform using network building blocks selected from a set of interconnectable network building blocks, such as wire, pins, blocks, and interconnects. The selected building blocks are interconnectably assembled and fixedly positioned in precise positions in a mold cavity of a mold frame to construct a three-dimensional model construction of a microfluidic flow path network preferably having meso-scale dimensions. A hardenable liquid, such as poly (dimethylsiloxane) is then introduced into the mold cavity and hardened to form a platform structure as well as to mold the microfluidic flow path network having channels, reservoirs and ports. Pre-fabricated elbows, T's and other joints are used to interconnect various building block elements together. After hardening the liquid the building blocks are removed from the platform structure to make available the channels, cavities and ports within the platform structure. Microdevices may be embedded within the cast polymer-based platform, or bonded to the platform structure subsequent to molding, to create an integrated microfluidic system. In this manner, the new microfluidic platform is versatile and capable of quickly generating prototype systems, and could easily be adapted to a manufacturing setting.
A Quatro-Based 65-nm Flip-Flop Circuit for Soft-Error Resilience
NASA Astrophysics Data System (ADS)
Li, Y.-Q.; Wang, H.-B.; Liu, R.; Chen, L.; Nofal, I.; Shi, S.-T.; He, A.-L.; Guo, G.; Baeg, S. H.; Wen, S.-J.; Wong, R.; Chen, M.; Wu, Q.
2017-06-01
A flip-flop circuit hardened against soft errors is presented in this paper. This design is an improved version of Quatro for further enhanced soft-error resilience by integrating the guard-gate technique. The proposed design, as well as reference Quatro and regular flip-flops, was implemented and manufactured in a 65-nm CMOS bulk technology. Experimental characterization results of their alpha and heavy ions soft-error rates verified the superior hardening performance of the proposed design over the other two circuits.
On the structure of nonlinear constitutive equations for fiber reinforced composites
NASA Technical Reports Server (NTRS)
Jansson, Stefan
1992-01-01
The structure of constitutive equations for nonlinear multiaxial behavior of transversely isotropic fiber reinforced metal matrix composites subject to proportional loading was investigated. Results from an experimental program were combined with numerical simulations of the composite behavior for complex stress to reveal the full structure of the equations. It was found that the nonlinear response can be described by a quadratic flow-potential, based on the polynomial stress invariants, together with a hardening rule that is dominated by two different hardening mechanisms.
Goal Structuring Notation in a Radiation Hardening Assurance Case for COTS-Based Spacecraft
NASA Technical Reports Server (NTRS)
Witulski, A.; Austin, R.; Evans, J.; Mahadevan, N.; Karsai, G.; Sierawski, B.; LaBel, K.; Reed, R.; Schrimpf, R.
2016-01-01
A systematic approach is presented to constructing a radiation assurance case using Goal Structuring Notation (GSN) for spacecraft containing COTS parts. The GSN paradigm is applied to an SRAM single-event upset experiment board designed to fly on a CubeSat in January 2017. A custom software language for development of a GSN assurance case is under development at Vanderbilt. Construction of a radiation assurance case without use of hardened parts or extensive radiation testing is discussed.
Evaluation of a Diffusion/Trapping Model for Hydrogen Ingress in High- Strength Alloys
1992-10-01
high-strength steels [3-5], precipitation -hardened and work-hardened nickel-base alloys [3-61, and titanium [71 and was shown to be effective in...other two alloys, Ti-13-11-3 was tested in the unaged and age- conditions to establish the role of the secondary (x phase precipitated during aging... maraging steel , so it probably takes the form of reversible trapping [5,29]. Hence, grain boundaries are considered to be the most likely sites for
Materials science. Modeling strain hardening the hard way.
Gumbsch, Peter
2003-09-26
The plastic deformation of metals results in strain hardening, that is, an increase in the stress with increasing strain. Materials engineers can provide a simple approximate description of such deformation and hardening behavior. In his perspective, Gumbsch discusses work by Madec et al. who have undertaken the formidable task of computing the physical basis for the development of strain hardening by individually following the fate of all the dislocations involved. Their simulations show that the collinear dislocation interaction makes a substantial contribution to strain hardening. It is likely that such simulations will play an important role in guiding the development of future engineering descriptions of deformation and hardening.
NASA Astrophysics Data System (ADS)
Xiao, Xiazi; Yu, Long
2018-05-01
Linear and square superposition hardening models are compared for the surface nanoindentation of ion-irradiated materials. Hardening mechanisms of both dislocations and defects within the plasticity affected region (PAR) are considered. Four sets of experimental data for ion-irradiated materials are adopted to compare with theoretical results of the two hardening models. It is indicated that both models describe experimental data equally well when the PAR is within the irradiated layer; whereas, when the PAR is beyond the irradiated region, the square superposition hardening model performs better. Therefore, the square superposition model is recommended to characterize the hardening behavior of ion-irradiated materials.
Effect of shot peening on the microstructure of laser hardened 17-4PH
NASA Astrophysics Data System (ADS)
Wang, Zhou; Jiang, Chuanhai; Gan, Xiaoyan; Chen, Yanhua
2010-12-01
In order to investigate the influence of shot peening on microstructure of laser hardened steel and clarify how much influence of initial microstructure induced by laser hardening treatment on final microstructure of laser hardened steel after shot peening treatment, measurements of retained austenite, measurements of microhardness and microstructural analysis were carried out on three typical areas including laser hardened area, transitional area and matrix area of laser hardened 17-4PH steel. The results showed that shot peening was an efficient cold working method to eliminate the retained austenite on the surface of laser hardened samples. The surface hardness increased dramatically when shot peening treatments were carried out. The analyses of microstructure of laser hardened 17-4PH after shot peening treatment were carried out in matrix area and laser hardened area via Voigt method. With the increasing peening intensity, the influence depth of shot peening on hardness and microstructure increased but the surface hardness and microstructure did not change when certain peening intensity was reached. Influence depth of shot peening on hardness was larger than influence depth of shot peening on microstructure due to the kinetic energy loss along the depth during shot peening treatment. From the microstructural result, it can be shown that the shot peening treatment can influence the domain size and microstrain of treated samples but laser hardening treatment can only influence the microstrain of treated samples.
Controlling user access to electronic resources without password
Smith, Fred Hewitt
2017-08-22
Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.
NASA Astrophysics Data System (ADS)
Hospodarova, V.; Stevulova, N.; Vaclavik, V.; Dvorsky, T.
2017-10-01
Nowadays, the application of raw materials from renewable sources such as wood, plants and waste paper to building materials preparing has gained a significant interest in this research area. The aim of this paper is to investigate the impact of the selected plasticizer on properties of fibres composites made of cellulosic fibres coming from recycled waste paper and cement. Investigations were performed on specimens with 0.5 wt. % of fibre addition without and with plasticizer. A comparative study did not show positive influence of plasticizer on the density and thermal conductivity of 28 days hardened composite. The specimens after 1, 3 and 7 days of hardening with plasticizer exhibited the highest impact on compressive strength in comparison to composite without plasticizer but 28 days hardened specimens reached the same value of strength characteristic (41 MPa).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, T. K.; Wu, Z.; Stoica, A. D.
The cryogenic plastic deformation of CrCoFeMnNi high entropy alloy is characterized by three distinct stages based on the change of the work hardening rate. Microstructure and bulk texture at different strain levels were studied by electron backscatter diffraction (EBSD) and neutron diffraction. Our findings indicate that the deformation twins led to the constant work hardening rate at Stage II and resulted in the appearance of <115 >//TA texture component, while the dislocation slip was involved all though the entire plastic deformation. As a result, the twinning-mediated tensile plastic deformation at cryogenic temperature finally induced the strong {111}- < 112 >more » texture component and minor {001} < 110 > texture component accompanied with twinning-induced {115}< 552 > texture component.« less
Liu, T. K.; Wu, Z.; Stoica, A. D.; ...
2017-06-17
The cryogenic plastic deformation of CrCoFeMnNi high entropy alloy is characterized by three distinct stages based on the change of the work hardening rate. Microstructure and bulk texture at different strain levels were studied by electron backscatter diffraction (EBSD) and neutron diffraction. Our findings indicate that the deformation twins led to the constant work hardening rate at Stage II and resulted in the appearance of <115 >//TA texture component, while the dislocation slip was involved all though the entire plastic deformation. As a result, the twinning-mediated tensile plastic deformation at cryogenic temperature finally induced the strong {111}- < 112 >more » texture component and minor {001} < 110 > texture component accompanied with twinning-induced {115}< 552 > texture component.« less
Construction procedures using self hardening fly ash
NASA Astrophysics Data System (ADS)
Thornton, S. I.; Parker, D. G.
1980-07-01
Fly ash produced in Arkansas from burning Wyoming low sulfur coal is self-hardening and can be effective as a soil stabilizing agent for clays and sands. The strength of soil-self hardening fly ash develops rapidly when compacted immediately after mixing. Seven day unconfined compressive strengths up to 1800 psi were obtained from 20% fly ash and 80% sand mixtures. A time delay between mixing the fly ash with the soil and compaction of the mixture reduced the strength. With two hours delay, over a third of the strength was lost and with four hours delay, the loss was over half. Gypsum and some commercial concrete retarders were effective in reducing the detrimental effect of delayed compaction. Adequate mixing of the soil and fly ash and rapid compaction of the mixtures were found to be important parameters in field construction of stabilized bases.
7 CFR 58.622 - Hardening and storage rooms.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 3 2013-01-01 2013-01-01 false Hardening and storage rooms. 58.622 Section 58.622....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be constructed... insure adequate storage temperature (−10° or lower). Air shall be circulated to maintain uniform...
7 CFR 58.622 - Hardening and storage rooms.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 3 2011-01-01 2011-01-01 false Hardening and storage rooms. 58.622 Section 58.622....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be constructed... insure adequate storage temperature (−10° or lower). Air shall be circulated to maintain uniform...
7 CFR 58.622 - Hardening and storage rooms.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 3 2010-01-01 2010-01-01 false Hardening and storage rooms. 58.622 Section 58.622....622 Hardening and storage rooms. Hardening and storage rooms for frozen desserts shall be constructed... insure adequate storage temperature (−10° or lower). Air shall be circulated to maintain uniform...
Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.
1976-07-01
heating to temperatures below the Acl precipitates a copper -rich phase within the martensite increasing hardness and strength. The stress relieving effect...experimental approach varied the heat treatment of two precipitation hardening martensitic alloys , 17-4 PH1 and 15-b PH. Fatigue-crack growth data was...hardenable by precipitation hardening. Alloys that do harden by this mechanism have only one thing in common, this is, a decreasing solubility for one phase
Liskowitz, J.W.; Wecharatana, M.; Jaturapitakkul, C.; Cerkanowicz, A.E.
1997-10-28
The present invention relates to concrete, mortar and other hardenable mixtures comprising cement and fly ash for use in construction. The invention provides a method for increasing the rate of strength gain of a hardenable mixture containing fly ash by exposing the fly ash to an aqueous slurry of calcium oxide (lime) prior to its incorporation into the hardenable mixture. The invention further relates to such hardenable mixtures, e.g., concrete and mortar, that contain fly ash pre-reacted with calcium oxide. In particular, the fly ash is added to a slurry of calcium oxide in water, prior to incorporating the fly ash in a hardenable mixture. The hardenable mixture may be concrete or mortar. In a specific embodiment, mortar containing fly ash treated by exposure to an aqueous lime slurry are prepared and tested for compressive strength at early time points. 2 figs.
Liskowitz, John W.; Wecharatana, Methi; Jaturapitakkul, Chai; Cerkanowicz, deceased, Anthony E.
1997-01-01
The present invention relates to concrete, mortar and other hardenable mixtures comprising cement and fly ash for use in construction. The invention provides a method for increasing the rate of strength gain of a hardenable mixture containing fly ash by exposing the fly ash to an aqueous slurry of calcium oxide (lime) prior to its incorporation into the hardenable mixture. The invention further relates to such hardenable mixtures, e.g., concrete and mortar, that contain fly ash pre-reacted with calcium oxide. In particular, the fly ash is added to a slurry of calcium oxide in water, prior to incorporating the fly ash in a hardenable mixture. The hardenable mixture may be concrete or mortar. In a specific embodiment, mortar containing fly ash treated by exposure to an aqueous lime slurry are prepared and tested for compressive strength at early time points.
NASA Astrophysics Data System (ADS)
Zecevic, Milovan; Korkolis, Yannis P.; Kuwabara, Toshihiko; Knezevic, Marko
2016-11-01
In this work, we develop a physically-based crystal plasticity model for the prediction of cyclic tension-compression deformation of multi-phase materials, specifically dual-phase (DP) steels. The model is elasto-plastic in nature and integrates a hardening law based on statistically stored dislocation density, localized hardening due to geometrically necessary dislocations (GNDs), slip-system-level kinematic backstresses, and annihilation of dislocations. The model further features a two level homogenization scheme where the first level is the overall response of a two-phase polycrystalline aggregate and the second level is the homogenized response of the martensite polycrystalline regions. The model is applied to simulate a cyclic tension-compression-tension deformation behavior of DP590 steel sheets. From experiments, we observe that the material exhibits a typical decreasing hardening rate during forward loading, followed by a linear and then a non-linear unloading upon the load reversal, the Bauschinger effect, and changes in hardening rate during strain reversals. To predict these effects, we identify the model parameters using a portion of the measured data and validate and verify them using the remaining data. The developed model is capable of predicting all the particular features of the cyclic deformation of DP590 steel, with great accuracy. From the predictions, we infer and discuss the effects of GNDs, the backstresses, dislocation annihilation, and the two-level homogenization scheme on capturing the cyclic deformation behavior of the material.
McColl, G.; Hoffmann, A. A.; McKechnie, S. W.
1996-01-01
To identify genes involved in stress resistance and heat hardening, replicate lines of Drosophila melanogaster were selected for increased resistance to knockdown by a 39° heat stress. Two selective regimes were used, one with and one without prior hardening. Mean knockdown times were increased from ~5 min to >20 min after 18 generations. Initial realized heritabilities were as high as 10% for lines selected without hardening, and crosses between lines indicated simple additive gene effects for the selected phenotypes. To survey allelic variation and correlated selection responses in two candidate stress genes, hsr-omega and hsp68, we applied denaturing gradient gel electrophoresis to amplified DNA sequences from small regions of these genes. After eight generations of selection, allele frequencies at both loci showed correlated responses for selection following hardening, but not without hardening. The hardening process itself was associated with a hsp68 frequency change in the opposite direction to that associated with selection that followed hardening. These stress loci are closely linked on chromosome III, and the hardening selection established a disequilibrium, suggesting an epistatic effect on resistance. The data indicate that molecular variation in both hsr-omega and hsp68 contribute to natural heritable variation for hardened heat resistance. PMID:8844150
Imran, Muhammad; Kühbach, Markus; Roters, Franz; Bambach, Markus
2017-11-02
Dynamic recrystallization (DRX) processes are widely used in industrial hot working operations, not only to keep the forming forces low but also to control the microstructure and final properties of the workpiece. According to the second derivative criterion (SDC) by Poliak and Jonas, the onset of DRX can be detected from an inflection point in the strain-hardening rate as a function of flow stress. Various models are available that can predict the evolution of flow stress from incipient plastic flow up to steady-state deformation in the presence of DRX. Some of these models have been implemented into finite element codes and are widely used for the design of metal forming processes, but their consistency with the SDC has not been investigated. This work identifies three sources of inconsistencies that models for DRX may exhibit. For a consistent modeling of the DRX kinetics, a new strain-hardening model for the hardening stages III to IV is proposed and combined with consistent recrystallization kinetics. The model is devised in the Kocks-Mecking space based on characteristic transition in the strain-hardening rate. A linear variation of the transition and inflection points is observed for alloy 800H at all tested temperatures and strain rates. The comparison of experimental and model results shows that the model is able to follow the course of the strain-hardening rate very precisely, such that highly accurate flow stress predictions are obtained.
Development of a Model for Dynamic Recrystallization Consistent with the Second Derivative Criterion
Imran, Muhammad; Kühbach, Markus; Roters, Franz; Bambach, Markus
2017-01-01
Dynamic recrystallization (DRX) processes are widely used in industrial hot working operations, not only to keep the forming forces low but also to control the microstructure and final properties of the workpiece. According to the second derivative criterion (SDC) by Poliak and Jonas, the onset of DRX can be detected from an inflection point in the strain-hardening rate as a function of flow stress. Various models are available that can predict the evolution of flow stress from incipient plastic flow up to steady-state deformation in the presence of DRX. Some of these models have been implemented into finite element codes and are widely used for the design of metal forming processes, but their consistency with the SDC has not been investigated. This work identifies three sources of inconsistencies that models for DRX may exhibit. For a consistent modeling of the DRX kinetics, a new strain-hardening model for the hardening stages III to IV is proposed and combined with consistent recrystallization kinetics. The model is devised in the Kocks-Mecking space based on characteristic transition in the strain-hardening rate. A linear variation of the transition and inflection points is observed for alloy 800H at all tested temperatures and strain rates. The comparison of experimental and model results shows that the model is able to follow the course of the strain-hardening rate very precisely, such that highly accurate flow stress predictions are obtained. PMID:29099068
SEGR- and SEB-hardened structure with DSPSOI in power MOSFETs
NASA Astrophysics Data System (ADS)
Tang, Zhaohuan; Fu, Xinghua; Yang, Fashun; Tan, Kaizhou; Ma, Kui; Wu, Xue; Lin, Jiexing
2017-12-01
Single event irradiation-hardened power MOSFET is the most important device for DC/DC converter in space environment application. Single event gate rupture (SEGR) and single event burnout (SEB), which will degrade the running safety and reliability of spacecraft, are the two typical failure modes in power MOSFETs. In this paper, based on recombination mechanism of interface between oxide and silicon, a novel hardened power MOSFETs structure for SEGR and SEB is proposed. The structure comprises double stagger partial silicon-on-insulator (DSPSOI) layers. Results show that the safety operation area (SOA) of a 130 V N-channel power MOSFET in single event irradiation environment is enhanced by up to 50% when the linear-energy-transfer value of heavy ion is a constant of 98 MeV·cm2/mg in the whole incident track, and the other parameters are almost maintained at the same value. Thus this novel structure can be widely used in designing single event irradiation-hardened power MOSFETs. Project supported by the National Natural Science Foundation of China (No. 61464002), the Grand Science and Technology Special Project in Guizhou Province of China (No. [2015]6006), and the Ministry of Education Open Foundation for Semiconductor Power Device Reliability (No. 010201).
NASA Astrophysics Data System (ADS)
Huang, Chen-Hsi; Gilbert, Mark R.; Marian, Jaime
2018-02-01
Simulations of neutron damage under fusion energy conditions must capture the effects of transmutation, both in terms of accurate chemical inventory buildup as well as the physics of the interactions between transmutation elements and irradiation defect clusters. In this work, we integrate neutronics, primary damage calculations, molecular dynamics results, Re transmutation calculations, and stochastic cluster dynamics simulations to study neutron damage in single-crystal tungsten to mimic divertor materials. To gauge the accuracy and validity of the simulations, we first study the material response under experimental conditions at the JOYO fast reactor in Japan and the High Flux Isotope Reactor at Oak Ridge National Laboratory, for which measurements of cluster densities and hardening levels up to 2 dpa exist. We then provide calculations under expected DEMO fusion conditions. Several key mechanisms involving Re atoms and defect clusters are found to govern the accumulation of irradiation damage in each case. We use established correlations to translate damage accumulation into hardening increases and compare our results to the experimental measurements. We find hardening increases in excess of 5000 MPa in all cases, which casts doubts about the integrity of W-based materials under long-term fusion exposure.
Villar-Salvador, Pedro; Planelles, Rosa; Oliet, Juan; Peñuelas-Rubira, Juan L; Jacobs, Douglass F; González, Magdalena
2004-10-01
Drought stress is the main cause of mortality of holm oak (Quercus ilex L.) seedlings in forest plantations. We therefore assessed if drought hardening, applied in the nursery at the end of the growing season, enhanced the drought tolerance and transplanting performance of holm oak seedlings. Seedlings were subjected to three drought hardening intensities (low, moderate and severe) for 2.5 and 3.5 months, and compared with control seedlings. At the end of the hardening period, water relations, gas exchange and morphological attributes were determined, and survival and growth under mesic and xeric transplanting conditions were assessed. Drought hardening increased drought tolerance primarily by affecting physiological traits, with no effect on shoot/root ratio or specific leaf mass. Drought hardening reduced osmotic potential at saturation and at the turgor loss point, stomatal conductance, residual transpiration (RT) and new root growth capacity (RGC), but enhanced cell membrane stability. Among treated seedlings, the largest response occurred in seedlings subjected to moderate hardening. Severe hardening reduced shoot soluble sugar concentration and increased shoot starch concentration. Increasing the duration of hardening had no effect on water relations but reduced shoot mineral and starch concentrations. Variation in cell membrane stability, RT and RGC were negatively related to osmotic adjustment. Despite differences in drought tolerance, no differences in mortality and relative growth rate were observed between hardening treatments when the seedlings were transplanted under either mesic or xeric conditions.
NASA Astrophysics Data System (ADS)
Yuan, Fusong; Lv, Peijun; Yang, Huifang; Wang, Yong; Sun, Yuchun
2015-07-01
Objectives: Based on the pixel gray value measurements, establish a beam-hardening artifacts index of the cone-beam CT tomographic image, and preliminarily evaluate its applicability. Methods: The 5mm-diameter metal ball and resin ball were fixed on the light-cured resin base plate respectively, while four vitro molars were fixed above and below the ball, on the left and right respectively, which have 10mm distance with the metal ball. Then, cone beam CT was used to scan the fixed base plate twice. The same layer tomographic images were selected from the two data and imported into the Photoshop software. The circle boundary was built through the determination of the center and radius of the circle, according to the artifact-free images section. Grayscale measurement tools were used to measure the internal boundary gray value G0, gray value G1 and G2 of 1mm and 20mm artifacts outside the circular boundary, the length L1 of the arc with artifacts in the circular boundary, the circumference L2. Hardening artifacts index was set A = (G1 / G0) * 0.5 + (G2 / G1) * 0.4 + (L2 / L1) * 0.1. Then, the A values of metal and resin materials were calculated respectively. Results: The A value of cobalt-chromium alloy material is 1, and resin material is 0. Conclusion: The A value reflects comprehensively the three factors of hardening artifacts influencing normal oral tissue image sharpness of cone beam CT. The three factors include relative gray value, the decay rate and range of artifacts.
Simulation of irradiation hardening of Zircaloy within plate-type dispersion nuclear fuel elements
NASA Astrophysics Data System (ADS)
Jiang, Yijie; Wang, Qiming; Cui, Yi; Huo, Yongzhong; Ding, Shurong
2011-06-01
Within plate-type dispersion nuclear fuel elements, the metal matrix and cladding attacked continuously by fast neutrons undergo irradiation hardening, which might have remarkable effects upon the mechanical behaviors within fuel elements. In this paper, with the irradiation hardening effect of metal materials mainly considered together with irradiation growth effect of the cladding, the three-dimensional large-deformation constitutive relations for the metal matrix and cladding are developed. The method of virtual temperature increase in the previous studies is further developed to model the irradiation swelling of fuel particles; the method of anisotropic thermal expansion is introduced to model irradiation growth of the cladding; and a method of multi-step-temperature loading is proposed to simulate the coupling features of irradiation-induced swelling of the fuel particles together with irradiation growth of the cladding. Above all, based on the developed relationship between irradiation growth at certain burnup and the loaded virtual temperatures, with considering that certain burnup corresponds to certain fast neutron fluence, the time-dependent constitutive relation due to irradiation hardening effect is replaced by the virtual-temperature-dependent one which is introduced into the commercial software to simulate the irradiation hardening effects of the matrix and cladding. Numerical simulations of the irradiation-induced mechanical behaviors are implemented with the finite element method in consideration of the micro-structure of the fuel meat. The obtained results indicate that when the irradiation hardening effects are introduced into the constitutive relations of the metal matrix and cladding: (1) higher maximum Mises stresses for certain burnup at the matrix exist with the equivalent plastic strains remaining almost the same at lower burnups; (2) the maximum Mises stresses for certain burnup at the cladding are enhanced while the maximum equivalent plastic strains are reduced; and (3) the maximum first principal stresses for certain burnup at the matrix or the cladding are lower than the ones without the hardening effect, and the differences are found to increase with burnup; and the variation rules of the interfacial stresses are similar.
NASA Astrophysics Data System (ADS)
Wangkheeree, W.; Meekum, U.
2016-03-01
The effect of IPDA, DDS, BPA and DICY, as main ingredient of TETA based hardener were examined. The 2k design of experiment(DOE) with k=3 were preliminary explored. The designed parameters A(IPDA), B(DDS) and C(BPA) were assigned as low(-) and high(+) levels, respectively. The Design Expert™ was hired as the analyzing tool at α=0.05. The mixed epoxy resin was based on the commercial one. The designed responds including tcure, t50, impact strengths, flexural properties and HDT were measured, respectively. Regarding to ANOVA conclusion, it was found that, there were no significant effects on the assigned parameters on the interested responds, except for the HDT where BPA(C) was negative effect was found. The lower in the crosslink density of cured epoxy, inferior in HDT, the higher in BPA addition was hypothesized. It was found that impact strength of cured epoxy derived from all formula were unacceptable low and tcure and t50, were too short. Thus, the further investigation by adding DICY into hardener was explored. The results showed that no significant change by mechanical means of cured epoxy by resolving 5-30 phr of DICY into the hardener. However, it was observed that the DICY added formula showed the obvious long cure times and behave as prepreg formula. The room temperature cured epoxy was incompletely crosslinked. The degrees of linear chain fragment were evidence, by weight, when higher DICY loading was engaged. Complete crosslink was achieved at 150°C post curing. The hardener comprised of TETA/aliphatic Epoxy(RD108) adduct was studied for enhancing the toughness of epoxy resin. It was observed that longer cure time at 150°C but lower toughness was experienced, on both prepreg and engineered wood made from the resins, at high TETA/RD108 ratio. Incomplete cure was explained for the mechanical inferior at high RD108 loading.
NASA Astrophysics Data System (ADS)
Myhr, Ole Runar; Hopperstad, Odd Sture; Børvik, Tore
2018-05-01
In this study, a combined precipitation, yield strength, and work hardening model for Al-Mg-Si alloys known as NaMo has been further developed to include the effects of strain rate and temperature on the resulting stress-strain behavior. The extension of the model is based on a comprehensive experimental database, where thermomechanical data for three different Al-Mg-Si alloys are available. In the tests, the temperature was varied between 20 °C and 350 °C with strain rates ranging from 10-6 to 750 s-1 using ordinary tension tests for low strain rates and a split-Hopkinson tension bar system for high strain rates, respectively. This large span in temperatures and strain rates covers a broad range of industrial relevant problems from creep to impact loading. Based on the experimental data, a procedure for calibrating the different physical parameters of the model has been developed, starting with the simplest case of a stable precipitate structure and small plastic strains, from which basic kinetic data for obstacle limited dislocation glide were extracted. For larger strains, when work hardening becomes significant, the dynamic recovery was linked to the Zener-Hollomon parameter, again using a stable precipitate structure as a basis for calibration. Finally, the complex situation of concurrent work hardening and dynamic evolution of the precipitate structure was analyzed using a stepwise numerical solution algorithm where parameters representing the instantaneous state of the structure were used to calculate the corresponding instantaneous yield strength and work hardening rate. The model was demonstrated to exhibit a high degree of predictive power as documented by a good agreement between predictions and measurements, and it is deemed well suited for simulations of thermomechanical processing of Al-Mg-Si alloys where plastic deformation is carried out at various strain rates and temperatures.
Current understanding of the effects of enviromental and irradiation variables on RPV embrittlement
DOE Office of Scientific and Technical Information (OSTI.GOV)
Odette, G.R.; Lucas, G.E.; Wirth, B.
1997-02-01
Radiation enhanced diffusion at RPV operating temperatures around 290{degrees}C leads to the formation of various ultrafine scale hardening phases, including copper-rich and copper-catalyzed manganese-nickel rich precipitates. In addition, defect cluster or cluster-solute complexes, manifesting a range of thermal stability, develop under irradiation. These features contribute directly to hardening which in turn is related to embrittlement, manifested as shifts in Charpy V-notch transition temperature. Models based on the thermodynamics, kinetics and micromechanics of the embrittlement processes have been developed; these are broadly consistent with experiment and rationalize the highly synergistic effects of most important irradiation (temperature, flux, fluence) and metallurgical (copper,more » nickel, manganese, phosphorous and heat treatment) variables on both irradiation hardening and recovery during post-irradiation annealing. A number of open questions remain which can be addressed with a hierarchy of new theoretical and experimental tools.« less
NASA Astrophysics Data System (ADS)
He, Zhitao; Chen, Wufan; Wang, Fenghua; Feng, Miaolin
2017-11-01
A kinematic hardening constitutive model is presented, in which a modified form of von Mises yield function is adopted, and the initial asymmetric tension and compression yield stresses of magnesium (Mg) alloys at room temperature (RT) are considered. The hardening behavior was classified into slip, twinning, and untwinning deformation modes, and these were described by two forms of back stress to capture the mechanical response of Mg sheet alloys under cyclic loading tests at RT. Experimental values were obtained for AZ31B-O and AZ31B sheet alloys under both tension-compression-tension (T-C-T) and compression-tension (C-T) loadings to calibrate the parameters of back stresses in the proposed model. The predicted parameters of back stresses in the twinning and untwinning modes were expressed as a cubic polynomial. The predicted curves based on these parameters showed good agreement with the tests.
Age hardening of 6061/alumina-silica fiber composite
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khangaonkar, P.R.; Shamsul, J.B.; Azmi, R.
1994-12-31
Continuous alumina-silica fiber (Altex of Sumitomo) which yields high performance composites with some aluminium alloys was tried for squeeze cast 6061 based composites with volume fractions of 0.5 and 0.32, and the matrix microhardness and resistivity changes during age hardening were studied. The matrix in the composites hardened much more than the unreinforced alloy. Microhardness increases of up to 70 VPN above the solution treated condition at various aging temperatures were observed. The resistivity variation indicated an appreciable state of internal stress which continued to persist even when hardness fell by overaging. Energy dispersive X-ray analysis indicated that the regionsmore » close to the fibers had a higher silicon content than the matrix, and amorphous silica in the fiber may have a role in the formation of an enriched layer which may help the bonding and strength in the composite.« less
Lee, Tian-Fu; Wang, Zeng-Bo
2017-01-01
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
Effect of cutting parameters on strain hardening of nickel–titanium shape memory alloy
NASA Astrophysics Data System (ADS)
Wang, Guijie; Liu, Zhanqiang; Ai, Xing; Huang, Weimin; Niu, Jintao
2018-07-01
Nickel–titanium shape memory alloy (SMA) has been widely used as implant materials due to its good biocompatibility, shape memory property and super-elasticity. However, the severe strain hardening is a main challenge due to cutting force and temperature caused by machining. An orthogonal experiment of nickel–titanium SMA with different milling parameters conditions was conducted in this paper. On the one hand, the effect of cutting parameters on work hardening is obtained. It is found that the cutting speed has the most important effect on work hardening. The depth of machining induced layer and the degree of hardening become smaller with the increase of cutting speed when the cutting speed is less than 200 m min‑1 and then get larger with further increase of cutting speed. The relative intensity of diffraction peak increases as the cutting speed increase. In addition, all of the depth of machining induced layer, the degree of hardening and the relative intensity of diffraction peak increase when the feed rate increases. On the other hand, it is found that the depth of machining induced layer is closely related with the degree of hardening and phase transition. The higher the content of austenite in the machined surface is, the higher the degree of hardening will be. The depth of the machining induced layer increases with the degree of hardening increasing.
Thermal highly porous insulation materials made of mineral raw materials
NASA Astrophysics Data System (ADS)
Mestnikov, A.
2015-01-01
The main objective of the study is to create insulating foam based on modified mineral binders with rapid hardening. The results of experimental studies of the composition and properties of insulating foam on the basis of rapidly hardening Portland cement (PC) and gypsum binder composite are presented in the article. The article proposes technological methods of production of insulating foamed concrete and its placement to the permanent shuttering wall enclosures in monolithic-frame construction and individual energy-efficient residential buildings, thus reducing foam shrinkage and improving crack-resistance.
Surface hardening of cutting elements agricultural machinery vibro arc plasma
NASA Astrophysics Data System (ADS)
Sharifullin, S. N.; Adigamov, N. R.; Adigamov, N. N.; Solovev, R. Y.; Arakcheeva, K. S.
2016-01-01
At present, the state technical policy aimed at the modernization of worn equipment, including agriculture, based on the use of high-performance technology called nanotechnology. By upgrading worn-out equipment meant restoring it with the achievement of the above parameters passport. The existing traditional technologies are not suitable for the repair of worn-out equipment modernization. This is especially true of imported equipment. Out here alone - is the use of high-performance technologies. In this paper, we consider the use of vibro arc plasma for surface hardening of cutting elements of agricultural machinery.
Role of electron concentration in softening and hardening of ternary molybdenum alloys
NASA Technical Reports Server (NTRS)
Stephens, J. R.; Witzke, W. R.
1975-01-01
Effects of various combinations of hafnium, tantalum, rhenium, osmium, iridium, and platinum in ternary molybdenum alloys on alloy softening and hardening were determined. Hardness tests were conducted at four test temperatures over the temperature range 77 to 411 K. Results showed that hardness data for ternary molybdenum alloys could be correlated with anticipated results from binary data based upon expressions involving the number of s and d electrons contributed by the solute elements. The correlation indicated that electron concentration plays a dominant role in controlling the hardness of ternary molybdenum alloys.
NASA Astrophysics Data System (ADS)
Dhote, Sharvari; Zu, Jean; Zhu, Yang
2015-04-01
In this paper, a nonlinear wideband multi-mode piezoelectric vibration-based energy harvester (PVEH) is proposed based on a compliant orthoplanar spring (COPS), which has an advantage of providing multiple vibration modes at relatively low frequencies. The PVEH is made of a tri-leg COPS flexible structure, where three fixed-guided beams are capable of generating strong nonlinear oscillations under certain base excitation. A prototype harvester was fabricated and investigated through both finite-element analysis and experiments. The frequency response shows multiple resonance which corresponds to a hardening type of nonlinear resonance. By adding masses at different locations on the COPS structure, the first three vibration modes are brought close to each other, where the three hardening nonlinear resonances provide a wide bandwidth for the PVEH. The proposed PVEH has enhanced performance of the energy harvester in terms of a wide frequency bandwidth and a high-voltage output under base excitations.
Stress Corrosion Cracking Behavior of Hardening-Treated 13Cr Stainless Steel
NASA Astrophysics Data System (ADS)
Niu, Li-Bin; Ishitake, Hisamitsu; Izumi, Sakae; Shiokawa, Kunio; Yamashita, Mitsuo; Sakai, Yoshihiro
2018-03-01
Stress corrosion cracking (SCC) behavior of the hardening-treated materials of 13Cr stainless steel was examined with SSRT tests and constant load tests. In the simulated geothermal water and even in the test water without addition of impurities, the hardening-treated materials showed a brittle intergranular fracture due to the sensitization, which was caused by the present hardening-treatments.
A biometric authentication model using hand gesture images.
Fong, Simon; Zhuang, Yan; Fister, Iztok; Fister, Iztok
2013-10-30
A novel hand biometric authentication method based on measurements of the user's stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password 'iloveu' in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, 'i' , 'l' , 'o' , 'v' , 'e' , and 'u'. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy.
Kinematic hardening of a porous limestone
NASA Astrophysics Data System (ADS)
Cheatham, J. B.; Allen, M. B.; Celle, C. C.
1984-10-01
A concept for a kinematic hardening yield surface in stress space for Cordova Cream limestone (Austin Chalk) developed by Celle and Cheatham (1981) has been improved using Ziegler's modification of Prager's hardening rule (Ziegler, 1959). Data to date agree with the formulated concepts. It is shown how kinematic hardening can be used to approximate the yield surface for a wide range of stress states past the initial yield surface. The particular difficulty of identifying the yield surface under conditions of unloading or extension is noted. A yield condition and hardening rule which account for the strain induced anisotropy in Cordova Cream Limestone were developed. Although the actual yield surface appears to involve some change of size and shape, it is concluded that true kinematic hardening provides a basis for engineering calculations.
Radiation Hardened Electronics for Extreme Environments
NASA Technical Reports Server (NTRS)
Keys, Andrew S.; Watson, Michael D.
2007-01-01
The Radiation Hardened Electronics for Space Environments (RHESE) project consists of a series of tasks designed to develop and mature a broad spectrum of radiation hardened and low temperature electronics technologies. Three approaches are being taken to address radiation hardening: improved material hardness, design techniques to improve radiation tolerance, and software methods to improve radiation tolerance. Within these approaches various technology products are being addressed including Field Programmable Gate Arrays (FPGA), Field Programmable Analog Arrays (FPAA), MEMS Serial Processors, Reconfigurable Processors, and Parallel Processors. In addition to radiation hardening, low temperature extremes are addressed with a focus on material and design approaches.
Argonne National Laboratory HEP Laptop Computing Problem Report Service Request Password Help New on ANL Exchange: See section for your OS Printing Available Software for Download VPN: Virtual
An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
Kumari, Saru
2013-01-01
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability. PMID:24350272
An improved biometrics-based remote user authentication scheme with user anonymity.
Khan, Muhammad Khurram; Kumari, Saru
2013-01-01
The authors review the biometrics-based user authentication scheme proposed by An in 2012. The authors show that there exist loopholes in the scheme which are detrimental for its security. Therefore the authors propose an improved scheme eradicating the flaws of An's scheme. Then a detailed security analysis of the proposed scheme is presented followed by its efficiency comparison. The proposed scheme not only withstands security problems found in An's scheme but also provides some extra features with mere addition of only two hash operations. The proposed scheme allows user to freely change his password and also provides user anonymity with untraceability.
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700
NASA Astrophysics Data System (ADS)
Liu, Hefu
This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.
Villar-Salvador, Pedro; Peñuelas, Juan L; Jacobs, Douglass F
2013-02-01
Functional attributes determine the survival and growth of planted seedlings in reforestation projects. Nitrogen (N) and water are important resources in the cultivation of forest species, which have a strong effect on plant functional traits. We analyzed the influence of N nutrition on drought acclimation of Pinus pinea L. seedlings. Specifically, we addressed if high N fertilization reduces drought and frost tolerance of seedlings and whether drought hardening reverses the effect of high N fertilization on stress tolerance. Seedlings were grown under two N fertilization regimes (6 and 100 mg N per plant) and subjected to three drought-hardening levels (well-watered, moderate and strong hardening). Water relations, gas exchange, frost damage, N concentration and growth at the end of the drought-hardening period, and survival and growth of seedlings under controlled xeric and mesic outplanting conditions were measured. Relative to low-N plants, high-N plants were larger, had higher stomatal conductance (27%), residual transpiration (11%) and new root growth capacity and closed stomata at higher water potential. However, high N fertilization also increased frost damage (24%) and decreased plasmalemma stability to dehydration (9%). Drought hardening reversed to a great extent the reduction in stress tolerance caused by high N fertilization as it decreased frost damage, stomatal conductance and residual transpiration by 21, 31 and 24%, respectively, and increased plasmalemma stability to dehydration (8%). Drought hardening increased tissue non-structural carbohydrates and N concentration, especially in high-fertilized plants. Frost damage was positively related to the stability of plasmalemma to dehydration (r = 0.92) and both traits were negatively related to the concentration of reducing soluble sugars. No differences existed between moderate and strong drought-hardening treatments. Neither N nutrition nor drought hardening had any clear effect on seedling performance under xeric outplanting conditions. However, fertilization increased growth under mesic conditions, whereas drought hardening decreased growth. We conclude that drought hardening and N fertilization applied under typical container nursery operational conditions exert opposite effects on the physiological stress tolerance of P. pinea seedlings. While drought hardening increases overall stress tolerance, N nutrition reduces it and yet has no effect on the drought acclimation capacity of seedlings.
REPHLEX II: An information management system for the ARS Water Data Base
NASA Astrophysics Data System (ADS)
Thurman, Jane L.
1993-08-01
The REPHLEX II computer system is an on-line information management system which allows scientists, engineers, and other researchers to retrieve data from the ARS Water Data Base using asynchronous communications. The system features two phone lines handling baud rates from 300 to 2400, customized menus to facilitate browsing, help screens, direct access to information and data files, electronic mail processing, file transfers using the XMODEM protocol, and log-in procedures which capture information on new users, process passwords, and log activity for a permanent audit trail. The primary data base on the REPHLEX II system is the ARS Water Data Base which consists of rainfall and runoff data from experimental agricultural watersheds located in the United States.
An authentication scheme for secure access to healthcare services.
Khan, Muhammad Khurram; Kumari, Saru
2013-08-01
Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.
Parallel, Distributed Scripting with Python
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, P J
2002-05-24
Parallel computers used to be, for the most part, one-of-a-kind systems which were extremely difficult to program portably. With SMP architectures, the advent of the POSIX thread API and OpenMP gave developers ways to portably exploit on-the-box shared memory parallelism. Since these architectures didn't scale cost-effectively, distributed memory clusters were developed. The associated MPI message passing libraries gave these systems a portable paradigm too. Having programmers effectively use this paradigm is a somewhat different question. Distributed data has to be explicitly transported via the messaging system in order for it to be useful. In high level languages, the MPI librarymore » gives access to data distribution routines in C, C++, and FORTRAN. But we need more than that. Many reasonable and common tasks are best done in (or as extensions to) scripting languages. Consider sysadm tools such as password crackers, file purgers, etc ... These are simple to write in a scripting language such as Python (an open source, portable, and freely available interpreter). But these tasks beg to be done in parallel. Consider the a password checker that checks an encrypted password against a 25,000 word dictionary. This can take around 10 seconds in Python (6 seconds in C). It is trivial to parallelize if you can distribute the information and co-ordinate the work.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-12-31
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General`s Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Computer assisted audit techniques for UNIX (UNIX-CAATS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Polk, W.T.
1991-01-01
Federal and DOE regulations impose specific requirements for internal controls of computer systems. These controls include adequate separation of duties and sufficient controls for access of system and data. The DOE Inspector General's Office has the responsibility to examine internal controls, as well as efficient use of computer system resources. As a result, DOE supported NIST development of computer assisted audit techniques to examine BSD UNIX computers (UNIX-CAATS). These systems were selected due to the increasing number of UNIX workstations in use within DOE. This paper describes the design and development of these techniques, as well as the results ofmore » testing at NIST and the first audit at a DOE site. UNIX-CAATS consists of tools which examine security of passwords, file systems, and network access. In addition, a tool was developed to examine efficiency of disk utilization. Test results at NIST indicated inadequate password management, as well as weak network resource controls. File system security was considered adequate. Audit results at a DOE site indicated weak password management and inefficient disk utilization. During the audit, we also found improvements to UNIX-CAATS were needed when applied to large systems. NIST plans to enhance the techniques developed for DOE/IG in future work. This future work would leverage currently available tools, along with needed enhancements. These enhancements would enable DOE/IG to audit large systems, such as supercomputers.« less
Nam, Junghyun; Choo, Kim-Kwang Raymond
2014-01-01
While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol. PMID:25309956
Effects of Ce additions on the age hardening response of Mg–Zn alloys
DOE Office of Scientific and Technical Information (OSTI.GOV)
Langelier, Brian, E-mail: langelb@mcmaster.ca; Esmaeili, Shahrzad
2015-03-15
The effects of Ce additions on the precipitation hardening behaviour of Mg–Zn are examined for a series of alloys, with Ce additions at both alloying and microalloying levels. The alloys are artificially aged, and studied using hardness measurement and X-ray diffraction, as well as optical and transmission electron microscopy. It is found that the age-hardening effect is driven by the formation of fine precipitates, the number density of which is related to the Zn content of the alloy. Conversely, the Ce content is found to slightly reduce hardening. When the alloy content of Ce is high, large secondary phase particlesmore » containing both Ce and Zn are present, and remain stable during solutionizing. These particles effectively reduce the amount of Zn available as solute for precipitation, and thereby reduce hardening. Combining hardness results with thermodynamic analysis of alloy solute levels also suggests that Ce can have a negative effect on hardening when present as solutes at the onset of ageing. This effect is confirmed by designing a pre-ageing heat treatment to preferentially remove Ce solutes, which is found to restore the hardening capability of an Mg–Zn–Ce alloy to the level of the Ce-free alloy. - Highlights: • The effects of Ce additions on precipitation in Mg–Zn alloys are examined. • Additions of Ce to Mg–Zn slightly reduce the age-hardening response. • Ce-rich secondary phase particles deplete the matrix of Zn solute. • Hardening is also decreased when Ce is present in solution. • Pre-ageing to preferentially precipitate out Ce restores hardening capabilities.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gill, K; Aldoohan, S; Collier, J
Purpose: Study image optimization and radiation dose reduction in pediatric shunt CT scanning protocol through the use of different beam-hardening filters Methods: A 64-slice CT scanner at OU Childrens Hospital has been used to evaluate CT image contrast-to-noise ratio (CNR) and measure effective-doses based on the concept of CT dose index (CTDIvol) using the pediatric head shunt scanning protocol. The routine axial pediatric head shunt scanning protocol that has been optimized for the intrinsic x-ray tube filter has been used to evaluate CNR by acquiring images using the ACR approved CT-phantom and radiation dose CTphantom, which was used to measuremore » CTDIvol. These results were set as reference points to study and evaluate the effects of adding different filtering materials (i.e. Tungsten, Tantalum, Titanium, Nickel and Copper filters) to the existing filter on image quality and radiation dose. To ensure optimal image quality, the scanner routine air calibration was run for each added filter. The image CNR was evaluated for different kVps and wide range of mAs values using above mentioned beam-hardening filters. These scanning protocols were run under axial as well as under helical techniques. The CTDIvol and the effective-dose were measured and calculated for all scanning protocols and added filtration, including the intrinsic x-ray tube filter. Results: Beam-hardening filter shapes energy spectrum, which reduces the dose by 27%. No noticeable changes in image low contrast detectability Conclusion: Effective-dose is very much dependent on the CTDIVol, which is further very much dependent on beam-hardening filters. Substantial reduction in effective-dose is realized using beam-hardening filters as compare to the intrinsic filter. This phantom study showed that significant radiation dose reduction could be achieved in CT pediatric shunt scanning protocols without compromising in diagnostic value of image quality.« less
Franken, S M; Genders, R E; de Gruijl, F R; Rustemeyer, T; Pavel, S
2013-01-01
An effective prophylactic treatment of patients with polymorphic light eruption (PLE) consists of repeated low, gradually increasing exposures to UVB radiation. This so-called UV(B) hardening induces better tolerance of the skin to sunlight. SunshowerMedical company (Amsterdam) has developed an UV (B) source that can be used during taking shower. The low UV fluence of this apparatus makes it an interesting device for UV hardening. In a group of PLE patients, we compared the effectiveness of the irradiation with SunshowerMedical at home with that of the UVB treatment in the hospital. The PLE patients were randomized for one of the treatments. The hospital treatment consisted of irradiations with broad-band UVB (Waldmann 85/UV21 lamps) twice a week during 6 weeks. The home UV-device was used each day with the maximal irradiation time of 6 min. The outcome assessment was based on the information obtained from patients' dermatological quality of life (DLQI) questionnaires, the ability of both phototherapies to reduce the provocation reaction and from the patients' evaluation of the long-term benefits of their phototherapies. Sixteen patients completed treatment with SunshowerMedical and thirteen completed treatment in hospital. Both types of phototherapy were effective. There was a highly significant improvement in DLQI with either treatment. In most cases, the hardening reduced or even completely suppressed clinical UV provocation of PLE. The patients using SunshowerMedical at home were, however, much more content with the treatment procedure than the patients visiting the dermatological units. Both treatments were equally effective in the induction of skin tolerance to sunlight in PLE patients. However, the home treatment was much better accepted than the treatment in the hospital. © 2011 The Authors. Journal of the European Academy of Dermatology and Venereology © 2011 European Academy of Dermatology and Venereology.
Reduction of metal artifacts: beam hardening and photon starvation effects
NASA Astrophysics Data System (ADS)
Yadava, Girijesh K.; Pal, Debashish; Hsieh, Jiang
2014-03-01
The presence of metal-artifacts in CT imaging can obscure relevant anatomy and interfere with disease diagnosis. The cause and occurrence of metal-artifacts are primarily due to beam hardening, scatter, partial volume and photon starvation; however, the contribution to the artifacts from each of them depends on the type of hardware. A comparison of CT images obtained with different metallic hardware in various applications, along with acquisition and reconstruction parameters, helps understand methods for reducing or overcoming such artifacts. In this work, a metal beam hardening correction (BHC) and a projection-completion based metal artifact reduction (MAR) algorithms were developed, and applied on phantom and clinical CT scans with various metallic implants. Stainless-steel and Titanium were used to model and correct for metal beam hardening effect. In the MAR algorithm, the corrupted projection samples are replaced by the combination of original projections and in-painted data obtained by forward projecting a prior image. The data included spine fixation screws, hip-implants, dental-filling, and body extremity fixations, covering range of clinically used metal implants. Comparison of BHC and MAR on different metallic implants was used to characterize dominant source of the artifacts, and conceivable methods to overcome those. Results of the study indicate that beam hardening could be a dominant source of artifact in many spine and extremity fixations, whereas dental and hip implants could be dominant source of photon starvation. The BHC algorithm could significantly improve image quality in CT scans with metallic screws, whereas MAR algorithm could alleviate artifacts in hip-implants and dentalfillings.
Simulation of the Press Hardening Process and Prediction of the Final Mechanical Material Properties
NASA Astrophysics Data System (ADS)
Hochholdinger, Bernd; Hora, Pavel; Grass, Hannes; Lipp, Arnulf
2011-08-01
Press hardening is a well-established production process in the automotive industry today. The actual trend of this process technology points towards the manufacturing of parts with tailored properties. Since the knowledge of the mechanical properties of a structural part after forming and quenching is essential for the evaluation of for example the crash performance, an accurate as possible virtual assessment of the production process is more than ever necessary. In order to achieve this, the definition of reliable input parameters and boundary conditions for the thermo-mechanically coupled simulation of the process steps is required. One of the most important input parameters, especially regarding the final properties of the quenched material, is the contact heat transfer coefficient (IHTC). The CHTC depends on the effective pressure or the gap distance between part and tool. The CHTC at different contact pressures and gap distances is determined through inverse parameter identification. Furthermore a simulation strategy for the subsequent steps of the press hardening process as well as adequate modeling approaches for part and tools are discussed. For the prediction of the yield curves of the material after press hardening a phenomenological model is presented. This model requires the knowledge of the microstructure within the part. By post processing the nodal temperature history with a CCT diagram the quantitative distribution of the phase fractions martensite, bainite, ferrite and pearlite after press hardening is determined. The model itself is based on a Hockett-Sherby approach with the Hockett-Sherby parameters being defined in function of the phase fractions and a characteristic cooling rate.
Modeling of polychromatic attenuation using computed tomography reconstructed images
NASA Technical Reports Server (NTRS)
Yan, C. H.; Whalen, R. T.; Beaupre, G. S.; Yen, S. Y.; Napel, S.
1999-01-01
This paper presents a procedure for estimating an accurate model of the CT imaging process including spectral effects. As raw projection data are typically unavailable to the end-user, we adopt a post-processing approach that utilizes the reconstructed images themselves. This approach includes errors from x-ray scatter and the nonidealities of the built-in soft tissue correction into the beam characteristics, which is crucial to beam hardening correction algorithms that are designed to be applied directly to CT reconstructed images. We formulate this approach as a quadratic programming problem and propose two different methods, dimension reduction and regularization, to overcome ill conditioning in the model. For the regularization method we use a statistical procedure, Cross Validation, to select the regularization parameter. We have constructed step-wedge phantoms to estimate the effective beam spectrum of a GE CT-I scanner. Using the derived spectrum, we computed the attenuation ratios for the wedge phantoms and found that the worst case modeling error is less than 3% of the corresponding attenuation ratio. We have also built two test (hybrid) phantoms to evaluate the effective spectrum. Based on these test phantoms, we have shown that the effective beam spectrum provides an accurate model for the CT imaging process. Last, we used a simple beam hardening correction experiment to demonstrate the effectiveness of the estimated beam profile for removing beam hardening artifacts. We hope that this estimation procedure will encourage more independent research on beam hardening corrections and will lead to the development of application-specific beam hardening correction algorithms.
Research on SEU hardening of heterogeneous Dual-Core SoC
NASA Astrophysics Data System (ADS)
Huang, Kun; Hu, Keliu; Deng, Jun; Zhang, Tao
2017-08-01
The implementation of Single-Event Upsets (SEU) hardening has various schemes. However, some of them require a lot of human, material and financial resources. This paper proposes an easy scheme on SEU hardening for Heterogeneous Dual-core SoC (HD SoC) which contains three techniques. First, the automatic Triple Modular Redundancy (TMR) technique is adopted to harden the register heaps of the processor and the instruction-fetching module. Second, Hamming codes are used to harden the random access memory (RAM). Last, a software signature technique is applied to check the programs which are running on CPU. The scheme need not to consume additional resources, and has little influence on the performance of CPU. These technologies are very mature, easy to implement and needs low cost. According to the simulation result, the scheme can satisfy the basic demand of SEU-hardening.
Beck, Erwin H; Heim, Richard; Hansen, Jens
2004-12-01
This introductory overview shows that cold, in particular frost, stresses a plant in manifold ways and that the plant's response, being injurious or adaptive, must be considered a syndrome rather than a single reaction. In the course of the year perennial plants of the temperate climate zones undergo frost hardening in autumn and dehardening in spring. Using Scots pine (Pinus sylvestris L.) as a model plant the environmental signals inducing frost hardening and dehardening, respectively, were investigated. Over 2 years the changes in frost resistance of Scots pine needles were recorded together with the annual courses of day-length and ambient temperature. Both act as environmental signals for frost hardening and dehardening. Climate chamber experiments showed that short day-length as a signal triggering frost hardening could be replaced by irradiation with far red light, while red light inhibited hardening. The involvement of phytochrome as a signal receptor could be corroborated by respective night-break experiments. More rapid frost hardening than by short day or far red treatment was achieved by applying a short period (6 h) of mild frost which did not exceed the plant's cold resistance. Both types of signals were independently effective but the rates of frost hardening were not additive. The maximal rate of hardening was - 0.93 degrees C per day and frost tolerance of less than < - 72 degrees C was achieved. For dehardening, temperature was an even more effective signal than day-length.
Robust Speaker Authentication Based on Combined Speech and Voiceprint Recognition
NASA Astrophysics Data System (ADS)
Malcangi, Mario
2009-08-01
Personal authentication is becoming increasingly important in many applications that have to protect proprietary data. Passwords and personal identification numbers (PINs) prove not to be robust enough to ensure that unauthorized people do not use them. Biometric authentication technology may offer a secure, convenient, accurate solution but sometimes fails due to its intrinsically fuzzy nature. This research aims to demonstrate that combining two basic speech processing methods, voiceprint identification and speech recognition, can provide a very high degree of robustness, especially if fuzzy decision logic is used.
Fleischmann, Ernst; Miller, Michael K.; Affeldt, Ernst; ...
2015-01-31
Here, the solid-solution hardening potential of the refractory elements rhenium, tungsten and molybdenum in the matrix of single-crystal nickel-based superalloys was experimentally quantified. Single-phase alloys with the composition of the nickel solid-solution matrix of superalloys were cast as single crystals, and tested in creep at 980 °C and 30–75 MPa. The use of single-phase single-crystalline material ensures very clean data because no grain boundary or particle strengthening effects interfere with the solid-solution hardening. This makes it possible to quantify the amount of rhenium, tungsten and molybdenum necessary to reduce the creep rate by a factor of 10. Rhenium is moremore » than two times more effective for matrix strengthening than either tungsten or molybdenum. The existence of rhenium clusters as a possible reason for the strong strengthening effect is excluded as a result of atom probe tomography measurements. If the partitioning coefficient of rhenium, tungsten and molybdenum between the γ matrix and the γ' precipitates is taken into account, the effectiveness of the alloying elements in two-phase superalloys can be calculated and the rhenium effect can be explained.« less
Size effects under homogeneous deformation of single crystals: A discrete dislocation analysis
NASA Astrophysics Data System (ADS)
Guruprasad, P. J.; Benzerga, A. A.
Mechanism-based discrete dislocation plasticity is used to investigate the effect of size on micron scale crystal plasticity under conditions of macroscopically homogeneous deformation. Long-range interactions among dislocations are naturally incorporated through elasticity. Constitutive rules are used which account for key short-range dislocation interactions. These include junction formation and dynamic source and obstacle creation. Two-dimensional calculations are carried out which can handle high dislocation densities and large strains up to 0.1. The focus is laid on the effect of dimensional constraints on plastic flow and hardening processes. Specimen dimensions ranging from hundreds of nanometers to tens of microns are considered. Our findings show a strong size-dependence of flow strength and work-hardening rate at the micron scale. Taylor-like hardening is shown to be insufficient as a rationale for the flow stress scaling with specimen dimensions. The predicted size effect is associated with the emergence, at sufficient resolution, of a signed dislocation density. Heuristic correlations between macroscopic flow stress and macroscopic measures of dislocation density are sought. Most accurate among those is a correlation based on two state variables: the total dislocation density and an effective, scale-dependent measure of signed density.
A Study of Tensile Flow and Work-Hardening Behavior of Alloy 617
NASA Astrophysics Data System (ADS)
Singh, Aditya Narayan; Moitra, A.; Bhaskar, Pragna; Dasgupta, Arup; Sasikala, G.; Bhaduri, A. K.
2018-04-01
The simple power relationship σ = Κɛ p n satisfactorily expresses the tensile flow behavior of many metals and alloys in their uniform plastic strain regime. However, many FCC materials with low stacking fault energy have opposed such power law relationship. Alloy 617, an age-hardenable Ni-based superalloy is also observed not to obey the simple power law relationship neither in its solution-treated nor in its aged conditions. Various flow relationships were used to obtain the best fit for the tensile data, and different relationships were identified for the different aged conditions. The work-hardening rate (θ) demonstrates three distinct regions for all aged conditions, and there is an obvious change in the trend of θ versus σ. In the initial portion, θ decreases rapidly followed by a gradual increase in the second stage and again a decrease in its third stage is perceived in the Alloy 617. These three-stage characteristics are attributed to a commonly known precipitate, γ': Ni3(Ti, Al) which evolves during aging treatment and well recognized under transmission electron microscopy (TEM) observation. TEM results also reveal a slight degree of coarsening in γ' over aging. The tensile flow and the work-hardening behavior are well correlated with other microstructural evolution during the aging treatments.
NASA Astrophysics Data System (ADS)
Papa Rao, M.; Subramanya Sarma, V.; Sankaran, S.
2017-03-01
Ultrafine-grained (UFG) dual-phase (DP) steel was produced by severe cold rolling (true strain of 2.4) and intercritical annealing of a low carbon V-Nb microalloyed steel in a temperature range of 1003 K to 1033 K (730 °C to 760 °C) for 2 minutes, and water quenching. The microstructure of UFG DP steels consisted of polygonal ferrite matrix with homogeneously distributed martensite islands (both of size <1 µm) and a small fraction of the inter lath films of retained austenite. The UFG DP steel produced through intercritical annealing at 1013 K (740 °C) has good combination of strength (1295 MPa) and ductility (uniform elongation, 13 pct). The nanoscale V- and Nb-based carbides/carbonitrides and spheroidized cementite particles have played a crucial role in achieving UFG DP microstructure and in improving the strength and work hardening. Analysis of work hardening behavior of the UFG DP steels through modified Crussard-Jaoul analysis showed a continuously varying work hardening rate response which could be approximated by 2 or 3 linear regimes. The transmission electron microscopy analysis on post tensile-tested samples indicated that these regimes are possibly related to the work hardening of ferrite, lath, and twin martensite, respectively.
Optimization of the transition path of the head hardening with using the genetic algorithms
NASA Astrophysics Data System (ADS)
Wróbel, Joanna; Kulawik, Adam
2016-06-01
An automated method of choice of the transition path of the head hardening in heat treatment process for the plane steel element is proposed in this communication. This method determines the points on the path of moving heat source using the genetic algorithms. The fitness function of the used algorithm is determined on the basis of effective stresses and yield point depending on the phase composition. The path of the hardening tool and also the area of the heat affected zone is determined on the basis of obtained points. A numerical model of thermal phenomena, phase transformations in the solid state and mechanical phenomena for the hardening process is implemented in order to verify the presented method. A finite element method (FEM) was used for solving the heat transfer equation and getting required temperature fields. The moving heat source is modeled with a Gaussian distribution and the water cooling is also included. The macroscopic model based on the analysis of the CCT and CHT diagrams of the medium-carbon steel is used to determine the phase transformations in the solid state. A finite element method is also used for solving the equilibrium equations giving us the stress field. The thermal and structural strains are taken into account in the constitutive relations.
Modification of Grange-Kiefer Approach for Determination of Hardenability in Eutectoid Steel
NASA Astrophysics Data System (ADS)
Sushanthi, Neethi; Maity, Joydeep
2014-12-01
In this research work, an independent mathematical modeling approach has been adopted for determination of the hardenability of steels. In this model, at first, cooling curves were generated by solving transient heat transfer equation through discretization with pure explicit finite difference scheme coupled with MATLAB-based programming considering variable thermo-physical properties of 1080 steel. Thereafter, a new fundamental approach is proposed for obtaining CCT noses as a function of volume fraction transformed through modification of Grange-Kiefer approach. The cooling curves were solved against 50 pct transformation nose of CCT diagram in order to predict hardening behavior of 1080 steel in terms of hardenability parameters (Grossmann critical diameter, D C; and ideal critical diameter, D I) and the variation of the unhardened core diameter ( D u) to diameter of steel bar ( D) ratio with diameter of the steel bar ( D). The experiments were also performed to ascertain actual D C value of 1080 steel for still water quenching. The D C value obtained by the developed model was found to match the experimental D C value with only 3 pct deviation. Therefore, the model developed in the present work can be used for direct determination of D I, D C and D u without resorting to any rigorous experimentation.
Low Shrinkage Cement Concrete Intended for Airfield Pavements
NASA Astrophysics Data System (ADS)
Małgorzata, Linek
2017-10-01
The work concerns the issue of hardened concrete parameters improvement intended for airfield pavements. Factors which have direct or indirect influence on rheological deformation size were of particular interest. The aim of lab testing was to select concrete mixture ratio which would make hardened concrete less susceptible to influence of basic operating factors. Analyses included two research groups. External and internal factors were selected. They influence parameters of hardened cement concrete by increasing rheological deformations. Research referred to innovative cement concrete intended for airfield pavements. Due to construction operation, the research considered the influence of weather conditions and forced thermal loads intensifying concrete stress. Fresh concrete mixture parameters were tested and basic parameters of hardened concrete were defined (density, absorbability, compression strength, tensile strength). Influence of the following factors on rheological deformation value was also analysed. Based on obtained test results, it has been discovered that innovative concrete, made on the basis of modifier, which changes internal structure of concrete composite, has definitely lower values of rheological deformation. Observed changes of microstructure, in connection with reduced deformation values allowed to reach the conclusion regarding advantageous characteristic features of the newly designed cement concrete. Applying such concrete for airfield construction may contribute to extension of its operation without malfunction and the increase of its general service life.
Work-hardening behaviour of Mg single crystals oriented for basal slip
NASA Astrophysics Data System (ADS)
Bhattacharya, B.; Niewczas, M.
2011-06-01
Work-hardening behaviour of Mg single crystals oriented for basal slip was studied by means of tensile tests carried out at 4, 78 and 295 K. The crystals show critical resolved shear stress values (CRSS) for a {0001} ? basal slip system in the range 1-1.5 MPa. The samples exhibit two-stage work hardening characteristics consisting of a long easy glide stage and a stage of rapid hardening terminated by failure. The onset of the plastic flow up to the point of fracture is accompanied by a low work-hardening rate in the range 5 × 10-5-5 × 10-4 µ, corresponding to the hardening rate in Stage I of copper single crystals. The analysis of thermally activated glide parameters suggests that forest interactions are rate-controlling processes. The very low value of the activation distance found at 4 K, ∼0.047 b, is attributed to zero-point energy effects. The failure of crystals occurs well before their hardening capacity is exhausted by mechanisms which are characteristic of deformation temperature.
Simal Gándara, J; López Mahía, P; Paseiro Losada, P; Simal Lozano, J; Paz Abuín, S
1993-01-01
The overall and specific migrations of BADGE n = 0 monomer and m-XDA hardener from a BEPOX LAB 889 (Gairesa internal code), epoxy system cured at room temperature, into three water-based food simulants are studied. Hydrolysis of BADGE n = 0 was observed in all of these simulants, giving more polar products. We thus propose changing the EEC Directives, which at present only legislate for levels of BADGE n = 0 monomer in the simulants, to include the hydrolysis products of BADGE monomers. Another alternative would be to express all the migration levels due to BADGE and its derived products in terms of BADGE itself.
Simulations of x-ray speckle-based dark-field and phase-contrast imaging with a polychromatic beam
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zdora, Marie-Christine, E-mail: marie-christine.zdora@diamond.ac.uk; Diamond Light Source, Harwell Science and Innovation Campus, Didcot, Oxfordshire OX11 0DE; Department of Physics & Astronomy, University College London, London WC1E 6BT
2015-09-21
Following the first experimental demonstration of x-ray speckle-based multimodal imaging using a polychromatic beam [I. Zanette et al., Phys. Rev. Lett. 112(25), 253903 (2014)], we present a simulation study on the effects of a polychromatic x-ray spectrum on the performance of this technique. We observe that the contrast of the near-field speckles is only mildly influenced by the bandwidth of the energy spectrum. Moreover, using a homogeneous object with simple geometry, we characterize the beam hardening artifacts in the reconstructed transmission and refraction angle images, and we describe how the beam hardening also affects the dark-field signal provided by specklemore » tracking. This study is particularly important for further implementations and developments of coherent speckle-based techniques at laboratory x-ray sources.« less
Farhadi, Akram; Ahmadi, Maryam
2013-12-01
Picture Archiving and Communications System (PACS) was originally developed for radiology services over 20 years ago to capture medical images electronically. Medical diagnosis methods are based on images such as clinical radiographs, ultrasounds, CT scans, MRIs, or other imaging modalities. Information obtained from these images is correlated with patient information. So with regards to the important role of PACS in hospitals, we aimed to evaluate the PACS and survey the information security needed in the Radiological Information system. First, we surveyed the different aspects of PACS that should be in any health organizations based on Department of Health standards and prepared checklists for assessing the PACS in different hospitals. Second, we surveyed the security controls that should be implemented in PACS. Checklists reliability is affirmed by professors of Tehran Science University. Then, the final data are inputted in SPSS software and analyzed. The results indicate that PACS in hospitals can transfer patient demographic information but they do not show route of information. These systems are not open source. They don't use XML-based standard and HL7 standard for exchanging the data. They do not use DS digital signature. They use passwords and the user can correct or change the medical information. PACS can detect alternation rendered. The survey of results demonstrates that PACS in all hospitals has the same features. These systems have the patient demographic data but they do not have suitable flexibility to interface network or taking reports. For the privacy of PACS in all hospitals, there were passwords for users and the system could show the changes that have been made; but there was no water making or digital signature for the users.
Cyclic deformation and phase transformation of 6Mo superaustenitic stainless steel
NASA Astrophysics Data System (ADS)
Wang, Shing-Hoa; Wu, Chia-Chang; Chen, Chih-Yuan; Yang, Jer-Ren; Chiu, Po-Kay; Fang, Jason
2007-08-01
A fatigue behavior analysis was performed on superaustenitic stainless steel UNS S31254 (Avesta Sheffield 254 SMO), which contains about 6wt.% molybdenum, to examine the cyclic hardening/softening trend, hysteresis loops, the degree of hardening, and fatigue life during cyclic straining in the total strain amplitude range from 0.2 to 1.5%. Independent of strain rate, hardening occurs first, followed by softening. The degree of hardening is dependent on the magnitude of strain amplitude. The cyclic stress-strain curve shows material softening. The lower slope of the degree of hardening versus the strain amplitude curve at a high strain rate is attributed to the fast development of dislocation structures and quick saturation. The ɛ martensite formation, either in band or sheath form, depending on the strain rate, leads to secondary hardening at the high strain amplitude of 1.5%.
NASA Astrophysics Data System (ADS)
Bang, Sungsik; Rickhey, Felix; Kim, Minsoo; Lee, Hyungyil; Kim, Naksoo
2013-12-01
In this study we establish a process to predict hardening behavior considering the Bauschinger effect for zircaloy-4 sheets. When a metal is compressed after tension in forming, the yield strength decreases. For this reason, the Bauschinger effect should be considered in FE simulations of spring-back. We suggested a suitable specimen size and a method for determining the optimum tightening torque for simple shear tests. Shear stress-strain curves are obtained for five materials. We developed a method to convert the shear load-displacement curve to the effective stress-strain curve with FEA. We simulated the simple shear forward/reverse test using the combined isotropic/kinematic hardening model. We also investigated the change of the load-displacement curve by varying the hardening coefficients. We determined the hardening coefficients so that they follow the hardening behavior of zircaloy-4 in experiments.
NASA Astrophysics Data System (ADS)
Li, H.; Liu, Y. H.
2008-11-01
The hole-drilling strain gage method is an effective semi-destructive technique for determining residual stresses in the component. As a mechanical technique, a work-hardening layer will be formed on the surface of the hole after drilling, and affect the strain relaxation. By increasing Young's modulus of the material near the hole, the work-hardening layer is simplified as a heterogeneous annulus. As an example, two finite rectangular plates submitted to different initial stresses are treated, and the relieved strains are measured by finite element simulation. The accuracy of the measurement is estimated by comparing the simulated residual stresses with the given initial ones. The results are shown for various hardness of work-hardening layer. The influence of the relative position of the gages compared with the thickness of the work-hardening layer, and the effect of the ratio of hole diameter to work-hardening layer thickness are analyzed as well.
Password Protection Act of 2013
Rep. Perlmutter, Ed [D-CO-7
2013-05-21
House - 06/14/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Induction Hardening of External Gear
NASA Astrophysics Data System (ADS)
Bukanin, V. A.; Ivanov, A. N.; Zenkov, A. E.; Vologdin, V. V.; Vologdin, V. V., Jr.
2018-03-01
Problems and solution of gear induction hardening are described. Main attention is paid to the parameters of heating and cooling systems. ELTA 7.0 program has been used to obtain the required electrical parameters of inductor, power sources, resonant circuits, as well as to choose the quenching media. Comparison of experimental and calculated results of investigation is provided. In order to compare advantages and disadvantages of single- and dual-frequency heating processes, many variants of these technologies were simulated. The predicted structure and hardness of steel gears are obtained by use of the ELTA data base taken into account the Continuous Cooling Transformation diagrams.
High-energy, high-rate materials processing
NASA Astrophysics Data System (ADS)
Marcus, H. L.; Bourell, D. L.; Eliezer, Z.; Persad, C.; Weldon, W.
1987-12-01
The increasingly available range of pulsed-power, high energy kinetic storage devices, such as low-inductance pulse-forming networks, compulsators, and homopolar generators, is presently considered as a basis for industrial high energy/high rate (HEHR) processing to accomplish shock hardening, drilling, rapid surface alloying and melting, welding and cutting, transformation hardening, and cladding and surface melting in metallic materials. Time-temperature-transformation concepts furnish the basis for a fundamental understanding of the potential advantages of this direct pulsed power processing. Attention is given to the HEHR processing of a refractory molybdenum alloy, a nickel-base metallic glass, tungsten, titanium aluminides, and metal-matrix composites.
Control of power to an inductively heated part
Adkins, Douglas R.; Frost, Charles A.; Kahle, Philip M.; Kelley, J. Bruce; Stanton, Suzanne L.
1997-01-01
A process for induction hardening a part to a desired depth with an AC signal applied to the part from a closely coupled induction coil includes measuring the voltage of the AC signal at the coil and the current passing through the coil; and controlling the depth of hardening of the part from the measured voltage and current. The control system determines parameters of the part that are functions of applied voltage and current to the induction coil, and uses a neural network to control the application of the AC signal based on the detected functions for each part.
Control of power to an inductively heated part
Adkins, D.R.; Frost, C.A.; Kahle, P.M.; Kelley, J.B.; Stanton, S.L.
1997-05-20
A process for induction hardening a part to a desired depth with an AC signal applied to the part from a closely coupled induction coil includes measuring the voltage of the AC signal at the coil and the current passing through the coil; and controlling the depth of hardening of the part from the measured voltage and current. The control system determines parameters of the part that are functions of applied voltage and current to the induction coil, and uses a neural network to control the application of the AC signal based on the detected functions for each part. 6 figs.
Multi-MGy Radiation Hardened Camera for Nuclear Facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Girard, Sylvain; Boukenter, Aziz; Ouerdane, Youcef
There is an increasing interest in developing cameras for surveillance systems to monitor nuclear facilities or nuclear waste storages. Particularly, for today's and the next generation of nuclear facilities increasing safety requirements consecutive to Fukushima Daiichi's disaster have to be considered. For some applications, radiation tolerance needs to overcome doses in the MGy(SiO{sub 2}) range whereas the most tolerant commercial or prototypes products based on solid state image sensors withstand doses up to few kGy. The objective of this work is to present the radiation hardening strategy developed by our research groups to enhance the tolerance to ionizing radiations ofmore » the various subparts of these imaging systems by working simultaneously at the component and system design levels. Developing radiation-hardened camera implies to combine several radiation-hardening strategies. In our case, we decided not to use the simplest one, the shielding approach. This approach is efficient but limits the camera miniaturization and is not compatible with its future integration in remote-handling or robotic systems. Then, the hardening-by-component strategy appears mandatory to avoid the failure of one of the camera subparts at doses lower than the MGy. Concerning the image sensor itself, the used technology is a CMOS Image Sensor (CIS) designed by ISAE team with custom pixel designs used to mitigate the total ionizing dose (TID) effects that occur well below the MGy range in classical image sensors (e.g. Charge Coupled Devices (CCD), Charge Injection Devices (CID) and classical Active Pixel Sensors (APS)), such as the complete loss of functionality, the dark current increase and the gain drop. We'll present at the conference a comparative study between these radiation-hardened pixel radiation responses with respect to conventional ones, demonstrating the efficiency of the choices made. The targeted strategy to develop the complete radiation hard camera electronics will be exposed. Another important element of the camera is the optical system that transports the image from the scene to the image sensor. This arrangement of glass-based lenses is affected by radiations through two mechanisms: the radiation induced absorption and the radiation induced refractive index changes. The first one will limit the signal to noise ratio of the image whereas the second one will directly affect the resolution of the camera. We'll present at the conference a coupled simulation/experiment study of these effects for various commercial glasses and present vulnerability study of typical optical systems to radiations at MGy doses. The last very important part of the camera is the illumination system that can be based on various technologies of emitting devices like LED, SLED or lasers. The most promising solutions for high radiation doses will be presented at the conference. In addition to this hardening-by-component approach, the global radiation tolerance of the camera can be drastically improve by working at the system level, combining innovative approaches eg. for the optical and illumination systems. We'll present at the conference the developed approach allowing to extend the camera lifetime up to the MGy dose range. (authors)« less
Okunade, Akintunde Akangbe
2002-12-01
Present interest is in the shielding of diagnostic X-ray units. Numerical comparison has been made of the attenuation and hardening properties of lead and some particular alternative materials: steel, plate glass and gypsum wallboard. Results show, for particular choices of thickness, that lead and steel can be made to provide closely similar attenuation and spectral hardening, values of lead attenuation equivalent (LAE) and lead hardening equivalent (LHE) thicknesses being nearly the same. Significant differences in the attenuation and hardening properties of lead are found in comparison with plate glass and gypsum wallboard. LAE produces better matching of exposure for lead-plate glass and lead-gypsum wallboard than LHE.
Technology Developments in Radiation-Hardened Electronics for Space Environments
NASA Technical Reports Server (NTRS)
Keys, Andrew S.; Howell, Joe T.
2008-01-01
The Radiation Hardened Electronics for Space Environments (RHESE) project consists of a series of tasks designed to develop and mature a broad spectrum of radiation hardened and low temperature electronics technologies. Three approaches are being taken to address radiation hardening: improved material hardness, design techniques to improve radiation tolerance, and software methods to improve radiation tolerance. Within these approaches various technology products are being addressed including Field Programmable Gate Arrays (FPGA), Field Programmable Analog Arrays (FPAA), MEMS, Serial Processors, Reconfigurable Processors, and Parallel Processors. In addition to radiation hardening, low temperature extremes are addressed with a focus on material and design approaches. System level applications for the RHESE technology products are discussed.
High-Performance, Radiation-Hardened Electronics for Space Environments
NASA Technical Reports Server (NTRS)
Keys, Andrew S.; Watson, Michael D.; Frazier, Donald O.; Adams, James H.; Johnson, Michael A.; Kolawa, Elizabeth A.
2007-01-01
The Radiation Hardened Electronics for Space Environments (RHESE) project endeavors to advance the current state-of-the-art in high-performance, radiation-hardened electronics and processors, ensuring successful performance of space systems required to operate within extreme radiation and temperature environments. Because RHESE is a project within the Exploration Technology Development Program (ETDP), RHESE's primary customers will be the human and robotic missions being developed by NASA's Exploration Systems Mission Directorate (ESMD) in partial fulfillment of the Vision for Space Exploration. Benefits are also anticipated for NASA's science missions to planetary and deep-space destinations. As a technology development effort, RHESE provides a broad-scoped, full spectrum of approaches to environmentally harden space electronics, including new materials, advanced design processes, reconfigurable hardware techniques, and software modeling of the radiation environment. The RHESE sub-project tasks are: SelfReconfigurable Electronics for Extreme Environments, Radiation Effects Predictive Modeling, Radiation Hardened Memory, Single Event Effects (SEE) Immune Reconfigurable Field Programmable Gate Array (FPGA) (SIRF), Radiation Hardening by Software, Radiation Hardened High Performance Processors (HPP), Reconfigurable Computing, Low Temperature Tolerant MEMS by Design, and Silicon-Germanium (SiGe) Integrated Electronics for Extreme Environments. These nine sub-project tasks are managed by technical leads as located across five different NASA field centers, including Ames Research Center, Goddard Space Flight Center, the Jet Propulsion Laboratory, Langley Research Center, and Marshall Space Flight Center. The overall RHESE integrated project management responsibility resides with NASA's Marshall Space Flight Center (MSFC). Initial technology development emphasis within RHESE focuses on the hardening of Field Programmable Gate Arrays (FPGA)s and Field Programmable Analog Arrays (FPAA)s for use in reconfigurable architectures. As these component/chip level technologies mature, the RHESE project emphasis shifts to focus on efforts encompassing total processor hardening techniques and board-level electronic reconfiguration techniques featuring spare and interface modularity. This phased approach to distributing emphasis between technology developments provides hardened FPGA/FPAAs for early mission infusion, then migrates to hardened, board-level, high speed processors with associated memory elements and high density storage for the longer duration missions encountered for Lunar Outpost and Mars Exploration occurring later in the Constellation schedule.
A phenomenological intra-laminar plasticity model for FRP composite materials
NASA Astrophysics Data System (ADS)
Zhou, Yinhua; Hou, Chi; Wang, Wenzhi; Zhao, Meiying; Wan, Xiaopeng
2015-07-01
The nonlinearity of fibre-reinforced polymer (FRP) composites have significant effects on the analysis of composite structures. This article proposes a phenomenological intralaminar plasticity model to represent the nonlinearity of FRP composite materials. Based on the model presented by Ladeveze et al., the plastic potential and hardening functions are improved to give a more rational description of phenomenological nonlinearity behavior. A four-parameter hardening model is built to capture important features of the hardening curve and consequently gives the good matching of the experiments. Within the frame of plasticity theory, the detailed constitutive model, the numerical algorithm and the derivation of the tangent stiffness matrix are presented in this study to improve model robustness. This phenomenological model achieved excellent agreement between the experimental and simulation results in element scale respectively for glass fibre-reinforced polymer (GFRP) and carbon fibre-reinforced polymer (CFRP). Moreover, the model is capable of simulating the nonlinear phenomenon of laminates, and good agreement is achieved in nearly all cases.
Artifact Reduction in X-Ray CT Images of Al-Steel-Perspex Specimens Mimicking a Hip Prosthesis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Madhogarhia, Manish; Munshi, P.; Lukose, Sijo
2008-09-26
X-ray Computed Tomography (CT) is a relatively new technique developed in the late 1970's, which enables the nondestructive visualization of the internal structure of objects. Beam hardening caused by the polychromatic spectrum is an important problem in X-ray computed tomography (X-CT). It leads to various artifacts in reconstruction images and reduces image quality. In the present work we are considering the Artifact Reduction in Total Hip Prosthesis CT Scan which is a problem of medical imaging. We are trying to reduce the cupping artifact induced by beam hardening as well as metal artifact as they exist in the CT scanmore » of a human hip after the femur is replaced by a metal implant. The correction method for beam hardening used here is based on a previous work. Simulation study for the present problem includes a phantom consisting of mild steel, aluminium and perspex mimicking the photon attenuation properties of a hum hip cross section with metal implant.« less
Thermomechanical deformation behavior of a dynamic strain aging alloy, Hastelloy X
NASA Technical Reports Server (NTRS)
Castelli, Michael G.; Miner, Robert V.; Robinson, David N.
1992-01-01
An experimental study was performed to identify the effects of dynamic strain aging (solute drag) and metallurgical instabilities under thermomechanical loading conditions. The study involved a series of closely controlled thermomechanical deformation tests on the solid-solution-strenghened nickel-base superalloy, Hastelloy X. This alloy exhibits a strong isothermal strain aging peak at approximately 600 C, promoted by the effects of solute drag and precipitation hardening. Macroscopic thermomechanical hardening trends are correlated with microstructural characteristics through the use of transmission electron microscopy. These observations are compared and contrasted with isothermal conditions. Thermomechanical behavior unique to the isothermal database is identified and discussed. The microstructural characteristics were shown to be dominated by effects associated with the highest temperature of the thermomechanical cycle. Results indicate that the deformation behavior of Hastelloy X is thermomechanically path dependent. In addition, guidance is given pertaining to deformation modeling in the context of macroscopic unified theory. An internal state variable is formulated to qualitatively reflect the isotropic hardening trends identified in the TMD experiments.
Strengthening Mechanisms in Thermomechanically Processed NbTi-Microalloyed Steel
NASA Astrophysics Data System (ADS)
Kostryzhev, Andrii G.; Marenych, Olexandra O.; Killmore, Chris R.; Pereloma, Elena V.
2015-08-01
The effect of deformation temperature on microstructure and mechanical properties was investigated for thermomechanically processed NbTi-microalloyed steel with ferrite-pearlite microstructure. With a decrease in the finish deformation temperature at 1348 K to 1098 K (1075 °C to 825 °C) temperature range, the ambient temperature yield stress did not vary significantly, work hardening rate decreased, ultimate tensile strength decreased, and elongation to failure increased. These variations in mechanical properties were correlated to the variations in microstructural parameters (such as ferrite grain size, solid solution concentrations, precipitate number density and dislocation density). Calculations based on the measured microstructural parameters suggested the grain refinement, solid solution strengthening, precipitation strengthening, and work hardening contributed up to 32 pct, up to 48 pct, up to 25 pct, and less than 3 pct to the yield stress, respectively. With a decrease in the finish deformation temperature, both the grain size strengthening and solid solution strengthening increased, the precipitation strengthening decreased, and the work hardening contribution did not vary significantly.
Paraequilibrium Carburization of Duplex and Ferritic Stainless Steels
NASA Astrophysics Data System (ADS)
Michal, G. M.; Gu, X.; Jennings, W. D.; Kahn, H.; Ernst, F.; Heuer, A. H.
2009-08-01
AISI 301 and E-BRITE stainless steels were subjected to low-temperature (743 K) carburization experiments using a commercial technology developed for carburization of 316 austenitic stainless steels. The AISI 301 steel contained ~40 vol pct ferrite before carburization but had a fully austenitic hardened case, ~20- μm thick, and a surface carbon concentration of ~8 at. pct after treatment; this “colossal” paraequilibrium carbon supersaturation caused an increase in lattice parameter of ~3 pct. The E-BRITE also developed a hardened case, 12- to 18- μm thick, but underwent a more modest (~0.3 pct) increase in lattice parameter; the surface carbon concentration was ~10 at. pct. While the hardened case on the AISI 301 stainless steel appeared to be single-phase austenite, evidence for carbide formation was apparent in X-ray diffractometer (XRD) scans of the E-BRITE. Paraequilibrium phase diagrams were calculated for both AISI 301 and E-BRITE stainless steels using a CALPHAD compound energy-based interstitial solid solution model. In the low-temperature regime of interest, and based upon measured paraequilibrium carbon solubilities, more negative Cr-carbon interaction parameters for austenite than those in the current CALPHAD data base may be appropriate. A sensitivity analysis involving Cr-carbon interaction parameters for ferrite found a strong dependence of carbon solubility on relatively small changes in the magnitude of these parameters.
Exercise and Pulmonary Hypertension (PH)
... with PAH Consensus Statement Issued by the Scientific Leadership Council DISCLAIMER: This information is for general information ... on our new PHPN/PHCR or Support Group Leadership Institute portal? Reset your password here . Login Username ...
Domain (One password used for computer logins, e-mail logins, VPN, and many other internal Argonne web see this page.). NEW!! Click here for instructions on how to setup publickey (passwordless) logins to
75 FR 52394 - Privacy Act of 1974, as Amended
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... Responsibilities for Maintaining Records About Individuals, dated February 8, 1996. The system notice is published..., DC and Fort Worth, Texas facilities. Desktop PCs are password controlled by users. Retention and...
Password Protection Act of 2012
Sen. Blumenthal, Richard [D-CT
2012-05-09
Senate - 05/09/2012 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Password Protection Act of 2013
Sen. Blumenthal, Richard [D-CT
2013-08-01
Senate - 08/01/2013 Read twice and referred to the Committee on Health, Education, Labor, and Pensions. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Induction of a Hardening Phenomenon and Quantitative Changes of Ceramides in Stratum Corneum
Park, Sook Young; Kim, Jin Hye; Cho, Soo Ick; Kim, Kyeong Il; Cho, Hee Jin; Park, Chun Wook; Lee, Cheol Heon
2014-01-01
Background Hardening phenomenon of human skin after repeated exposure to the irritants is well-known, but the precise mechanism remains elusive. Objective To modify the previous experimental model of hardening phenomenon by repeated applications of two different concentrations of sodium lauryl sulfate (SLS) solutions to Korean healthy volunteers and to investigate the quantitative changes of ceramides in stratum corneum before and after chronic repeated irritation. Methods Eight hundred microliters of distilled water containing 0.1% and 2% SLS was applied for 10 minutes on the forearm of 41 healthy volunteers for 3 weeks. After an intervening 3-week rest, 24-hour patch tests with 1% SLS were conducted on previously irritated sites. Transepidermal water loss (TEWL), erythema index and quantity of ceramide were measured in the stratum corneum before and after irritation. Results TEWL values on the sites preirritated with 2% SLS were lower than those with 0.1% SLS. Hardening phenomenon occurred in 24 volunteers at day 44. The changes in ceramide levels were not significantly higher in the hardened skin than in the non-hardened skin. Conclusion Repetitive stimulation with a higher concentration of SLS can more easily trigger skin hardening. PMID:24648684
Contact allergy to epoxy hardeners.
Aalto-Korte, Kristiina; Suuronen, Katri; Kuuliala, Outi; Henriks-Eckerman, Maj-Len; Jolanki, Riitta
2014-09-01
Diglycidylether of bisphenol A resin is the most important sensitizer in epoxy systems, but a minority of patients develop concomitant or solitary contact allergy to epoxy hardeners. At the Finnish Institute of Occupational Health, several in-house test substances of epoxy hardeners have been tested in a special epoxy compound patch test series. To analyse the frequency and clinical relevance of allergic reactions to different epoxy hardeners. Test files (January 1991 to March 2013) were screened for contact allergy to different epoxy hardeners, and the clinical records of patients with allergic reactions were analysed for occupation, concomitant allergic reactions, and exposure. The most commonly positive epoxy hardeners were m-xylylenediamine (n = 24), 2,4,6-tris-(dimethylaminomethyl)phenol (tris-DMP; n = 14), isophorone-diamine (n = 12), and diethylenetriamine (n = 9). Trimethylhexamethylenediamine (n = 7), tetraethylenepentamine (n = 4), and triethylenetetramine (n = 2) elicited some reactions, although most patients were found to have no specific exposure. Allergic reactions to hexamethylenetetramine, dimethylaminopropylamine and ethylenediamine dihydrochloride were not related to epoxy products. Tris-DMP is an important sensitizer in epoxy hardeners, and should be included in the patch test series of epoxy chemicals. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.
Safiuddin, Md; Raman, Sudharshan N; Zain, Muhammad Fauzi Mohd
2015-12-10
The aim of the work reported in this article was to investigate the effects of medium temperature and industrial by-products on the key hardened properties of high performance concrete. Four concrete mixes were prepared based on a water-to-binder ratio of 0.35. Two industrial by-products, silica fume and Class F fly ash, were used separately and together with normal portland cement to produce three concrete mixes in addition to the control mix. The properties of both fresh and hardened concretes were examined in the laboratory. The freshly mixed concrete mixes were tested for slump, slump flow, and V-funnel flow. The hardened concretes were tested for compressive strength and dynamic modulus of elasticity after exposing to 20, 35 and 50 °C. In addition, the initial surface absorption and the rate of moisture movement into the concretes were determined at 20 °C. The performance of the concretes in the fresh state was excellent due to their superior deformability and good segregation resistance. In their hardened state, the highest levels of compressive strength and dynamic modulus of elasticity were produced by silica fume concrete. In addition, silica fume concrete showed the lowest level of initial surface absorption and the lowest rate of moisture movement into the interior of concrete. In comparison, the compressive strength, dynamic modulus of elasticity, initial surface absorption, and moisture movement rate of silica fume-fly ash concrete were close to those of silica fume concrete. Moreover, all concretes provided relatively low compressive strength and dynamic modulus of elasticity when they were exposed to 50 °C. However, the effect of increased temperature was less detrimental for silica fume and silica fume-fly ash concretes in comparison with the control concrete.
Safiuddin, Md.; Raman, Sudharshan N.; Zain, Muhammad Fauzi Mohd.
2015-01-01
The aim of the work reported in this article was to investigate the effects of medium temperature and industrial by-products on the key hardened properties of high performance concrete. Four concrete mixes were prepared based on a water-to-binder ratio of 0.35. Two industrial by-products, silica fume and Class F fly ash, were used separately and together with normal portland cement to produce three concrete mixes in addition to the control mix. The properties of both fresh and hardened concretes were examined in the laboratory. The freshly mixed concrete mixes were tested for slump, slump flow, and V-funnel flow. The hardened concretes were tested for compressive strength and dynamic modulus of elasticity after exposing to 20, 35 and 50 °C. In addition, the initial surface absorption and the rate of moisture movement into the concretes were determined at 20 °C. The performance of the concretes in the fresh state was excellent due to their superior deformability and good segregation resistance. In their hardened state, the highest levels of compressive strength and dynamic modulus of elasticity were produced by silica fume concrete. In addition, silica fume concrete showed the lowest level of initial surface absorption and the lowest rate of moisture movement into the interior of concrete. In comparison, the compressive strength, dynamic modulus of elasticity, initial surface absorption, and moisture movement rate of silica fume-fly ash concrete were close to those of silica fume concrete. Moreover, all concretes provided relatively low compressive strength and dynamic modulus of elasticity when they were exposed to 50 °C. However, the effect of increased temperature was less detrimental for silica fume and silica fume-fly ash concretes in comparison with the control concrete. PMID:28793732
A detailed investigation of the strain hardening response of aluminum alloyed Hadfield steel
NASA Astrophysics Data System (ADS)
Canadinc, Demircan
The unusual strain hardening response exhibited by Hadfield steel single and polycrystals under tensile loading was investigated. Hadfield steel, which deforms plastically through the competing mechanisms slip and twinning, was alloyed with aluminum in order to suppress twinning and study the role of slip only. To avoid complications due to a grained structure, only single crystals of the aluminum alloyed Hadfield steel were considered at the initial stage of the current study. As a result of alloying with aluminum, twinning was suppressed; however a significant increase in the strain hardening response was also present. A detailed microstructural analysis showed the presence of high-density dislocation walls that evolve in volume fraction due to plastic deformation and interaction with slip systems. The very high strain hardening rates exhibited by the aluminum alloyed Hadfield steel single crystals was attributed to the blockage of glide dislocations by the high-density dislocation walls. A crystal plasticity model was proposed, that accounts for the volume fraction evolution and rotation of the dense dislocation walls, as well as their interaction with the active slip systems. The novelty of the model lies in the simplicity of the constitutive equations that define the strain hardening, and the fact that it is based on experimental data regarding the microstructure. The success of the model was tested by its application to different crystallographic orientations, and finally the polycrystals of the aluminum alloyed Hadfield steel. Meanwhile, the capability of the model to predict texture was also observed through the rotation of the loading axis in single crystals. The ability of the model to capture the polycrystalline deformation response provides a venue for its utilization in other alloys that exhibit dislocation sheet structures.
DOT National Transportation Integrated Search
1977-04-01
This study showed that lime treatment removes polar, viscosity-building components and reduces the susceptibility of the asphalt to laboratory oxidative hardening. The beneficial effects of lime treatment in reducing asphalt oxidative hardening were ...
The Air Force concentrating photovoltaic array program
NASA Technical Reports Server (NTRS)
Geis, Jack W.
1987-01-01
A summary is given of Air Force solar concentrator projects beginning with the Rockwell International study program in 1977. The Satellite Materials Hardening Programs (SMATH) explored and developed techniques for hardening planar solar cell array power systems to the combined nuclear and laser radiation threat environments. A portion of program dollars was devoted to developing a preliminary design for a hardened solar concentrator. The results of the Survivable Concentrating Photovoltaic Array (SCOPA) program, and the design, fabrication and flight qualification of a hardened concentrator panel are discussed.
NASA Technical Reports Server (NTRS)
Allen Phillip A.; Wilson, Christopher D.
2003-01-01
The development of a pressure-dependent constitutive model with combined multilinear kinematic and isotropic hardening is presented. The constitutive model is developed using the ABAQUS user material subroutine (UMAT). First the pressure-dependent plasticity model is derived. Following this, the combined bilinear and combined multilinear hardening equations are developed for von Mises plasticity theory. The hardening rule equations are then modified to include pressure dependency. The method for implementing the new constitutive model into ABAQUS is given.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dhote, Sharvari, E-mail: sharvari.dhote@mail.utoronto.ca; Zu, Jean; Zhu, Yang
2015-04-20
In this paper, a nonlinear wideband multi-mode piezoelectric vibration-based energy harvester (PVEH) is proposed based on a compliant orthoplanar spring (COPS), which has an advantage of providing multiple vibration modes at relatively low frequencies. The PVEH is made of a tri-leg COPS flexible structure, where three fixed-guided beams are capable of generating strong nonlinear oscillations under certain base excitation. A prototype harvester was fabricated and investigated through both finite-element analysis and experiments. The frequency response shows multiple resonance which corresponds to a hardening type of nonlinear resonance. By adding masses at different locations on the COPS structure, the first threemore » vibration modes are brought close to each other, where the three hardening nonlinear resonances provide a wide bandwidth for the PVEH. The proposed PVEH has enhanced performance of the energy harvester in terms of a wide frequency bandwidth and a high-voltage output under base excitations.« less
NASA Astrophysics Data System (ADS)
Flores, P.; Duchêne, L.; Lelotte, T.; Bouffioux, C.; El Houdaigui, F.; Van Bael, A.; He, S.; Duflou, J.; Habraken, A. M.
2005-08-01
The bi-axial experimental equipment developed by Flores enables to perform Baushinger shear tests and successive or simultaneous simple shear tests and plane-strain tests. Such experiments and classical tensile tests investigate the material behavior in order to identify the yield locus and the hardening models. With tests performed on two steel grades, the methods applied to identify classical yield surfaces such as Hill or Hosford ones as well as isotropic Swift type hardening or kinematic Armstrong-Frederick hardening models are explained. Comparison with the Taylor-Bishop-Hill yield locus is also provided. The effect of both yield locus and hardening model choice will be presented for two applications: Single Point Incremental Forming (SPIF) and a cup deep drawing.
System-Level Radiation Hardening
NASA Technical Reports Server (NTRS)
Ladbury, Ray
2014-01-01
Although system-level radiation hardening can enable the use of high-performance components and enhance the capabilities of a spacecraft, hardening techniques can be costly and can compromise the very performance designers sought from the high-performance components. Moreover, such techniques often result in a complicated design, especially if several complex commercial microcircuits are used, each posing its own hardening challenges. The latter risk is particularly acute for Commercial-Off-The-Shelf components since high-performance parts (e.g. double-data-rate synchronous dynamic random access memories - DDR SDRAMs) may require other high-performance commercial parts (e.g. processors) to support their operation. For these reasons, it is essential that system-level radiation hardening be a coordinated effort, from setting requirements through testing up to and including validation.
NASA Astrophysics Data System (ADS)
Mohanty, Subhasish; Soppet, William K.; Majumdar, Saurindranath; Natesan, Krishnamurti
2016-05-01
Argonne National Laboratory (ANL), under the sponsorship of Department of Energy's Light Water Reactor Sustainability (LWRS) program, is trying to develop a mechanistic approach for more accurate life estimation of LWR components. In this context, ANL has conducted many fatigue experiments under different test and environment conditions on type 316 stainless steel (316 SS) material which is widely used in the US reactors. Contrary to the conventional S ∼ N curve based empirical fatigue life estimation approach, the aim of the present DOE sponsored work is to develop an understanding of the material ageing issues more mechanistically (e.g. time dependent hardening and softening) under different test and environmental conditions. Better mechanistic understanding will help develop computer-based advanced modeling tools to better extrapolate stress-strain evolution of reactor components under multi-axial stress states and hence help predict their fatigue life more accurately. Mechanics-based modeling of fatigue such as by using finite element (FE) tools requires the time/cycle dependent material hardening properties. Presently such time-dependent material hardening properties are hardly available in fatigue modeling literature even under in-air conditions. Getting those material properties under PWR environment, are even harder. Through this work we made preliminary attempt to generate time/cycle dependent stress-strain data both under in-air and PWR water conditions for further study such as for possible development of material models and constitutive relations for FE model implementation. Although, there are open-ended possibility to further improve the discussed test methods and related material estimation techniques we anticipate that the data presented in this paper will help the metal fatigue research community particularly, the researchers who are dealing with mechanistic modeling of metal fatigue such as using FE tools. In this paper the fatigue experiments under different test and environment conditions and related stress-strain results for 316 SS are discussed.
ICME for Crashworthiness of TWIP Steels: From Ab Initio to the Crash Performance
NASA Astrophysics Data System (ADS)
Güvenç, O.; Roters, F.; Hickel, T.; Bambach, M.
2015-01-01
During the last decade, integrated computational materials engineering (ICME) emerged as a field which aims to promote synergetic usage of formerly isolated simulation models, data and knowledge in materials science and engineering, in order to solve complex engineering problems. In our work, we applied the ICME approach to a crash box, a common automobile component crucial to passenger safety. A newly developed high manganese steel was selected as the material of the component and its crashworthiness was assessed by simulated and real drop tower tests. The crashworthiness of twinning-induced plasticity (TWIP) steel is intrinsically related to the strain hardening behavior caused by the combination of dislocation glide and deformation twinning. The relative contributions of those to the overall hardening behavior depend on the stacking fault energy (SFE) of the selected material. Both the deformation twinning mechanism and the stacking fault energy are individually well-researched topics, but especially for high-manganese steels, the determination of the stacking-fault energy and the occurrence of deformation twinning as a function of the SFE are crucial to understand the strain hardening behavior. We applied ab initio methods to calculate the stacking fault energy of the selected steel composition as an input to a recently developed strain hardening model which models deformation twinning based on the SFE-dependent dislocation mechanisms. This physically based material model is then applied to simulate a drop tower test in order to calculate the energy absorption capacity of the designed component. The results are in good agreement with experiments. The model chain links the crash performance to the SFE and hence to the chemical composition, which paves the way for computational materials design for crashworthiness.
NASA Astrophysics Data System (ADS)
Kuleshova, E. A.; Gurovich, B. A.; Bukina, Z. V.; Frolov, A. S.; Maltsev, D. A.; Krikun, E. V.; Zhurko, D. A.; Zhuchkov, G. M.
2017-07-01
This work summarizes and analyzes our recent research results on the effect of irradiation temperature within the range of (50-400)°C on microstructure and properties of 15Kh2NMFAA class 1 steel (VVER-1000 reactor pressure vessel (RPV) base metal). The paper considers the influence of accelerated irradiation with different temperature up to different fluences on the carbide and irradiation-induced phases, radiation defects, yield strength changes and critical brittleness temperature shift (ΔTK) as well as on changes of the fraction of brittle intergranular fracture and segregation processes in the steel. Low temperature irradiation resulted solely in formation of radiation defects - dislocation loops of high number density, the latter increased with increase in irradiation temperature while their size decreased. In this regard high embrittlement rate observed at low temperature irradiation is only due to the hardening mechanism of radiation embrittlement. Accelerated irradiation at VVER-1000 RPV operating temperature (∼300 °C) caused formation of radiation-induced precipitates and dislocation loops, as well as some increase in phosphorus grain boundary segregation. The observed ΔTK shift being within the regulatory curve for VVER-1000 RPV base metal is due to both hardening and non-hardening mechanisms of radiation embrittlement. Irradiation at elevated temperature caused more intense phosphorus grain boundary segregation, but no formation of radiation-induced precipitates or dislocation loops in contrast to irradiation at 300 °C. Carbide transformations observed only after irradiation at 400 °C caused increase in yield strength and, along with a contribution of the non-hardening mechanism, resulted in the lowest ΔTK shift in the studied range of irradiation temperature and fluence.
... Search form Sorry, we didn't find an account with that username and password. Please try again. Close Sign In to myNAMI signin form Forgot Sign In Create an Account Logging in... Learn More Find Support Get Involved ...
Lung Transplantation in Patients with Pulmonary Hypertension
... Pulmonary Hypertension Consensus Statements Issued by the Scientific Leadership Council Download & Print PDF DISCLAIMER: This information is ... on our new PHPN/PHCR or Support Group Leadership Institute portal? Reset your password here . Login Username ...
Cerebral and Sinus Vein Thrombosis
... Disclosures Footnotes References Figures & Tables Info & Metrics eLetters Article Tools Print Citation Tools Cerebral and Sinus Vein ... Remember my user name & password. Submit Share this Article Email Thank you for your interest in spreading ...
Screening for Peripheral Artery Disease
... Disclosures Acknowledgments Footnotes Figures & Tables Info & Metrics eLetters Article Tools Print Citation Tools Screening for Peripheral Artery ... Remember my user name & password. Submit Share this Article Email Thank you for your interest in spreading ...
Service Request Password Help New Users Back to HEP Computing Mail-Migration Procedure on Linux Mail -Migration Procedure on Windows How to Migrate a Folder to GMail using Pine U.S. Department of Energy The
Find a Physical Medicine & Rehabilitation Physician
... password Create a new account American Academy of Physical Medicine and Rehabilitation 9700 W. Bryn Mawr Ave ... Physiatry About Physiatry History of the Specialty About Physical Medicine and Rehabilitation Find a PM&R Physician ...
American Association on Intellectual and Developmental Disabilities
... Password Education Webinars Annual Conference 2018 Call for Papers SECP Opportunities Exhibits and Sponsorship Hotel & Travel Registration ... Material Transition Planning SIS-A SIS-C White Papers International SIS Use Order SIS-A Contact Us ...
Society of NeuroInterventional Surgery
... Find A Doctor / In the News / SNIS Foundation / Login Membership Login Join Today SNIS Connect Getting Started on SNIS ... SNIS Members Area Remember Me > Forget your password? > Login > Not a Member? SNIS Foundation > SNIS Foundation Publications ...
Survey of methods for secure connection to the internet
NASA Astrophysics Data System (ADS)
Matsui, Shouichi
1994-04-01
This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.
Strain hardening behavior during manufacturing of tube shapes by hydroforming
NASA Astrophysics Data System (ADS)
Park, Hyun Kyu; Yi, Hyae Kyung; Van Tyne, Chester J.; Moon, Young Hoon
2009-12-01
Safe and robust process design relies on knowledge of the evolution of the mechanical properties in a tube during hydroforming. The manufacturing of tubular shapes generally consists of three main stages: bending, preforming, and expansion. The latter is usually called hydroforming. As a result of these three steps, the final product's strain hardening history is nonlinear. In the present study, the strain hardening behavior during hydroforming was experimentally investigated. The variation of local flow stress and/or local hardness was used as an index of the strain hardening during the various steps and the local flow stress and/or local hardness were used with respective correlations to determine the effective strain. The strain hardening behavior during hydroforming after preforming has been successfully analyzed by using the relationships between hardness, flow stress, and effective strain for variable pre-strains prior to hydroforming. The comparison of predicted hardness with measured hardness confirms that the methodology used in this study is feasible, and that the strain hardening behavior can be quantitatively estimated with good accuracy.
Biometric template transformation: a security analysis
NASA Astrophysics Data System (ADS)
Nagar, Abhishek; Nandakumar, Karthik; Jain, Anil K.
2010-01-01
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncompromised identifiers. One methodology for biometric template protection is the template transformation approach, where the template, consisting of the features extracted from the biometric trait, is transformed using parameters derived from a user specific password or key. Only the transformed template is stored and matching is performed directly in the transformed domain. In this paper, we formally investigate the security strength of template transformation techniques and define six metrics that facilitate a holistic security evaluation. Furthermore, we analyze the security of two wellknown template transformation techniques, namely, Biohashing and cancelable fingerprint templates based on the proposed metrics. Our analysis indicates that both these schemes are vulnerable to intrusion and linkage attacks because it is relatively easy to obtain either a close approximation of the original template (Biohashing) or a pre-image of the transformed template (cancelable fingerprints). We argue that the security strength of template transformation techniques must consider also consider the computational complexity of obtaining a complete pre-image of the transformed template in addition to the complexity of recovering the original biometric template.
A biometric authentication model using hand gesture images
2013-01-01
A novel hand biometric authentication method based on measurements of the user’s stationary hand gesture of hand sign language is proposed. The measurement of hand gestures could be sequentially acquired by a low-cost video camera. There could possibly be another level of contextual information, associated with these hand signs to be used in biometric authentication. As an analogue, instead of typing a password ‘iloveu’ in text which is relatively vulnerable over a communication network, a signer can encode a biometric password using a sequence of hand signs, ‘i’ , ‘l’ , ‘o’ , ‘v’ , ‘e’ , and ‘u’. Subsequently the features from the hand gesture images are extracted which are integrally fuzzy in nature, to be recognized by a classification model for telling if this signer is who he claimed himself to be, by examining over his hand shape and the postures in doing those signs. It is believed that everybody has certain slight but unique behavioral characteristics in sign language, so are the different hand shape compositions. Simple and efficient image processing algorithms are used in hand sign recognition, including intensity profiling, color histogram and dimensionality analysis, coupled with several popular machine learning algorithms. Computer simulation is conducted for investigating the efficacy of this novel biometric authentication model which shows up to 93.75% recognition accuracy. PMID:24172288
Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas
2016-08-01
The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.
The Strain-Hardening Behavior of TZAV-30 Alloy After Various Heat Treatments
NASA Astrophysics Data System (ADS)
Liang, S. X.; Yin, L. X.; Zheng, L. Y.; Ma, M. Z.; Liu, R. P.
2016-02-01
The Ti-Zr-Al-V series titanium alloys with excellent mechanical properties and low density exhibit tremendous application potential as structural materials in aviation, automotive, and navigation industries. The strain-hardening behavior of Ti-30Zr-5Al-3V (wt.%, TZAV-30) alloy with various heat treatments is investigated in this study. Experimental results show that strain-hardening behavior of the examined alloy depends on the heat treatment process. The average strain-hardening exponent, n, is approximately 0.061 for WA specimen (825 °C/0.5 h/water quenching + 600 °C/4 h/air cooling), 0.068 for FC (850 °C/0.5 h/furnace cooling), 0.121 for AC (850 °C/0.5 h/air cooling), and 0.412 for WQ (850 °C/0.5 h/water quenching). Analysis of strain-hardening rate versus true strain curves indicates that higher n of AC specimen results from the lower degradation rate of strain-hardening rate with strain, and the ultrahigh n of WQ specimen is attributed to the evident increase in strain-hardening rate at the true strain from 0.04 to 0.06. Phase constitution and microstructural analyses reveal that the n of the examined alloy with α + β phases increases with the increase in the relative content of the retained β phase but is independent of average thickness of α plates. The increase in strain-hardening rate in WQ specimen depends on metastable α″ martensite and martensitic transition induced by tensile stress.
A Comprehensive Expedient Methods Field Manual.
1984-09-01
structures. " Revetments may be constructed of sandbags, sod blocks , and other expedients [17:933." Bunkers are emplacements with overhead protective...Lapland Fence............................. 75 19. Hardening: Dimensional Timber (Soil Bin) Revetment ............................................. 76...20. Hardening: Log Bulkhead (Soil Bin) Revetment ... 77 21. Hardening: Landing Mat Bulkhead (Soil Bin) Revetment
Comparison of air void content measurements in fresh versus hardened concretes.
DOT National Transportation Integrated Search
1990-01-01
This study compares the air content of freshly mixed and hardened concretes. At the fresh stage, pressure meters (Types A and B) and a volumetric meter were used to determine the air content. At the hardened stage, the air content was calculated usin...
7 CFR 58.641 - Hardening and storage.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 7 Agriculture 3 2011-01-01 2011-01-01 false Hardening and storage. 58.641 Section 58.641 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended...
7 CFR 58.641 - Hardening and storage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 3 2010-01-01 2010-01-01 false Hardening and storage. 58.641 Section 58.641 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended...
7 CFR 58.641 - Hardening and storage.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 7 Agriculture 3 2013-01-01 2013-01-01 false Hardening and storage. 58.641 Section 58.641 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Standards... Procedures § 58.641 Hardening and storage. Immediately after the semifrozen product is placed in its intended...
NASA Astrophysics Data System (ADS)
Grilo, Tiago J.; Vladimirov, Ivaylo N.; Valente, Robertt A. F.; Reese, Stefanie
2016-06-01
In the present paper, a finite strain model for complex combined isotropic-kinematic hardening is presented. It accounts for finite elastic and finite plastic strains and is suitable for any anisotropic yield criterion. In order to model complex cyclic hardening phenomena, the kinematic hardening is described by several back stress components. To that end, a new procedure is proposed in which several multiplicative decompositions of the plastic part of the deformation gradient are considered. The formulation incorporates a completely general format of the yield function, which means that any yield function can by employed by following a procedure that ensures the principle of material frame indifference. The constitutive equations are derived in a thermodynamically consistent way and numerically integrated by means of a backward-Euler algorithm based on the exponential map. The performance of the constitutive model is assessed via numerical simulations of industry-relevant sheet metal forming processes (U-channel forming and draw/re-draw of a panel benchmarks), the results of which are compared to experimental data. The comparison between numerical and experimental results shows that the use of multiple back stress components is very advantageous in the description of springback. This holds in particular if one carries out a comparison with the results of using only one component. Moreover, the numerically obtained results are in excellent agreement with the experimental data.
A study of the microstructural and mechanical properties of novel spring steels
NASA Astrophysics Data System (ADS)
Harris-Pointer, Cheryl Faye
This work is concerned with track spring components manufactured by Pandrol from a SiMn alloy in the quenched and tempered condition. For many years low to medium carbon based spring steel has been manufactured via an oil quench temper route producing components with suitable mechanical and microstructural properties. The current problem facing the spring manufacturer with the traditional heat treatment route involve a number of technical issues including a sensitivity to temper embrittlement and susceptibility to stress corrosion cracking. In addition, economic factors and component handling problems led Pandrol to seek solutions via the manufacturing process and materials selection. A programme of research was therefore proposed to identify a possible replacement alloy system and production route which could exclude the costly tempering operation and instil a degree of production control. The initial program of work involved the examination of several alloy systems based loosely around three separate microstructures, i.e. a fully pearlitic, bainitic and martensitic microstructure. In turn, each alloy was examined and assessed with respect to their suitability for the industrial application given their mechanical properties.From the initial research, a selected number of promising alloy systems were examined further, namely a chromium molybdenum alloy, salt bath quenched to produce a bainitic microstructure, a water quenched low carbon chromium and low carbon boron martensitic type alloy. The low carbon boron alloy was considered the most promising, with similar mechanical properties in both the plain bar and clip form compared to the existing Pandrol alloy. However, concern was raised over the amount of plastic deformation (permanent set) suffered by a clip component whilst in service. In response to this, the use of cold work was examined to further strengthen the microstructure with notable success.On identifying several possible alternative alloy systems to replace the existing oil quenched and tempered variant, the second stage of this research work concentrated on understanding the degree and type of microstructural strengthening involved on each particular alloy system. The effect of plastic deformation in each alloy type was also thoroughly investigated via transmission electron microscopy / true stress strain analysis and an attempt was made to relate microstructural changes to obtained mechanical properties. In addition the work hardening characteristics of the tempered microstructure were investigated, and compared to the straight through hardened variants. Qualitative Transmission Electron Microscopy studies confirmed that dislocation density / mobility played a crucial role in determining the work hardening rate. This project has studied the phenomena of work hardening in body centred cubic materials in the through hardened and untempered condition. A series of novel alloys have been developed with strengths equal to or above an oil quenched and tempered counterpart. However, these new alloys do not require a temper treatment thereby removing the risk of temper embrittlement. A clearer understanding of the work hardening characteristics has been developed through an assessment of the work hardening coefficient of these material variants.
NASA Astrophysics Data System (ADS)
Schade, Christopher
To improve the mechanical properties of PM stainless steels in comparison with their wrought counterparts, a PM stainless steel alloy was developed which combines a dual-phase microstructure with precipitation-hardening. The use of a mixed microstructure of martensite and ferrite results in an alloy with a combination of the optimum properties of each phase, namely strength and ductility. The use of precipitation hardening via the addition of copper results in additional strength and hardness. A range of compositions was studied in combination with various sintering conditions to determine the optimal thermal processing to achieve the desired microstructure. The microstructure could be varied from predominately ferrite to one containing a high percentage of martensite by additions of copper and a variation of the sintering temperature before rapid cooling. Mechanical properties (transverse rupture strength (TRS), yield strength, tensile strength, ductility and impact toughness) were measured as a function of the v/o ferrite in the microstructure. A dual phase alloy with the optimal combination of properties served as the base for introducing precipitation hardening. Copper was added to the base alloy at various levels and its effect on the microstructure and mechanical properties was quantified. Processing at various sintering temperatures led to a range of microstructures; dilatometry was used utilized to monitor and understand the transformations and the formation of the two phases. The aging process was studied as a function of temperature and time by measuring TRS, yield strength, tensile strength, ductility, impact toughness and apparent hardness. It was determined that optimum aging was achieved at 538°C for 1h. Aging at slightly lower temperatures led to the formation of carbides, which contributed to reduced hardness and tensile strength. As expected, at the peak aging temperature, an increase in yield strength and ultimate tensile strength as well as apparent hardness was found. Aging also lead to an unexpected and concurrent increase in ductility and impact toughness. The alloys also showed an increase in strain hardening on aging. The increase in ductility varied with the v/o martensite in the microstructure and was shown to occur after short time intervals at the optimum aging temperature. Compressive strength measurements revealed that the increase in ductility was due to the relaxation of residuals stresses that occur when the high temperature austenite transforms to martensite in the dual phase microstructure. The specific volume of martensite is much larger than that of austenite so that when the transformation takes place, a compressive stress is induced in the ferrite. In the sintered state, the residual stress leads to a higher work hardening rate in tension. When the alloy is aged, the work hardening rate is reduced and the ductility is increased compared with the sintered state, even though aging increases the strength and apparent hardness.
Developments in Radiation-Hardened Electronics Applicable to the Vision for Space Exploration
NASA Technical Reports Server (NTRS)
Keys, Andrew S.; Frazier, Donald O.; Patrick , Marshall C.; Watson, Michael D.; Johnson, Michael A.; Cressler, John D.; Kolawa, Elizabeth A.
2007-01-01
The Radiation Hardened Electronics for Space Exploration (RHESE) project develops the advanced technologies required to produce radiation hardened electronics, processors, and devices in support of the anticipated requirements of NASA's Constellation program. Methods of protecting and hardening electronics against the encountered space environment are discussed. Critical stages of a spaceflight mission that are vulnerable to radiation-induced interruptions or failures are identified. Solutions to mitigating the risk of radiation events are proposed through the infusion of RHESE technology products and deliverables into the Constellation program's spacecraft designs.
Evolution of radiation defect and radiation hardening in heat treated SA508 Gr3 steel
NASA Astrophysics Data System (ADS)
Jin, Hyung-Ha; Kwon, Junhyun; Shin, Chansun
2014-01-01
The formation of radiation defects and corresponding radiation hardening in heat-treated SA508 Gr3 steel after Fe ion irradiation were investigated by means of transmission electron microscopy and a nano-indentation technique. As the residual dislocation density is increased in the matrix, the formation of radiation defects is considerably weakened. Comparison between the characteristics of the radiation defect and an evaluation of radiation hardening indicates that a large dislocation loop contributes little to the radiation hardening in the heat-treated SA508 Gr3 steel.
Implementation of Ferroelectric Memories for Space Applications
NASA Technical Reports Server (NTRS)
Philpy, Stephen C.; Derbenwick, Gary F.; Kamp, David A.; Isaacson, Alan F.
2000-01-01
Ferroelectric random access semiconductor memories (FeRAMs) are an ideal nonvolatile solution for space applications. These memories have low power performance, high endurance and fast write times. By combining commercial ferroelectric memory technology with radiation hardened CMOS technology, nonvolatile semiconductor memories for space applications can be attained. Of the few radiation hardened semiconductor manufacturers, none have embraced the development of radiation hardened FeRAMs, due a limited commercial space market and funding limitations. Government funding may be necessary to assure the development of radiation hardened ferroelectric memories for space applications.
Effect of Plate Hardening Behavior on the Deformation of Stainless Steel Metal Bellows
NASA Astrophysics Data System (ADS)
Hao, Zengliang; Luo, Shuyi; Zhao, He; Zhang, Chunxiang; Luo, Junting
2017-11-01
Tensile tests of original plate samples from three types of stainless steel metal bellows were performed at room temperature. The constitutive equations for the three hardening curves were obtained and fitted. The analysis results of the microstructure and fracture morphology of the tensile specimens show that the grain size of the plate with a high logarithmic-exponential hardening rate is uneven and the dimple of the shear fracture is elongated into an ellipse. By contrast, the grain size of the plate with a relatively low linear hardening rate is even and the dimple of the fracture is uniformly equiaxial. Finite element simulations of the hydraulic bulging and repeated limit bending deformation of the metal bellows of the three types of materials were also conducted. The repeated limit bending deformation process was tested experimentally. Although the effect of the hardening exponent on the residual stress of the metal bellows after hydraulic bulging is minimal, this exponent considerably influences the repeated limit bending deformation of the metal bellows after subsequent use. The trough hardening phenomenon is serious in the repeated limit bending process. Moreover, when the hardening exponent of the original plate is high, the resistance to bending fracture at the trough area is poor.
National Association of Pediatric Nurse Practitioners
... Your Source for Pediatric CE Check out PedsCE today! P resident's Message PedsCE SM NAPNAP Partners for ... Log in Forgot Username/Password | Join JOIN NAPNAP TODAY! Become a Member Corporate Circle Members See All ...
Sleeping Pills for Insomnia: Which Ones Work Best?
... Student Debt Special Report All Money More on Money Best & Worst Banks According to Consumer Reports Members ... 333-0663 Join Consumer Reports Basic Membership is FREE. Show Password By clicking "Become a Member" you ...
Advanced Password Tips and Tricks
... email Looking for business guidance on privacy and security? Get Email Updates Blog Feed Facebook YouTube Twitter The Federal Trade Commission (FTC) is the nation’s consumer protection agency. The FTC works to prevent fraudulent, deceptive ...
Microstructural and strain rate effects on plastic deformation in aluminum 2219-T87
NASA Astrophysics Data System (ADS)
Rincon, Carlos D.
A fundamental investigation has been conducted on the effects of microstructure and strain rate on the plastic deformation of theta-prime-strengthened 2219 aluminum. The motivation for this work is based upon a previous study which showed inhomogeneous and locally extreme work hardening in the HAZ regions in VPPA 2219-T87 butt welds. This strongly suggests that the HAZ microstructure plays a major role in the deformation and fracture process in precipitation hardened aluminum alloy 2219. Tensile specimens of the weld joint exhibited more rapid work hardening in the heat-affected-zone (HAZ) at higher strain levels. Microhardness contour maps for these welds illustrated that late stage deformation was concentrated in two crossing bands at about 45sp° to the tensile axis. The width of the deformation bands and the ultimate tensile strength seemed to be dictated by the amount of work hardening in the HAZ. In this study, three different heat treatments were used to produce samples with different particle sizes and particle spacings, but all hardened by copper aluminide precipitates of the thetasp' structure. The heat treatments were categorized as being (A) as-received T87 condition, (B) T87 condition aged at approximately 204sp°C for 3 hours and (C) T87 over-aged at 204sp°C for 7 days. Uniaxial tensile tests consisted of two sets of experiments: (1) three heat treatments (A, B, and C) at two strain rates (0.02 minsp{-1} and 0.2 minsp{-1}) and (2) three heat treatments that were interrupted at select stress-strain levels (0.8% and 2% total strain) during the tensile tests at strain rate equal to 0.02 minsp{-1} at room temperature. Furthermore, a detailed transmission electron microscopy (TEM) study demonstrates the microstructural development during tensile deformation. The Voce equation of strain-hardening provides a slightly better fit to the tensile curves than the Ludwik-Hollomon equation. At higher strains, localized areas showed strain fields around thetasp' platelets had diminished. Lastly, in every treatment, both the yield and tensile strength were slightly higher for the higher strain rate, but only by 0.5 to 2.0 ksi.
Benefits of aggregates surface modification in concrete production
NASA Astrophysics Data System (ADS)
Junak, J.; Sicakova, A.
2017-10-01
In our study, recycled concrete aggregates (RCA), which surfaces had been modified by geopolymer material based on coal fly ash, were used to produce the concrete samples. In these samples, fraction 4/8 mm was replaced by recycled concrete aggregate with a range of 100%. To modify the surface of RCA was “Solo” and “Triple stage” modification used. On these samples real density, total water absorption and compressive strength were examined after 28, 90, 180 and 365 days of hardening. The highest compressive strength 56.8 MPa, after 365 days hardening, reached sample which had improved RCA surface by “Triple stage mixing”.
PDBsum: Structural summaries of PDB entries.
Laskowski, Roman A; Jabłońska, Jagoda; Pravda, Lukáš; Vařeková, Radka Svobodová; Thornton, Janet M
2018-01-01
PDBsum is a web server providing structural information on the entries in the Protein Data Bank (PDB). The analyses are primarily image-based and include protein secondary structure, protein-ligand and protein-DNA interactions, PROCHECK analyses of structural quality, and many others. The 3D structures can be viewed interactively in RasMol, PyMOL, and a JavaScript viewer called 3Dmol.js. Users can upload their own PDB files and obtain a set of password-protected PDBsum analyses for each. The server is freely accessible to all at: http://www.ebi.ac.uk/pdbsum. © 2017 The Protein Society.
2004-02-01
Protocol for Unix enumerating by stealing /etc/ passwd and (or) /etc/hosts.equiv and (or) ~/.rhosts; ISU – Identifying SID with user2sid ; IAS...null sessions””, FUE – “Finger Users Enumeration”, UTFTP – “Use of Trivial File Transfer Protocol for Unix enumerating by stealing /etc/ passwd and...Ping of Death”, UF – “UDP flooding”, IFS – “Storm of inquiries to FTP-server”, APF – “Access to Password File . passwd ”, WDPF – “Writing of Data with
Microstructural Study of 17-4PH Stainless Steel after Plasma-Transferred Arc Welding.
Deng, Dewei; Chen, Rui; Sun, Qi; Li, Xiaona
2015-01-29
The improvement of the surface qualities and surface hardening of precipitation hardened martensitic stainless steel 17-4PH was achieved by the plasma-transferred arc welding (PTAW) process deposited with Co-based alloy. The microstructure of the heat affected zone (HAZ) and base metal were characterized by optical microscope (OM), scanning electron microscope (SEM) and transmission electron microscope (TEM). The results show that there are obvious microstructural differences between the base metal and HAZ. For example, base material is transformed from lath martensite to austenite due to the heateffect of the welding process. On the other hand, the precipitate in the matrix (bar-like shape Cr₇C₃ phase with a width of about one hundred nanometres and a length of hundreds of nanometres) grows to a rectangular appearance with a width of about two hundred nanometres and a length of about one micron. Stacking fault could also be observed in the Cr₇C₃ after PTAW. The above means that welding can obviously improve the surface qualities.
Process design of press hardening with gradient material property influence
NASA Astrophysics Data System (ADS)
Neugebauer, R.; Schieck, F.; Rautenstrauch, A.
2011-05-01
Press hardening is currently used in the production of automotive structures that require very high strength and controlled deformation during crash tests. Press hardening can achieve significant reductions of sheet thickness at constant strength and is therefore a promising technology for the production of lightweight and energy-efficient automobiles. The manganese-boron steel 22MnB5 have been implemented in sheet press hardening owing to their excellent hot formability, high hardenability, and good temperability even at low cooling rates. However, press-hardened components have shown poor ductility and cracking at relatively small strains. A possible solution to this problem is a selective increase of steel sheet ductility by press hardening process design in areas where the component is required to deform plastically during crash tests. To this end, process designers require information about microstructure and mechanical properties as a function of the wide spectrum of cooling rates and sequences and austenitizing treatment conditions that can be encountered in production environments. In the present work, a Continuous Cooling Transformation (CCT) diagram with corresponding material properties of sheet steel 22MnB5 was determined for a wide spectrum of cooling rates. Heating and cooling programs were conducted in a quenching dilatometer. Motivated by the importance of residual elasticity in crash test performance, this property was measured using a micro-bending test and the results were integrated into the CCT diagrams to complement the hardness testing results. This information is essential for the process design of press hardening of sheet components with gradient material properties.