Sample records for control plane security

  1. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  2. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks

    PubMed Central

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-01-01

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller. PMID:28430155

  3. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    PubMed

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  4. Applying face identification to detecting hijacking of airplane

    NASA Astrophysics Data System (ADS)

    Luo, Xuanwen; Cheng, Qiang

    2004-09-01

    That terrorists hijacked the airplanes and crashed the World Trade Center is disaster to civilization. To avoid the happening of hijack is critical to homeland security. To report the hijacking in time, limit the terrorist to operate the plane if happened and land the plane to the nearest airport could be an efficient way to avoid the misery. Image processing technique in human face recognition or identification could be used for this task. Before the plane take off, the face images of pilots are input into a face identification system installed in the airplane. The camera in front of pilot seat keeps taking the pilot face image during the flight and comparing it with pre-input pilot face images. If a different face is detected, a warning signal is sent to ground automatically. At the same time, the automatic cruise system is started or the plane is controlled by the ground. The terrorists will have no control over the plane. The plane will be landed to a nearest or appropriate airport under the control of the ground or cruise system. This technique could also be used in automobile industry as an image key to avoid car stealth.

  5. Random phase encoding for optical security

    NASA Astrophysics Data System (ADS)

    Wang, RuiKang K.; Watson, Ian A.; Chatwin, Christopher R.

    1996-09-01

    A new optical encoding method for security applications is proposed. The encoded image (encrypted into the security products) is merely a random phase image statistically and randomly generated by a random number generator using a computer, which contains no information from the reference pattern (stored for verification) or the frequency plane filter (a phase-only function for decoding). The phase function in the frequency plane is obtained using a modified phase retrieval algorithm. The proposed method uses two phase-only functions (images) at both the input and frequency planes of the optical processor leading to maximum optical efficiency. Computer simulation shows that the proposed method is robust for optical security applications.

  6. The New European Security Calculus: Implications for the U.S. Army

    DTIC Science & Technology

    1991-01-03

    Iberian and Levantine allies) is anxious that "peace" in Central Europe could work to decouple its security concerns from its northern neighbors. 10 4...altered political climate in Europe, the U.S. Army must be proactive in changing its force and command and control structures to meet both its new...relocated to the Kola Peninsula . "The main task of these planes is to attack targets from the rear, and their range makes it possible for them to reach

  7. Securing the Internet Control Plane

    ERIC Educational Resources Information Center

    Benton, Kevin

    2017-01-01

    The Internet carries traffic between billions of devices every day and modern societies depend on the resiliency of the routing technology behind it to work around the frequent link outages caused by natural disasters, equipment failures, destruction of cables, and even wars. However, the routing technology behind all of this, the Border Gateway…

  8. 46 CFR 169.755 - Draft marks and draft indicating systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Section 169.755 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.755 Draft marks and... projections of the marks onto a vertical plane are of uniform height equal to the vertical spacing between...

  9. 46 CFR 169.755 - Draft marks and draft indicating systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Section 169.755 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.755 Draft marks and... projections of the marks onto a vertical plane are of uniform height equal to the vertical spacing between...

  10. 46 CFR 169.755 - Draft marks and draft indicating systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Section 169.755 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.755 Draft marks and... projections of the marks onto a vertical plane are of uniform height equal to the vertical spacing between...

  11. 46 CFR 169.755 - Draft marks and draft indicating systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Section 169.755 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.755 Draft marks and... projections of the marks onto a vertical plane are of uniform height equal to the vertical spacing between...

  12. 46 CFR 169.755 - Draft marks and draft indicating systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Section 169.755 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS Vessel Control, Miscellaneous Systems, and Equipment Markings § 169.755 Draft marks and... projections of the marks onto a vertical plane are of uniform height equal to the vertical spacing between...

  13. UAVs Being Used for Environmental Surveying

    ScienceCinema

    Chung, Sandra

    2017-12-09

    UAVs, are much more sophisticated than your typical remote-controlled plane. INL robotics and remote sensing experts have added state-of-the-art imaging and wireless technology to the UAVs to create intelligent remote surveillance craft that can rapidly survey a wide area for damage and track down security threats.

  14. 75 FR 6096 - Security Zone; Escorted Vessels, Charleston, SC, Captain of the Port Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... which a vessel proceeds when it is fully off plane, completely settled in the water and not creating... a plane; (2) In the process of coming up onto or coming off a plane; or (3) Creating an excessive...

  15. 76 FR 44880 - Security Zone; Escorted Vessels in Captain of the Port Ohio Valley Zone

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-27

    .... Minimum safe speed means the speed at which a vessel proceeds when it is fully off plane, completely... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...

  16. Preliminary Results from a Model-Driven Architecture Methodology for Development of an Event-Driven Space Communications Service Concept

    NASA Technical Reports Server (NTRS)

    Roberts, Christopher J.; Morgenstern, Robert M.; Israel, David J.; Borky, John M.; Bradley, Thomas H.

    2017-01-01

    NASA's next generation space communications network will involve dynamic and autonomous services analogous to services provided by current terrestrial wireless networks. This architecture concept, known as the Space Mobile Network (SMN), is enabled by several technologies now in development. A pillar of the SMN architecture is the establishment and utilization of a continuous bidirectional control plane space link channel and a new User Initiated Service (UIS) protocol to enable more dynamic and autonomous mission operations concepts, reduced user space communications planning burden, and more efficient and effective provider network resource utilization. This paper provides preliminary results from the application of model driven architecture methodology to develop UIS. Such an approach is necessary to ensure systematic investigation of several open questions concerning the efficiency, robustness, interoperability, scalability and security of the control plane space link and UIS protocol.

  17. HYMOSS signal processing for pushbroom spectral imaging

    NASA Technical Reports Server (NTRS)

    Ludwig, David E.

    1991-01-01

    The objective of the Pushbroom Spectral Imaging Program was to develop on-focal plane electronics which compensate for detector array non-uniformities. The approach taken was to implement a simple two point calibration algorithm on focal plane which allows for offset and linear gain correction. The key on focal plane features which made this technique feasible was the use of a high quality transimpedance amplifier (TIA) and an analog-to-digital converter for each detector channel. Gain compensation is accomplished by varying the feedback capacitance of the integrate and dump TIA. Offset correction is performed by storing offsets in a special on focal plane offset register and digitally subtracting the offsets from the readout data during the multiplexing operation. A custom integrated circuit was designed, fabricated, and tested on this program which proved that nonuniformity compensated, analog-to-digital converting circuits may be used to read out infrared detectors. Irvine Sensors Corporation (ISC) successfully demonstrated the following innovative on-focal-plane functions that allow for correction of detector non-uniformities. Most of the circuit functions demonstrated on this program are finding their way onto future IC's because of their impact on reduced downstream processing, increased focal plane performance, simplified focal plane control, reduced number of dewar connections, as well as the noise immunity of a digital interface dewar. The potential commercial applications for this integrated circuit are primarily in imaging systems. These imaging systems may be used for: security monitoring systems, manufacturing process monitoring, robotics, and for spectral imaging when used in analytical instrumentation.

  18. HYMOSS signal processing for pushbroom spectral imaging

    NASA Astrophysics Data System (ADS)

    Ludwig, David E.

    1991-06-01

    The objective of the Pushbroom Spectral Imaging Program was to develop on-focal plane electronics which compensate for detector array non-uniformities. The approach taken was to implement a simple two point calibration algorithm on focal plane which allows for offset and linear gain correction. The key on focal plane features which made this technique feasible was the use of a high quality transimpedance amplifier (TIA) and an analog-to-digital converter for each detector channel. Gain compensation is accomplished by varying the feedback capacitance of the integrate and dump TIA. Offset correction is performed by storing offsets in a special on focal plane offset register and digitally subtracting the offsets from the readout data during the multiplexing operation. A custom integrated circuit was designed, fabricated, and tested on this program which proved that nonuniformity compensated, analog-to-digital converting circuits may be used to read out infrared detectors. Irvine Sensors Corporation (ISC) successfully demonstrated the following innovative on-focal-plane functions that allow for correction of detector non-uniformities. Most of the circuit functions demonstrated on this program are finding their way onto future IC's because of their impact on reduced downstream processing, increased focal plane performance, simplified focal plane control, reduced number of dewar connections, as well as the noise immunity of a digital interface dewar. The potential commercial applications for this integrated circuit are primarily in imaging systems. These imaging systems may be used for: security monitoring systems, manufacturing process monitoring, robotics, and for spectral imaging when used in analytical instrumentation.

  19. An interference-based optical authentication scheme using two phase-only masks with different diffraction distances

    NASA Astrophysics Data System (ADS)

    Lu, Dajiang; He, Wenqi; Liao, Meihua; Peng, Xiang

    2017-02-01

    A new method to eliminate the security risk of the well-known interference-based optical cryptosystem is proposed. In this method, which is suitable for security authentication application, two phase-only masks are separately placed at different distances from the output plane, where a certification image (public image) can be obtained. To further increase the security and flexibility of this authentication system, we employ one more validation image (secret image), which can be observed at another output plane, for confirming the identity of the user. Only if the two correct masks are properly settled at their positions one could obtain two significant images. Besides, even if the legal users exchange their masks (keys), the authentication process will fail and the authentication results will not reveal any information. Numerical simulations are performed to demonstrate the validity and security of the proposed method.

  20. Use of One Time Pad Algorithm for Bit Plane Security Improvement

    NASA Astrophysics Data System (ADS)

    Suhardi; Suwilo, Saib; Budhiarti Nababan, Erna

    2017-12-01

    BPCS (Bit-Plane Complexity Segmentation) which is one of the steganography techniques that utilizes the human vision characteristics that cannot see the change in binary patterns that occur in the image. This technique performs message insertion by making a switch to a high-complexity bit-plane or noise-like regions with bits of secret messages. Bit messages that were previously stored precisely result the message extraction process to be done easily by rearranging a set of previously stored characters in noise-like region in the image. Therefore the secret message becomes easily known by others. In this research, the process of replacing bit plane with message bits is modified by utilizing One Time Pad cryptography technique which aims to increase security in bit plane. In the tests performed, the combination of One Time Pad cryptographic algorithm to the steganography technique of BPCS works well in the insertion of messages into the vessel image, although in insertion into low-dimensional images is poor. The comparison of the original image with the stegoimage looks identical and produces a good quality image with a mean value of PSNR above 30db when using a largedimensional image as the cover messages.

  1. Adaptive optical filter

    DOEpatents

    Whittemore, Stephen Richard

    2013-09-10

    Imaging systems include a detector and a spatial light modulator (SLM) that is coupled so as to control image intensity at the detector based on predetermined detector limits. By iteratively adjusting SLM element values, image intensity at one or all detector elements or portions of an imaging detector can be controlled to be within limits. The SLM can be secured to the detector at a spacing such that the SLM is effectively at an image focal plane. In some applications, the SLM can be adjusted to impart visible or hidden watermarks to images or to reduce image intensity at one or a selected set of detector elements so as to reduce detector blooming

  2. A topology visualization early warning distribution algorithm for large-scale network security incidents.

    PubMed

    He, Hui; Fan, Guotao; Ye, Jianwei; Zhang, Weizhe

    2013-01-01

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement and anomaly detection. The key visualization algorithm and technology of the system are mainly discussed. The large-scale network system's plane visualization is realized based on the divide and conquer thought. First, the topology of the large-scale network is divided into some small-scale networks by the MLkP/CR algorithm. Second, the sub graph plane visualization algorithm is applied to each small-scale network. Finally, the small-scale networks' topologies are combined into a topology based on the automatic distribution algorithm of force analysis. As the algorithm transforms the large-scale network topology plane visualization problem into a series of small-scale network topology plane visualization and distribution problems, it has higher parallelism and is able to handle the display of ultra-large-scale network topology.

  3. Neural network control of a parallel hybrid-electric propulsion system for a small unmanned aerial vehicle

    NASA Astrophysics Data System (ADS)

    Harmon, Frederick G.

    2005-11-01

    Parallel hybrid-electric propulsion systems would be beneficial for small unmanned aerial vehicles (UAVs) used for military, homeland security, and disaster-monitoring missions. The benefits, due to the hybrid and electric-only modes, include increased time-on-station and greater range as compared to electric-powered UAVs and stealth modes not available with gasoline-powered UAVs. This dissertation contributes to the research fields of small unmanned aerial vehicles, hybrid-electric propulsion system control, and intelligent control. A conceptual design of a small UAV with a parallel hybrid-electric propulsion system is provided. The UAV is intended for intelligence, surveillance, and reconnaissance (ISR) missions. A conceptual design reveals the trade-offs that must be considered to take advantage of the hybrid-electric propulsion system. The resulting hybrid-electric propulsion system is a two-point design that includes an engine primarily sized for cruise speed and an electric motor and battery pack that are primarily sized for a slower endurance speed. The electric motor provides additional power for take-off, climbing, and acceleration and also serves as a generator during charge-sustaining operation or regeneration. The intelligent control of the hybrid-electric propulsion system is based on an instantaneous optimization algorithm that generates a hyper-plane from the nonlinear efficiency maps for the internal combustion engine, electric motor, and lithium-ion battery pack. The hyper-plane incorporates charge-depletion and charge-sustaining strategies. The optimization algorithm is flexible and allows the operator/user to assign relative importance between the use of gasoline, electricity, and recharging depending on the intended mission. A MATLAB/Simulink model was developed to test the control algorithms. The Cerebellar Model Arithmetic Computer (CMAC) associative memory neural network is applied to the control of the UAVs parallel hybrid-electric propulsion system. The CMAC neural network approximates the hyper-plane generated from the instantaneous optimization algorithm and produces torque commands for the internal combustion engine and electric motor. The CMAC neural network controller saves on the required memory as compared to a large look-up table by two orders of magnitude. The CMAC controller also prevents the need to compute a hyper-plane or complex logic every time step.

  4. Clamshell tomograph

    DOEpatents

    Derenzo, Stephen E.; Budinger, Thomas F.

    1984-01-01

    In brief, the invention is a tomograph modified to be in a clamshell configuration so that the ring or rings may be moved to multiple sampling positions. The tomograph includes an array of detectors arranged in successive adjacent relative locations along a closed curve in a first position in a selected plane, and means for securing the detectors in the relative locations in a first sampling position. The securing means is movable in the plane in two sections and pivotable at one p The U.S. Government has rights in this invention pursuant to Contract No. W-7405-ENG-48 between the U.S. Department of Energy and the University of California.

  5. 16 CFR 1203.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... solid model in the shape of a human head of sizes A, E, J, M, and O as defined in draft ISO/DIS 6220... configure the helmet for a range of different head sizes. (d) Coronal plane is an anatomical plane... to secure its position on the headform. The mass of the preload ballast is 5 kg (11 lb). (j...

  6. 16 CFR 1203.4 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... solid model in the shape of a human head of sizes A, E, J, M, and O as defined in draft ISO/DIS 6220... configure the helmet for a range of different head sizes. (d) Coronal plane is an anatomical plane... to secure its position on the headform. The mass of the preload ballast is 5 kg (11 lb). (j...

  7. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Requirements” section except those cameras in ECCN 6A003.b.4.b that have a focal plane array with 111,000 or... Albania, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, Cyprus, Czech Republic, Denmark, Estonia....b.4.b that have a focal plane array with 111,000 or fewer elements and a frame rate of 60 Hz or less...

  8. Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy.

    PubMed

    Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook

    2016-05-01

    In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.

  9. Dose Calculation Evolution for Internal Organ Irradiation in Humans

    NASA Astrophysics Data System (ADS)

    Jimenez V., Reina A.

    2007-10-01

    The International Commission of Radiation Units (ICRU) has established through the years, a discrimination system regarding the security levels on the prescription and administration of doses in radiation treatments (Radiotherapy, Brach therapy, Nuclear Medicine). The first level is concerned with the prescription and posterior assurance of dose administration to a point of interest (POI), commonly located at the geometrical center of the region to be treated. In this, the effects of radiation around that POI, is not a priority. The second level refers to the dose specifications in a particular plane inside the patient, mostly the middle plane of the lesion. The dose is calculated to all the structures in that plane regardless if they are tumor or healthy tissue. In this case, the dose is not represented by a point value, but by level curves called "isodoses" as in a topographic map, so you can assure the level of doses to this particular plane, but it also leave with no information about how this values go thru adjacent planes. This is why the third level is referred to the volumetrical description of doses so these isodoses construct now a volume (named "cloud") that give us better assurance about tissue irradiation around the volume of the lesion and its margin (sub clinical spread or microscopic illness). This work shows how this evolution has resulted, not only in healthy tissue protection improvement but in a rise of tumor control, quality of life, better treatment tolerance and minimum permanent secuelae.

  10. 33 CFR 165.769 - Security Zone; Escorted Vessels, Charleston, South Carolina, Captain of the Port Zone

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... clearly identifiable by lights, vessel markings, or with agency insignia as listed below: Coast Guard... are moored, dayboards or other visual indications such as lights or buoys may be used. In all cases... a plane; (2) In the process of coming up onto or coming off a plane; or (3) Creating an excessive...

  11. 33 CFR 165.769 - Security Zone; Escorted Vessels, Charleston, South Carolina, Captain of the Port Zone

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... clearly identifiable by lights, vessel markings, or with agency insignia as listed below: Coast Guard... are moored, dayboards or other visual indications such as lights or buoys may be used. In all cases... a plane; (2) In the process of coming up onto or coming off a plane; or (3) Creating an excessive...

  12. A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system

    NASA Astrophysics Data System (ADS)

    Chai, Xiu-Li; Gan, Zhi-Hua; Lu, Yang; Zhang, Miao-Hui; Chen, Yi-Ran

    2016-10-01

    Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional (4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes, and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication. Project supported by the National Natural Science Foundation of China (Grant Nos. 61203094 and 61305042), the Natural Science Foundation of the United States (Grant Nos. CNS-1253424 and ECCS-1202225), the Science and Technology Foundation of Henan Province, China (Grant No. 152102210048), the Foundation and Frontier Project of Henan Province, China (Grant No. 162300410196), the Natural Science Foundation of Educational Committee of Henan Province, China (Grant No. 14A413015), and the Research Foundation of Henan University, China (Grant No. xxjc20140006).

  13. 33 CFR 165.749 - Security Zone: Escorted Vessels, Savannah, Georgia, Captain of the Port Zone.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... clearly identifiable by lights, vessel markings, or with agency insignia as listed below: (1) Coast Guard... vessels are moored, dayboards or other visual indications such as lights or buoys may be used. In all... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...

  14. 33 CFR 165.749 - Security Zone: Escorted Vessels, Savannah, Georgia, Captain of the Port Zone.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... clearly identifiable by lights, vessel markings, or with agency insignia as listed below: (1) Coast Guard... vessels are moored, dayboards or other visual indications such as lights or buoys may be used. In all... minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off a plane...

  15. Terahertz Real-Time Imaging Uncooled Arrays Based on Antenna-Coupled Bolometers or FET Developed at CEA-Leti

    NASA Astrophysics Data System (ADS)

    Simoens, François; Meilhan, Jérôme; Nicolas, Jean-Alain

    2015-10-01

    Sensitive and large-format terahertz focal plane arrays (FPAs) integrated in compact and hand-held cameras that deliver real-time terahertz (THz) imaging are required for many application fields, such as non-destructive testing (NDT), security, quality control of food, and agricultural products industry. Two technologies of uncooled THz arrays that are being studied at CEA-Leti, i.e., bolometer and complementary metal oxide semiconductor (CMOS) field effect transistors (FET), are able to meet these requirements. This paper reminds the followed technological approaches and focuses on the latest modeling and performance analysis. The capabilities of application of these arrays to NDT and security are then demonstrated with experimental tests. In particular, high technological maturity of the THz bolometer camera is illustrated with fast scanning of large field of view of opaque scenes achieved in a complete body scanner prototype.

  16. Worldwide Emerging Environmental Issues Affecting the U.S. Military. March 2009

    DTIC Science & Technology

    2009-03-01

    Efficiency 50% by 2050……………………………………………………....9 6.7 UK Could Seize Planes to Enforce European Emissions Trading Scheme………….9 6.8 ―Roving‖ Marine Protected...display a currently valid OMB control number. 1. REPORT DATE MAR 2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND...energy security concerns. Current large lithium producers are Argentina (about 50% of current world production), Chile, China, and Australia

  17. Airborne megawatt class free-electron laser for defense and security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roy Whitney; David Douglas; George Neil

    2005-03-01

    An airborne megawatt (MW) average power Free-Electron Laser (FEL) is now a possibility. In the process of shrinking the FEL parameters to fit on ship, a surprisingly lightweight and compact design has been achieved. There are multiple motivations for using a FEL for a high-power airborne system for Defense and Security: Diverse mission requirements can be met by a single system. The MW of light can be made available with any time structure for time periods from microseconds to hours, i.e. there is a nearly unlimited magazine. The wavelength of the light can be chosen to be from the farmore » infrared (IR) to the near ultraviolet (UV) thereby best meeting mission requirements. The FEL light can be modulated for detecting the same pattern in the small fraction of light reflected from the target resulting in greatly enhanced targeting control. The entire MW class FEL including all of its subsystems can be carried by large commercial size airplanes or on an airship. Adequate electrical power can be generated on the plane or airship to run the FEL as long as the plane or airship has fuel to fly. The light from the FEL will work well with relay mirror systems. The required R&D to achieve the MW level is well understood. The coupling of the capabilities of an airborne FEL to diverse mission requirements provides unique opportunities.« less

  18. PLANES Act of 2010

    THOMAS, 111th Congress

    Rep. Braley, Bruce L. [D-IA-1

    2010-01-13

    House - 01/28/2010 Referred to the Subcommittee on Transportation Security and Infrastructure Protection. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Secure Oblivious Hiding, Authentication, Tamper Proofing, and Verification Techniques

    DTIC Science & Technology

    2002-08-01

    compressing the bit- planes. The algorithm always starts with inspecting the 5th LSB plane. For color images , all three color-channels are compressed...use classical encryption engines, such as IDEA or DES . These algorithms have a fixed encryption block size, and, depending on the image dimensions, we...information can be stored either in a separate file, in the image header, or embedded in the image itself utilizing the modern concepts of steganography

  20. Final report for the Multiprotocol Label Switching (MPLS) control plane security LDRD project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Torgerson, Mark Dolan; Michalski, John T.; Tarman, Thomas David

    2003-09-01

    As rapid Internet growth continues, global communications becomes more dependent on Internet availability for information transfer. Recently, the Internet Engineering Task Force (IETF) introduced a new protocol, Multiple Protocol Label Switching (MPLS), to provide high-performance data flows within the Internet. MPLS emulates two major aspects of the Asynchronous Transfer Mode (ATM) technology. First, each initial IP packet is 'routed' to its destination based on previously known delay and congestion avoidance mechanisms. This allows for effective distribution of network resources and reduces the probability of congestion. Second, after route selection each subsequent packet is assigned a label at each hop, whichmore » determines the output port for the packet to reach its final destination. These labels guide the forwarding of each packet at routing nodes more efficiently and with more control than traditional IP forwarding (based on complete address information in each packet) for high-performance data flows. Label assignment is critical in the prompt and accurate delivery of user data. However, the protocols for label distribution were not adequately secured. Thus, if an adversary compromises a node by intercepting and modifying, or more simply injecting false labels into the packet-forwarding engine, the propagation of improperly labeled data flows could create instability in the entire network. In addition, some Virtual Private Network (VPN) solutions take advantage of this 'virtual channel' configuration to eliminate the need for user data encryption to provide privacy. VPN's relying on MPLS require accurate label assignment to maintain user data protection. This research developed a working distributive trust model that demonstrated how to deploy confidentiality, authentication, and non-repudiation in the global network label switching control plane. Simulation models and laboratory testbed implementations that demonstrated this concept were developed, and results from this research were transferred to industry via standards in the Optical Internetworking Forum (OIF).« less

  1. Nanostructure based EO/IR sensor development for homeland security applications

    NASA Astrophysics Data System (ADS)

    Sood, Ashok K.; Welser, Roger E.; Sood, Adam W.; Puri, Yash R.; Manzur, Tariq; Dhar, Nibir K.; Polla, Dennis L.; Wang, Zhong L.; Wijewarnasuriya, Priyalal S.; Anwar, A. F. M.

    2011-06-01

    Next Generation EO/IR focal plane arrays using nanostructure materials are being developed for a variety of Defense and Homeland Security Sensor Applications. Several different nanomaterials are being evaluated for these applications. These include ZnO nanowires, GaN Nanowires and II-VI nanowires, which have demonstrated large signal to noise ratio as a wide band gap nanostructure material in the UV band. Similarly, the work is under way using Carbon Nanotubes (CNT) for a high speed detector and focal plane array as two-dimensional array as bolometer for IR bands of interest, which can be implemented for the sensors for homeland security applications. In this paper, we will discuss the sensor design and model predicting performance of an EO/IR focal plane array and Sensor that can cover the UV to IR bands of interest. The model can provide a robust means for comparing performance of the EO/IR FPA's and Sensors that can operate in the UV, Visible-NIR (0.4- 1.8μ), SWIR (2.0-2.5μ), MWIR (3-5μ), and LWIR bands (8-14μ). This model can be used as a tool for predicting performance of nanostructure arrays under development. We will also discuss our results on growth and characterization of ZnO nanowires and CNT's for the next generation sensor applications. We also present several approaches for integrated energy harvesting using nanostructure based solar cells and Nanogenerators that can be used to supplement the energy required for nanostructure based sensors.

  2. Location-assured, multifactor authentication on smartphones via LTE communication

    NASA Astrophysics Data System (ADS)

    Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham

    2013-05-01

    With the added security provided by LTE, geographical location has become an important factor for authentication to enhance the security of remote client authentication during mCommerce applications using Smartphones. Tight combination of geographical location with classic authentication factors like PINs/Biometrics in a real-time, remote verification scheme over the LTE layer connection assures the authenticator about the client itself (via PIN/biometric) as well as the client's current location, thus defines the important aspects of "who", "when", and "where" of the authentication attempt without eaves dropping or man on the middle attacks. To securely integrate location as an authentication factor into the remote authentication scheme, client's location must be verified independently, i.e. the authenticator should not solely rely on the location determined on and reported by the client's Smartphone. The latest wireless data communication technology for mobile phones (4G LTE, Long-Term Evolution), recently being rolled out in various networks, can be employed to enhance this location-factor requirement of independent location verification. LTE's Control Plane LBS provisions, when integrated with user-based authentication and independent source of localisation factors ensures secure efficient, continuous location tracking of the Smartphone. This feature can be performed during normal operation of the LTE-based communication between client and network operator resulting in the authenticator being able to verify the client's claimed location more securely and accurately. Trials and experiments show that such algorithm implementation is viable for nowadays Smartphone-based banking via LTE communication.

  3. Best Way to Get Rid of Used Needles and Other Sharps

    MedlinePlus

    ... other options are not available. If traveling by plane, check the Transportation Security Administration (TSA) website for ... be thrown away in the common trash. Additional Consumer Information How to Get Rid of a Sharps ...

  4. The deployment of routing protocols in distributed control plane of SDN.

    PubMed

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  5. Magnetic induction tomography of objects for security applications

    NASA Astrophysics Data System (ADS)

    Ward, Rob; Joseph, Max; Langley, Abbi; Taylor, Stuart; Watson, Joe C.

    2017-10-01

    A coil array imaging system has been further developed from previous investigations, focusing on designing its application for fast screening of small bags or parcels, with a view to the production of a compact instrument for security applications. In addition to reducing image acquisition times, work was directed toward exploring potential cost effective manufacturing routes. Based on magnetic induction tomography and eddy-current principles, the instrument captured images of conductive targets using a lock-in amplifier, individually multiplexing signals between a primary driver coil and a 20 by 21 imaging array of secondary passive coils constructed using a reproducible multiple tile design. The design was based on additive manufacturing techniques and provided 2 orthogonal imaging planes with an ability to reconstruct images in less than 10 seconds. An assessment of one of the imaging planes is presented. This technique potentially provides a cost effective threat evaluation technique that may compliment conventional radiographic approaches.

  6. A 1.3 giga pixels focal plane for GAIA

    NASA Astrophysics Data System (ADS)

    Laborie, Anouk; Pouny, Pierre; Vetel, Cyril; Collados, Emmanuel; Rougier, Gilles; Davancens, Robert; Zayer, Igor; Perryman, Michael; Pace, Oscar

    2004-06-01

    The astrometric mission GAIA is a cornerstone mission of the European Space Agency, due for launch in the 2010 time frame. Requiring extremely demanding performance GAIA calls for the development of an unprecedented large focal plane featuring innovative technologies. For securing the very challenging GAIA development, a significant number of technology activities have been initiated by ESA through a competitive selection process. In this context, an industrial consortium led by EADS-Astrium (France) with e2v technologies (UK) as major subcontractor was selected for the GAIA CCD and Focal Plane Technology Demonstrators programme, which is by far the most significant and the most critical GAIA pre-development for all aspects: science performance, development schedule and cost. This programme has started since August 2002 and will end early 2005 prior to commencement of the GAIA Phase B. While the GAIA payload will host three instruments and related focal planes, the major mission objectives are assigned to the Astrometric (ASTRO) Focal Plane, which is the subject of this presentation.

  7. The Effect of Sliding Humeral Osteotomy (SHO) on Frontal Plane Thoracic Limb Alignment: An Ex Vivo Canine Cadaveric Study.

    PubMed

    Breiteneicher, Adam H; Norby, Bo; Schulz, Kurt S; Kerwin, Sharon C; Hulse, Don A; Fox, Derek B; Saunders, W Brian

    2016-11-01

    To determine the effect of sliding humeral osteotomy (SHO) on frontal plane thoracic limb alignment in standing and recumbent limb positions. Canine cadaveric study. Canine thoracic limbs (n=15 limb pairs). Limbs acquired from healthy Labrador Retrievers euthanatized for reasons unrelated to this study were mounted in a limb press and aligned in a standing position followed by axial loading at 30% body weight. Frontal plane radiography was performed in standing and recumbent positions pre- and post-SHO. In the standing position, lateralization of the foot was measured pre- and post-SHO using a textured grid secured to the limb press base plate. Twelve thoracic limb alignment values (mean ± SD and 95% CI) were determined using the center of rotation of angulation (CORA) method were compared using linear mixed models to determine if significant differences existed between limb alignment values pre- or post-SHO, controlling for dog, limb, and limb position. Six of 12 standing or recumbent alignment values were significantly different pre- and post-SHO. SHO resulted in decreased mechanical lateral distal humeral angle and movement of the mechanical humeral radio-ulnar angle, radio-ulnar metacarpal angle, thoracic humeral angle, and elbow mechanical axis deviation toward coaxial limb alignment. In the standing position, the foot underwent significant lateralization post-SHO. SHO resulted in significant alteration in frontal plane thoracic limb alignment. Additional studies are necessary to determine if the changes reported using our ex vivo model occur following SHO in vivo. © Copyright 2016 by The American College of Veterinary Surgeons.

  8. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Requirements” section except those cameras in ECCN 6A003.b.4.b that have a focal plane array with 111,000 or..., South Korea, Spain, Sweden, Switzerland, Turkey, and the United Kingdom for those cameras in ECCN 6A003...

  9. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Requirements” section except those cameras in ECCN 6A003.b.4.b that have a focal plane array with 111,000 or..., South Korea, Spain, Sweden, Switzerland, Turkey, and the United Kingdom for those cameras in ECCN 6A003...

  10. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Requirements” section except those cameras in ECCN 6A003.b.4.b that have a focal plane array with 111,000 or..., South Korea, Spain, Sweden, Switzerland, Turkey, and the United Kingdom for those cameras in ECCN 6A003...

  11. 15 CFR 742.4 - National security.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Requirements” section except those cameras in ECCN 6A003.b.4.b that have a focal plane array with 111,000 or..., South Korea, Spain, Sweden, Switzerland, Turkey, and the United Kingdom for those cameras in ECCN 6A003...

  12. The Deployment of Routing Protocols in Distributed Control Plane of SDN

    PubMed Central

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies. PMID:25250395

  13. A novel image encryption algorithm based on the chaotic system and DNA computing

    NASA Astrophysics Data System (ADS)

    Chai, Xiuli; Gan, Zhihua; Lu, Yang; Chen, Yiran; Han, Daojun

    A novel image encryption algorithm using the chaotic system and deoxyribonucleic acid (DNA) computing is presented. Different from the traditional encryption methods, the permutation and diffusion of our method are manipulated on the 3D DNA matrix. Firstly, a 3D DNA matrix is obtained through bit plane splitting, bit plane recombination, DNA encoding of the plain image. Secondly, 3D DNA level permutation based on position sequence group (3DDNALPBPSG) is introduced, and chaotic sequences generated from the chaotic system are employed to permutate the positions of the elements of the 3D DNA matrix. Thirdly, 3D DNA level diffusion (3DDNALD) is given, the confused 3D DNA matrix is split into sub-blocks, and XOR operation by block is manipulated to the sub-DNA matrix and the key DNA matrix from the chaotic system. At last, by decoding the diffused DNA matrix, we get the cipher image. SHA 256 hash of the plain image is employed to calculate the initial values of the chaotic system to avoid chosen plaintext attack. Experimental results and security analyses show that our scheme is secure against several known attacks, and it can effectively protect the security of the images.

  14. Movement compatibility for configurations of displays located in three cardinal orientations and ipsilateral, contralateral and overhead controls.

    PubMed

    Chan, Alan H S; Hoffmann, Errol R

    2012-01-01

    Stereotype strength and reversibility were determined for displays that were in the Front, Right and Left orientations relative to the operator, along with rotary, horizontally and vertically-moving controls located in the overhead, left-sagittal and right-sagittal planes. In each case, responses were made using the left and right hands. The arrangements used were (i) rotary control with a circular display (ii) horizontal/transverse control moving forward/rearward in the left and right-sagittal planes or transversely in the overhead plane and (iii) vertical/longitudinal control moving vertically in the left and right-sagittal planes and longitudinally in the overhead plane. These are all combinations not previously researched. Stereotype strength varied with display plane, type of control and plane of control. Models for the stereotype strength are developed, showing the contribution of various components to the overall stereotype strength. The major component for horizontally-moving controls comes from the "visual field" model of Worringham and Beringer (1998); for the rotary control important factors are "clockwise-for-clockwise" and the hand/control location effect (Hoffmann, 2009a). Vertically-moving controls are governed by a simple 'up-for-up' relationship between displays and controls. Overall stereotype strength is a maximum when all components add positively. Copyright © 2011 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  15. 33 CFR 165.836 - Security Zone; Escorted Vessels, Mobile, Alabama, Captain of the Port.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... lights, vessel markings, or with agency insignia as follows: Coast Guard surface or air asset displaying... coming up onto or coming off a plane; or (3) Creating an excessive wake or surge. (b) Regulated area. All...

  16. Helmet Fit and Cervical Spine Motion in Collegiate Men's Lacrosse Athletes Secured to a Spine Board

    PubMed Central

    Petschauer, Meredith A.; Schmitz, Randy; Gill, Diane L.

    2010-01-01

    Abstract Context: Proper management of cervical spine injuries in men's lacrosse players depends in part upon the ability of the helmet to immobilize the head. Objective: To determine if properly and improperly fitted lacrosse helmets provide adequate stabilization of the head in the spine-boarded athlete. Design: Crossover study. Setting: Sports medicine research laboratory. Patients or Other Participants: Eighteen healthy collegiate men's lacrosse players. Intervention(s): Participants were asked to move their heads through 3 planes of motion after being secured to a spine board under 3 helmet conditions. Main Outcome Measure(s): Change in range of motion in the cervical spine was calculated for the sagittal, frontal, and transverse planes for both head-to-thorax and helmet-to-thorax range of motion in all 3 helmet conditions (properly fitted, improperly fitted, and no helmet). Results: Head-to-thorax range of motion with the properly fitted and improperly fitted helmets was greater than in the no-helmet condition (P < .0001). In the sagittal plane, range of motion was greater with the improperly fitted helmet than with the properly fitted helmet. No difference was observed in helmet-to-thorax range of motion between properly and improperly fitted helmet conditions. Head-to-thorax range of motion was greater than helmet-to-thorax range of motion in all 3 planes (P < .0001). Conclusions: Cervical spine motion was minimized the most in the no-helmet condition, indicating that in lacrosse players, unlike football players, the helmet may need to be removed before stabilization. PMID:20446833

  17. Improved performance of analog and digital acousto-optic modulation with feedback under profiled beam propagation for secure communication using chaos

    NASA Astrophysics Data System (ADS)

    Almehmadi, Fares S.; Chatterjee, Monish R.

    2014-12-01

    Using intensity feedback, the closed-loop behavior of an acousto-optic hybrid device under profiled beam propagation has been recently shown to exhibit wider chaotic bands potentially leading to an increase in both the dynamic range and sensitivity to key parameters that characterize the encryption. In this work, a detailed examination is carried out vis-à-vis the robustness of the encryption/decryption process relative to parameter mismatch for both analog and pulse code modulation signals, and bit error rate (BER) curves are used to examine the impact of additive white noise. The simulations with profiled input beams are shown to produce a stronger encryption key (i.e., much lower parametric tolerance thresholds) relative to simulations with uniform plane wave input beams. In each case, it is shown that the tolerance for key parameters drops by factors ranging from 10 to 20 times below those for uniform plane wave propagation. Results are shown to be at consistently lower tolerances for secure transmission of analog and digital signals using parameter tolerance measures, as well as BER performance measures for digital signals. These results hold out the promise for considerably greater information transmission security for such a system.

  18. Modal Control of a Satellite in Orbit about L3.

    DTIC Science & Technology

    1980-12-01

    the right- half of the complex plane , are removed via the controller moving the unstable roots from the right- half to the left- half of the ...complex plane . Simultaneously, the other system roots remain in their original locations in the complex plane . Since the Poincare exponents of Hamiltonian... half - plane , the conjugate root in the left- half -

  19. Further Tests of Belief-Importance Theory

    PubMed Central

    Petrides, K. V.; Furnham, Adrian

    2015-01-01

    Belief-importance (belimp) theory hypothesizes that personality traits confer a propensity to perceive convergences or divergences between the belief that we can attain certain goals and the importance that we place on these goals. Belief and importance are conceptualized as two coordinates, together defining the belimp plane. We tested fundamental aspects of the theory using four different planes based on the life domains of appearance, family, financial security, and friendship as well as a global plane combining these four domains. The criteria were from the areas of personality (Big Five and trait emotional intelligence) and learning styles. Two hundred and fifty eight participants were allocated into the four quadrants of the belimp plane (Hubris, Motivation, Depression, and Apathy) according to their scores on four reliable instruments. Most hypotheses were supported by the data. Results are discussed with reference to the stability of the belimp classifications under different life domains and the relationship of the quadrants with the personality traits that are hypothesized to underpin them. PMID:25874374

  20. Further tests of belief-importance theory.

    PubMed

    Petrides, K V; Furnham, Adrian

    2015-01-01

    Belief-importance (belimp) theory hypothesizes that personality traits confer a propensity to perceive convergences or divergences between the belief that we can attain certain goals and the importance that we place on these goals. Belief and importance are conceptualized as two coordinates, together defining the belimp plane. We tested fundamental aspects of the theory using four different planes based on the life domains of appearance, family, financial security, and friendship as well as a global plane combining these four domains. The criteria were from the areas of personality (Big Five and trait emotional intelligence) and learning styles. Two hundred and fifty eight participants were allocated into the four quadrants of the belimp plane (Hubris, Motivation, Depression, and Apathy) according to their scores on four reliable instruments. Most hypotheses were supported by the data. Results are discussed with reference to the stability of the belimp classifications under different life domains and the relationship of the quadrants with the personality traits that are hypothesized to underpin them.

  1. 49 CFR 1580.203 - Reporting significant security concerns.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...

  2. 49 CFR 1580.203 - Reporting significant security concerns.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...

  3. 49 CFR 1580.203 - Reporting significant security concerns.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...

  4. 49 CFR 1580.203 - Reporting significant security concerns.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...

  5. 49 CFR 571.101 - Standard No. 101; Controls and displays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... accessibility, visibility and recognition of motor vehicle controls, telltales and indicators, and to facilitate... pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving...

  6. 49 CFR 571.101 - Standard No. 101; Controls and displays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... accessibility, visibility and recognition of motor vehicle controls, telltales and indicators, and to facilitate... pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving...

  7. 49 CFR 571.101 - Standard No. 101; Controls and displays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... accessibility, visibility and recognition of motor vehicle controls, telltales and indicators, and to facilitate... pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving...

  8. 49 CFR 571.101 - Standard No. 101; Controls and displays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... accessibility, visibility and recognition of motor vehicle controls, telltales and indicators, and to facilitate... pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving...

  9. 49 CFR 571.101 - Standard No. 101; Controls and displays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... accessibility, visibility and recognition of motor vehicle controls, telltales and indicators, and to facilitate... pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving...

  10. Programmable hyperspectral image mapper with on-array processing

    NASA Technical Reports Server (NTRS)

    Cutts, James A. (Inventor)

    1995-01-01

    A hyperspectral imager includes a focal plane having an array of spaced image recording pixels receiving light from a scene moving relative to the focal plane in a longitudinal direction, the recording pixels being transportable at a controllable rate in the focal plane in the longitudinal direction, an electronic shutter for adjusting an exposure time of the focal plane, whereby recording pixels in an active area of the focal plane are removed therefrom and stored upon expiration of the exposure time, an electronic spectral filter for selecting a spectral band of light received by the focal plane from the scene during each exposure time and an electronic controller connected to the focal plane, to the electronic shutter and to the electronic spectral filter for controlling (1) the controllable rate at which the recording is transported in the longitudinal direction, (2) the exposure time, and (3) the spectral band so as to record a selected portion of the scene through M spectral bands with a respective exposure time t(sub q) for each respective spectral band q.

  11. Software-defined networking control plane for seamless integration of multiple silicon photonic switches in Datacom networks.

    PubMed

    Shen, Yiwen; Hattink, Maarten H N; Samadi, Payman; Cheng, Qixiang; Hu, Ziyiz; Gazman, Alexander; Bergman, Keren

    2018-04-16

    Silicon photonics based switches offer an effective option for the delivery of dynamic bandwidth for future large-scale Datacom systems while maintaining scalable energy efficiency. The integration of a silicon photonics-based optical switching fabric within electronic Datacom architectures requires novel network topologies and arbitration strategies to effectively manage the active elements in the network. We present a scalable software-defined networking control plane to integrate silicon photonic based switches with conventional Ethernet or InfiniBand networks. Our software-defined control plane manages both electronic packet switches and multiple silicon photonic switches for simultaneous packet and circuit switching. We built an experimental Dragonfly network testbed with 16 electronic packet switches and 2 silicon photonic switches to evaluate our control plane. Observed latencies occupied by each step of the switching procedure demonstrate a total of 344 µs control plane latency for data-center and high performance computing platforms.

  12. 77 FR 66501 - General Motors, LLC, Receipt of Petition for Decision of Inconsequential Noncompliance

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-05

    ... driver pressing on the center of the face plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal... provided for a horn control in the center of the face plane of the steering wheel hub, the identifier must...

  13. An efficient method to detect periodic behavior in botnet traffic by analyzing control plane traffic

    PubMed Central

    AsSadhan, Basil; Moura, José M.F.

    2013-01-01

    Botnets are large networks of bots (compromised machines) that are under the control of a small number of bot masters. They pose a significant threat to Internet’s communications and applications. A botnet relies on command and control (C2) communications channels traffic between its members for its attack execution. C2 traffic occurs prior to any attack; hence, the detection of botnet’s C2 traffic enables the detection of members of the botnet before any real harm happens. We analyze C2 traffic and find that it exhibits a periodic behavior. This is due to the pre-programmed behavior of bots that check for updates to download them every T seconds. We exploit this periodic behavior to detect C2 traffic. The detection involves evaluating the periodogram of the monitored traffic. Then applying Walker’s large sample test to the periodogram’s maximum ordinate in order to determine if it is due to a periodic component or not. If the periodogram of the monitored traffic contains a periodic component, then it is highly likely that it is due to a bot’s C2 traffic. The test looks only at aggregate control plane traffic behavior, which makes it more scalable than techniques that involve deep packet inspection (DPI) or tracking the communication flows of different hosts. We apply the test to two types of botnet, tinyP2P and IRC that are generated by SLINGbot. We verify the periodic behavior of their C2 traffic and compare it to the results we get on real traffic that is obtained from a secured enterprise network. We further study the characteristics of the test in the presence of injected HTTP background traffic and the effect of the duty cycle on the periodic behavior. PMID:25685512

  14. Comparative evaluation of effectiveness of intra-pocket anesthetic gel and injected local anesthesia during scaling and root planing - A split-mouth clinical trial.

    PubMed

    Chintala, Kalyan; Kumar, Sandhya Pavan; Murthy, K Raja V

    2017-01-01

    Pain control is an important outcome measure for successful periodontal therapy. Injected local anesthesia has been used to secure anesthesia for scaling and root planing (SRP) and continues to be the anesthetic of choice for pain control. Alternatively, intra-pocket anesthetic gel has been used as an anesthetic during SRP. Hence, this clinical trial was done to compare the effectiveness of intra-pocket anesthetic gel and injected local anesthesia during SRP and also to assess the influence of intra-pocket anesthetic gel on treatment outcomes in chronic periodontitis patients. Fifteen systemically healthy chronic periodontitis patients were recruited. The dental quadrants on right side received either intra-pocket 20% benzocaine gel (Gel group) or infiltration/block by 2% lidocaine with 1:80,000 adrenaline (injection group). Quadrants on the left side received the alternative. Pain perception and patients preference for the type of anesthesia was recorded. Clinical parameters: plaque index, modified gingival index, modified sulcular bleeding index, probing pocket depth, and clinical attachment level were recorded at baseline and 1 month after treatment. No difference was observed in visual analog scale (P > 0.05) and verbal rating scale (P > 0.05) pain perception between gel group and injection group. A slightly increased preference to gel as anesthesia (53% vs. 47%) was observed. The treatment outcome after SRP did not show a significant difference between gel and injection group (P > 0.05). Intra-pocket administration of 20% benzocaine gel may be effective for pain control during SRP and may offer an alternative to conventional injection anesthesia.

  15. Monitoring system and methods for a distributed and recoverable digital control system

    NASA Technical Reports Server (NTRS)

    Stange, Kent (Inventor); Hess, Richard (Inventor); Kelley, Gerald B (Inventor); Rogers, Randy (Inventor)

    2010-01-01

    A monitoring system and methods are provided for a distributed and recoverable digital control system. The monitoring system generally comprises two independent monitoring planes within the control system. The first monitoring plane is internal to the computing units in the control system, and the second monitoring plane is external to the computing units. The internal first monitoring plane includes two in-line monitors. The first internal monitor is a self-checking, lock-step-processing monitor with integrated rapid recovery capability. The second internal monitor includes one or more reasonableness monitors, which compare actual effector position with commanded effector position. The external second monitor plane includes two monitors. The first external monitor includes a pre-recovery computing monitor, and the second external monitor includes a post recovery computing monitor. Various methods for implementing the monitoring functions are also disclosed.

  16. Digital Avionics

    NASA Technical Reports Server (NTRS)

    Koelbl, Terry G.; Ponchak, Denise; Lamarche, Teresa

    2002-01-01

    The field of digital avionics experienced another year of important advances in civil aviation, military systems, and space applications. As a result of the events of 9/11/2001, NASA has pursued activities to apply its aerospace technologies toward improved aviation security. Both NASA Glenn Research Center and Langley Research Center have performed flight research demonstrations using advanced datalink concepts to transmit live pictures from inside a jetliner, and to downlink the contents of the plane's 'black box' recorder in real time. The U.S. Navy and General Electric demonstrated survivable engine control (SEC) algorithms during engine ground tests at the Weapons Survivability Laboratory at China Lake. The scientists at Boeing Satellite Systems advanced the field of stellar inertial technology with the development of a new method for positioning optical star trackers on satellites.

  17. Impact of the number of image planes of real-time three-dimensional echocardiography on the accuracy of left atrial and ventricular volume measurements.

    PubMed

    Li, Fang; Wang, Qian; Yao, Gui Hua; Zhang, Peng Fei; Ge, Zhi Ming; Zhang, Mei; Zhang, Yun

    2008-01-01

    Real-time three-dimensional (3D) echocardiography (RT-3DE) has emerged as a new technique in measuring left atrial and ventricular volume. However, the impact of cutting planes of RT-3DE on the accuracy of volume measurement in patients with a normal or enlarged heart is still unknown. We enrolled 30 normal subjects (control group) and 30 patients with heart failure (patient group). RT-3DE was performed to measure maximal volume of the left atrium (LAVmax) and left ventricular end-diastole volume (LVEDV) with 2-, 4-, 8- and 16-cutting planes, compared with cardiac magnetic resonance imaging (CMRI). In both groups, LAVmax by RT-3DE using 2- and 4-cutting planes was significantly underestimated (mean difference: -10.4 +/- 16.6 mL, p = 0.001 and -8.8 +/- 14.2 mL, p = 0.002 in the control group and -13.4 +/- 19.6 mL, p = 0.001 and -11.2 +/- 17.5 mL, p = 0.001 in the patient group, respectively). These differences became nonsignificant when 8- and 16-cutting planes were adopted (mean difference: -2.1 +/- 7.6 mL and -1.9 +/- 7.4 mL in the control group and -2.7 +/- 8.4 mL and -2.2 +/- 8.3 mL in the patient group, respectively). The agreement for LVEDV was acceptable when 4- or more cutting planes were used in the control group and when 8- or 16-cutting planes were used in the patient group. The time expense for data analysis of LAVmax with 8-image planes was only 7 +/- 4 min in the control group and 6 +/- 5 min in the patient group, almost halving that of the 16-image planes. Similarly, 4- and 8-cutting planes were required for an accurate measurement of LVEDV in the control and patient groups, respectively. In conclusion, RT-3DE with 8-cutting planes is both accurate and timesaving for measurement of LAVmax and LVEDV in patients with normal or enlarged left atria and ventricles.

  18. Computer Program for Calculating Hydrodynamic Properties of Shock Waves in Sea Water.

    DTIC Science & Technology

    1982-02-01

    White Oak Labs. 13. NUMG*CNOF WAGES tS. ed~eiYONwG AGECY NAM S AOOeSSl1 diffrent froem CooIn.1" Offieo) 1. SECURITY ’ CLASS. (of this ropoft) Unclassif...calculaNTwithout use of tables opies of the four magnetic 00 ~’ 1473 oo’-lo. or I NO 4S 51 OGSOLETZ SECURITY CLAISIPPICAAK -HIS CP5 AoG ’When Dove 60fed...initial pressure po-0. Neither of the two plane. In Fig. 1, the possible states of a given equations-of-state are complete in the sense that fluid just

  19. Leveraging master-slave OpenFlow controller arrangement to improve control plane resiliency in SD-EONs.

    PubMed

    Chen, Xiaoliang; Zhao, Bin; Ma, Shoujiang; Chen, Cen; Hu, Daoyun; Zhou, Wenshuang; Zhu, Zuqing

    2015-03-23

    In this paper, we study how to improve the control plane resiliency of software-defined elastic optical networks (SD-EONs) and design a master-slave OpenFlow (OF) controller arrangement. Specifically, we introduce two OF controllers (OF-Cs), i.e., the master and slave OF-Cs, and make them work in a collaborative way to protect the SD-EON against controller failures. We develop a controller communication protocol (CCP) to facilitate the cooperation of the two OF-Cs. With the CCP, the master OF-C (M-OF-C) can synchronize network status to the slave OF-C (S-OF-C) in real time, while S-OF-C can quickly detect the failure of M-OF-C and take over the network control and management (NC&M) tasks timely to avoid service disruption. We implement the proposed framework in an SD-EON control plane testbed built with high-performance servers, and perform NC&M experiments with different network failure scenarios to demonstrate its effectiveness. Experimental results indicate that the proposed system can restore services in both the data and control planes of SD-EON jointly while maintaining relatively good scalability. To the best of our knowledge, this is the first demonstration that realizes control plane resiliency in SD-EONs.

  20. Software-defined networking control plane for seamless integration of multiple silicon photonic switches in Datacom networks

    DOE PAGES

    Shen, Yiwen; Hattink, Maarten; Samadi, Payman; ...

    2018-04-13

    Silicon photonics based switches offer an effective option for the delivery of dynamic bandwidth for future large-scale Datacom systems while maintaining scalable energy efficiency. The integration of a silicon photonics-based optical switching fabric within electronic Datacom architectures requires novel network topologies and arbitration strategies to effectively manage the active elements in the network. Here, we present a scalable software-defined networking control plane to integrate silicon photonic based switches with conventional Ethernet or InfiniBand networks. Our software-defined control plane manages both electronic packet switches and multiple silicon photonic switches for simultaneous packet and circuit switching. We built an experimental Dragonfly networkmore » testbed with 16 electronic packet switches and 2 silicon photonic switches to evaluate our control plane. Observed latencies occupied by each step of the switching procedure demonstrate a total of 344 microsecond control plane latency for data-center and high performance computing platforms.« less

  1. Software-defined networking control plane for seamless integration of multiple silicon photonic switches in Datacom networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shen, Yiwen; Hattink, Maarten; Samadi, Payman

    Silicon photonics based switches offer an effective option for the delivery of dynamic bandwidth for future large-scale Datacom systems while maintaining scalable energy efficiency. The integration of a silicon photonics-based optical switching fabric within electronic Datacom architectures requires novel network topologies and arbitration strategies to effectively manage the active elements in the network. Here, we present a scalable software-defined networking control plane to integrate silicon photonic based switches with conventional Ethernet or InfiniBand networks. Our software-defined control plane manages both electronic packet switches and multiple silicon photonic switches for simultaneous packet and circuit switching. We built an experimental Dragonfly networkmore » testbed with 16 electronic packet switches and 2 silicon photonic switches to evaluate our control plane. Observed latencies occupied by each step of the switching procedure demonstrate a total of 344 microsecond control plane latency for data-center and high performance computing platforms.« less

  2. Absolute Stability Analysis of a Phase Plane Controlled Spacecraft

    NASA Technical Reports Server (NTRS)

    Jang, Jiann-Woei; Plummer, Michael; Bedrossian, Nazareth; Hall, Charles; Jackson, Mark; Spanos, Pol

    2010-01-01

    Many aerospace attitude control systems utilize phase plane control schemes that include nonlinear elements such as dead zone and ideal relay. To evaluate phase plane control robustness, stability margin prediction methods must be developed. Absolute stability is extended to predict stability margins and to define an abort condition. A constrained optimization approach is also used to design flex filters for roll control. The design goal is to optimize vehicle tracking performance while maintaining adequate stability margins. Absolute stability is shown to provide satisfactory stability constraints for the optimization.

  3. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    NASA Astrophysics Data System (ADS)

    Zhao, Liang; Adhikari, Avishek; Sakurai, Kouichi

    Watermarking is one of the most effective techniques for copyright protection and information hiding. It can be applied in many fields of our society. Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scrambling schemes can be seen as a useful test tool for showing the property or flaw of the image scrambling method. In this paper, a new scrambling evaluation system based on spatial distribution entropy and centroid difference of bit-plane is presented to obtain the scrambling degree of image scrambling schemes. Our scheme is illustrated and justified through computer simulations. The experimental results show (in Figs. 6 and 7) that for the general gray-scale image, the evaluation degree of the corresponding cipher image for the first 4 significant bit-planes selection is nearly the same as that for the 8 bit-planes selection. That is why, instead of taking 8 bit-planes of a gray-scale image, it is sufficient to take only the first 4 significant bit-planes for the experiment to find the scrambling degree. This 50% reduction in the computational cost makes our scheme efficient.

  4. GMPLS-based control plane for optical networks: early implementation experience

    NASA Astrophysics Data System (ADS)

    Liu, Hang; Pendarakis, Dimitrios; Komaee, Nooshin; Saha, Debanjan

    2002-07-01

    Generalized Multi-Protocol Label Switching (GMPLS) extends MPLS signaling and Internet routing protocols to provide a scalable, interoperable, distributed control plane, which is applicable to multiple network technologies such as optical cross connects (OXCs), photonic switches, IP routers, ATM switches, SONET and DWDM systems. It is intended to facilitate automatic service provisioning and dynamic neighbor and topology discovery across multi-vendor intelligent transport networks, as well as their clients. Efforts to standardize such a distributed common control plane have reached various stages in several bodies such as the IETF, ITU and OIF. This paper describes the design considerations and architecture of a GMPLS-based control plane that we have prototyped for core optical networks. Functional components of GMPLS signaling and routing are integrated in this architecture with an application layer controller module. Various requirements including bandwidth, network protection and survivability, traffic engineering, optimal utilization of network resources, and etc. are taken into consideration during path computation and provisioning. Initial experiments with our prototype demonstrate the feasibility and main benefits of GMPLS as a distributed control plane for core optical networks. In addition to such feasibility results, actual adoption and deployment of GMPLS as a common control plane for intelligent transport networks will depend on the successful completion of relevant standardization activities, extensive interoperability testing as well as the strengthening of appropriate business drivers.

  5. 9/11 Leaves Small Imprint on Curricula

    ERIC Educational Resources Information Center

    Robelen, Erik W.

    2011-01-01

    Ten years after terrorists crashed planes into the World Trade Center and the Pentagon, the profound impact on the United States is not hard to see, from heightened domestic-security measures to the U.S. role in conflicts deemed part of a war on terror. What's less obvious is how the attacks have filtered into American classrooms. Some observers…

  6. 49 CFR 231.2 - Hopper cars and high-side gondolas with fixed ends.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... which time they must be made to comply with the standards prescribed. (iv) Carriers are not required to... within 12 inches of a vertical plane parallel with end of car and passing through the inside face of... outer face of buffer block. (2) Carriers are not required to make changes to secure additional end...

  7. Flight Physical Standards of the 1980’s: Spinal Column Considerations

    DTIC Science & Technology

    1979-10-01

    disease and spondylosis deformans. In addition, the role of vertebral body fractures oni subsequent spinal column impact is discussed. SECURITY...11 Spondylosis D eform ans ......................................... ................... 11 III...5th lumbar vertebra supports the superimposed weight of the torso upon the inclined plane of the sacrum. The necessity for bony continuity of the 5th

  8. 76 FR 12209 - Access to Aircraft Situation Display (ASDI) and National Airspace System Status Information (NASSI)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-04

    ..., a recent history of violent terrorist activity in the geographic area in which the transportation is...-oriented security concern'' that requires an employee to travel on a company plane for business and... history of violent terrorist activity in the geographic area in which the transportation is provided, or a...

  9. Analytical investigation of the dynamics of tethered constellations in Earth orbit, phase 2

    NASA Astrophysics Data System (ADS)

    Lorenzini, E. C.; Arnold, D. A.; Cosmo, M.; Grossi, M. D.

    1986-10-01

    The following topics related to the dynamics of the 4-mass tethered system are addressed: (1) the development of damping algorithms for damping the out-of-plane libration of the system and the interaction of the out-of-plane control with the other degrees of freedom; and (2) the development of environmental models to be added to the dynamics simulation computer code. The environmental models are specifically a new drag routine based on the Jacchia's 1977 model, a J(2) model and an accurate thermal model of the wire. Regarding topic (1) a survey of various out-of-plane libration control laws was carried out. Consequently a yo-yo control law with amplitude of the tether length variation proportional to the amplitude of the out-of-game libration has been selected. This control law provides good damping when applied to a (theoretical) two-dimensional system. In the actual 3-dimensional 4-mass tethered system, however, energy is transferred to the least damped degrees of freedom (the out-of-plane lateral deflections are still undamped in the present simulations) in such a way as to decrease the effectiveness of the algorithm for out-of-plane libration control. The addition of damping algorithms for the out-of-plane lateral deflections is therefore necessary.

  10. Analytical investigation of the dynamics of tethered constellations in Earth orbit, phase 2

    NASA Technical Reports Server (NTRS)

    Lorenzini, E. C.; Arnold, D. A.; Cosmo, M.; Grossi, M. D.

    1986-01-01

    The following topics related to the dynamics of the 4-mass tethered system are addressed: (1) the development of damping algorithms for damping the out-of-plane libration of the system and the interaction of the out-of-plane control with the other degrees of freedom; and (2) the development of environmental models to be added to the dynamics simulation computer code. The environmental models are specifically a new drag routine based on the Jacchia's 1977 model, a J(2) model and an accurate thermal model of the wire. Regarding topic (1) a survey of various out-of-plane libration control laws was carried out. Consequently a yo-yo control law with amplitude of the tether length variation proportional to the amplitude of the out-of-game libration has been selected. This control law provides good damping when applied to a (theoretical) two-dimensional system. In the actual 3-dimensional 4-mass tethered system, however, energy is transferred to the least damped degrees of freedom (the out-of-plane lateral deflections are still undamped in the present simulations) in such a way as to decrease the effectiveness of the algorithm for out-of-plane libration control. The addition of damping algorithms for the out-of-plane lateral deflections is therefore necessary.

  11. Simultaneous compression and encryption of closely resembling images: application to video sequences and polarimetric images.

    PubMed

    Aldossari, M; Alfalou, A; Brosseau, C

    2014-09-22

    This study presents and validates an optimized method of simultaneous compression and encryption designed to process images with close spectra. This approach is well adapted to the compression and encryption of images of a time-varying scene but also to static polarimetric images. We use the recently developed spectral fusion method [Opt. Lett.35, 1914-1916 (2010)] to deal with the close resemblance of the images. The spectral plane (containing the information to send and/or to store) is decomposed in several independent areas which are assigned according a specific way. In addition, each spectrum is shifted in order to minimize their overlap. The dual purpose of these operations is to optimize the spectral plane allowing us to keep the low- and high-frequency information (compression) and to introduce an additional noise for reconstructing the images (encryption). Our results show that not only can the control of the spectral plane enhance the number of spectra to be merged, but also that a compromise between the compression rate and the quality of the reconstructed images can be tuned. We use a root-mean-square (RMS) optimization criterion to treat compression. Image encryption is realized at different security levels. Firstly, we add a specific encryption level which is related to the different areas of the spectral plane, and then, we make use of several random phase keys. An in-depth analysis at the spectral fusion methodology is done in order to find a good trade-off between the compression rate and the quality of the reconstructed images. Our new proposal spectral shift allows us to minimize the image overlap. We further analyze the influence of the spectral shift on the reconstructed image quality and compression rate. The performance of the multiple-image optical compression and encryption method is verified by analyzing several video sequences and polarimetric images.

  12. A secure and robust information hiding technique for covert communication

    NASA Astrophysics Data System (ADS)

    Parah, S. A.; Sheikh, J. A.; Hafiz, A. M.; Bhat, G. M.

    2015-08-01

    The unprecedented advancement of multimedia and growth of the internet has made it possible to reproduce and distribute digital media easier and faster. This has given birth to information security issues, especially when the information pertains to national security, e-banking transactions, etc. The disguised form of encrypted data makes an adversary suspicious and increases the chance of attack. Information hiding overcomes this inherent problem of cryptographic systems and is emerging as an effective means of securing sensitive data being transmitted over insecure channels. In this paper, a secure and robust information hiding technique referred to as Intermediate Significant Bit Plane Embedding (ISBPE) is presented. The data to be embedded is scrambled and embedding is carried out using the concept of Pseudorandom Address Vector (PAV) and Complementary Address Vector (CAV) to enhance the security of the embedded data. The proposed ISBPE technique is fully immune to Least Significant Bit (LSB) removal/replacement attack. Experimental investigations reveal that the proposed technique is more robust to various image processing attacks like JPEG compression, Additive White Gaussian Noise (AWGN), low pass filtering, etc. compared to conventional LSB techniques. The various advantages offered by ISBPE technique make it a good candidate for covert communication.

  13. Efficient Terahertz detection in black-phosphorus nano-transistors with selective and controllable plasma-wave, bolometric and thermoelectric response

    PubMed Central

    Viti, Leonardo; Hu, Jin; Coquillat, Dominique; Politano, Antonio; Knap, Wojciech; Vitiello, Miriam S.

    2016-01-01

    The ability to convert light into an electrical signal with high efficiencies and controllable dynamics, is a major need in photonics and optoelectronics. In the Terahertz (THz) frequency range, with its exceptional application possibilities in high data rate wireless communications, security, night-vision, biomedical or video-imaging and gas sensing, detection technologies providing efficiency and sensitivity performances that can be “engineered” from scratch, remain elusive. Here, by exploiting the inherent electrical and thermal in-plane anisotropy of a flexible thin flake of black-phosphorus (BP), we devise plasma-wave, thermoelectric and bolometric nano-detectors with a selective, switchable and controllable operating mechanism. All devices operates at room-temperature and are integrated on-chip with planar nanoantennas, which provide remarkable efficiencies through light-harvesting in the strongly sub-wavelength device channel. The achieved selective detection (∼5–8 V/W responsivity) and sensitivity performances (signal-to-noise ratio of 500), are here exploited to demonstrate the first concrete application of a phosphorus-based active THz device, for pharmaceutical and quality control imaging of macroscopic samples, in real-time and in a realistic setting. PMID:26847823

  14. Human-Derived Disturbance Estimation and Compensation (DEC) Method Lends Itself to a Modular Sensorimotor Control in a Humanoid Robot.

    PubMed

    Lippi, Vittorio; Mergner, Thomas

    2017-01-01

    The high complexity of the human posture and movement control system represents challenges for diagnosis, therapy, and rehabilitation of neurological patients. We envisage that engineering-inspired, model-based approaches will help to deal with the high complexity of the human posture control system. Since the methods of system identification and parameter estimation are limited to systems with only a few DoF, our laboratory proposes a heuristic approach that step-by-step increases complexity when creating a hypothetical human-derived control systems in humanoid robots. This system is then compared with the human control in the same test bed, a posture control laboratory. The human-derived control builds upon the identified disturbance estimation and compensation (DEC) mechanism, whose main principle is to support execution of commanded poses or movements by compensating for external or self-produced disturbances such as gravity effects. In previous robotic implementation, up to 3 interconnected DEC control modules were used in modular control architectures separately for the sagittal plane or the frontal body plane and successfully passed balancing and movement tests. In this study we hypothesized that conflict-free movement coordination between the robot's sagittal and frontal body planes emerges simply from the physical embodiment, not necessarily requiring a full body control. Experiments were performed in the 14 DoF robot Lucy Posturob (i) demonstrating that the mechanical coupling from the robot's body suffices to coordinate the controls in the two planes when the robot produces movements and balancing responses in the intermediate plane, (ii) providing quantitative characterization of the interaction dynamics between body planes including frequency response functions (FRFs), as they are used in human postural control analysis, and (iii) witnessing postural and control stability when all DoFs are challenged together with the emergence of inter-segmental coordination in squatting movements. These findings represent an important step toward controlling in the robot in future more complex sensorimotor functions such as walking.

  15. Human-Derived Disturbance Estimation and Compensation (DEC) Method Lends Itself to a Modular Sensorimotor Control in a Humanoid Robot

    PubMed Central

    Lippi, Vittorio; Mergner, Thomas

    2017-01-01

    The high complexity of the human posture and movement control system represents challenges for diagnosis, therapy, and rehabilitation of neurological patients. We envisage that engineering-inspired, model-based approaches will help to deal with the high complexity of the human posture control system. Since the methods of system identification and parameter estimation are limited to systems with only a few DoF, our laboratory proposes a heuristic approach that step-by-step increases complexity when creating a hypothetical human-derived control systems in humanoid robots. This system is then compared with the human control in the same test bed, a posture control laboratory. The human-derived control builds upon the identified disturbance estimation and compensation (DEC) mechanism, whose main principle is to support execution of commanded poses or movements by compensating for external or self-produced disturbances such as gravity effects. In previous robotic implementation, up to 3 interconnected DEC control modules were used in modular control architectures separately for the sagittal plane or the frontal body plane and successfully passed balancing and movement tests. In this study we hypothesized that conflict-free movement coordination between the robot's sagittal and frontal body planes emerges simply from the physical embodiment, not necessarily requiring a full body control. Experiments were performed in the 14 DoF robot Lucy Posturob (i) demonstrating that the mechanical coupling from the robot's body suffices to coordinate the controls in the two planes when the robot produces movements and balancing responses in the intermediate plane, (ii) providing quantitative characterization of the interaction dynamics between body planes including frequency response functions (FRFs), as they are used in human postural control analysis, and (iii) witnessing postural and control stability when all DoFs are challenged together with the emergence of inter-segmental coordination in squatting movements. These findings represent an important step toward controlling in the robot in future more complex sensorimotor functions such as walking. PMID:28951719

  16. Compensatory Versus Noncompensatory Shoulder Movements Used for Reaching in Stroke.

    PubMed

    Levin, Mindy F; Liebermann, Dario G; Parmet, Yisrael; Berman, Sigal

    2016-08-01

    Background The extent to which the upper-limb flexor synergy constrains or compensates for arm motor impairment during reaching is controversial. This synergy can be quantified with a minimal marker set describing movements of the arm-plane. Objectives To determine whether and how (a) upper-limb flexor synergy in patients with chronic stroke contributes to reaching movements to different arm workspace locations and (b) reaching deficits can be characterized by arm-plane motion. Methods Sixteen post-stroke and 8 healthy control subjects made unrestrained reaching movements to targets located in ipsilateral, central, and contralateral arm workspaces. Arm-plane, arm, and trunk motion, and their temporal and spatial linkages were analyzed. Results Individuals with moderate/severe stroke used greater arm-plane movement and compensatory trunk movement compared to those with mild stroke and control subjects. Arm-plane and trunk movements were more temporally coupled in stroke compared with controls. Reaching accuracy was related to different segment and joint combinations for each target and group: arm-plane movement in controls and mild stroke subjects, and trunk and elbow movements in moderate/severe stroke subjects. Arm-plane movement increased with time since stroke and when combined with trunk rotation, discriminated between different subject groups for reaching the central and contralateral targets. Trunk movement and arm-plane angle during target reaches predicted the subject group. Conclusions The upper-limb flexor synergy was used adaptively for reaching accuracy by patients with mild, but not moderate/severe stroke. The flexor synergy, as parameterized by the amount of arm-plane motion, can be used by clinicians to identify levels of motor recovery in patients with stroke. © The Author(s) 2015.

  17. 33 CFR 165.773 - Security Zone; Escorted Vessels in Captain of the Port Zone Jacksonville, Florida.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... enforcement agency assets clearly identifiable by lights, vessel markings, or with agency insignia as follows...) When escorted vessels are moored, dayboards or other visual indications such as lights or buoys may be... proceeding at minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off...

  18. 33 CFR 165.773 - Security Zone; Escorted Vessels in Captain of the Port Zone Jacksonville, Florida.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... enforcement agency assets clearly identifiable by lights, vessel markings, or with agency insignia as follows...) When escorted vessels are moored, dayboards or other visual indications such as lights or buoys may be... proceeding at minimum safe speed if it is: (1) On a plane; (2) In the process of coming up onto or coming off...

  19. Improved Procedure for Loading the M198 Towed Howitzer Aboard a C130 Cargo Plane.

    DTIC Science & Technology

    1986-04-01

    anl latr roln:.-;ill the large nmber of bolts which secure the rails to the airplane. Sinc, the Air Force posit ion was considered to have a...198-044, APG Report No. APG-MT- 6034 , June 1984. 10. "Customer Test of the M198 Howitzer Air Transportability Kit (TRADOC Trms No. 4000544, ISAABNBD

  20. Controlled multiple neutral planes by low elastic modulus adhesive for flexible organic photovoltaics.

    PubMed

    Kim, Wansun; Lee, Inhwa; Yoon Kim, Dong; Yu, Youn-Yeol; Jung, Hae-Yoon; Kwon, Seyeoul; Seo Park, Weon; Kim, Taek-Soo

    2017-05-12

    To protect brittle layers in organic photovoltaic devices, the mechanical neutral plane strategy can be adopted through placing the brittle functional materials close to the neutral plane where stress and strain are zero during bending. However, previous research has been significantly limited in the location and number of materials to protect through using a single neutral plane. In this study, multiple neutral planes are generated using low elastic modulus adhesives and are controlled through quantitative analyses in order to protect the multiple brittle materials at various locations. Moreover, the protection of multiple brittle layers at various locations under both concave and convex bending directions is demonstrated. Multilayer structures that have soft adhesives are further analyzed using the finite element method analysis in order to propose guidelines for structural design when employing multiple neutral planes.

  1. Rate of Malunion Following Bi-plane Chevron Medial Malleolar Osteotomy.

    PubMed

    Bull, Patrick E; Berlet, Gregory C; Canini, Cameron; Hyer, Christopher F

    2016-06-01

    Access to the medial half of the talus can be challenging even with an osteotomy. Although several techniques are presented in the literature, critical evaluation of fixation, union, and alignment is lacking. The chevron medial malleolar osteotomy provides advantages of perpendicular instrumentation access and wide exposure to the medial talus. Postoperative displacement resulting in malunion, and possibly provoking ankle osteoarthritis, is a known complication. The present study describes our experience with the osteotomy. A consecutive series cohort of 50 bi-plane chevron osteotomies performed from 2004 to 2013 were evaluated. Forty-six were secured using 2 lag screws, and 4 were secured using 2 lag screws and a medial buttress plate. Radiographic studies performed at 2, 6, and 12 weeks and at final follow-up were analyzed for postoperative displacement, malunion, non-union, and hardware-related complications. At initial postoperative follow-up, 47 of 50 had adequate radiographs for review, and 18 of 47 (38.3%) showed some displacement when compared to the initial osteotomy fixation position. By final follow-up, 15 of 50 (30.0%) had measurable incongruence. Hardware removal was performed in 13 (26.0%) cases at an average of 2.4 years postoperation. Bi-plane medial malleolar chevron osteotomy fixed with 2 lag screws showed a 30.0% malunion rate with an average of 2 mm of incongruence on final follow-up radiographs, which is higher than what has been reported in the literature. In our practice, we now use a buttress plate and more recently have eliminated postoperative osteotomy displacement. Level IV, retrospective case series. © The Author(s) 2016.

  2. Executive Summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, James J.; Cook, Kristin A.

    2005-05-09

    Motivation Our country faces profound challenges that must be addressed in order to ensure our continued freedom and security. As the September 11, 2001, attacks on the Pentagon and World Trade Center illustrate, threats to the United States are present within our borders. On that day, after at least 20 months of planning and preparation, nineteen terrorists hijacked four airliners at three different airports in a coordinated attack. The hijackers crashed two planes into the World Trade Center’s twin towers and one plane into the Pentagon. The fourth plane, intended to attack another U.S. landmark, crashed in a field inmore » Pennsylvania. 2973 people lost their lives as a result of this attack. As the attack unfolded, government agencies and emergency response personnel had to respond in real time to situations for which policies and procedures did not exist. They were forced to assess situations and make decisions under extreme pressure, often without having critical information that would help them save additional lives. [National Commission on Terrorist Attacks, 2004]« less

  3. Multiplanar lumbopelvic control in patients with low back pain: is multiplanar assessment better than single plane assessment in discriminating between patients and healthy controls?

    PubMed

    Nelson-Wong, E; Gallant, P; Alexander, S; Dehmer, K; Ingvalson, S; McClenahan, B; Piatte, A; Poupore, K; Davis, A M

    2016-02-01

    Patients with low back pain (LBP) commonly have lumbopelvic control deficits. Lumbopelvic assessment during sagittal motion is incorporated into commonly used clinical examination algorithms for Treatment Based Classification. The purpose of this study was to investigate whether combined assessment of lumbopelvic control during sagittal and frontal plane motion discriminates between people with and without LBP better than single plane assessment alone. Nineteen patients with LBP and 18 healthy control participants volunteered for this study. The active straight leg raise (ASLR) and active hip abduction (AHAbd) tests were used to assess lumbopelvic control during sagittal and frontal plane motion, respectively. The tests were scored as positive or negative using published scoring criteria. Contingency tables were created for each test alone and for the combined tests (both positive/both negative) with presence/absence of LBP as the reference standard to calculate accuracy statistics of sensitivity (sn), specificity (sp), likelihood (+LR and -LR), and diagnostic odds ratios (OR). Active straight leg raise and AHAbd tests alone had sn of 0·63, 0·74, respectively, sp of 0·61, 0·50, respectively, and OR of 2·7, 2·8, respectively. The combined tests had sn = 0·89, sp = 0·60, and OR = 12·0. Forty percent of patients with LBP had control deficits in both planes of motion. The AHAbd and ALSR tests appear to have greater diagnostic discrimination when used in combination than when used independently. A percentage of patients with LBP had control deficits in both planes, while others demonstrated uniplanar deficits only. These findings highlight the importance of multiplanar assessment in patients with LBP.

  4. MRI-guided therapeutic ultrasound: Temperature feedback control for extracorporeal and endoluminal applicators

    NASA Astrophysics Data System (ADS)

    Salomir, Rares

    2005-09-01

    Therapeutic ultrasound is a mini-invasive and promising tool for in situ ablation of non-resectable tumors in uterus, breast, esophagus, kidney, liver, etc. Extracorporeal, endoluminal, and interstitial applicators have been successfully tested to date. Magnetic resonance imaging (MRI) is the only available technique providing non-invasive temperature mapping, together with excellent contrast of soft tissue. Coupling of these two technologies offers the advantage of both: (1) on line spatial guidance to the target region, and (2) thermal dose control during the treatment. This talk will provide an overview of the author's experience with automatic, active feedback control of the temperature evolution in tissues, which has been demonstrated with MRI compatible extracorporeal transducers (focused beam) or endoluminal applicators (plane waves). The feedback loop is based on fast switching capabilities of the driving electronics and real time data transfer out of the MR scanner. Precision of temperature control was typically better than 1°C. This approach is expected to improve the efficacy of the treatment (complete tumor ablation) and the thermal security of the critical regions crossed by the acoustic beam. It also permits one to reach an under-lethal heating regime for local drug delivery using thermosensitive liposomes or gene expression control based on hsp promoters.

  5. Contribution of lower limb eccentric work and different step responses to balance recovery among older adults.

    PubMed

    Nagano, Hanatsu; Levinger, Pazit; Downie, Calum; Hayes, Alan; Begg, Rezaul

    2015-09-01

    Falls during walking reflect susceptibility to balance loss and the individual's capacity to recover stability. Balance can be recovered using either one step or multiple steps but both responses are impaired with ageing. To investigate older adults' (n=15, 72.5±4.8 yrs) recovery step control a tether-release procedure was devised to induce unanticipated forward balance loss. Three-dimensional position-time data combined with foot-ground reaction forces were used to measure balance recovery. Dependent variables were; margin of stability (MoS) and available response time (ART) for spatial and temporal balance measures in the transverse and sagittal planes; lower limb joint angles and joint negative/positive work; and spatio-temporal gait parameters. Relative to multi-step responses, single-step recovery was more effective in maintaining balance, indicated by greater MoS and longer ART. MoS in the sagittal plane measure and ART in the transverse plane distinguished single step responses from multiple steps. When MoS and ART were negative (<0), balance was not secured and additional steps would be required to establish the new base of support for balance recovery. Single-step responses demonstrated greater step length and velocity and when the recovery foot landed, greater centre of mass downward velocity. Single-step strategies also showed greater ankle dorsiflexion, increased knee maximum flexion and more negative work at the ankle and knee. Collectively these findings suggest that single-step responses are more effective in forward balance recovery by directing falling momentum downward to be absorbed as lower limb eccentric work. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. 21 CFR 1301.73 - Physical security controls for non-practitioners; compounders for narcotic treatment programs...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners..., DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES Security Requirements § 1301.73 Physical security... adequate security for the area or building. If such security requires an alarm, such alarm, upon...

  7. Bit-level plane image encryption based on coupled map lattice with time-varying delay

    NASA Astrophysics Data System (ADS)

    Lv, Xiupin; Liao, Xiaofeng; Yang, Bo

    2018-04-01

    Most of the existing image encryption algorithms had two basic properties: confusion and diffusion in a pixel-level plane based on various chaotic systems. Actually, permutation in a pixel-level plane could not change the statistical characteristics of an image, and many of the existing color image encryption schemes utilized the same method to encrypt R, G and B components, which means that the three color components of a color image are processed three times independently. Additionally, dynamical performance of a single chaotic system degrades greatly with finite precisions in computer simulations. In this paper, a novel coupled map lattice with time-varying delay therefore is applied in color images bit-level plane encryption to solve the above issues. Spatiotemporal chaotic system with both much longer period in digitalization and much excellent performances in cryptography is recommended. Time-varying delay embedded in coupled map lattice enhances dynamical behaviors of the system. Bit-level plane image encryption algorithm has greatly reduced the statistical characteristics of an image through the scrambling processing. The R, G and B components cross and mix with one another, which reduces the correlation among the three components. Finally, simulations are carried out and all the experimental results illustrate that the proposed image encryption algorithm is highly secure, and at the same time, also demonstrates superior performance.

  8. Layperson's preference regarding orientation of the transverse occlusal plane and commissure line from the frontal perspective.

    PubMed

    Silva, Bruno Pereira; Jiménez-Castellanos, Emilio; Finkel, Sivan; Macias, Inmaculada Redondo; Chu, Stephen J

    2017-04-01

    Facial asymmetries in features such as lip commissure and interpupillary plane canting have been described as common conditions affecting smile esthetics. When presented with these asymmetries, the clinician must choose the reference line with which to orient the transverse occlusal plane of the planned dental restorations. The purpose of the online survey described in this study was to determine lay preferences regarding the transverse occlusal plane orientation in faces that display a cant of the commissure line viewed from the frontal perspective. From a digitally created symmetrical facial model with the transverse occlusal plane and commissure line parallel to the interpupillary line (horizontal) and a model constructed in a previous study (control), a new facial model was created with 3 degrees of cant of the commissure line. Three digital tooth mountings were designed with different transverse occlusal plane orientations: parallel to the interpupillary line (A), parallel to the commissure line (B), and the mean angulation plane formed between the interpupillary and commissure line (C), resulting in a total of 4 images. All images, including the control, were organized into 6 pairs and evaluated by 247 selected laypersons through an online Web site survey. Each participant was asked to choose the more attractive face from each of the 6 pairs of images. The control image was preferred by 72.9% to 74.5% of the participants compared with the other 3 images, all of which represented a commissure line cant. Among the 3 pairs which represent a commissure line cant, 59.1% to 61.1% preferred a transverse plane of occlusion cant (B and C) compared with a plane of occlusion parallel to the interpupillary, line and 61.1% preferred a plane of occlusion parallel to the commissure line (B) compared with the mean angulation plane (C). Laypeople prefer faces with a commissure line and transverse occlusal plane parallel to the horizontal plane or horizon. When faces present a commissure line cant, laypeople prefer a transverse occlusal plane with a similar and coincident cant. Copyright © 2016 Editorial Council for the Journal of Prosthetic Dentistry. Published by Elsevier Inc. All rights reserved.

  9. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  10. A Novel Quantum Image Steganography Scheme Based on LSB

    NASA Astrophysics Data System (ADS)

    Zhou, Ri-Gui; Luo, Jia; Liu, XingAo; Zhu, Changming; Wei, Lai; Zhang, Xiafen

    2018-06-01

    Based on the NEQR representation of quantum images and least significant bit (LSB) scheme, a novel quantum image steganography scheme is proposed. The sizes of the cover image and the original information image are assumed to be 4 n × 4 n and n × n, respectively. Firstly, the bit-plane scrambling method is used to scramble the original information image. Then the scrambled information image is expanded to the same size of the cover image by using the key only known to the operator. The expanded image is scrambled to be a meaningless image with the Arnold scrambling. The embedding procedure and extracting procedure are carried out by K 1 and K 2 which are under control of the operator. For validation of the presented scheme, the peak-signal-to-noise ratio (PSNR), the capacity, the security of the images and the circuit complexity are analyzed.

  11. Co-scheduling of network resource provisioning and host-to-host bandwidth reservation on high-performance network and storage systems

    DOEpatents

    Yu, Dantong; Katramatos, Dimitrios; Sim, Alexander; Shoshani, Arie

    2014-04-22

    A cross-domain network resource reservation scheduler configured to schedule a path from at least one end-site includes a management plane device configured to monitor and provide information representing at least one of functionality, performance, faults, and fault recovery associated with a network resource; a control plane device configured to at least one of schedule the network resource, provision local area network quality of service, provision local area network bandwidth, and provision wide area network bandwidth; and a service plane device configured to interface with the control plane device to reserve the network resource based on a reservation request and the information from the management plane device. Corresponding methods and computer-readable medium are also disclosed.

  12. An overview of controls research on the NASA Langley Research Center grid

    NASA Technical Reports Server (NTRS)

    Montgomery, Raymond C.

    1987-01-01

    The NASA Langley Research Center has assembled a flexible grid on which control systems research can be accomplished on a two-dimensional structure that has many physically distributed sensors and actuators. The grid is a rectangular planar structure that is suspended by two cables attached to one edge so that out of plane vibrations are normal to gravity. There are six torque wheel actuators mounted to it so that torque is produced in the grid plane. Also, there are six rate gyros mounted to sense angular motion in the grid plane and eight accelerometers that measure linear acceleration normal to the grid plane. All components can be relocated to meet specific control system test requirements. Digital, analog, and hybrid control systems capability is provided in the apparatus. To date, research on this grid has been conducted in the areas of system and parameter identification, model estimation, distributed modal control, hierarchical adaptive control, and advanced redundancy management algorithms. The presentation overviews each technique and presents the most significant results generated for each area.

  13. Depth-enhanced integral imaging display system with electrically variable image planes using polymer-dispersed liquid-crystal layers.

    PubMed

    Kim, Yunhee; Choi, Heejin; Kim, Joohwan; Cho, Seong-Woo; Kim, Youngmin; Park, Gilbae; Lee, Byoungho

    2007-06-20

    A depth-enhanced three-dimensional integral imaging system with electrically variable image planes is proposed. For implementing the variable image planes, polymer-dispersed liquid-crystal (PDLC) films and a projector are adopted as a new display system in the integral imaging. Since the transparencies of PDLC films are electrically controllable, we can make each film diffuse the projected light successively with a different depth from the lens array. As a result, the proposed method enables control of the location of image planes electrically and enhances the depth. The principle of the proposed method is described, and experimental results are also presented.

  14. 77 FR 5302 - Ford Motor Company, Receipt of Petition for Decision of Inconsequential Noncompliance

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-02

    ... plane of the steering wheel hub; or for a turn signal control that is operated in a plane essentially parallel to the face plane of the steering wheel in its normal driving position and which is located on the... face plane of the steering wheel hub, the identifier must meet Table 2 requirements for the horn...

  15. Exploiting Inherent Robustness and Natural Dynamics in the Control of Bipedal Walking Robots

    DTIC Science & Technology

    2000-06-01

    physical models of bipedal walking. The insight gained from these models is used in the development of three planar (motion only in the sagittal plane ...ground is implemented and tested in simulation. The dynamics of the sagittal plane are suffciently decoupled from the dynamics of the frontal and...transverse planes such that control of each can be treated separately. We achieve three-dimensional walking by adding lateral balance to the planar algorithms

  16. Principle and verification of novel optical virtual private networks over multiprotocol label switching/optical packet switching networks

    NASA Astrophysics Data System (ADS)

    Zhang, Chongfu; Wang, Zhengsuan; Jin, Wei; Qiu, Kun

    2012-11-01

    A novel realization method of the optical virtual private networks (OVPN) over multiprotocol label switching/optical packet switching (MPLS/OPS) networks is proposed. In this scheme, the introduction of MPLS control plane makes OVPN over OPS networks more reliable and easier; OVPN makes use of the concept of high reconfiguration of light-paths offered by MPLS, to set up secure tunnels of high bandwidth across intelligent OPS networks. Through resource management, the signal mechanism, connection control, and the architecture of the creation and maintenance of OVPN are efficiently realized. We also present an OVPN architecture with two traffic priorities, which is used to analyze the capacity, throughput, delay time of the proposed networks, and the packet loss rate performance of the OVPN over MPLS/OPS networks based on full mesh topology. The results validate the applicability of such reliable connectivity to high quality services in the OVPN over MPLS/OPS networks. Along with the results, the feasibility of the approach as the basis for the next generation networks is demonstrated and discussed.

  17. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  18. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  19. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  20. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  1. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  2. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  3. Non-equilibrium dynamic reversal of in-plane ferromagnetic elliptical disk

    NASA Astrophysics Data System (ADS)

    Kim, June-Seo; Hwang, Hee-Kyeong; You, Chun-Yeol

    2018-01-01

    The ultrafast switching mechanism of an in-plane magnetized elliptical magnetic disk by applying dynamic out-of-plane magnetic field pulses is investigated by performing micromagnetic simulations. For the in-plane magnetized nanostructures, the out-of-plane magnetic field is able to rotate the direction of magnetization when the precession torque overcomes the shape anisotropy of the system. This type magnetization reversal is one of non-equilibrium dynamic within a certain transition time util the precession torque is equivalent to the damping torque. By controlling the rise time or fall times of dynamic out-of-plane field pulses, the transition time can be also successively tuned and then an ultrafast switching of an elliptical magnetic nano-disk is clearly achieved by controlling the precessional torque. As another reversal approach, sinusoidal magnetic fields in gigahertz range are applied to the system. Consequently, the thresholds of switching fields are drastically decreased. We also reveal that the ferromagnetic resonance frequencies at the center and the edge of the elliptical disk are most important for microwave sinusoidal out-of-plane magnetic field induced magnetization reversal.

  4. Tethered satellite system dynamics and control

    NASA Technical Reports Server (NTRS)

    Musetti, B.; Cibrario, B.; Bussolino, L.; Bodley, C. S.; Flanders, H. A.; Mowery, D. K.; Tomlin, D. D.

    1990-01-01

    The first tethered satellite system, scheduled for launch in May 1991, is reviewed. The system dynamics, dynamics control, and dynamics simulations are discussed. Particular attention is given to in-plane and out-of-plane librations; tether oscillation modes; orbiter and sub-satellite dynamics; deployer control system; the sub-satellite attitude measurement and control system; the Aeritalia Dynamics Model; the Martin-Marietta and NASA-MSFC Dynamics Model; and simulation results.

  5. Fast-response free-running frequency-stabilized dc-to-dc converter employing a state plane-trajectory control law

    NASA Technical Reports Server (NTRS)

    Huffman, S. D.; Burns, W. W., III; Wilson, T. G.; Owen, H. A., Jr.

    1976-01-01

    Implementations of a state-plane-trajectory control law for energy storage dc-to-dc converters are presented. Performance characteristics of experimental voltage step-up converter systems employing these implementations are reported and compared to theoretical predictions.

  6. Interest in the glenoid hull method for analyzing humeral subluxation in primary glenohumeral osteoarthritis.

    PubMed

    Bouacida, Soufyane; Gauci, Marc-Olivier; Coulet, Bertrand; Lazerges, Cyril; Cyteval, Catherine; Boileau, Pascal; Chammas, Michel

    2017-07-01

    Posterior humeral subluxation is the main cause of failure of total shoulder arthroplasty. We aimed to compare humeral head subluxation in various reference planes and to search for a correlation with retroversion, inclination, and glenoid wear. We included 109 computed tomography scans of primary glenohumeral osteoarthritis and 97 of shoulder problems unrelated to shoulder osteoarthritis (controls); all computed tomography scans were reconstructed in the anatomic scapular plane and the glenoid hull plane that we defined. In both planes, we measured retroversion, inclination, glenohumeral offset (Walch index), and scapulohumeral offset. Retroversion in the scapular plane (Friedman method) was lower than that in the glenoid hull plane for controls and for arthritic shoulders. The threshold of scapulohumeral subluxation was 60% and 65% in the scapular plane and glenoid hull plane, respectively. The mean upward inclination was lower in the scapular plane (Churchill method) than in the glenoid hull plane (Maurer method). In the glenoid hull plane, 35% of type A2 glenoids showed glenohumeral offset greater than 75%, with mean retroversion of 25.6° ± 6° as compared with 7.5° ± 7.2° for the "centered" type A2 glenoids (P < .0001) and an upward inclination of -1.4° ± 8° and 6.3° ± 7° (P = .03), respectively. The correlation between retroversion and scapulohumeral offset was r = 0.64 in the glenoid hull plane and r = 0.59 in the scapular plane (P < .05). Measurement in the glenoid hull plane may be more accurate than in the scapular plane. Thus, the glenoid hull method allows for better understanding type B3 of the modified Walch classification. Copyright © 2017 Journal of Shoulder and Elbow Surgery Board of Trustees. Published by Elsevier Inc. All rights reserved.

  7. Dynamics and control of tethered antennas/reflectors in orbit

    NASA Astrophysics Data System (ADS)

    Liu, Liangdong; Bainum, Peter M.

    The system linear equations for the motion of a tethered shallow spherical shell in orbit with its symmetry axis nominally following the local vertical are developed. The shell roll, yaw, tether out-of-plane swing motion and elastic vibrations are decoupled from the shell and tether in-plane pitch motions and elastic vibrations. The neutral gravity stability conditions for the special case of a constant length rigid tether are given for in-plane motion and out-of-plant motion. It is proved that the in-plane motion of the system could be asymptotically stable based on Rupp's tension control law, for a variable length tether. However, the system simulation results indicate that the transient responses can be improved significantly, especially for the damping of the tether and shell pitch motion, by an optimal feedback control law for the rigid variable length tether model. It is also seen that the system could be unstable when the effect of tether flexibility is included if the control gains are not chosen carefully. The transient responses for three different tension control laws are compared during typical station keeping operations.

  8. Multidimensional Scaling in the Poincare Disk

    DTIC Science & Technology

    2011-05-01

    REPORT Multidimensional Scaling in the Poincare Dis 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Multidimensional scaling (MDS) is a class of projective...DATES COVERED (From - To) Standard Form 298 (Rev 8/98) Prescribed by ANSI Std. Z39.18 - Multidimensional Scaling in the Poincare Dis Report Title... plane . Our construction is based on an approximate hyperbolic line search and exempli?es some of the particulars that need to be addressed when

  9. Cutting planes for the multistage stochastic unit commitment problem

    DOE PAGES

    Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul

    2016-04-20

    As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less

  10. Cutting planes for the multistage stochastic unit commitment problem

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jiang, Ruiwei; Guan, Yongpei; Watson, Jean -Paul

    As renewable energy penetration rates continue to increase in power systems worldwide, new challenges arise for system operators in both regulated and deregulated electricity markets to solve the security-constrained coal-fired unit commitment problem with intermittent generation (due to renewables) and uncertain load, in order to ensure system reliability and maintain cost effectiveness. In this paper, we study a security-constrained coal-fired stochastic unit commitment model, which we use to enhance the reliability unit commitment process for day-ahead power system operations. In our approach, we first develop a deterministic equivalent formulation for the problem, which leads to a large-scale mixed-integer linear program.more » Then, we verify that the turn on/off inequalities provide a convex hull representation of the minimum-up/down time polytope under the stochastic setting. Next, we develop several families of strong valid inequalities mainly through lifting schemes. In particular, by exploring sequence independent lifting and subadditive approximation lifting properties for the lifting schemes, we obtain strong valid inequalities for the ramping and general load balance polytopes. Lastly, branch-and-cut algorithms are developed to employ these valid inequalities as cutting planes to solve the problem. Our computational results verify the effectiveness of the proposed approach.« less

  11. Voltage Control of Antiferromagnetic Phases at Near-Terahertz Frequencies

    NASA Astrophysics Data System (ADS)

    Barra, Anthony; Domann, John; Kim, Ki Wook; Carman, Greg

    2018-03-01

    A method to control antiferromagnetism using voltage-induced strain is proposed and theoretically examined. Voltage-induced magnetoelastic anisotropy is shown to provide sufficient torque to switch an antiferromagnetic domain 90° either from out of plane to in plane or between in-plane axes. Numerical results indicate that strain-mediated antiferromagnetic switching can occur in an 80-nm nanopatterned disk at frequencies approaching 1 THz but that the switching speed heavily depends on the system's mechanical design. Furthermore, the energy cost to induce magnetic switching is only 450 aJ, indicating that magnetoelastic control of antiferromagnetism is substantially more energy efficient than other approaches.

  12. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  13. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  14. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  15. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  16. 49 CFR 1542.207 - Access control systems.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control... original access medium, if the airport operator follows measures and procedures in the security program...

  17. Aircraft digital control design methods

    NASA Technical Reports Server (NTRS)

    Powell, J. D.; Parsons, E.; Tashker, M. G.

    1976-01-01

    Variations in design methods for aircraft digital flight control are evaluated and compared. The methods fall into two categories; those where the design is done in the continuous domain (or s plane) and those where the design is done in the discrete domain (or z plane). Design method fidelity is evaluated by examining closed loop root movement and the frequency response of the discretely controlled continuous aircraft. It was found that all methods provided acceptable performance for sample rates greater than 10 cps except the uncompensated s plane design method which was acceptable above 20 cps. A design procedure based on optimal control methods was proposed that provided the best fidelity at very slow sample rates and required no design iterations for changing sample rates.

  18. Ocean sciences after September 11

    NASA Astrophysics Data System (ADS)

    McPhaden, Michael J.

    The terrorist attacks in New York City and Washington D.C. on September 11, 2001 shocked the world with their audacity and destruction. Shortly thereafter, bioterrorists struck through the U.S. postal system. Virtually overnight, major policy shifts took place in the United States that catapulted national security and homeland defense to the top of the political agenda. The consequences were unimaginable just a few months before: an international coalition at war against the Taliban in Afghanistan, major increases in U.S. defense spending, tightened security measures at airports, government facilities, and research laboratories, and a new sense of vulnerability in the post-cold war era. AGU itself was directly affected: three of its members perished in the hijacked planes, or on the ground in New York City.

  19. Security hologram foil labels with a design facilitating authenticity testing: effects of mechanical bending of substrates with the glued on holograms

    NASA Astrophysics Data System (ADS)

    Aubrecht, Ivo

    2015-05-01

    Optimal design of security holograms or diffractive optically variable image devices (DOVIDs) that would be complex enough to deter counterfeiters from attempts of mimicking but contains features readily recognizable by laymen has been addressed by many experts. This paper tries to discuss effects of mechanical bending of a flexible substrate to visual appearance of a glued-on foil DOVID. Initially plane, the DOVID is deformed to a convex- or concave-shaped curved surface. Theoretical analyses and experimental results assume the surface to be a cylindrical segment and concern rainbow-type surface-relief holograms that are recorded piecewise in a photoresist material, coated on planar and non-planar substrates.

  20. Intraosseous anesthesia using a computer-controlled system during non-surgical periodontal therapy (root planing): Two case reports.

    PubMed

    Han, Keumah; Kim, Jongbin

    2018-02-01

    Local anesthesia is administered to control pain, but it may induce fear and anxiety. Root planing is a non-surgical periodontal therapy; however, when it is performed in an extensive manner, some tissue removal is inevitable. Notably, this removal may be so painful that local anesthesia is required to be administered to the area scheduled for the treatment. Although patients tend to accept root planing easily, they frequently express a fear of local anesthesia. Intraosseous anesthesia (IA) is an intraosseous injection technique, whereby local anesthetic is injected into the cancellous bone supporting the teeth. A computer-controlled IA system (CIAS) exhibits multiple benefits, such as less painful anesthesia, reduced soft tissue numbness, and the provision of palatal or lingual, as well as buccal, anesthesia via single needle penetration. In this report, we present two cases of root planing that were performed under local anesthesia, using a CIAS.

  1. Intraosseous anesthesia using a computer-controlled system during non-surgical periodontal therapy (root planing): Two case reports

    PubMed Central

    2018-01-01

    Local anesthesia is administered to control pain, but it may induce fear and anxiety. Root planing is a non-surgical periodontal therapy; however, when it is performed in an extensive manner, some tissue removal is inevitable. Notably, this removal may be so painful that local anesthesia is required to be administered to the area scheduled for the treatment. Although patients tend to accept root planing easily, they frequently express a fear of local anesthesia. Intraosseous anesthesia (IA) is an intraosseous injection technique, whereby local anesthetic is injected into the cancellous bone supporting the teeth. A computer-controlled IA system (CIAS) exhibits multiple benefits, such as less painful anesthesia, reduced soft tissue numbness, and the provision of palatal or lingual, as well as buccal, anesthesia via single needle penetration. In this report, we present two cases of root planing that were performed under local anesthesia, using a CIAS. PMID:29556561

  2. Serial Testing of Postural Control After Acute Lateral Ankle Sprain

    PubMed Central

    Buckley, W. E.; Denegar, Craig R.

    2001-01-01

    Objective: To identify subjects' changes in postural control during single-leg stance in the 4 weeks after acute lateral ankle sprain. Design and Setting: We used a 2 × 2 × 3 (side-by-plane-by-session) within-subjects design with repeated measures on all 3 factors. All tests were performed in a university laboratory. Subjects: Seventeen young adults (9 men, 8 women; age, 21.8 ± 5.9 years; mass, 74.9 ± 10.5 kg; height, 176.9 ± 7.1 cm) who had sustained unilateral acute mild or moderate lateral ankle sprains. Measurements: Measures of center-of-pressure excursion length, root mean square velocity of center-of-pressure excursions (VEL), and range of center-of-pressure excursions (RANGE) were calculated separately in the frontal and sagittal planes during 5-second trials of static single-leg stance. Results: We noted significant side-by-plane-by-session interactions for magnitude of center-of-pressure excursions in a given trial (PSL) (P = .004), VEL (P = .011), and RANGE (P = .009). Both PSL and VEL in the frontal plane were greater in the injured limbs compared with the uninjured limbs on day 1 and during week 2 but not during week 4, whereas sagittal-plane differences existed during all 3 testing sessions. Injured-limb, frontal-plane RANGE scores were greater than uninjured values at day 1 but not during weeks 2 or 4. No significant differences in sagittal-plane RANGE scores were seen. Conclusions: Postural control was significantly impaired in the injured limbs at day 1 and during week 2 after lateral ankle sprain but not during week 4. Consistent improvement in postural control measures on both injured and uninjured limbs was seen throughout the 4 weeks after ankle sprain. PMID:12937477

  3. Realisation and robustness evaluation of a blind spatial domain watermarking technique

    NASA Astrophysics Data System (ADS)

    Parah, Shabir A.; Sheikh, Javaid A.; Assad, Umer I.; Bhat, Ghulam M.

    2017-04-01

    A blind digital image watermarking scheme based on spatial domain is presented and investigated in this paper. The watermark has been embedded in intermediate significant bit planes besides the least significant bit plane at the address locations determined by pseudorandom address vector (PAV). The watermark embedding using PAV makes it difficult for an adversary to locate the watermark and hence adds to security of the system. The scheme has been evaluated to ascertain the spatial locations that are robust to various image processing and geometric attacks JPEG compression, additive white Gaussian noise, salt and pepper noise, filtering and rotation. The experimental results obtained, reveal an interesting fact, that, for all the above mentioned attacks, other than rotation, higher the bit plane in which watermark is embedded more robust the system. Further, the perceptual quality of the watermarked images obtained in the proposed system has been compared with some state-of-art watermarking techniques. The proposed technique outperforms the techniques under comparison, even if compared with the worst case peak signal-to-noise ratio obtained in our scheme.

  4. Single-intensity-recording optical encryption technique based on phase retrieval algorithm and QR code

    NASA Astrophysics Data System (ADS)

    Wang, Zhi-peng; Zhang, Shuai; Liu, Hong-zhao; Qin, Yi

    2014-12-01

    Based on phase retrieval algorithm and QR code, a new optical encryption technology that only needs to record one intensity distribution is proposed. In this encryption process, firstly, the QR code is generated from the information to be encrypted; and then the generated QR code is placed in the input plane of 4-f system to have a double random phase encryption. For only one intensity distribution in the output plane is recorded as the ciphertext, the encryption process is greatly simplified. In the decryption process, the corresponding QR code is retrieved using phase retrieval algorithm. A priori information about QR code is used as support constraint in the input plane, which helps solve the stagnation problem. The original information can be recovered without distortion by scanning the QR code. The encryption process can be implemented either optically or digitally, and the decryption process uses digital method. In addition, the security of the proposed optical encryption technology is analyzed. Theoretical analysis and computer simulations show that this optical encryption system is invulnerable to various attacks, and suitable for harsh transmission conditions.

  5. Piezotronic Effect in Polarity-Controlled GaN Nanowires.

    PubMed

    Zhao, Zhenfu; Pu, Xiong; Han, Changbao; Du, Chunhua; Li, Linxuan; Jiang, Chunyan; Hu, Weiguo; Wang, Zhong Lin

    2015-08-25

    Using high-quality and polarity-controlled GaN nanowires (NWs), we studied the piezotronic effect in crystal orientation defined wurtzite structures. By applying a normal compressive force on c-plane GaN NWs with an atomic force microscopy tip, the Schottky barrier between the Pt tip and GaN can be effectively tuned by the piezotronic effect. In contrast, the normal compressive force cannot change the electron transport characteristics in m-plane GaN NWs whose piezoelectric polarization axis is turned in the transverse direction. This observation provided solid evidence for clarifying the difference between the piezotronic effect and the piezoresistive effect. We further demonstrated a high sensitivity of the m-plane GaN piezotronic transistor to collect the transverse force. The integration of c-plane GaN and m-plane GaN indicates an overall response to an external force in any direction.

  6. Analyzing Cases of Resilience Success and Failure - A Research Study

    DTIC Science & Technology

    2012-12-01

    controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring

  7. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  8. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  11. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 32 CFR 2800.4 - General information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... STATES SECURITY PROCEDURES § 2800.4 General information. (a) Staff Security Officer/Top Secret Control... Staff Security Officer will serve as Top Secret Control Officer and Assistant Top Secret Control Officer... responsible for the overall supervision of the Top Secret Control program. They will maintain positive control...

  13. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Architecture Lab Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.

    2015-01-01

    NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.

  14. Person and gesture tracking with smart stereo cameras

    NASA Astrophysics Data System (ADS)

    Gordon, Gaile; Chen, Xiangrong; Buck, Ron

    2008-02-01

    Physical security increasingly involves sophisticated, real-time visual tracking of a person's location inside a given environment, often in conjunction with biometrics and other security-related technologies. However, demanding real-world conditions like crowded rooms, changes in lighting and physical obstructions have proved incredibly challenging for 2D computer vision technology. In contrast, 3D imaging technology is not affected by constant changes in lighting and apparent color, and thus allows tracking accuracy to be maintained in dynamically lit environments. In addition, person tracking with a 3D stereo camera can provide the location and movement of each individual very precisely, even in a very crowded environment. 3D vision only requires that the subject be partially visible to a single stereo camera to be correctly tracked; multiple cameras are used to extend the system's operational footprint, and to contend with heavy occlusion. A successful person tracking system, must not only perform visual analysis robustly, but also be small, cheap and consume relatively little power. The TYZX Embedded 3D Vision systems are perfectly suited to provide the low power, small footprint, and low cost points required by these types of volume applications. Several security-focused organizations, including the U.S Government, have deployed TYZX 3D stereo vision systems in security applications. 3D image data is also advantageous in the related application area of gesture tracking. Visual (uninstrumented) tracking of natural hand gestures and movement provides new opportunities for interactive control including: video gaming, location based entertainment, and interactive displays. 2D images have been used to extract the location of hands within a plane, but 3D hand location enables a much broader range of interactive applications. In this paper, we provide some background on the TYZX smart stereo cameras platform, describe the person tracking and gesture tracking systems implemented on this platform, and discuss some deployed applications.

  15. Transversus Abdominis Plane Blocks with Single-Dose Liposomal Bupivacaine in Conjunction with a Nonnarcotic Pain Regimen Help Reduce Length of Stay following Abdominally Based Microsurgical Breast Reconstruction.

    PubMed

    Jablonka, Eric M; Lamelas, Andreas M; Kim, Julie N; Molina, Bianca; Molina, Nathan; Okwali, Michelle; Samson, William; Sultan, Mark R; Dayan, Joseph H; Smith, Mark L

    2017-08-01

    Side effects associated with use of postoperative narcotics for pain control can delay recovery after abdominally based microsurgical breast reconstruction. The authors evaluated a nonnarcotic pain control regimen in conjunction with bilateral transversus abdominis plane blocks on facilitating early hospital discharge. A retrospective analysis was performed of consecutive patients who underwent breast reconstruction using abdominally based free flaps, with or without being included in a nonnarcotic protocol using intraoperative transversus abdominis plane blockade. During this period, the use of locoregional analgesia evolved from none (control), to continuous bupivacaine infusion transversus abdominis plane and catheters, to single-dose transversus abdominis plane blockade with liposomal bupivacaine solution. Demographic factors, length of stay, inpatient opioid consumption, and complications were reported for all three groups. One hundred twenty-eight consecutive patients (182 flaps) were identified. Forty patients (62 flaps) were in the infusion-liposomal bupivacaine group, 48 (66 flaps) were in the single-dose blockade-catheter group, and 40 (54 flaps) were in the control group. The infusion-liposomal bupivacaine patients had a significantly shorter hospital stay compared with the single-dose blockade-catheter group (2.65 ± 0.66 versus 3.52 ± 0.92 days; p < 0.0001) and the control group (2.65 ± 0.66 versus 4.05 ± 1.26 days; p < 0.0001). There was no significant difference in flap loss or major complications among groups. When used as part of a nonnarcotic postoperative pain regimen, transversus abdominis plane blocks performed with single injections of liposomal bupivacaine help facilitate early hospital discharge after abdominally based microsurgical breast reconstruction. A trend toward consistent discharge by postoperative day 2 was seen. This could result in significant cost savings for health care systems. Therapeutic, III.

  16. Remote focusing for programmable multi-layer differential multiphoton microscopy

    PubMed Central

    Hoover, Erich E.; Young, Michael D.; Chandler, Eric V.; Luo, Anding; Field, Jeffrey J.; Sheetz, Kraig E.; Sylvester, Anne W.; Squier, Jeff A.

    2010-01-01

    We present the application of remote focusing to multiphoton laser scanning microscopy and utilize this technology to demonstrate simultaneous, programmable multi-layer imaging. Remote focusing is used to independently control the axial location of multiple focal planes that can be simultaneously imaged with single element detection. This facilitates volumetric multiphoton imaging in scattering specimens and can be practically scaled to a large number of focal planes. Further, it is demonstrated that the remote focusing control can be synchronized with the lateral scan directions, enabling imaging in orthogonal scan planes. PMID:21326641

  17. Optimization and guidance of flight trajectories for the national aerospace plane

    NASA Technical Reports Server (NTRS)

    Miele, Angelo

    1990-01-01

    The research on optimal trajectories for the National Aerospace Plane (NASP) performed by the Aero-Astronautics Group of Rice University from June 22, 1989 to December 31, 1990 is summarized. The aerospace plane is assumed to be controlled via the angle of attack and the power setting. The time history of the controls is optimized simultaneously with the switch times from one powerplant to another and the final time. The intent is to arrive at NASP guidance trajectories exhibiting many of the desirable characteristics of NASP optimal trajectories.

  18. A comparative study of stabilizing control of a planer electromagnetic levitation using PID and LQR controllers

    NASA Astrophysics Data System (ADS)

    Yaseen, Mundher H. A.

    Magnetic levitation is a technique to suspend an object without any mechanical support. The main objective of this study is to demonstrate stabilized closed loop control of 1-DOF Maglev experimentally using real-time control simulink feature of (SIMLAB) microcontroller. Proportional Integral Derivative (PID) and Linear Quadratic Regulator (LQR) controllers are employed to examine the stability performance of the Maglev control system under effect of unbalanced change of load and wave signal on Maglev plane. The effect of unbalanced change of applied load on single point, line and plane are presented. Furthermore, in order to study the effect of sudden change in input signal, the input of wave signal has been applied on all points of the prototype maglev plate simultaneously. The results of pulse width modulation (PWM) reveal that the control system using LQR controller provides faster response to adjust the levitated plane comparing to PID controller. Moreover, the air gap distance that controlled using PID controller is rather stable with little oscillation. Meanwhile, LQR controller provided more stability and homogeneous response.

  19. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  20. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    PubMed

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODE plus . It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODE plus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  1. Non-Cr Paint Systems on Commercial Aircraft - Current Status and Future Direction

    DTIC Science & Technology

    2014-11-01

    have been used on all metal parts, including aluminum, titanium, and stainless steel alloys. Over 75% of the plane is coated with chromated...Sustainable Surface Engineering for Aerospace and Defense, 18-20 Nov 2014, Fort Myer, VA. 14. ABSTRACT 15 . SUBJECT TERMS 16. SECURITY CLASSIFICATION...OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT

  2. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  3. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  4. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  5. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) CERTIFICATION OF GASEOUS DIFFUSION PLANTS Safeguards and Security § 76.111 Physical security, material control...

  6. 76 FR 67019 - Tenth Meeting: RTCA Special Committee 224, Airport Security Access Control

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-28

    ... 224, Airport Security Access Control AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control. SUMMARY: The... (Pub. L. 92-463, 5 U.S.C., App.), notice is hereby given for a Special Committee 224, Airport Security...

  7. Research and realization of info-net security controlling system

    NASA Astrophysics Data System (ADS)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  8. OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    OVERALL view OF CONTROL BUILDING AND SECURITY GATE. view TO EAST. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in Weapons Storage Area, Plattsburgh, Clinton County, NY

  9. OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    OVERALL VIEW OF CONTROL BUILDING AND SECURITY GATE. VIEW TO NORTH. - Plattsburgh Air Force Base, Security Police Entry Control Building, Off Perimeter Road in SAC Alert Area, Plattsburgh, Clinton County, NY

  10. MYSEA: The Monterey Security Architecture

    DTIC Science & Technology

    2009-01-01

    Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized

  11. Nonprincipal plane scattering of flat plates and pattern control of horn antennas

    NASA Technical Reports Server (NTRS)

    Balanis, Constantine A.; Polka, Lesley A.; Liu, Kefeng

    1989-01-01

    Using the geometrical theory of diffraction, the traditional method of high frequency scattering analysis, the prediction of the radar cross section of a perfectly conducting, flat, rectangular plate is limited to principal planes. Part A of this report predicts the radar cross section in nonprincipal planes using the method of equivalent currents. This technique is based on an asymptotic end-point reduction of the surface radiation integrals for an infinite wedge and enables nonprincipal plane prediction. The predicted radar cross sections for both horizontal and vertical polarizations are compared to moment method results and experimental data from Arizona State University's anechoic chamber. In part B, a variational calculus approach to the pattern control of the horn antenna is outlined. The approach starts with the optimization of the aperture field distribution so that the control of the radiation pattern in a range of directions can be realized. A control functional is thus formulated. Next, a spectral analysis method is introduced to solve for the eigenfunctions from the extremal condition of the formulated functional. Solutions to the optimized aperture field distribution are then obtained.

  12. Characterization and quenching of friction-induced limit cycles of electro-hydraulic servovalve control systems with transport delay.

    PubMed

    Wang, Yuan-Jay

    2010-10-01

    This paper develops a systematic and straightforward methodology to characterize and quench the friction-induced limit cycle conditions in electro-hydraulic servovalve control systems with transport delay in the transmission line. The nonlinear friction characteristic is linearized by using its corresponding describing function. The delay time in the transmission line, which could accelerate the generation of limit cycles is particularly considered. The stability equation method together with parameter plane method provides a useful tool for the establishment of necessary conditions to sustain a limit cycle directly in the constructed controller coefficient plane. Also, the stable region, the unstable region, and the limit cycle region are identified in the parameter plane. The parameter plane characterizes a clear relationship between limit cycle amplitude, frequency, transport delay, and the controller coefficients to be designed. The stability of the predicted limit cycle is checked by plotting stability curves. The stability of the system is examined when the viscous gain changes with respect to the temperature of the working fluid. A feasible stable region is characterized in the parameter plane to allow a flexible choice of controller gains. The robust prevention of limit cycle is achieved by selecting controller gains from the asymptotic stability region. The predicted results are verified by simulations. It is seen that the friction-induced limit cycles can be effectively predicted, removed, and quenched via the design of the compensator even in the case of viscous gain and delay time variations unconditionally. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  13. Postural control is altered in patients with ankylosing spondylitis.

    PubMed

    Vergara, Martin E; O'Shea, Finbar D; Inman, Robert D; Gage, William H

    2012-05-01

    Ankylosing spondylitis is a chronic inflammatory disorder that can lead to increased axial and peripheral joint stiffness, impairing joint mobility. Impaired axial mobility due to vertebral ankylosis may result in changes in standing postural control. Little research has addressed changes in standing postural control in the ankylosing spondylitis population, nor how these issues might affect clinical understanding and treatment. Sixteen ankylosing spondylitis patients, and 17 healthy controls participated. Each individual completed two 120-second quiet standing trials with eyes open and eyes closed, while standing upon two force platforms. Net center of pressure displacement and mean power frequency in the frontal and sagittal planes were calculated. A Spearman's rank correlation analysis was performed between net center of pressure measures and several clinical measures of disease activity. Frontal plane net center of pressure displacement and frequency content, and sagittal plane net center of pressure displacement were significantly greater within the ankylosing spondylitis patient group. Ankylosing spondylitis patients demonstrated a significant increase in frontal plane net center of pressure displacement in the eyes-closed condition. Net center of pressure displacement and frequency were significantly correlated to the Bath Ankylosing Spondylitis Functional Index, and individual components of the Bath Ankylosing Spondylitis Metrology Index. Quiet standing postural control was altered particularly so in the frontal plane in patients with ankylosing spondylitis, which may be associated with increased fall risk. Posturographic measures of postural control may serve as valuable clinical tools for the monitoring of disease progression and disease status in ankylosing spondylitis. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Optimal Control of Electrodynamic Tethers

    DTIC Science & Technology

    2008-06-01

    the out-of- plane component of the magnetic field which produces the required in- track thrust is reduced (see Eq. as th sp lo e a (4... the same orbital plane using an EDT. For the sake of testing the algorithm against a known solution we seek the maximum altitude an EDT can reach...be incl planes co gnetic equatorial plane ent of latit and m mi ains constant as the EDT ity the Eart e tilted with respect to the

  15. Ionic Liquid Gating Control of Spin Reorientation Transition and Switching of Perpendicular Magnetic Anisotropy.

    PubMed

    Zhao, Shishun; Wang, Lei; Zhou, Ziyao; Li, Chunlei; Dong, Guohua; Zhang, Le; Peng, Bin; Min, Tai; Hu, Zhongqiang; Ma, Jing; Ren, Wei; Ye, Zuo-Guang; Chen, Wei; Yu, Pu; Nan, Ce-Wen; Liu, Ming

    2018-05-29

    Electric field (E-field) modulation of perpendicular magnetic anisotropy (PMA) switching, in an energy-efficient manner, is of great potential to realize magnetoelectric (ME) memories and other ME devices. Voltage control of the spin-reorientation transition (SRT) that allows the magnetic moment rotating between the out-of-plane and the in-plane direction is thereby crucial. In this work, a remarkable magnetic anisotropy field change up to 1572 Oe is achieved under a small operation voltage of 4 V through ionic liquid (IL) gating control of SRT in Au/[DEME] + [TFSI] - /Pt/(Co/Pt) 2 /Ta capacitor heterostructures at room temperature, corresponding to a large ME coefficient of 378 Oe V -1 . As revealed by both ferromagnetic resonance measurements and magnetic domain evolution observation, the magnetization can be switched stably and reversibly between the out-of-plane and in-plane directions via IL gating. The key mechanism, revealed by the first-principles calculation, is that the IL gating process influences the interfacial spin-orbital coupling as well as net Rashba magnetic field between the Co and Pt layers, resulting in the modulation of the SRT and in-plane/out-of-plane magnetization switching. This work demonstrates a unique IL-gated PMA with large ME tunability and paves a way toward IL gating spintronic/electronic devices such as voltage tunable PMA memories. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. A security architecture for health information networks.

    PubMed

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-10-11

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.

  17. A Security Architecture for Health Information Networks

    PubMed Central

    Kailar, Rajashekar

    2007-01-01

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately. PMID:18693862

  18. Orientations of dendritic growth during solidification

    NASA Astrophysics Data System (ADS)

    Lee, Dong Nyung

    2017-03-01

    Dendrites are crystalline forms which grow far from the limit of stability of the plane front and adopt an orientation which is as close as possible to the heat flux direction. Dendritic growth orientations for cubic metals, bct Sn, and hcp Zn, can be controlled by thermal conductivity, Young's modulus, and surface energy. The control factors have been elaborated. Since the dendrite is a single crystal, its properties such as thermal conductivity that influences the heat flux direction, the minimum Young's modulus direction that influences the strain energy minimization, and the minimum surface energy plane that influences the crystal/liquid interface energy minimization have been proved to control the dendritic growth direction. The dendritic growth directions of cubic metals are determined by the minimum Young's modulus direction and/or axis direction of symmetry of the minimum crystal surface energy plane. The dendritic growth direction of bct Sn is determined by its maximum thermal conductivity direction and the minimum surface energy plane normal direction. The primary dendritic growth direction of hcp Zn is determined by its maximum thermal conductivity direction and the minimum surface energy plane normal direction and the secondary dendrite arm direction of hcp Zn is normal to the primary dendritic growth direction.

  19. Cyber Security Assessment Report: Adventium Labs

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2007-12-31

    Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.

  20. Thorax, pelvis and hip pattern in the frontal plane during walking in unilateral transtibial amputees: biomechanical analysis

    PubMed Central

    Molina-Rueda, Francisco; Alguacil-Diego, Isabel M.; Cuesta-Gómez, Alicia; Iglesias-Giménez, Javier; Martín-Vivaldi, Andrés; Miangolarra-Page, Juan C.

    2014-01-01

    Background: Lower limb amputees exhibit postural control deficits during standing which can affect their walking ability. Objectives: The primary purpose of the present study was to analyze the thorax, pelvis, and hip kinematics and the hip internal moment in the frontal plane during gait in subjects with Unilateral Transtibial Amputation (UTA). Method: The participants included 25 people with UTA and 25 non-amputees as control subjects. Gait analysis was performed using the Vicon(r) Motion System. We analyzed the motion of the thorax, pelvis, and hip (kinematics) as well as the hip internal moment in the frontal plane. Results: The second peak of the hip abductor moment was significantly lower on the prosthetic side than on the sound side (p=.01) and the control side (right: p=.01; left: p=.01). During middle stance, the opposite side of the pelvis was higher on the prosthetic side compared to the control side (right: p=.01: left: p=.01). Conclusions: The joint internal moment at the hip in the frontal plane was lower on the prosthetic side than on the sound side or the control side. Thorax and pelvis kinematics were altered during the stance phase on the prosthetic side, presumably because there are mechanisms which affect postural control during walking. PMID:25003278

  1. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... Control Systems (Update to DO-230B): Agenda October 20, 2011 Welcome/Introductions/Administrative Remarks... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  2. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-16

    ... Control Systems (Update to DO-230B): Agenda September 15, 2011 Welcome/Introductions/Administrative... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...

  3. 21 CFR 1301.75 - Physical security controls for practitioners.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...

  4. 21 CFR 1301.75 - Physical security controls for practitioners.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...

  5. 21 CFR 1301.75 - Physical security controls for practitioners.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...

  6. 21 CFR 1301.75 - Physical security controls for practitioners.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...

  7. 21 CFR 1301.75 - Physical security controls for practitioners.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 21 Food and Drugs 9 2014-04-01 2014-04-01 false Physical security controls for practitioners. 1301.75 Section 1301.75 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE REGISTRATION....75 Physical security controls for practitioners. (a) Controlled substances listed in Schedule I shall...

  8. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  9. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  10. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  11. 17 CFR 229.308 - (Item 308) Internal control over financial reporting.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...

  12. The effect of photometric and geometric context on photometric and geometric lightness effects

    PubMed Central

    Lee, Thomas Y.; Brainard, David H.

    2014-01-01

    We measured the lightness of probe tabs embedded at different orientations in various contextual images presented on a computer-controlled stereo display. Two background context planes met along a horizontal roof-like ridge. Each plane was a graphic rendering of a set of achromatic surfaces with the simulated illumination for each plane controlled independently. Photometric context was varied by changing the difference in simulated illumination intensity between the two background planes. Geometric context was varied by changing the angle between them. We parsed the data into separate photometric effects and geometric effects. For fixed geometry, varying photometric context led to linear changes in both the photometric and geometric effects. Varying geometric context did not produce a statistically reliable change in either the photometric or geometric effects. PMID:24464163

  13. The effect of photometric and geometric context on photometric and geometric lightness effects.

    PubMed

    Lee, Thomas Y; Brainard, David H

    2014-01-24

    We measured the lightness of probe tabs embedded at different orientations in various contextual images presented on a computer-controlled stereo display. Two background context planes met along a horizontal roof-like ridge. Each plane was a graphic rendering of a set of achromatic surfaces with the simulated illumination for each plane controlled independently. Photometric context was varied by changing the difference in simulated illumination intensity between the two background planes. Geometric context was varied by changing the angle between them. We parsed the data into separate photometric effects and geometric effects. For fixed geometry, varying photometric context led to linear changes in both the photometric and geometric effects. Varying geometric context did not produce a statistically reliable change in either the photometric or geometric effects.

  14. [The effects of transversus abdominis plane block on analgesic and anesthetic consumption during total abdominal hysterectomy: a randomized controlled study].

    PubMed

    Karaman, Tugba; Ozsoy, Asker Zeki; Karaman, Serkan; Dogru, Serkan; Tapar, Hakan; Sahin, Aynur; Dogru, Hatice; Suren, Mustafa

    A transversus abdominis plane block is a peripheral block method that has been used successfully for pain relief after total abdominal hysterectomy. However, the effects of the combination of the transversus abdominis plane block and general anesthesia on analgesic and anesthetic requirements remain unclear. This randomized placebo-controlled study is aimed to evaluate the effects of transversus abdominis plane block on analgesic and anesthetic consumption during total abdominal hysterectomy under general anesthesia. Sixty-six women undergoing total abdominal hysterectomy were randomized into two groups to receive general anesthesia alone (control group) or with transversus abdominis plane block using 20mL of 0.25% bupivacaine (transversus abdominis plane group). Intraoperative remifentanil and sevoflurane consumption were recorded. We also evaluated the postoperative pain, nausea, quality of recovery scores and rescue analgesic requirement during postoperative 24hours. The total remifentanil and sevoflurane consumption is significantly lower in transversus abdominis plane group; respectively mean (SD) 0.130 (0.25) vs. 0.094 (0.02) mcg.kg -1 .min -1 ; p<0.01 and 0.295 (0.05) vs. 0.243 (0.06) mL.min -1 ; p<0.01. In the postoperative period, pain scores were significantly reduced in transversus abdominis plane group soon after surgery; median (range) 6 (2-10) vs. 3 (0-5); p<0.001, at 2h (5 [3-9] vs. 2.5 [0-6]; p<0.001), at 6h (4 [2-7] vs. 3[0-6], p<0.001), at 12h (3.5 [1-6] vs. 2 [1-5]; p=0.003). The patients in the transversus abdominis plane group had significantly higher QoR-40 scores 190.5 (175-197) vs. 176.5 (141-187); p<0.001). Combining transversus abdominis plane block with general anesthesia can provide reduced opioid and anesthetic consumption and can improve postoperative pain and quality of recovery scores in patients undergoing total abdominal hysterectomy. Copyright © 2018 Sociedade Brasileira de Anestesiologia. Publicado por Elsevier Editora Ltda. All rights reserved.

  15. [Hydraulic simulation and safety assessment of secondary water supply system with anti-negative pressure facility].

    PubMed

    Wang, Huan-Huan; Liu, Shu-Ming; Jiang, Shuaiz; Meng, Fan-Lin; Bai, Lu

    2013-01-01

    In the last few decades, anti-negative pressure facility (ANPF) has been emerged as a revolutionary approach for sloving the pollution in the Second Water Supply System (SWSS) in China. This study analyzed implications of the safety in SWSS with ANPF, utilizing the water distribution network hydraulic model. A method of hydraulic simulation and security assessment was presented which was able to reflect the number and location of nodes that can be installed in ANPF. Benchmark results through two instance networks showed that 67% and 89% of nodes in each network did not fit the ANPFs for installation. The simple and pratical algorithm was recommended in the water distribution network design and planing in order to increase the security of SWSS.

  16. Dual-layer electrode-driven liquid crystal lens with electrically tunable focal length and focal plane

    NASA Astrophysics Data System (ADS)

    Zhang, Y. A.; Lin, C. F.; Lin, J. P.; Zeng, X. Y.; Yan, Q.; Zhou, X. T.; Guo, T. L.

    2018-04-01

    Electric-field-driven liquid crystal (ELC) lens with tunable focal length and their depth of field has been extensively applied in 3D display and imaging systems. In this work, a dual-layer electrode-driven liquid crystal (DELC) lens with electrically tunable focal length and controllable focal plane is demonstrated. ITO-SiO2-AZO electrodes with the dual-layer staggered structure on the top substrate are used as driven electrodes within a LC cell, which permits the establishment of an alternative controllability. The focal length of the DELC lens can be adjusted from 1.41 cm to 0.29 cm when the operating voltage changes from 15 V to 40 V. Furthermore, the focal plane of the DELC lens can selectively move by changing the driving method of the applied voltage to the next driven electrodes. This work demonstrates that the DELC lens has potential applications in imaging systems because of electrically tunable focal length and controllable focal plane.

  17. A wavenumber approach to analysing the active control of plane waves with arrays of secondary sources

    NASA Astrophysics Data System (ADS)

    Elliott, Stephen J.; Cheer, Jordan; Bhan, Lam; Shi, Chuang; Gan, Woon-Seng

    2018-04-01

    The active control of an incident sound field with an array of secondary sources is a fundamental problem in active control. In this paper the optimal performance of an infinite array of secondary sources in controlling a plane incident sound wave is first considered in free space. An analytic solution for normal incidence plane waves is presented, indicating a clear cut-off frequency for good performance, when the separation distance between the uniformly-spaced sources is equal to a wavelength. The extent of the near field pressure close to the source array is also quantified, since this determines the positions of the error microphones in a practical arrangement. The theory is also extended to oblique incident waves. This result is then compared with numerical simulations of controlling the sound power radiated through an open aperture in a rigid wall, subject to an incident plane wave, using an array of secondary sources in the aperture. In this case the diffraction through the aperture becomes important when its size is compatible with the acoustic wavelength, in which case only a few sources are necessary for good control. When the size of the aperture is large compared to the wavelength, and diffraction is less important but more secondary sources need to be used for good control, the results then become similar to those for the free field problem with an infinite source array.

  18. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ... Control Systems (Update to DO-230B): Agenda July 15, 2011 Welcome/Introductions/Administrative Remarks... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to...

  19. Control of Love waves by resonant metasurfaces.

    PubMed

    Palermo, Antonio; Marzani, Alessandro

    2018-05-08

    Metasurfaces of mechanical resonators have been successfully used to control in-plane polarized surface waves for filtering, waveguiding and lensing applications across different length scales. In this work, we extend the concept of metasurfaces to anti-plane surface waves existing in semi-infinite layered media, generally known as Love waves. By means of an effective medium approach, we derive an original closed-form dispersion relation for the metasurface. This relation reveals the possibility to control the Love waves dispersive properties by varying the resonators mechanical parameters. We exploit this capability to manipulate the metasurface refractive index and design two gradient index (GRIN) metalenses, i.e. a Luneburg lens and a Maxwell lens. We confirm the performance of the designed lenses using full 3D finite element simulations. Our work demonstrates the possibility of realizing wave control devices for anti-plane waves.

  20. Probe-Hole Field Emission Microscope System Controlled by Computer

    NASA Astrophysics Data System (ADS)

    Gong, Yunming; Zeng, Haishan

    1991-09-01

    A probe-hole field emission microscope system, controlled by an Apple II computer, has been developed and operated successfully for measuring the work function of a single crystal plane. The work functions on the clean W(100) and W(111) planes are measured to be 4.67 eV and 4.45 eV, respectively.

  1. In-plane electric field controlled ferromagnetism and anisotropic magnetoresistance in an LSMO/PMN-PT heterostructure.

    PubMed

    Guo, Qi; Xu, Xiaoguang; Wang, Fang; Lu, Yunhao; Chen, Jikun; Wu, Yanjun; Meng, Kangkang; Wu, Yong; Miao, Jun; Jiang, Yong

    2018-06-01

    We report the in-plane electric field controlled ferromagnetism of La 2/3 Sr 1/3 MnO 3 (LSMO) films epitaxially deposited on [Pb(Mg 1/3 Nb 2/3 )O 3 ] 0.7 -(PbTiO 3 ) 0.3 (PMN-PT) (001), (011) and (111) single crystal substrates. The in-plane coercivities (H c∥ ) and remanences of the LSMO films greatly depend on the in-plane electric field applied on the PMN-PT (001) and (011) substrates. The experimental change of H c∥ is consistent with the Stoner-Wohlfarth model and first principle calculation with the electric field varying from -10 to 10 kV cm -1 . Moreover, the Curie temperature and anisotropic magnetoresistance of the LSMO films can also be manipulated by an in-plane electric field. Finally, the LSMO/PMN-PT (001) heterostructure is designed to be a new kind of magnetic signal generator with the source of electric field.

  2. The OPERA muon spectrometer tracking electronics

    NASA Astrophysics Data System (ADS)

    Ambrosio, M.; Barichello, G.; Brugnera, R.; Carrara, E.; Consiglio, L.; Corradi, A.; Dal Corso, F.; Dusini, S.; Felici, G.; Garfagnini, A.; Manea, C.; Masone, V.; Paoloni, A.; Paoluzzi, G.; Papalino, G.; Parascandolo, P.; Sorrentino, G.; Spinetti, M.; Stanco, L.; Terranova, F.; Votano, L.

    2004-11-01

    The document describes the front-end electronics that instrument the spectrometer of the OPERA experiment. The spectrometer is made of two separate modules. Each module consists of 22 RPC planes equipped with horizontal and vertical strips readout for a total amount of about 25,000 digital channels. The front end electronics is self-triggered and has single plane readout capability. It is made of three different stages: the Front End Boards (FEBs) system, the Controller Boards (CBs) system and the Timing Boards (TBs) system. The FEB system provides discrimination of the strip incoming signals; a FAST OR output of the input signals is also available for trigger plane signal generation. FEBs discriminated signals are acquired by the CBs system that manages also the communication to the experiment DAQ and Slow Control interface. A Trigger Board allows to operate in both self-trigger (the FEB FAST OR signal starts the plane acquisition) or external-trigger (different conditions can be set on the OR signals generated from different planes) modes.

  3. In-plane electric field controlled ferromagnetism and anisotropic magnetoresistance in an LSMO/PMN-PT heterostructure

    NASA Astrophysics Data System (ADS)

    Guo, Qi; Xu, Xiaoguang; Wang, Fang; Lu, Yunhao; Chen, Jikun; Wu, Yanjun; Meng, Kangkang; Wu, Yong; Miao, Jun; Jiang, Yong

    2018-06-01

    We report the in-plane electric field controlled ferromagnetism of La2/3Sr1/3MnO3 (LSMO) films epitaxially deposited on [Pb(Mg1/3Nb2/3)O3]0.7-(PbTiO3)0.3 (PMN-PT) (001), (011) and (111) single crystal substrates. The in-plane coercivities (H c∥) and remanences of the LSMO films greatly depend on the in-plane electric field applied on the PMN-PT (001) and (011) substrates. The experimental change of H c∥ is consistent with the Stoner–Wohlfarth model and first principle calculation with the electric field varying from ‑10 to 10 kV cm‑1. Moreover, the Curie temperature and anisotropic magnetoresistance of the LSMO films can also be manipulated by an in-plane electric field. Finally, the LSMO/PMN-PT (001) heterostructure is designed to be a new kind of magnetic signal generator with the source of electric field.

  4. Comfort Characterization of Various Fabrics for Extremity Protection

    DTIC Science & Technology

    2013-09-01

    comfort, permeability, drape , stretch 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 48 19a. NAME OF...such as fabric “ drape ” (i.e., the ability to conform to a surface), which is thought to be a function of bending and in-plane shear stiffness (2...test (17), Kawabata tests (18), and the Cusick drape test (19). In general, knits appear to provide the best combination of breathability and ease of

  5. CTC Sentinel. Volume 9, Issue 5, May 2016

    DTIC Science & Technology

    2016-05-01

    after a bomb hidden in a laptop was detonated onboard a Somali passenger jet in February, focuses on the technological arms race between terrorist... bomb makers and those working to prevent bombs from getting onto planes. Robert Liscouski and William McGann, two leading specialists in aviation...SENTINEL 1 The mid-air bombing of a Somali passenger jet in Feb- ruary was a wake-up call for security agencies and those working in the field of

  6. Investigation of Microwave Monolithic Integrated Circuit (MMIC) Non-Reciprocal Millimeterwave Components

    DTIC Science & Technology

    1991-09-01

    nickel zinc ferrite films and (2) sputtering of barium hexaferrites with C-axis oriented normally to the film plane. The SSP tech- nique potential for...M-Wave, Components, Ferrites, Films , Yig, Nickel, Zinc , Hexagonal, R96E Measurements, Frequency, Magnetic, Barium Ferrite 17. SECURITY CLASSIFICATION...techniques to integrate millimeter-wave ferrite devices with GaAs VI&Cs. APPROACH Our approach was to deposit ferrite thin films on GaAs sub- strates in a

  7. Very large scale heterogeneous integration (VLSHI) and wafer-level vacuum packaging for infrared bolometer focal plane arrays

    NASA Astrophysics Data System (ADS)

    Forsberg, Fredrik; Roxhed, Niclas; Fischer, Andreas C.; Samel, Björn; Ericsson, Per; Hoivik, Nils; Lapadatu, Adriana; Bring, Martin; Kittilsland, Gjermund; Stemme, Göran; Niklaus, Frank

    2013-09-01

    Imaging in the long wavelength infrared (LWIR) range from 8 to 14 μm is an extremely useful tool for non-contact measurement and imaging of temperature in many industrial, automotive and security applications. However, the cost of the infrared (IR) imaging components has to be significantly reduced to make IR imaging a viable technology for many cost-sensitive applications. This paper demonstrates new and improved fabrication and packaging technologies for next-generation IR imaging detectors based on uncooled IR bolometer focal plane arrays. The proposed technologies include very large scale heterogeneous integration for combining high-performance, SiGe quantum-well bolometers with electronic integrated read-out circuits and CMOS compatible wafer-level vacuum packing. The fabrication and characterization of bolometers with a pitch of 25 μm × 25 μm that are arranged on read-out-wafers in arrays with 320 × 240 pixels are presented. The bolometers contain a multi-layer quantum well SiGe thermistor with a temperature coefficient of resistance of -3.0%/K. The proposed CMOS compatible wafer-level vacuum packaging technology uses Cu-Sn solid-liquid interdiffusion (SLID) bonding. The presented technologies are suitable for implementation in cost-efficient fabless business models with the potential to bring about the cost reduction needed to enable low-cost IR imaging products for industrial, security and automotive applications.

  8. Colloquium : Emergent properties in plane view: Strong correlations at oxide interfaces

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chakhalian, Jak; Freeland, John W.; Millis, Andrew J.

    2014-10-01

    Finding new collective electronic states in materials is one of the fundamental goals of condensed matter physics. Atomic-scale superlattices formed from transition metal oxides are a particularly appealing hunting ground for new physics. In bulk form, transition metal oxides exhibit a remarkable range of magnetic, superconducting, and multiferroic phases that are of great scientific interest and are potentially capable of providing innovative energy, security, electronics, and medical technology platforms. In superlattices new states may emerge at the interfaces where dissimilar materials meet. This Colloquium illustrates the essential features that make transition metal oxide-based heterostructures an appealing discovery platform for emergentmore » properties with a few selected examples, showing how charge redistributes, magnetism and orbital polarization arises, and ferroelectric order emerges from heterostructures comprised of oxide components with nominally contradictory behavior with the aim providing insight into the creation and control of novel behavior at oxide interfaces by suitable mechanical, electrical, or optical boundary conditions and excitations.« less

  9. Providing security for automated process control systems at hydropower engineering facilities

    NASA Astrophysics Data System (ADS)

    Vasiliev, Y. S.; Zegzhda, P. D.; Zegzhda, D. P.

    2016-12-01

    This article suggests the concept of a cyberphysical system to manage computer security of automated process control systems at hydropower engineering facilities. According to the authors, this system consists of a set of information processing tools and computer-controlled physical devices. Examples of cyber attacks on power engineering facilities are provided, and a strategy of improving cybersecurity of hydropower engineering systems is suggested. The architecture of the multilevel protection of the automated process control system (APCS) of power engineering facilities is given, including security systems, control systems, access control, encryption, secure virtual private network of subsystems for monitoring and analysis of security events. The distinctive aspect of the approach is consideration of interrelations and cyber threats, arising when SCADA is integrated with the unified enterprise information system.

  10. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  12. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  14. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  15. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. Role of cerebellar nodulus and uvula on the vestibular quick phase spatial constancy.

    PubMed

    Pettorossi, V E; Grassi, S; Errico, P; Barmack, N H

    2001-01-01

    We investigated the orientation of quick phases (QPs) of vestibularly-induced eye movements in rabbits in response to "off-vertical" sinusoidal vestibular stimulation. We also examined the possible role of the cerebellar nodulus and ventral uvula in controlling QP spatial orientation and modification. During "off-vertical" vestibular stimulation QPs remained aligned with the earth's horizontal plane, while the slow phases (SPs) were aligned with the plane of vestibular stimulation. This suggests that QPs are coded in gravito-inertial coordinates and SPs in head coordinates. When rabbits were oscillated in the light (20 degrees peak-to-peak; 0.2 Hz) about an "off-vertical" axis for 2 h, the QPs changed their trajectory, abandoning the earth's horizontal plane to approach the plane of the stimulus. By contrast, in the absence of conjunctive optokinetic stimulation, QPs remained fixed in the earth's horizontal plane even after 2 h of "off-vertical" stimulation. The conjunctive combination of optokinetic and vestibular stimulation caused QPs to change their plane of rotation. After lesion of the nodulus-uvula the ability of rabbits to reorient QPs during conjoint vestibular-optokinetic stimulation was maintained. We conclude that the space orientation and adaptation of QPs do not require cerebellar control.

  18. Sulfur redox reactions on nanostructured highly oriented pyrolytic graphite (HOPG) electrodes: Direct evidence for superior electrocatalytic performance on defect sites

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wang, Gongwei; Zheng, Dong; Liu, Dan

    Fundamental research of sulfur redox reactions on well-defined controlled model electrode surfaces can provide new information to design high-performance lithium-sulfur batteries. In this paper, we study the electrochemical reduction and oxidation of sulfur on the nanostructured HOPG electrodes with pure basal planes, step plans, and pure edge planes. Finally, our results directly indicate that electrochemical reduction and oxidation of sulfur is significantly affected by the carbon surface structure, namely, the electrochemical reversibility of sulfur redox reaction is much better on edge plane, compared with basal plane and step plane.

  19. Sulfur redox reactions on nanostructured highly oriented pyrolytic graphite (HOPG) electrodes: Direct evidence for superior electrocatalytic performance on defect sites

    DOE PAGES

    Wang, Gongwei; Zheng, Dong; Liu, Dan; ...

    2017-04-28

    Fundamental research of sulfur redox reactions on well-defined controlled model electrode surfaces can provide new information to design high-performance lithium-sulfur batteries. In this paper, we study the electrochemical reduction and oxidation of sulfur on the nanostructured HOPG electrodes with pure basal planes, step plans, and pure edge planes. Finally, our results directly indicate that electrochemical reduction and oxidation of sulfur is significantly affected by the carbon surface structure, namely, the electrochemical reversibility of sulfur redox reaction is much better on edge plane, compared with basal plane and step plane.

  20. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  1. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...

  2. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...

  3. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...

  4. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...

  5. Differences in lumbar spine and lower extremity kinematics during a step down functional task in people with and people without low back pain.

    PubMed

    Hernandez, Alejandra; Gross, Karlie; Gombatto, Sara

    2017-08-01

    When functional movements are impaired in people with low back pain, they may be a contributing factor to chronicity and recurrence. The purpose of the current study was to examine lumbar spine, pelvis, and lower extremity kinematics during a step down functional task between people with and without a history of low back pain. A 3-dimensional motion capture system was used to analyze kinematics during a step down task. Total excursion of the lumbar spine, pelvis, and lower extremity segments in each plane were calculated from the start to end of the task. Separate analysis of variance tests (α=0.05) were conducted to determine the effect of independent variables of group and plane on lumbar spine, pelvis, and lower extremity kinematics. An exploratory analysis was conducted to examine kinematic differences among movement-based low back pain subgroups. Subjects with low back pain displayed less lumbar spine movement than controls across all three planes of movement (P-values=0.001-0.043). This group difference was most pronounced in the sagittal plane. For the lower extremity, subjects with low back pain displayed more frontal and axial plane knee movement than controls (P-values=0.001). There were no significant differences in kinematics among movement-based low back pain subgroups. People with low back pain displayed less lumbar region movement in the sagittal plane and more off-plane knee movements than the control group during a step down task. Clinicians can use this information when assessing lumbar spine and lower extremity movement during functional tasks, with the goal of developing movement-based interventions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. A randomised trial of the analgesic efficacy of ultrasound-guided transversus abdominis plane block after caesarean delivery under general anaesthesia.

    PubMed

    Tan, Terry T; Teoh, Wendy H L; Woo, David C M; Ocampo, Cecilia E; Shah, Mukesh K; Sia, Alex T H

    2012-02-01

    Previous studies examining the efficacy of transversus abdominis plane block after caesarean section have mostly been in parturients under spinal anaesthesia. We postulated that the advantage of performing transversus abdominis plane block after caesarean section might be even more obvious after general anaesthesia, resulting in reduced 24-h consumption of morphine. DESIGN, SETTING, PATIENTS AND INTERVENTIONS: In this single centre, randomised double-blind controlled trial, 40 women who underwent caesarean delivery under general anaesthesia were allocated randomly to receive a transversus abdominis plane block or no block. In those who received the block, 20 ml of levobupivacaine 2.5 mg ml was deposited bilaterally into the transversus abdominis plane under ultrasound guidance using a Sonosite Titan (SonoSite, Bothell, Washington, USA) 7-13 MHz linear transducer at the end of surgery when the patient was still anaesthetised. We recorded patient-controlled intravenous morphine use for 24 h, pain scores at rest and activity, sedation, nausea and vomiting, use of antiemetic medication and overall maternal satisfaction. The primary outcome was 24-h morphine consumption. Patients who received the transversus abdominis plane block used significantly less morphine in 24 h than those in the control group [12.3 (2.6) vs. 31.4 mg (3.1), P<0.001) and had higher satisfaction scores [16 (80%) vs. 5 (25%), P = 0.012). There were no differences between groups in the visual analogue pain scores, sedation level, nausea and vomiting or the use of antiemetic medication. Ultrasound-guided transversus abdominis plane block reduced morphine consumption following caesarean section under general anaesthesia, with increased maternal satisfaction.

  7. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Telecommunications; (iii) Power distribution system; (iv) Access points for ventilation and air-conditioning systems... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7... security and surveillance equipment and systems and their controls, and lighting system controls; and (3...

  8. 36 CFR 1256.70 - What controls access to national security-classified information?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  9. Image multiplexing and authentication based on double phase retrieval in fresnel transform domain

    NASA Astrophysics Data System (ADS)

    Chang, Hsuan-Ting; Lin, Che-Hsian; Chen, Chien-Yue

    2017-04-01

    An image multiplexing and authentication method based on the double-phase retrieval algorithm (DPRA) with the manipulations of wavelength and position in the Fresnel transform (FrT) domain is proposed in this study. The DPRA generates two matched phase-only functions (POFs) in the different planes so that the corresponding image can be reconstructed at the output plane. Given a number of target images, all the sets of matched POFs are used to generate the phase-locked system through the phase modulation and synthesis to achieve the multiplexing purpose. To reconstruct a target image, the corresponding phase key and all the correct parameters in the FrT are required. Therefore, the authentication system with high-level security can be achieved. The computer simulation verifies the validity of the proposed method and also shows good resistance to the crosstalk among the reconstructed images.

  10. Sub-wavelength terahertz beam profiling of a THz source via an all-optical knife-edge technique.

    PubMed

    Phing, Sze Ho; Mazhorova, Anna; Shalaby, Mostafa; Peccianti, Marco; Clerici, Matteo; Pasquazi, Alessia; Ozturk, Yavuz; Ali, Jalil; Morandotti, Roberto

    2015-02-25

    Terahertz technologies recently emerged as outstanding candidates for a variety of applications in such sectors as security, biomedical, pharmaceutical, aero spatial, etc. Imaging the terahertz field, however, still remains a challenge, particularly when sub-wavelength resolutions are involved. Here we demonstrate an all-optical technique for the terahertz near-field imaging directly at the source plane. A thin layer (<100 nm-thickness) of photo carriers is induced on the surface of the terahertz generation crystal, which acts as an all-optical, virtual blade for terahertz near-field imaging via a knife-edge technique. Remarkably, and in spite of the fact that the proposed approach does not require any mechanical probe, such as tips or apertures, we are able to demonstrate the imaging of a terahertz source with deeply sub-wavelength features (<30 μm) directly in its emission plane.

  11. A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems

    NASA Astrophysics Data System (ADS)

    Wang, Xingyuan; Wang, Siwei; Zhang, Yingqian; Luo, Chao

    2018-04-01

    A novel image encryption algorithm is proposed that combines the SHA-3 hash function and two chaotic systems: the hyper-chaotic Lorenz and Chen systems. First, 384 bit keystream hash values are obtained by applying SHA-3 to plaintext. The sensitivity of the SHA-3 algorithm and chaotic systems ensures the effect of a one-time pad. Second, the color image is expanded into three-dimensional space. During permutation, it undergoes plane-plane displacements in the x, y and z dimensions. During diffusion, we use the adjacent pixel dataset and corresponding chaotic value to encrypt each pixel. Finally, the structure of alternating between permutation and diffusion is applied to enhance the level of security. Furthermore, we design techniques to improve the algorithm's encryption speed. Our experimental simulations show that the proposed cryptosystem achieves excellent encryption performance and can resist brute-force, statistical, and chosen-plaintext attacks.

  12. Report: EPA’s Office of Environmental Information Should Improve Ariel Rios and Potomac Yard Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.

  13. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    PubMed

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  14. Practical stability and controllability of airplanes

    NASA Technical Reports Server (NTRS)

    Norton, F H

    1923-01-01

    The effect of the characteristics of an airplane on balance, stability, and controllability, based on free flight tests, is discussed particularly in respect to the longitudinal motion. It is shown that the amount of longitudinal stability can be varied by changing the position of the center of gravity or by varying the aspect ratio of the tail plane, and that the stability for any particular air speed can be varied by changing the camber of the tail plane. It is found that complete longitudinal stability may be obtained even when the tail plane is at all times a lifting surface. Empirical values are given for the characteristics of a new airplane for producing any desired amount of stability and control, or to correct the faults of an airplane already constructed. (author)

  15. Interlimb Differences in Coordination of Unsupported Reaching Movements

    PubMed Central

    Schaffer, Jacob E.; Sainburg, Robert L.

    2017-01-01

    Previous research suggests that interlimb differences in coordination associated with handedness might result from specialized control mechanisms that are subserved by different cerebral hemispheres. Based largely on the results of horizontal plane reaching studies, we have proposed that the hemisphere contralateral to the dominant arm is specialized for predictive control of limb dynamics, while the non-dominant hemisphere is specialized for controlling limb impedance. The current study explores interlimb differences in control of 3-D unsupported reaching movements. While the task was presented in the horizontal plane, participant’s arms were unsupported and free to move within a range of the vertical axis, which was redundant to the task plane. Results indicated significant dominant arm advantages for both initial direction accuracy and final position accuracy. The dominant arm showed greater excursion along a redundant axis that was perpendicular to the task, and parallel to gravitational forces. In contrast, the non-dominant arm better impeded motion out of the task-plane. Nevertheless, left arm task errors varied substantially more with shoulder rotation excursion than did dominant arm task errors. These findings suggest that the dominant arm controller was able to take advantage of the redundant degrees of freedom of the task, while non-dominant task errors appeared enslaved to motion along the redundant axis. These findings are consistent with a dominant controller that is specialized for intersegmental coordination, and a non-dominant controller that is specialized for impedance control. However, the findings are inconsistent with previously documented conclusions from planar tasks, in which non-dominant control leads to greater final position accuracy. PMID:28344068

  16. New Vectorial Propulsion System and Trajectory Control Designs for Improved AUV Mission Autonomy.

    PubMed

    Masmitja, Ivan; Gonzalez, Julian; Galarza, Cesar; Gomariz, Spartacus; Aguzzi, Jacopo; Del Rio, Joaquin

    2018-04-17

    Autonomous Underwater Vehicles (AUV) are proving to be a promising platform design for multidisciplinary autonomous operability with a wide range of applications in marine ecology and geoscience. Here, two novel contributions towards increasing the autonomous navigation capability of a new AUV prototype (the Guanay II) as a mix between a propelled vehicle and a glider are presented. Firstly, a vectorial propulsion system has been designed to provide full vehicle maneuverability in both horizontal and vertical planes. Furthermore, two controllers have been designed, based on fuzzy controls, to provide the vehicle with autonomous navigation capabilities. Due to the decoupled system propriety, the controllers in the horizontal plane have been designed separately from the vertical plane. This class of non-linear controllers has been used to interpret linguistic laws into different zones of functionality. This method provided good performance, used as interpolation between different rules or linear controls. Both improvements have been validated through simulations and field tests, displaying good performance results. Finally, the conclusion of this work is that the Guanay II AUV has a solid controller to perform autonomous navigation and carry out vertical immersions.

  17. The University of Florida's next-generation cryogenic infrared focal plane array controller system

    NASA Astrophysics Data System (ADS)

    Raines, Steven N.; Boreman, Glenn D.; Eikenberry, Stephen S.; Bandyopadhyay, Reba M.; Quijano, Ismael

    2008-07-01

    The Infrared Instrumentation Group at the University of Florida has substantial experience building IR focal plane array (FPA) controllers and seamlessly integrating them into the instruments that it builds for 8-meter class observatories, including writing device drivers for UNIX-based computer systems. We report on a design study to investigate implementing an ASIC from Teledyne Imaging Systems (TIS) into our IR FPA controller while simultaneously replacing TIS's interface card with one that eliminates the requirement for a Windows-OS computer within the instrument's control system.

  18. The adoption of IT security standards in a healthcare environment.

    PubMed

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.

  19. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  20. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  1. Performance of an Achromatic Focal Plane Mask for Exoplanet Imaging Coronagraphy

    NASA Technical Reports Server (NTRS)

    Newman, Kevin; Belikov, Ruslan; Pluzhnik, Eugene; Balasubramanian, Kunjithapatham; Wilson, Dan

    2014-01-01

    Coronagraph technology combined with wavefront control is close to achieving the contrast and inner working angle requirements in the lab necessary to observe the faint signal of an Earth-like exoplanet in monochromatic light. An important remaining technological challenge is to achieve high contrast in broadband light. Coronagraph bandwidth is largely limited by chromaticity of the focal plane mask, which is responsible for blocking the stellar PSF. The size of a stellar PSF scales linearly with wavelength; ideally, the size of the focal plane mask would also scale with wavelength. A conventional hard-edge focal plane mask has a fixed size, normally sized for the longest wavelength in the observational band to avoid starlight leakage. The conventional mask is oversized for shorter wavelengths and blocks useful discovery space. Recently we presented a solution to the size chromaticity challenge with a focal plane mask designed to scale its effective size with wavelength. In this paper, we analyze performance of the achromatic size-scaling focal plane mask within a Phase Induced Amplitude Apodization (PIAA) coronagraph. We present results from wavefront control around the achromatic focal plane mask, and demonstrate the size-scaling effect of the mask with wavelength. The edge of the dark zone, and therefore the inner working angle of the coronagraph, scale with wavelength. The achromatic mask enables operation in a wider band of wavelengths compared with a conventional hard-edge occulter.

  2. 14 CFR 25.771 - Pilot compartment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the controls, lies in the region between the plane of rotation of any inboard propeller and the... degrees forward or aft of the plane of rotation of the propeller. (c) If provision is made for a second...

  3. Effect of the out-of-plane stress on the properties of epitaxial SrTiO3 films with nano-pillar array on Si-substrate

    NASA Astrophysics Data System (ADS)

    Bai, Gang; Xie, Qiyun; Liu, Zhiguo; Wu, Dongmei

    2015-08-01

    A nonlinear thermodynamic formalism has been proposed to calculate the physical properties of the epitaxial SrTiO3 films containing vertical nano-pillar array on Si-substrate. The out-of-plane stress induced by the mismatch between film and nano-pillars provides an effective way to tune the physical properties of ferroelectric SrTiO3 films. Tensile out-of-plane stress raises the phase transition temperature and increases the out-of-plane polarization, but decreases the out-of-plane dielectric constant below Curie temperature, pyroelectric coefficient, and piezoelectric coefficient. These results showed that by properly controlling the out-of-plane stress, the out-of-plane stress induced paraelectric-ferroelectric phase transformation will appear near room temperature. Excellent dielectric, pyroelectric, piezoelectric properties of these SrTiO3 films similar to PZT and other lead-based ferroelectrics can be expected.

  4. Tunable spin splitting and spin lifetime in polar WSTe monolayer

    NASA Astrophysics Data System (ADS)

    Adhib Ulil Absor, Moh.; Kotaka, Hiroki; Ishii, Fumiyuki; Saito, Mineo

    2018-04-01

    The established spin splitting with out-of-plane Zeeman spin polarizations in the monolayer (ML) of transition metal dichalcogenides (TMDs) is dictated by inversion symmetry breaking together with mirror symmetry in the surface plane. Here, by density functional theory calculations, we find that mirror symmetry breaking in the polar WSTe ML leads to large spin splitting exhibiting in-plane Rashba spin polarizations. We also find that the interplay between the out-of-plane Zeeman- and in-plane Rashba spin-polarized states sensitively affects the spin lifetime, which can be effectively controlled by in-plane strain. In addition, the tunability of spin splitting using an external electric field is also demonstrated. Our study clarifies that the use of in-plane strain and an external electric field is effective for tuning the spin splitting and spin lifetime of the polar WSTe ML; thus, it is useful for designing spintronic devices.

  5. Incentive and Architecture of Multi-Band Enabled Small Cell and UE for Up-/Down-Link and Control-/User-Plane Splitting for 5G Mobile Networks

    NASA Astrophysics Data System (ADS)

    Saha, Rony Kumer; Aswakul, Chaodit

    2017-01-01

    In this paper, a multi-band enabled femtocell base station (FCBS) and user equipment (UE) architecture is proposed in a multi-tier network that consists of small cells, including femtocells and picocells deployed over the coverage of a macrocell for splitting uplink and downlink (UL/DL) as well as control-plane and user-plane (C-/U-plane) for 5G mobile networks. Since splitting is performed at the same FCBS, we define this architecture as the same base station based split architecture (SBSA). For multiple bands, we consider co-channel (CC) microwave and different frequency (DF) 60 GHz millimeter wave (mmWave) bands for FCBSs and UEs with respect to the microwave band used by their over-laid macrocell base station. All femtocells are assumed to be deployed in a 3-dimensional multi-storage building. For CC microwave band, cross-tier CC interference of femtocells with macrocell is avoided using almost blank subframe based enhanced inter-cell interference coordination techniques. The co-existence of CC microwave and DF mmWave bands for SBSA on the same FCBS and UE is first studied to show their performance disparities in terms of system capacity and spectral efficiency in order to provide incentives for employing multiple bands at the same FCBS and UE and identify a suitable band for routing decoupled UL/DL or C-/U-plane traffic. We then present a number of disruptive architectural design alternatives of multi-band enabled SBSA for 5G mobile networks for UL/DL and C-/U-plane splitting, including a disruptive and complete splitting of UL/DL and C-/U-plane as well as a combined UL/DL and C-/U-plane splitting, by exploiting dual connectivity on CC microwave and DF mmWave bands. The outperformances of SBSA in terms of system level capacity, average spectral efficiency, energy efficiency, and control-plane overhead traffic capacity in comparison with different base stations based split architecture (DBSA) are shown. Finally, a number of technical and business perspectives as well as key research issues of SBSA are discussed.

  6. Control of Initialized Fractional-Order Systems. Revised

    NASA Technical Reports Server (NTRS)

    Hartley, Tom T.; Lorenzo, Carl F.

    2002-01-01

    Due to the importance of historical effects in fractional-order systems, this paper presents a general fractional-order control theory that includes the time-varying initialization response. Previous studies have not properly accounted for these historical effects. The initialization response, along with the forced response, for fractional-order systems is determined. Stability properties of fractional-order systems are presented in the complex w-plane, which is a transformation of the s-plane. Time responses are discussed with respect to pole positions in the complex w-plane and frequency response behavior is included. A fractional-order vector space representation, which is a generalization of the state space concept, is presented including the initialization response. Control methods for vector representations of initialized fractional-order systems are shown. Nyquist, root-locus, and other input-output control methods are adapted to the control of fractional-order systems. Finally, the fractional-order differintegral is generalized to continuous order-distributions that have the possibility of including a continuum of fractional orders in a system element.

  7. "A Tale of Two Planes": Deep Versus Superficial Serratus Plane Block for Postmastectomy Pain Syndrome.

    PubMed

    Piracha, Mohammad M; Thorp, Stephen L; Puttanniah, Vinay; Gulati, Amitabh

    Postmastectomy pain syndrome (PMPS) is a significant burden for breast cancer survivors. Although multiple therapies have been described, an evolving field of serratus anterior plane blocks has been described in this population. We describe the addition of the deep serratus anterior plane block (DSPB) for PMPS. Four patients with history of PMPS underwent DSPB for anterior chest wall pain. A retrospective review of these patients' outcomes was obtained through postprocedure interviews. Three of the patients previously had a superficial serratus anterior plane block, which was not as efficacious as the DSPB. The fourth patient had a superficial serratus anterior plane that was difficult to separate with hydrodissection but had improved pain control with a DSPB. We illustrate 4 patients who have benefitted from a DSPB and describe indications that this block may be more efficacious than a superficial serratus plane block. Further study is recommended to understand the intercostal nerve branches within the lateral and anterior muscular chest wall planes.

  8. A Chronology of Terrorist Attacks and Other Criminal Actions Against Maritime Targets

    DTIC Science & Technology

    1983-09-01

    34 was ordered to leave the port of Rio de Janeiro because it had a bomb on board. Twenty-eight crewmembers abandoned the ship for security reasons. The...ship was to have been repaired in a yard in Rio de Janeiro , but the captain, Henzo Battagliarin, found the bomb and reported it to Brazilian...naval plane and persuaded to alter course for Recife, Brazil where Galvao had negotiations on 31 January with a U.S. Naval Admiral and on 1 February

  9. Statistical Analysis of Firearms/Toolmarks Interpretation of Cartridge Case Evidence Using IBIS and Bayesian Networks

    DTIC Science & Technology

    2015-10-24

    reference material (SRM) was entered into IBIS 10 times by each of three users (EBF, RLJ, and EFL). Each of these users has more than 12 months...bullet leaves the muzzle. In a recoil action (locked breech) pistol, the barrel and slide are securely locked together at the moment of firing. They...travel backward together until the barrel unlocks, forced down by a link or inclined plane, and continues rearward under its own momentum. A

  10. Shingle assembly

    DOEpatents

    Dinwoodie, Thomas L.

    2007-02-20

    A barrier, such as a PV module, is secured to a base by a support to create a shingle assembly with a venting region defined between the barrier and base for temperature regulation. The first edge of one base may be interengageable with the second edge of an adjacent base to be capable of resisting first and second disengaging forces oriented perpendicular to the edges and along planes oriented parallel to and perpendicular to the base. A deflector may be used to help reduce wind uplift forces.

  11. A study on the probability of twin plane formation during the nucleation of AgBr and AgCl crystals in the aqueous gelatin solution

    NASA Astrophysics Data System (ADS)

    Ohzeki, Katsuhisa; Hosoya, Yoichi

    2007-07-01

    A study was made on the probability of twin plane formation during the nucleation of AgBr and AgCl crystals. The growth condition was controlled to keep the number of the nuclei, neither decreasing owing to their dissolution, nor increasing owing to the formation of a new nucleus during the growth process. Under the condition, the nuclei were grown to have {1 1 1} faces on their surfaces by controlling pAg in a reaction solution and by use of growth modifier in case of AgCl crystal formation. The number of twin planes in each crystal was judged according to a conventional way on the basis of its morphology. The dependence of the number of twin planes per crystal on the probability of twin plain formation was in accordance with Poisson distribution, indicating the random formation of a twin plane on the {1 1 1} faces of a nucleus. The result that the ratio of number of AgCl crystals with parallel twin planes to all the multiply twinned crystals was about 10% supports the random formation of a twin plane and suggests that the twin plane formation took place on {1 1 1} surfaces at the possible eight corner of a nucleus. On the other hand, the ratio of the number of AgBr crystals with parallel twin planes to all the multiply twinned crystals was more than 50%. The result was explained by the anisotropic growth of a singly twinned nucleus according to the higher growth rate of {1 0 0} surfaces than that of {1 1 1} surfaces.

  12. Arms Control and National Security: An Introduction. Advance Edition.

    ERIC Educational Resources Information Center

    Arms Control Association, Washington, DC.

    Suitable for use with high school students, this booklet on arms control and national security provides background information, describes basic concepts, reviews recent history, and offers suggestions for further reading. The first section, on American attitudes toward national security and arms control, defines five types of limits on weapons…

  13. Security Controls Hurt Research, NAS Warns.

    ERIC Educational Resources Information Center

    Kolata, Gina

    1982-01-01

    A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…

  14. Minimizing communication cost among distributed controllers in software defined networks

    NASA Astrophysics Data System (ADS)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  15. In-plane pitch control of cholesteric liquid crystals by formation of artificial domains via patterned photopolymerization.

    PubMed

    Yoshida, Hiroyuki; Miura, Yusuke; Tokuoka, Kazuki; Suzuki, Satoshi; Fujii, Akihiko; Ozaki, Masanori

    2008-11-10

    A controlled helix pitch modulation in the in-plane direction of a planarly aligned cholesteric liquid crystal cell is demonstrated by using photopolymerizable cholesteric liquid crystals. By fabricating artificial domains with a closed volume via two-photon excitation laser-lithography, the degree of pitch modulation could be controlled by adjusting the surface area to volume ratio of the domain. A pitch modulation of over 60 nm was realized by designing the shape of the artificial domain.

  16. Vibration-Assisted Femtosecond Laser Drilling with Controllable Taper Angles for AMOLED Fine Metal Mask Fabrication.

    PubMed

    Choi, Wonsuk; Kim, Hoon Young; Jeon, Jin Woo; Chang, Won Seok; Cho, Sung-Hak

    2017-02-21

    This study investigates the effect of focal plane variation using vibration in a femtosecond laser hole drilling process on Invar alloy fabrication quality for the production of fine metal masks (FMMs). FMMs are used in the red, green, blue (RGB) evaporation process in Active Matrix Organic Light-Emitting Diode (AMOLED) manufacturing. The taper angle of the hole is adjusted by attaching the objective lens to a micro-vibrator and continuously changing the focal plane position. Eight laser pulses were used to examine how the hole characteristics vary with the first focal plane's position, where the first pulse is focused at an initial position and the focal planes of subsequent pulses move downward. The results showed that the hole taper angle can be controlled by varying the amplitude of the continuously operating vibrator during femtosecond laser hole machining. The taper angles were changed between 31.8° and 43.9° by adjusting the vibrator amplitude at a frequency of 100 Hz. Femtosecond laser hole drilling with controllable taper angles is expected to be used in the precision micro-machining of various smart devices.

  17. Size Controlled Two-dimensional Co3O4 with Exposure of {111} Plane: Synthesis and Catalytic Properties for Photooxidation of Organics

    EPA Science Inventory

    The size controlled 2D hexagonal structured Co3O4 with exposure of the {111} plane was fabricated, and the catalytic properties for photooxidation of organics using as-prepared samples were investigated. 2D hexagonal structured Co3O4 with the size of 3 m displays higher photocat...

  18. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  19. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265 Security... security measures to: (1) Deter the unauthorized introduction of dangerous substances and devices...

  20. Stoichiometric control for heteroepitaxial growth of smooth ɛ-Ga2O3 thin films on c-plane AlN templates by mist chemical vapor deposition

    NASA Astrophysics Data System (ADS)

    Tahara, Daisuke; Nishinaka, Hiroyuki; Morimoto, Shota; Yoshimoto, Masahiro

    2017-07-01

    Epitaxial ɛ-Ga2O3 thin films with smooth surfaces were successfully grown on c-plane AlN templates by mist chemical vapor deposition. Using X-ray diffraction 2θ-ω and φ scans, the out-of-plane and in-plane epitaxial relationship was determined to be (0001) ɛ-Ga2O3 [10\\bar{1}0] ∥ (0001)AlN[10\\bar{1}0]. The gallium/oxygen ratio was controlled by varying the gallium precursor concentration in the solution. While scanning electron microscopy showed the presence of large grains on the surfaces of the films formed for low concentrations of oxygen species, no large grains were observed under stoichiometric conditions. Cathodoluminescence measurements showed a deep-level emission ranging from 1.55-3.7 eV; however, no band-edge emission was observed.

  1. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smartt, Heidi A.; Romero, Juan A.; Custer, Joyce Olsen

    Containment/Surveillance (C/S) measures are critical to any verification regime in order to maintain Continuity of Knowledge (CoK). The Ceramic Seal project is research into the next generation technologies to advance C/S, in particular improving security and efficiency. The Ceramic Seal is a small form factor loop seal with improved tamper-indication including a frangible seal body, tamper planes, external coatings, and electronic monitoring of the seal body integrity. It improves efficiency through a self-securing wire and in-situ verification with a handheld reader. Sandia National Laboratories (SNL) and Savannah River National Laboratory (SRNL), under sponsorship from the U.S. National Nuclear Security Administrationmore » (NNSA) Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D), have previously designed and have now fabricated and tested Ceramic Seals. Tests have occurred at both SNL and SRNL, with different types of tests occurring at each facility. This interim report will describe the Ceramic Seal prototype, the design and development of a handheld standalone reader and an interface to a data acquisition system, fabrication of the seals, and results of initial testing.« less

  2. A novel robot for imposing perturbations during overground walking: mechanism, control and normative stepping responses.

    PubMed

    Olenšek, Andrej; Zadravec, Matjaž; Matjačić, Zlatko

    2016-06-11

    The most common approach to studying dynamic balance during walking is by applying perturbations. Previous studies that investigated dynamic balance responses predominantly focused on applying perturbations in frontal plane while walking on treadmill. The goal of our work was to develop balance assessment robot (BAR) that can be used during overground walking and to assess normative balance responses to perturbations in transversal plane in a group of neurologically healthy individuals. BAR provides three passive degrees of freedom (DoF) and three actuated DoF in pelvis that are admittance-controlled in such a way that the natural movement of pelvis is not significantly affected. In this study BAR was used to assess normative balance responses in neurologically healthy individuals by applying linear perturbations in frontal and sagittal planes and angular perturbations in transversal plane of pelvis. One way repeated measure ANOVA was used to statistically evaluate the effect of selected perturbations on stepping responses. Standard deviations of assessed responses were similar in unperturbed and perturbed walking. Perturbations in frontal direction evoked substantial pelvis displacement and caused statistically significant effect on step length, step width and step time. Likewise, perturbations in sagittal plane also caused statistically significant effect on step length, step width and step time but with less explicit impact on pelvis movement in frontal plane. On the other hand, except from substantial pelvis rotation angular perturbations did not have substantial effect on pelvis movement in frontal and sagittal planes while statistically significant effect was noted only in step length and step width after perturbation in clockwise direction. Results indicate that the proposed device can repeatedly reproduce similar experimental conditions. Results also suggest that "stepping strategy" is the dominant strategy for coping with perturbations in frontal plane, perturbations in sagittal plane are to greater extent handled by "ankle strategy" while angular perturbations in transversal plane do not pose substantial challenge for balance. Results also show that specific perturbation in general elicits responses that extend also to other planes of movement that are not directly associated with plane of perturbation as well as to spatio temporal parameters of gait.

  3. Safe-haven locking device

    DOEpatents

    Williams, J.V.

    1984-04-26

    Disclosed is a locking device for eliminating external control of a secured space formed by fixed and movable barriers. The locking device uses externally and internally controlled locksets and a movable strike, operable from the secured side of the movable barrier, to selectively engage either lockset. A disengagement device, for preventing forces from being applied to the lock bolts is also disclosed. In this manner, a secured space can be controlled from the secured side as a safe-haven. 4 figures.

  4. Graphs for information security control in software defined networks

    NASA Astrophysics Data System (ADS)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  5. A satellite digital controller or 'play that PID tune again, Sam'. [Position, Integral, Derivative feedback control algorithm for design strategy

    NASA Technical Reports Server (NTRS)

    Seltzer, S. M.

    1976-01-01

    The problem discussed is to design a digital controller for a typical satellite. The controlled plant is considered to be a rigid body acting in a plane. The controller is assumed to be a digital computer which, when combined with the proposed control algorithm, can be represented as a sampled-data system. The objective is to present a design strategy and technique for selecting numerical values for the control gains (assuming position, integral, and derivative feedback) and the sample rate. The technique is based on the parameter plane method and requires that the system be amenable to z-transform analysis.

  6. Reduced dislocation density in Ga xIn 1–xP compositionally graded buffer layers through engineered glide plane switch

    DOE PAGES

    Schulte, Kevin L.; France, Ryan M.; McMahon, William E.; ...

    2016-11-17

    In this work we develop control over dislocation glide dynamics in Ga xIn 1-xP compositionally graded buffer layers (CGBs) through control of CuPt ordering on the group-III sublattice. The ordered structure is metastable in the bulk, so any glissile dislocation that disrupts the ordered pattern will release stored energy, and experience an increased glide force. Here we show how this connection between atomic ordering and dislocation glide force can be exploited to control the threading dislocation density (TDD) in Ga xIn 1-xP CGBs. When ordered Ga xIn 1-xP is graded from the GaAs lattice constant to InP, the order parametermore » ..eta.. decreases as x decreases, and dislocation glide switches from one set of glide planes to the other. This glide plane switch (GPS) is accompanied by the nucleation of dislocations on the new glide plane, which typically leads to increased TDD. We develop control of the GPS position within a Ga xIn 1-xP CGB through manipulation of deposition temperature, surfactant concentration, and strain-grading rate. We demonstrate a two-stage Ga xIn 1-xP CGB from GaAs to InP with sufficiently low TDD for high performance devices, such as the 4-junction inverted metamorphic multi-junction solar cell, achieved through careful control the GPS position. Here, experimental results are analyzed within the context of a model that considers the force balance on dislocations on the two competing glide planes as a function of the degree of ordering.« less

  7. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... and facilities; (4) Granting access to only those responding to the security incident or threat... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.255 Security...

  8. A Comparison of Cervical Spine Motion After Immobilization With a Traditional Spine Board and Full-Body Vacuum-Mattress Splint.

    PubMed

    Etier, Brian E; Norte, Grant E; Gleason, Megan M; Richter, Dustin L; Pugh, Kelli F; Thomson, Keith B; Slater, Lindsay V; Hart, Joe M; Brockmeier, Stephen F; Diduch, David R

    2017-12-01

    The National Athletic Trainers' Association (NATA) advocates for cervical spine immobilization on a rigid board or vacuum splint and for removal of athletic equipment before transfer to an emergency medical facility. To (1) compare triplanar cervical spine motion using motion capture between a traditional rigid spine board and a full-body vacuum splint in equipped and unequipped athletes, (2) assess cervical spine motion during the removal of a football helmet and shoulder pads, and (3) evaluate the effect of body mass on cervical spine motion. Controlled laboratory study. Twenty healthy male participants volunteered for this study to examine the influence of immobilization type and presence of equipment on triplanar angular cervical spine motion. Three-dimensional cervical spine kinematics was measured using an electromagnetic motion analysis system. Independent variables included testing condition (static lift and hold, 30° tilt, transfer, equipment removal), immobilization type (rigid, vacuum-mattress), and equipment (on, off). Peak sagittal-, frontal-, and transverse-plane angular motions were the primary outcome measures of interest. Subjective ratings of comfort and security did not differ between immobilization types ( P > .05). Motion between the rigid board and vacuum splint did not differ by more than 2° under any testing condition, either with or without equipment. In removing equipment, the mean peak motion ranged from 12.5° to 14.0° for the rigid spine board and from 11.4° to 15.4° for the vacuum-mattress splint, and more transverse-plane motion occurred when using the vacuum-mattress splint compared with the rigid spine board (mean difference, 0.14 deg/s [95% CI, 0.05-0.23 deg/s]; P = .002). In patients weighing more than 250 lb, the rigid board provided less motion in the frontal plane ( P = .027) and sagittal plane ( P = .030) during the tilt condition and transfer condition, respectively. The current study confirms similar motion in the vacuum-mattress splint compared with the rigid backboard in varying sized equipped or nonequipped athletes. Cervical spine motion occurs when removing a football helmet and shoulder pads, at an unknown risk to the injured athlete. In athletes who weighed more than 250 lb, immobilization with the rigid board helped to reduce cervical spine motion. Athletic trainers and team physicians should consider immobilization of athletes who weigh more than 250 lb with a rigid board.

  9. Strain doping: Reversible single-axis control of a complex oxide lattice via helium implantation

    DOE PAGES

    Guo, Hangwen; Dong, Shuai; Rack, Philip D.; ...

    2015-06-25

    We report on the use of helium ion implantation to independently control the out-of-plane lattice constant in epitaxial La 0.7Sr 0.3MnO 3 thin films without changing the in-plane lattice constants. The process is reversible by a vacuum anneal. Resistance and magnetization measurements show that even a small increase in the out-of-plane lattice constant of less than 1% can shift the metal-insulator transition and Curie temperatures by more than 100 °C. Unlike conventional epitaxy-based strain tuning methods which are constrained not only by the Poisson effect but by the limited set of available substrates, the present study shows that strain canmore » be independently and continuously controlled along a single axis. This permits novel control over orbital populations through Jahn-Teller effects, as shown by Monte Carlo simulations on a double-exchange model. As a result, the ability to reversibly control a single lattice parameter substantially broadens the phase space for experimental exploration of predictive models and leads to new possibilities for control over materials’ functional properties.« less

  10. Sinus anatomy associated with inadvertent cerebrospinal fluid leak during functional endoscopic sinus surgery.

    PubMed

    Heaton, Chase M; Goldberg, Andrew N; Pletcher, Steven D; Glastonbury, Christine M

    2012-07-01

    Anatomic variations in skull base anatomy may predispose the surgeon to inadvertent skull base injury with resultant cerebrospinal fluid (CSF) leak during functional endoscopic sinus surgery (ESS). Our objective was to compare preoperative sinus imaging of patients who underwent FESS with and without CSF leak to elucidate these variations. In this retrospective case-control study, 18 patients with CSF leak following FESS for chronic rhinosinusitis (CRS) from 2000 to 2011 were compared to 18 randomly selected patients who underwent preoperative imaging for FESS for CRS. Measurements were obtained from preoperative computed tomography images with specific attention to anatomic differences in cribriform plate and ethmoid roof heights in the coronal plane, and the skull base angle in the sagittal plane. Mean values of measured variables were compared using a nonparametric Mann-Whitney test. When compared to controls, patients with CSF leak demonstrated a greater angle of the skull base in the sagittal plane (P < .001) and a greater slope of the skull base in the coronal plane (P < .006). A lower cribriform height relative to ethmoid roof height was also noted in cases of CSF leak as compared to controls (P < .04). A steep skull base angle in the sagittal plane, a greater slope of the skull base in the coronal plane, and a low cribriform height relative to the ethmoid roof predispose the patient to CSF leak during FESS. Preoperative review of imaging with specific attention paid to these anatomic variations may help to prevent iatrogenic CSF leak. Copyright © 2012 The American Laryngological, Rhinological, and Otological Society, Inc.

  11. Cryptosystem for Securing Image Encryption Using Structured Phase Masks in Fresnel Wavelet Transform Domain

    NASA Astrophysics Data System (ADS)

    Singh, Hukum

    2016-12-01

    A cryptosystem for securing image encryption is considered by using double random phase encoding in Fresnel wavelet transform (FWT) domain. Random phase masks (RPMs) and structured phase masks (SPMs) based on devil's vortex toroidal lens (DVTL) are used in spatial as well as in Fourier planes. The images to be encrypted are first Fresnel transformed and then single-level discrete wavelet transform (DWT) is apply to decompose LL,HL, LH and HH matrices. The resulting matrices from the DWT are multiplied by additional RPMs and the resultants are subjected to inverse DWT for the encrypted images. The scheme is more secure because of many parameters used in the construction of SPM. The original images are recovered by using the correct parameters of FWT and SPM. Phase mask SPM based on DVTL increases security that enlarges the key space for encryption and decryption. The proposed encryption scheme is a lens-less optical system and its digital implementation has been performed using MATLAB 7.6.0 (R2008a). The computed value of mean-squared-error between the retrieved and the input images shows the efficacy of scheme. The sensitivity to encryption parameters, robustness against occlusion, entropy and multiplicative Gaussian noise attacks have been analysed.

  12. Effect of green tea catechin, a local drug delivery system as an adjunct to scaling and root planing in chronic periodontitis patients: A clinicomicrobiological study

    PubMed Central

    Kudva, Praveen; Tabasum, Syeda Tawkhira; Shekhawat, Nirmal Kanwar

    2011-01-01

    Background: Evaluate the adjunctive use of locally delivered green tea catechin with scaling and root planing, as compared to scaling and root planing alone in the management of chronic periodontitis. Materials and Methods: Fourteen patients with two sites in the contralateral quadrants with probing pocket depth of 5–8mm were selected. Each of the sites was assessed for the plaque index, gingival index, and probing pocket depth at baseline and 21 days and for microbiological analysis at baseline, 1 week and 21 days. Test sites received scaling and root planing along with green tea catechin strips and control sites received scaling and root planning alone. Results: The result showed intercomparison of the plaque index and gingival index for test and control groups at 21 days was not significant with P>0.05, whereas the probing depth at 21 days was significant with P<0.001. Intercomparison between microbial results demonstrated a considerable reduction of occurrence of Aggregatibacter actinomycetemcomitans, Prevotella intermedia, Fusobacterium species and Capnocytophaga in test. Conclusion: Green tea catechin local delivery along with scaling and root planing is more effective than scaling and root planing alone. PMID:21772720

  13. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 9 2011-04-01 2011-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  14. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 21 Food and Drugs 9 2012-04-01 2012-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  15. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  16. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 21 Food and Drugs 9 2013-04-01 2013-04-01 false Physical security controls for non-practitioners... security controls for non-practitioners; narcotic treatment programs and compounders for narcotic treatment... shall have the following specifications or the equivalent: 30 man-minutes against surreptitious entry...

  17. Gender differences in offaxis neuromuscular control during stepping under a slippery condition.

    PubMed

    Lee, Song Joo; Ren, Yupeng; Geiger, François; Zhang, Li-Qun

    2013-11-01

    Females are at greater risks of musculoskeletal injuries than are males, which may be related to decreased neuromuscular control in axial and/or frontal planes, offaxis neuromuscular control. The objective of this study was to investigate gender differences in offaxis neuromuscular control during stepping under a slippery condition. Forty-three healthy subjects (21 males and 22 females) performed different stepping tasks under a slippery condition, namely, free pivoting task (FPT) to control axial plane pivoting, free sliding task (FST) to control frontal plane sliding, and free pivoting and sliding task (FPST) to control axial pivoting, and frontal sliding on a custom-made offaxis elliptical trainer. Compared to males, females showed significantly higher pivoting instability, higher max internal and external pivoting angles, higher mean max medial and lateral sliding distance, and higher entropy of time to peak EMG in the medial and lateral gastrocnemius muscles during the FPST and higher entropy of time to peak EMG in the lateral gastrocnemius muscle during the FPT and FST. The findings may help us understand potential injury risk factors associated with gender differences, and provide a basis for developing targeted neuromuscular training to improve offaxis neuromuscular control, and reduce musculoskeletal injuries associated with excessive offaxis loadings.

  18. 14 CFR 23.771 - Pilot compartment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... the propellers so that no part of the pilot or the controls lies in the region between the plane of... propeller hub making an angle of 5 degrees forward or aft of the plane of rotation of the propeller. [Doc...

  19. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    DOT National Transportation Integrated Search

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  20. 33 CFR 104.405 - Format of the Vessel Security Plan (VSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...

  1. Main control computer security model of closed network systems protection against cyber attacks

    NASA Astrophysics Data System (ADS)

    Seymen, Bilal

    2014-06-01

    The model that brings the data input/output under control in closed network systems, that maintains the system securely, and that controls the flow of information through the Main Control Computer which also brings the network traffic under control against cyber-attacks. The network, which can be controlled single-handedly thanks to the system designed to enable the network users to make data entry into the system or to extract data from the system securely, intends to minimize the security gaps. Moreover, data input/output record can be kept by means of the user account assigned for each user, and it is also possible to carry out retroactive tracking, if requested. Because the measures that need to be taken for each computer on the network regarding cyber security, do require high cost; it has been intended to provide a cost-effective working environment with this model, only if the Main Control Computer has the updated hardware.

  2. Case Report of Serratus Plane Catheter for Pain Management in a Patient With Multiple Rib Fractures and an Inferior Scapular Fracture.

    PubMed

    Fu, Peter; Weyker, Paul D; Webb, Christopher A J

    2017-03-15

    We placed a superficial serratus anterior plane catheter in an elderly woman with dementia and elevated clotting times who presented with multiple rib fractures after a mechanical fall. She was not a surgical candidate, and treatment consisted of conservative management with physical therapy and pain control. She was not a candidate for a patient-controlled analgesia regimen because of her dementia. Given her elevated international normalized ratio, thoracic epidural and paravertebral analgesia was also contraindicated. We placed an ultrasound-guided serratus anterior plane catheter, allowing titratable continuous infusion in a trauma patient, resulting in excellent analgesia without adverse effects.

  3. Protocol independent transmission method in software defined optical network

    NASA Astrophysics Data System (ADS)

    Liu, Yuze; Li, Hui; Hou, Yanfang; Qiu, Yajun; Ji, Yuefeng

    2016-10-01

    With the development of big data and cloud computing technology, the traditional software-defined network is facing new challenges (e.i., ubiquitous accessibility, higher bandwidth, more flexible management and greater security). Using a proprietary protocol or encoding format is a way to improve information security. However, the flow, which carried by proprietary protocol or code, cannot go through the traditional IP network. In addition, ultra- high-definition video transmission service once again become a hot spot. Traditionally, in the IP network, the Serial Digital Interface (SDI) signal must be compressed. This approach offers additional advantages but also bring some disadvantages such as signal degradation and high latency. To some extent, HD-SDI can also be regard as a proprietary protocol, which need transparent transmission such as optical channel. However, traditional optical networks cannot support flexible traffics . In response to aforementioned challenges for future network, one immediate solution would be to use NFV technology to abstract the network infrastructure and provide an all-optical switching topology graph for the SDN control plane. This paper proposes a new service-based software defined optical network architecture, including an infrastructure layer, a virtualization layer, a service abstract layer and an application layer. We then dwell on the corresponding service providing method in order to implement the protocol-independent transport. Finally, we experimentally evaluate that proposed service providing method can be applied to transmit the HD-SDI signal in the software-defined optical network.

  4. Ultrasound-guided Combined Fascial Plane Blocks as an Intervention for Pain Management after Laparoscopic Cholecystectomy: A Randomized Control Study

    PubMed Central

    Ramkiran, Seshadri; Jacob, Mathews; Honwad, Manish; Vivekanand, Desiraju; Krishnakumar, Mathangi; Patrikar, Seema

    2018-01-01

    Background: Pain associated with laparoscopic cholecystectomy is most severe during the first 24 h and the port sites are the most painful. Recent multimodal approaches target incisional pain instead of visceral pain which has led to the emergence of abdominal fascial plane blocks. This study embraces a novel combination of two independently effective fascial plane blocks, namely rectus sheath block and subcostal transversus abdominis plane (TAP) block to alleviate postoperative pain. Study Objective: The aim is to evaluate the effectiveness of the combination of rectus sheath block and subcostal TAP block, to compare its efficacy with that of subcostal TAP block alone and with conventional port site infiltration (PSI) in alleviating postoperative pain in patients undergoing laparoscopic cholecystectomy. Methodology: This prospective, randomized control, pilot study included 61 patients scheduled for elective laparoscopic cholecystectomy and distributed among three groups, namely Group 1: Combined subcostal TAP block with rectus sheath block (n = 20); Group 2: Oblique subcostal TAP block alone (n = 21); and Group 3: PSI group as an active control (n = 20). Results: Combined group had significantly lower pain scores, higher satisfaction scores, and reduced rescue analgesia both in early and late postoperative periods than the conventional PSI group. Conclusion: Ultrasound-guided combined fascial plane blocks is a novel intervention in pain management of patients undergoing laparoscopic cholecystectomy and should become the standard of care. PMID:29628547

  5. Summary of Research 1997, Department of Aeronautics and Astronautics

    DTIC Science & Technology

    1999-01-01

    military space planes ; (2) stability and control of single and dual-spin spacecraft; and (3) near-Earth-object interception. The research has lead...rectilinear cascade wind tunnel. Second generation blading, having approximately half the solidity of the first- generation design, when operated at...Control of an Unmanned Aerial Vehicle for Precise Navigation in the Local Tangent Plane ," Master’s Thesis, Naval Postgraduate School, March 1997

  6. State-plane trajectories used to observe and control the behavior of a voltage step-up dc-to-dc converter

    NASA Technical Reports Server (NTRS)

    Burns, W. W., III; Wilson, T. G.

    1976-01-01

    State-plane analysis techniques are employed to study the voltage step up energy storage dc-to-dc converter. Within this framework, an example converter operating under the influence of a constant on time and a constant frequency controller is examined. Qualitative insight gained through this approach is used to develop a conceptual free running control law for the voltage step up converter which can achieve steady state operation in one on/off cycle of control. Digital computer simulation data is presented to illustrate and verify the theoretical discussions presented.

  7. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  8. IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations

    NASA Technical Reports Server (NTRS)

    Branch, Drew A.

    2014-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere has heightened from airports to the communication among the military branches legionnaires. With advanced persistent threats (APT's) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning, and configuration of network devices i.e. routers and IDS's/IPS's. In addition, I will be completing security assessments on software and hardware, vulnerability assessments and reporting, and conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out the tasks stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, as well as policies and procedures.

  9. IT Security Support for the Spaceport Command Control Systems Development Ground Support Development Operations

    NASA Technical Reports Server (NTRS)

    Branch, Drew

    2013-01-01

    Security is one of the most if not the most important areas today. After the several attacks on the United States, security everywhere was heightened from Airports to the communication among the military branches legionnaires. With advanced persistent threats (APTs) on the rise following Stuxnet, government branches and agencies are required, more than ever, to follow several standards, policies and procedures to reduce the likelihood of a breach. Attack vectors today are very advanced and are going to continue to get more and more advanced as security controls advance. This creates a need for networks and systems to be in an updated and secured state in a launch control system environment. FISMA is a law that is mandated by the government to follow when government agencies secure networks and devices. My role on this project is to ensure network devices and systems are in compliance with NIST, as outlined in FISMA. I will achieve this by providing assistance with security plan documentation and collection, system hardware and software inventory, malicious code and malware scanning and configuration of network devices i.e. routers and IDSsIPSs. In addition I will be completing security assessments on software and hardware, vulnerability assessments and reporting, conducting patch management and risk assessments. A guideline that will help with compliance with NIST is the SANS Top 20 Critical Controls. SANS Top 20 Critical Controls as well as numerous security tools, security software and the conduction of research will be used to successfully complete the tasks given to me. This will ensure compliance with FISMA and NIST, secure systems and a secured network. By the end of this project, I hope to have carried out stated above as well as gain an immense knowledge about compliance, security tools, networks and network devices, policies and procedures.

  10. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  11. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  12. 33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...

  13. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  14. New Vectorial Propulsion System and Trajectory Control Designs for Improved AUV Mission Autonomy

    PubMed Central

    Gonzalez, Julian; Galarza, Cesar; Aguzzi, Jacopo; del Rio, Joaquin

    2018-01-01

    Autonomous Underwater Vehicles (AUV) are proving to be a promising platform design for multidisciplinary autonomous operability with a wide range of applications in marine ecology and geoscience. Here, two novel contributions towards increasing the autonomous navigation capability of a new AUV prototype (the Guanay II) as a mix between a propelled vehicle and a glider are presented. Firstly, a vectorial propulsion system has been designed to provide full vehicle maneuverability in both horizontal and vertical planes. Furthermore, two controllers have been designed, based on fuzzy controls, to provide the vehicle with autonomous navigation capabilities. Due to the decoupled system propriety, the controllers in the horizontal plane have been designed separately from the vertical plane. This class of non-linear controllers has been used to interpret linguistic laws into different zones of functionality. This method provided good performance, used as interpolation between different rules or linear controls. Both improvements have been validated through simulations and field tests, displaying good performance results. Finally, the conclusion of this work is that the Guanay II AUV has a solid controller to perform autonomous navigation and carry out vertical immersions. PMID:29673224

  15. 17 CFR 240.17i-4 - Internal risk management control system requirements for supervised investment bank holding...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  16. 17 CFR 240.17i-4 - Internal risk management control system requirements for supervised investment bank holding...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...

  17. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  18. In-plane and out-of-plane motions of the human tympanic membrane

    PubMed Central

    Khaleghi, Morteza; Cheng, Jeffrey Tao; Furlong, Cosme; Rosowski, John J.

    2016-01-01

    Computer-controlled digital holographic techniques are developed and used to measure shape and four-dimensional nano-scale displacements of the surface of the tympanic membrane (TM) in cadaveric human ears in response to tonal sounds. The combination of these measurements (shape and sound-induced motions) allows the calculation of the out-of-plane (perpendicular to the surface) and in-plane (tangential) motion components at over 1 000 000 points on the TM surface with a high-degree of accuracy and sensitivity. A general conclusion is that the in-plane motion components are 10–20 dB smaller than the out-of-plane motions. These conditions are most often compromised with higher-frequency sound stimuli where the overall displacements are smaller, or the spatial density of holographic fringes is higher, both of which increase the uncertainty of the measurements. The results are consistent with the TM acting as a Kirchhoff–Love's thin shell dominated by out-of-plane motion with little in-plane motion, at least with stimulus frequencies up to 8 kHz. PMID:26827009

  19. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    NASA Astrophysics Data System (ADS)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  20. Effortful control mediates relations between children's attachment security and their regard for rules of conduct

    PubMed Central

    Nordling, Jamie Koenig; Boldt, Lea J.; O'Bleness, Jessica; Kochanska, Grazyna

    2015-01-01

    Although attachment security has been associated with children's rule-compatible conduct, the mechanism through which attachment influences early regard for rules is not well established. We hypothesized that effortful control would mediate the link between security and indicators of children's emerging regard for rules (discomfort following rule violations, internalization of parents' and experimenter's rules, few externalizing behaviors). In a longitudinal study, the Attachment Q-Set was completed by parents, effortful control was observed, and Regard for Rules was observed and rated by parents. The proposed model fit the data well: Children's security to mothers predicted their effortful control, which in turn had a direct link to a greater Regard for Rules. Children's security with fathers did not predict effortful control. The mother-child relationship appears particularly important for positive developmental cascades of self-regulation and socialization. PMID:27158193

  1. The influence of air-filled structures on wave propagation and beam formation of a pygmy sperm whale (Kogia breviceps) in horizontal and vertical planes.

    PubMed

    Song, Zhongchang; Zhang, Yu; Thornton, Steven W; Li, Songhai; Dong, Jianchen

    2017-10-01

    The wave propagation, sound field, and transmission beam pattern of a pygmy sperm whale (Kogia breviceps) were investigated in both the horizontal and vertical planes. Results suggested that the signals obtained at both planes were similarly characterized with a high peak frequency and a relatively narrow bandwidth, close to the ones recorded from live animals. The sound beam measured outside the head in the vertical plane was narrower than that of the horizontal one. Cases with different combinations of air-filled structures in both planes were used to study the respective roles in controlling wave propagation and beam formation. The wave propagations and beam patterns in the horizontal and vertical planes elucidated the important reflection effect of the spermaceti and vocal chambers on sound waves, which was highly significant in forming intensive forward sound beams. The air-filled structures, the forehead soft tissues and skull structures formed wave guides in these two planes for emitted sounds to propagate forward.

  2. Diffractive optical variable image devices generated by maskless interferometric lithography for optical security

    NASA Astrophysics Data System (ADS)

    Cabral, Alexandre; Rebordão, José M.

    2011-05-01

    In optical security (protection against forgery and counterfeit of products and documents) the problem is not exact reproduction but the production of something sufficiently similar to the original. Currently, Diffractive Optically Variable Image Devices (DOVID), that create dynamic chromatic effects which may be easily recognized but are difficult to reproduce, are often used to protect important products and documents. Well known examples of DOVID for security are 3D or 2D/3D holograms in identity documents and credit cards. Others are composed of shapes with different types of microstructures yielding by diffraction to chromatic dynamic effects. A maskless interferometric lithography technique to generate DOVIDs for optical security is presented and compared to traditional techniques. The approach can be considered as a self-masking focused holography on planes tilted with respect to the reference optical axes of the system, and is based on the Scheimpflug and Hinge rules. No physical masks are needed to ensure optimum exposure of the photosensitive film. The system built to demonstrate the technique relies on the digital mirrors device MOEMS technology from Texas Instruments' Digital Light Processing. The technique is linear on the number of specified colors and does not depend either on the area of the device or the number of pixels, factors that drive the complexity of dot-matrix based systems. The results confirmed the technique innovation and capabilities in the creation of diffractive optical elements for security against counterfeiting and forgery.

  3. Verticality Perceptions Associate with Postural Control and Functionality in Stroke Patients

    PubMed Central

    Baggio, Jussara A. O.; Mazin, Suleimy S. C.; Alessio-Alves, Frederico F.; Barros, Camila G. C.; Carneiro, Antonio A. O.; Leite, João P.; Pontes-Neto, Octavio M.; Santos-Pontelli, Taiza E. G.

    2016-01-01

    Deficits of postural control and perceptions of verticality are disabling problems observed in stroke patients that have been recently correlated to each other. However, there is no evidence in the literature confirming this relationship with quantitative posturography analysis. Therefore, the objectives of the present study were to analyze the relationship between Subjective Postural Vertical (SPV) and Haptic Vertical (HV) with posturography and functionality in stroke patients. We included 45 stroke patients. The study protocol was composed by clinical interview, evaluation of SPV and HV in roll and pitch planes and posturography. Posturography was measured in the sitting and standing positions under the conditions: eyes open, stable surface (EOSS); eyes closed, stable surface (ECSS); eyes open, unstable surface (EOUS); and eyes closed, unstable surface (ECUS). The median PV in roll plane was 0.34° (-1.44° to 2.54°) and in pitch plane 0.36° (-2.72° to 2.45°). The median of HV in roll and pitch planes were -0.94° (-5.86° to 3.84°) and 3.56° (-0.68° to 8.36°), respectively. SPV in the roll plane was correlated with all posturagraphy parameters in sitting position in all conditions (r = 0.35 to 0.47; p < 0.006). There were moderate correlations with the verticality perceptions and all the functional scales. Linear regression model showed association between speed and SPV in the roll plane in the condition EOSS (R2 of 0.37; p = 0.005), in the condition ECSS (R2 of 0.13; p = 0.04) and in the condition EOUS (R2 of 0.22; p = 0.03). These results suggest that verticality perception is a relevant component of postural control and should be systematically evaluated, particularly in patients with abnormal postural control. PMID:26954679

  4. Auditing Albaha University Network Security using in-house Developed Penetration Tool

    NASA Astrophysics Data System (ADS)

    Alzahrani, M. E.

    2018-03-01

    Network security becomes very important aspect in any enterprise/organization computer network. If important information of the organization can be accessed by anyone it may be used against the organization for further own interest. Thus, network security comes into it roles. One of important aspect of security management is security audit. Security performance of Albaha university network is relatively low (in term of the total controls outlined in the ISO 27002 security control framework). This paper proposes network security audit tool to address issues in Albaha University network. The proposed penetration tool uses Nessus and Metasploit tool to find out the vulnerability of a site. A regular self-audit using inhouse developed tool will increase the overall security and performance of Albaha university network. Important results of the penetration test are discussed.

  5. The effects of prosthetic foot stiffness on transtibial amputee walking mechanics and balance control during turning.

    PubMed

    Shell, Courtney E; Segal, Ava D; Klute, Glenn K; Neptune, Richard R

    2017-11-01

    Little evidence exists regarding how prosthesis design characteristics affect performance in tasks that challenge mediolateral balance such as turning. This study assesses the influence of prosthetic foot stiffness on amputee walking mechanics and balance control during a continuous turning task. Three-dimensional kinematic and kinetic data were collected from eight unilateral transtibial amputees as they walked overground at self-selected speed clockwise and counterclockwise around a 1-meter circle and along a straight line. Subjects performed the walking tasks wearing three different ankle-foot prostheses that spanned a range of sagittal- and coronal-plane stiffness levels. A decrease in stiffness increased residual ankle dorsiflexion (10-13°), caused smaller adaptations (<5°) in proximal joint angles, decreased residual and increased intact limb body support, increased residual limb propulsion and increased intact limb braking for all tasks. While changes in sagittal-plane joint work due to decreased stiffness were generally consistent across tasks, effects on coronal-plane hip work were task-dependent. When the residual limb was on the inside of the turn and during straight-line walking, coronal-plane hip work increased and coronal-plane peak-to-peak range of whole-body angular momentum decreased with decreased stiffness. Changes in sagittal-plane kinematics and kinetics were similar to those previously observed in straight-line walking. Mediolateral balance improved with decreased stiffness, but adaptations in coronal-plane angles, work and ground reaction force impulses were less systematic than those in sagittal-plane measures. Effects of stiffness varied with the residual limb inside versus outside the turn, which suggests that actively adjusting stiffness to turn direction may be beneficial. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Knee Joint Contact Mechanics during Downhill Gait and its Relationship with Varus/Valgus Motion and Muscle Strength in Patients with Knee Osteoarthritis

    PubMed Central

    Farrokhi, Shawn; Voycheck, Carrie A.; Gustafson, Jonathan A.; Fitzgerald, G. Kelley; Tashman, Scott

    2015-01-01

    Objective The objective of this exploratory study was to evaluate tibiofemoral joint contact point excursions and velocities during downhill gait and assess the relationship between tibiofemoral joint contact mechanics with frontal-plane knee joint motion and lower extremity muscle weakness in patients with knee osteoarthritis (OA). Methods Dynamic stereo X-ray was used to quantify tibiofemoral joint contact mechanics and frontal-plane motion during the loading response phase of downhill gait in 11 patients with knee OA and 11 control volunteers. Quantitative testing of the quadriceps and the hip abductor muscles was also performed. Group differences in contact mechanics and frontal-plane motion excursions were compared using analysis of covariance with adjustments for body mass index. Differences in strength were compared using independent sample t-tests. Additionally, linear associations between contact mechanics with frontal-plane knee motion and muscle strength were evaluated using Pearson's correlation coefficients. Results Patients with knee OA demonstrated larger medial/lateral joint contact point excursions (p<0.02) and greater heel-strike joint contact point velocities (p<0.05) for the medial and lateral compartments compared to the control group. The peak medial/lateral joint contact point velocity of the medial compartment was also greater for patients with knee OA compared to their control counterparts (p=0.02). Additionally, patients with knee OA demonstrated significantly increased frontal-plane varus motion excursions (p<0.01) and greater quadriceps and hip abductor muscle weakness (p=0.03). In general, increased joint contact point excursions and velocities in patients with knee OA were linearly associated with greater frontal-plane varus motion excursions (p<0.04) but not with quadriceps or hip abductor strength. Conclusion Altered contact mechanics in patients with knee OA may be related to compromised frontal-plane joint stability but not with deficits in muscle strength. PMID:27030846

  7. Experimental demonstration of in-plane negative-angle refraction with an array of silicon nanoposts.

    PubMed

    Wu, Aimin; Li, Hao; Du, Junjie; Ni, Xingjie; Ye, Ziliang; Wang, Yuan; Sheng, Zhen; Zou, Shichang; Gan, Fuwan; Zhang, Xiang; Wang, Xi

    2015-03-11

    Controlling an optical beam is fundamental in optics. Recently, unique manipulation of optical wavefronts has been successfully demonstrated by metasurfaces. However, these artificially engineered nanostructures have thus far been limited to operate on light beams propagating out-of-plane. The in-plane operation is critical for on-chip photonic applications. Here, we demonstrate an anomalous negative-angle refraction of a light beam propagating along the plane, by designing a thin dielectric array of silicon nanoposts. The circularly polarized dipoles induced by the high-permittivity nanoposts at the scattering resonance significantly shape the wavefront of the light beam and bend it anomalously. The unique capability of a thin line of the nanoposts for manipulating in-plane wavefronts makes the device extremely compact. The low loss all-dielectric structure is compatible with complementary metal-oxide semiconductor technologies, offering an effective solution for in-plane beam steering and routing for on-chip photonics.

  8. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  9. Time Periodic Control of a Multi-Blade Helicopter.

    DTIC Science & Technology

    1988-05-01

    part of an element of p X rotor inflow ratio; Langrangian multiplier; Poincare exponent H rotor inflow ratio with respect to the hub *P plane A...and a $ complex conjugate pair in the right- half plane resulting from ( the longitudinal velocity and pitch coupling. Without a horizontal tail, the ... Poincare Exponents . . .. 182 VI. Controller Gains ...... ................ 184 viii I ’Q List of Symbols Listed below are the principal symbols used in this

  10. Double-sided coaxial circuit QED with out-of-plane wiring

    NASA Astrophysics Data System (ADS)

    Rahamim, J.; Behrle, T.; Peterer, M. J.; Patterson, A.; Spring, P. A.; Tsunoda, T.; Manenti, R.; Tancredi, G.; Leek, P. J.

    2017-05-01

    Superconducting circuits are well established as a strong candidate platform for the development of quantum computing. In order to advance to a practically useful level, architectures are needed which combine arrays of many qubits with selective qubit control and readout, without compromising on coherence. Here, we present a coaxial circuit quantum electrodynamics architecture in which qubit and resonator are fabricated on opposing sides of a single chip, and control and readout wiring are provided by coaxial wiring running perpendicular to the chip plane. We present characterization measurements of a fabricated device in good agreement with simulated parameters and demonstrating energy relaxation and dephasing times of T1 = 4.1 μs and T2 = 5.7 μs, respectively. The architecture allows for scaling to large arrays of selectively controlled and measured qubits with the advantage of all wiring being out of the plane.

  11. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  12. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  13. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  14. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  15. 47 CFR 87.395 - Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... and Air Navigation Aids (Short Title: SCATANA). 87.395 Section 87.395 Telecommunication FEDERAL... Communications § 87.395 Plan for the Security Control of Air Traffic and Air Navigation Aids (Short Title: SCATANA). (a) The Plan for the Security Control of Air Traffic and Air Navigation Aids (SCATANA) is...

  16. A Hierarchical Security Architecture for Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  17. Multi-color IR sensors based on QWIP technology for security and surveillance applications

    NASA Astrophysics Data System (ADS)

    Sundaram, Mani; Reisinger, Axel; Dennis, Richard; Patnaude, Kelly; Burrows, Douglas; Cook, Robert; Bundas, Jason

    2006-05-01

    Room-temperature targets are detected at the furthest distance by imaging them in the long wavelength (LW: 8-12 μm) infrared spectral band where they glow brightest. Focal plane arrays (FPAs) based on quantum well infrared photodetectors (QWIPs) have sensitivity, noise, and cost metrics that have enabled them to become the best commercial solution for certain security and surveillance applications. Recently, QWIP technology has advanced to provide pixelregistered dual-band imaging in both the midwave (MW: 3-5 μm) and longwave infrared spectral bands in a single chip. This elegant technology affords a degree of target discrimination as well as the ability to maximize detection range for hot targets (e.g. missile plumes) by imaging in the midwave and for room-temperature targets (e.g. humans, trucks) by imaging in the longwave with one simple camera. Detection-range calculations are illustrated and FPA performance is presented.

  18. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    NASA Astrophysics Data System (ADS)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  19. Low-temperature plasma-enhanced atomic layer deposition of 2-D MoS2: large area, thickness control and tuneable morphology.

    PubMed

    Sharma, Akhil; Verheijen, Marcel A; Wu, Longfei; Karwal, Saurabh; Vandalon, Vincent; Knoops, Harm C M; Sundaram, Ravi S; Hofmann, Jan P; Kessels, W M M Erwin; Bol, Ageeth A

    2018-05-10

    Low-temperature controllable synthesis of monolayer-to-multilayer thick MoS2 with tuneable morphology is demonstrated by using plasma enhanced atomic layer deposition (PEALD). The characteristic self-limiting ALD growth with a growth-per-cycle of 0.1 nm per cycle and digital thickness control down to a monolayer are observed with excellent wafer scale uniformity. The as-deposited films are found to be polycrystalline in nature showing the signature Raman and photoluminescence signals for the mono-to-few layered regime. Furthermore, a transformation in film morphology from in-plane to out-of-plane orientation of the 2-dimensional layers as a function of growth temperature is observed. An extensive study based on high-resolution transmission electron microscopy is presented to unravel the nucleation mechanism of MoS2 on SiO2/Si substrates at 450 °C. In addition, a model elucidating the film morphology transformation (at 450 °C) is hypothesized. Finally, the out-of-plane oriented films are demonstrated to outperform the in-plane oriented films in the hydrogen evolution reaction for water splitting applications.

  20. Solution of task related to control of swiss-type automatic lathe to get planes parallel to part axis

    NASA Astrophysics Data System (ADS)

    Tabekina, N. A.; Chepchurov, M. S.; Evtushenko, E. I.; Dmitrievsky, B. S.

    2018-05-01

    The work solves the problem of automation of machining process namely turning to produce parts having the planes parallel to an axis of rotation of part without using special tools. According to the results, the availability of the equipment of a high speed electromechanical drive to control the operative movements of lathe machine will enable one to get the planes parallel to the part axis. The method of getting planes parallel to the part axis is based on the mathematical model, which is presented as functional dependency between the conveying velocity of the driven element and the time. It describes the operative movements of lathe machine all over the tool path. Using the model of movement of the tool, it has been found that the conveying velocity varies from the maximum to zero value. It will allow one to carry out the reverse of the drive. The scheme of tool placement regarding the workpiece has been proposed for unidirectional movement of the driven element at high conveying velocity. The control method of CNC machines can be used for getting geometrically complex parts on the lathe without using special milling tools.

  1. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  2. 17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internal risk management control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...

  3. Control and Non-Payload Communications (CNPC) Prototype Radio - Generation 2 Security Flight Test Report

    NASA Technical Reports Server (NTRS)

    Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.

    2015-01-01

    NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.

  4. Implementing digital holograms to create and measure complex-plane optical fields

    NASA Astrophysics Data System (ADS)

    Dudley, Angela; Majola, Nombuso; Chetty, Naven; Forbes, Andrew

    2016-02-01

    The coherent superposition of a Gaussian beam with an optical vortex can be mathematically described to occupy the complex plane. We provide a simple analogy between the mathematics, in the form of the complex plane, and the visual representation of these two superimposed optical fields. We provide detailed instructions as to how one can experimentally produce, measure, and control these fields with the use of digital holograms encoded on a spatial light modulator.

  5. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    PubMed

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  6. Design and Stability of an On-Orbit Attitude Control System Using Reaction Control Thrusters

    NASA Technical Reports Server (NTRS)

    Hall, Robert A.; Hough, Steven; Orphee, Carolina; Clements, Keith

    2015-01-01

    Principles for the design and stability of a spacecraft on-orbit attitude control system employing on-off Reaction Control System (RCS) thrusters is presented. Both the vehicle dynamics and the control system actuators are inherently nonlinear, hence traditional linear control system design approaches are not directly applicable. This paper has three main aspects: It summarizes key RCS control System design principles from the Space Shuttle and Space Station programs, it demonstrates a new approach to develop a linear model of a phase plane control system using describing functions, and applies each of these to the initial development of the NASA's next generation of upper stage vehicles. Topics addressed include thruster hardware specifications, phase plane design and stability, jet selection approaches, filter design metrics, and automaneuver logic.

  7. Speckle correlation method used to measure object's in-plane velocity.

    PubMed

    Smíd, Petr; Horváth, Pavel; Hrabovský, Miroslav

    2007-06-20

    We present a measurement of an object's in-plane velocity in one direction by the use of the speckle correlation method. Numerical correlations of speckle patterns recorded periodically during motion of the object under investigation give information used to evaluate the object's in-plane velocity. The proposed optical setup uses a detection plane in the image field and enables one to detect the object's velocity within the interval (10-150) microm x s(-1). Simulation analysis shows a way of controlling the measuring range. The presented theory, simulation analysis, and setup are verified through an experiment of measurement of the velocity profile of an object.

  8. A TEMPLATE-BASED FABRICATION TECHNIQUE FOR SPATIALLY-DESIGNED POLYMER MICRO/NANOFIBER COMPOSITES

    PubMed Central

    Naik, Nisarga; Caves, Jeff; Kumar, Vivek; Chaikof, Elliot; Allen, Mark G.

    2013-01-01

    This paper reports a template-based technique for the fabrication of polymer micro/nanofiber composites, exercising control over the fiber dimensions and alignment. Unlike conventional spinning-based methods of fiber production, the presented approach is based on micro-transfer molding. It is a parallel processing technique capable of producing fibers with control over both in-plane and out-of-plane geometries, in addition to packing density and layout of the fibers. Collagen has been used as a test polymer to demonstrate the concept. Hollow and solid collagen fibers with various spatial layouts have been fabricated. Produced fibers have widths ranging from 2 µm to 50 µm, and fiber thicknesses ranging from 300 nm to 3 µm. Also, three-dimensionality of the process has been demonstrated by producing in-plane serpentine fibers with designed arc lengths, out-of-plane wavy fibers, fibers with focalized particle encapsulation, and porous fibers with desired periodicity and pore sizes. PMID:24533428

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schulte, Kevin L.; France, Ryan M.; McMahon, William E.

    In this work we develop control over dislocation glide dynamics in Ga xIn 1-xP compositionally graded buffer layers (CGBs) through control of CuPt ordering on the group-III sublattice. The ordered structure is metastable in the bulk, so any glissile dislocation that disrupts the ordered pattern will release stored energy, and experience an increased glide force. Here we show how this connection between atomic ordering and dislocation glide force can be exploited to control the threading dislocation density (TDD) in Ga xIn 1-xP CGBs. When ordered Ga xIn 1-xP is graded from the GaAs lattice constant to InP, the order parametermore » ..eta.. decreases as x decreases, and dislocation glide switches from one set of glide planes to the other. This glide plane switch (GPS) is accompanied by the nucleation of dislocations on the new glide plane, which typically leads to increased TDD. We develop control of the GPS position within a Ga xIn 1-xP CGB through manipulation of deposition temperature, surfactant concentration, and strain-grading rate. We demonstrate a two-stage Ga xIn 1-xP CGB from GaAs to InP with sufficiently low TDD for high performance devices, such as the 4-junction inverted metamorphic multi-junction solar cell, achieved through careful control the GPS position. Here, experimental results are analyzed within the context of a model that considers the force balance on dislocations on the two competing glide planes as a function of the degree of ordering.« less

  10. DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN NUCLEAR FACILITY SAFEGUARDS AND SECURITY

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard

    2011-07-01

    Many critical infrastructure sectors have been investigating cyber security issues for several years especially with the help of two primary government programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the U.S. Department of Homeland Security (DHS) Control Systems Security Program have both implemented activities aimed at securing the industrial control systems that operate the North American electric grid along with several other critical infrastructure sectors (ICS). These programs have spent the last seven years working with industry including asset owners, educational institutions, standards and regulating bodies, and control system vendors. The programs common mission is tomore » provide outreach, identification of cyber vulnerabilities to ICS and mitigation strategies to enhance security postures. The success of these programs indicates that a similar approach can be successfully translated into other sectors including nuclear operations, safeguards, and security. The industry regulating bodies have included cyber security requirements and in some cases, have incorporated sets of standards with penalties for non-compliance such as the North American Electric Reliability Corporation Critical Infrastructure Protection standards. These DOE and DHS programs that address security improvements by both suppliers and end users provide an excellent model for nuclear facility personnel concerned with safeguards and security cyber vulnerabilities and countermeasures. It is not a stretch to imagine complete surreptitious collapse of protection against the removal of nuclear material or even initiation of a criticality event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS inadequately protected against the cyber threat.« less

  11. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  12. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    DTIC Science & Technology

    2017-02-12

    group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research

  13. Survey of methods for secure connection to the internet

    NASA Astrophysics Data System (ADS)

    Matsui, Shouichi

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.

  14. Cyber secure systems approach for NPP digital control systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McCreary, T. J.; Hsu, A.

    2006-07-01

    Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less

  15. Fluorescent lamp unit with magnetic field generating means

    DOEpatents

    Grossman, Mark W.; George, William A.

    1989-01-01

    A fluorescent lamp unit having a magnetic field generating means for improving the performance of the fluorescent lamp is disclosed. In a preferred embodiment the fluorescent lamp comprises four longitudinally extending leg portions disposed in substantially quadrangular columnar array and joined by three generally U-shaped portions disposed in different planes. In another embodiment of the invention the magnetic field generating means comprises a plurality of permanent magnets secured together to form a single columnar structure disposed within a centrally located region defined by the shape of lamp envelope.

  16. Fluorescent lamp unit with magnetic field generating means

    DOEpatents

    Grossman, M.W.; George, W.A.

    1989-08-08

    A fluorescent lamp unit having a magnetic field generating means for improving the performance of the fluorescent lamp is disclosed. In a preferred embodiment the fluorescent lamp comprises four longitudinally extending leg portions disposed in substantially quadrangular columnar array and joined by three generally U-shaped portions disposed in different planes. In another embodiment of the invention the magnetic field generating means comprises a plurality of permanent magnets secured together to form a single columnar structure disposed within a centrally located region defined by the shape of lamp envelope. 4 figs.

  17. Hip rotation angle is associated with frontal plane knee joint mechanics during running.

    PubMed

    Sakaguchi, Masanori; Shimizu, Norifumi; Yanai, Toshimasa; Stefanyshyn, Darren J; Kawakami, Yasuo

    2015-02-01

    Inability to control lower extremity segments in the frontal and transverse planes resulting in large knee abduction angle and increased internal knee abduction impulse has been associated with patellofemoral pain (PFP). However, the influence of hip rotation angles on frontal plane knee joint kinematics and kinetics remains unclear. The purpose of this study was to explore how hip rotation angles are related to frontal plane knee joint kinematics and kinetics during running. Seventy runners participated in this study. Three-dimensional marker positions and ground reaction forces were recorded with an 8-camera motion analysis system and a force plate while subjects ran along a 25-m runway at a speed of 4m/s. Knee abduction, hip rotation and toe-out angles, frontal plane lever arm at the knee, internal knee abduction moment and impulse, ground reaction forces and the medio-lateral distance from the ankle joint center to the center of pressure (AJC-CoP) were quantified. The findings of this study indicate that greater hip external rotation angles were associated with greater toe-out angles, longer AJC-CoP distances, smaller internal knee abduction impulses with shorter frontal plane lever arms and greater knee abduction angles. Thus, there appears to exist a conflict between kinematic and kinetic risk factors of PFP, and hip external rotation angle may be a key factor to control frontal plane knee joint kinematics and kinetics. These results may help provide an appropriate manipulation and/or intervention on running style to reduce the risk of PFP. Copyright © 2014 Elsevier B.V. All rights reserved.

  18. Characterizing head motion in three planes during combined visual and base of support disturbances in healthy and visually sensitive subjects.

    PubMed

    Keshner, E A; Dhaher, Y

    2008-07-01

    Multiplanar environmental motion could generate head instability, particularly if the visual surround moves in planes orthogonal to a physical disturbance. We combined sagittal plane surface translations with visual field disturbances in 12 healthy (29-31 years) and 3 visually sensitive (27-57 years) adults. Center of pressure (COP), peak head angles, and RMS values of head motion were calculated and a three-dimensional model of joint motion was developed to examine gross head motion in three planes. We found that subjects standing quietly in front of a visual scene translating in the sagittal plane produced significantly greater (p<0.003) head motion in yaw than when on a translating platform. However, when the platform was translated in the dark or with a visual scene rotating in roll, head motion orthogonal to the plane of platform motion significantly increased (p<0.02). Visually sensitive subjects having no history of vestibular disorder produced large, delayed compensatory head motion. Orthogonal head motions were significantly greater in visually sensitive than in healthy subjects in the dark (p<0.05) and with a stationary scene (p<0.01). We concluded that motion of the visual field could modify compensatory response kinematics of a freely moving head in planes orthogonal to the direction of a physical perturbation. These results suggest that the mechanisms controlling head orientation in space are distinct from those that control trunk orientation in space. These behaviors would have been missed if only COP data were considered. Data suggest that rehabilitation training can be enhanced by combining visual and mechanical perturbation paradigms.

  19. US-CERT Control System Center Input/Output (I/O) Conceputal Design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2005-02-01

    This document was prepared for the US-CERT Control Systems Center of the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs the federal departments to identify and prioritize critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the NCSD to address the control system security component addressed in the National Strategy to Secure Cyberspace andmore » the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems; the I/O upgrade described in this document supports these goals. The vulnerability assessment Test Bed, located in the Information Operations Research Center (IORC) facility at Idaho National Laboratory (INL), consists of a cyber test facility integrated with multiple test beds that simulate the nation's critical infrastructure. The fundamental mission of the Test Bed is to provide industry owner/operators, system vendors, and multi-agency partners of the INL National Security Division a platform for vulnerability assessments of control systems. The Input/Output (I/O) upgrade to the Test Bed (see Work Package 3.1 of the FY-05 Annual Work Plan) will provide for the expansion of assessment capabilities within the IORC facility. It will also provide capabilities to connect test beds within the Test Range and other Laboratory resources. This will allow real time I/O data input and communication channels for full replications of control systems (Process Control Systems [PCS], Supervisory Control and Data Acquisition Systems [SCADA], and components). This will be accomplished through the design and implementation of a modular infrastructure of control system, communications, networking, computing and associated equipment, and measurement/control devices. The architecture upgrade will provide a flexible patching system providing a quick ''plug and play''configuration through various communication paths to gain access to live I/O running over specific protocols. This will allow for in-depth assessments of control systems in a true-to-life environment. The full I/O upgrade will be completed through a two-phased approach. Phase I, funded by DHS, expands the capabilities of the Test Bed by developing an operational control system in two functional areas, the Science & Technology Applications Research (STAR) Facility and the expansion of various portions of the Test Bed. Phase II (see Appendix A), funded by other programs, will complete the full I/O upgrade to the facility.« less

  20. Quadratus Lumborum Block Versus Transversus Abdominis Plane Block for Postoperative Pain After Cesarean Delivery: A Randomized Controlled Trial.

    PubMed

    Blanco, Rafael; Ansari, Tarek; Riad, Waleed; Shetty, Nanda

    Effective postoperative analgesia after cesarean delivery enhances early recovery, ambulation, and breastfeeding. In a previous study, we established the effectiveness of the quadratus lumborum block in providing pain relief after cesarean delivery compared with patient-controlled analgesia (morphine). In the current study, we hypothesized that this method would be equal to or better than the transversus abdominis plane block with regard to pain relief and its duration of action after cesarean delivery. Between April 2015 and August 2015, we randomized 76 patients scheduled for elective cesarean delivery under spinal anesthesia to receive the quadratus lumborum block or the transversus abdominis plane block for postoperative pain relief. This trial was registered prospectively (NCT 02489851) [corrected]. Patients in the quadratus lumborum block group used significantly less morphine than the transversus abdominis plane block group (P < 0.05) at 12, 24, and 48 hours but not at 4 and 6 hours after cesarean delivery. This group also had significantly fewer morphine demands than the control group (P < 0.05) at 6, 12, 24, and 48 hours after cesarean delivery. No significant differences in visual analog scale results were shown between the 2 groups at rest or with movement. Calculated total pain relief at rest and with movement were similar (P < 0.001) in both groups. The quadratus lumborum block was more effective in reducing morphine consumption and demands than transversus abdominis plane blocks after cesarean section. This effect was observed up to 48 hours postoperatively.

  1. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD...) MISCELLANEOUS PLAN FOR THE EMERGENCY SECURITY CONTROL OF AIR TRAFFIC (ESCAT) Explanation of Terms, Acronyms and... Order ESCAT—Emergency Security Control of Air Traffic FAA—Federal Aviation Administration IFR—Instrument...

  2. Impaired Varus-Valgus Proprioception and Neuromuscular Stabilization in Medial Knee Osteoarthritis

    PubMed Central

    Chang, Alison H.; Lee, Song Joo; Zhao, Heng; Ren, Yupeng; Zhang, Li-Qun

    2014-01-01

    Impaired proprioception and poor muscular stabilization in the frontal plane may lead to knee instability during functional activities, a common complaint in persons with knee osteoarthritis (KOA). Understanding these frontal plane neuromechanical properties in KOA will help elucidate the factors contributing to knee instability and aid in the development of targeted intervention strategies. The study objectives were to compare knee varus-valgus proprioception, isometric muscle strength, and active muscular contribution to stability between persons with medial KOA and healthy controls. We evaluated knee frontal plane neuromechanical parameters in 14 participants with medial KOA and 14 age- and gender-matched controls, using a joint driving device (JDD) with a customized motor and a 6-axis force sensor. Analysis of covariance with BMI as a covariate was used to test the differences in varus-valgus neuromechanical parameters between these two groups. The KOA group had impaired varus proprioception acuity (1.08 ± 0.59° vs. 0.69 ± 0.49°, p < 0.05), decreased normalized varus muscle strength (1.31 ± 0.75% vs. 1.79 ± 0.84% body weight, p < 0.05), a trend toward decreased valgus strength (1.29 ± 0.67% vs. 1.88 ± 0.99%, p = 0.054), and impaired ability to actively stabilize the knee in the frontal plane during external perturbation (4.67 ± 2.86 vs. 8.26 ± 5.95 Nm/degree, p < 0.05). The knee frontal plane sensorimotor control system is compromised in persons with medial KOA. Our findings suggest varus-valgus control deficits in both the afferent input (proprioceptive acuity) and muscular effectors (muscle strength and capacity to stabilize the joint). PMID:24321442

  3. Arms Control and Nonproliferation: A Catalog of Treaties and Agreements

    DTIC Science & Technology

    2007-08-09

    security and control over nuclear weapons and fissile materials. These projects provided Russia with bullet-proof Kevlar blankets, secure canisters ...U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...U.S.-Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and

  4. Digitally Controlled ’Programmable’ Active Filters.

    DTIC Science & Technology

    1985-12-01

    Advisor: Sherif Michael Approved for public release; distribution is unlimited. U - ~ .%~ ~ % %’.4 ~ -. 4-. " %’ -. .4. z. . 4, ,4°*-4° -o - ’ SECURITY ...CLASSIFICATION O THI PAGE ff ,’- -""" REPORT DOCUMENTATION PAGE Ia REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a SECURITY CLASSIFICATION...ELEMENT NO. NO NO. ACCESSION NO. S 11 TITLE (Include Security ClassWfication) , DIGITALLY CONTROLLED "PROGRAMMABLE" ACTIVE FILTERS 1 PERSONAL AUTHOR

  5. Analysis of Traffic Signals on a Software-Defined Network for Detection and Classification of a Man-in-the-Middle Attack

    DTIC Science & Technology

    2017-09-01

    unique characteristics of reported anomalies in the collected traffic signals to build a classification framework. Other cyber events, such as a...Furthermore, we identify unique characteristics of reported anomalies in the collected traffic signals to build a classification framework. Other cyber...2]. The applications build flow rules using network topology information provided by the control plane [1]. Since the control plane is able to

  6. Wettability control of droplet deposition and detachment.

    PubMed

    Baret, Jean-Christophe; Brinkmann, Martin

    2006-04-14

    The conditions for droplet deposition on plane substrates are studied using electrowetting to continuously modulate the surface wettability. Droplets of controlled volume attached to the tip of a pipette are brought into contact with the surface. During retraction of the pipette the droplets are deposited or detach completely depending on volume and contact angle. The experimental limit of deposition in the contact angle or volume plane is in good agreement with analytical and numerical predictions obtained within the capillary model.

  7. 33 CFR 101.405 - Maritime Security (MARSEC) Directives.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.405 Maritime... necessary to respond to a threat assessment or to a specific threat against the maritime elements of the...

  8. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  9. Taking Steps to Protect Against the Insider Threat

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pope, Noah Gale; Williams, Martha; Lewis, Joel

    2015-10-16

    Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse ofmore » equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.« less

  10. A Network Access Control Framework for 6LoWPAN Networks

    PubMed Central

    Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime

    2013-01-01

    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610

  11. Performance modeling of terahertz (THz) and millimeter waves (mmW) pupil plane imaging

    NASA Astrophysics Data System (ADS)

    Mohammadian, Nafiseh; Furxhi, Orges; Zhang, Lei; Offermans, Peter; Ghazi, Galia; Driggers, Ronald

    2018-05-01

    Terahertz- (THz) and millimeter-wave sensors are becoming more important in industrial, security, medical, and defense applications. A major problem in these sensing areas is the resolution, sensitivity, and visual acuity of the imaging systems. There are different fundamental parameters in designing a system that have significant effects on the imaging performance. The performance of THz systems can be discussed in terms of two characteristics: sensitivity and spatial resolution. New approaches for design and manufacturing of THz imagers are a vital basis for developing future applications. Photonics solutions have been at the technological forefront in THz band applications. A single scan antenna does not provide reasonable resolution, sensitivity, and speed. An effective approach to imaging is placing a high-performance antenna in a two-dimensional antenna array to achieve higher radiation efficiency and higher resolution in the imaging systems. Here, we present the performance modeling of a pupil plane imaging system to find the resolution and sensitivity efficiency of the imaging system.

  12. Design and Stability of an On-Orbit Attitude Control System Using Reaction Control Thrusters

    NASA Technical Reports Server (NTRS)

    Hall, Robert A.; Hough, Steven; Orphee, Carolina; Clements, Keith

    2016-01-01

    Basic principles for the design and stability of a spacecraft on-orbit attitude control system employing on-off Reaction Control System (RCS) thrusters are presented. Both vehicle dynamics and the control system actuators are inherently nonlinear, hence traditional linear control system design approaches are not directly applicable. This paper has two main aspects: It summarizes key RCS design principles from earlier NASA vehicles, notably the Space Shuttle and Space Station programs, and introduces advances in the linear modelling and analyses of a phase plane control system derived in the initial development of the NASA's next upper stage vehicle, the Exploration Upper Stage (EUS). Topics include thruster hardware specifications, phase plane design and stability, jet selection approaches, filter design metrics, and RCS rotational maneuver logic.

  13. 32 CFR 2700.42 - Responsibility for safeguarding classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... responsibility. (b) Security and Top Secret Control Officers. The Director, OMSN, and the Status Liaison Officer, Saipan, are assigned specific security responsibilities as Security Officer and Top Secret Control Officer. (c) Handling. All documents bearing the terms “Top Secret,” “Secret” and “Confidential” shall be...

  14. 10 CFR 76.111 - Physical security, material control and accounting, and protection of certain information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... significance (Category III), and for protection of Restricted Data, National Security Information, Safeguards... 10 Energy 2 2010-01-01 2010-01-01 false Physical security, material control and accounting, and protection of certain information. 76.111 Section 76.111 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED...

  15. International Conference on Aerospace Trends...2001 - From Aeroplane to Aerospace Plane, Thiruvananthapuram, India, June 27, 28, 1991, Proceedings

    NASA Astrophysics Data System (ADS)

    1991-08-01

    Consideration is given to operational characteristics of future launch vehicles, trends in propulsion technology, technology challenges in the development of cryogenic propulsion systems for future reusable space-launch vehicles, estimation of the overall drag coefficient of an aerospace plane, and self-reliance in aerospace structures. Attention is also given to basic design concepts for smart actuators for aerospace plane control, a software package for the preliminary design of a helicopter, and multiconstraint wing optimization.

  16. Trajectory optimization for the national aerospace plane

    NASA Technical Reports Server (NTRS)

    Lu, Ping

    1993-01-01

    During the past six months the research objectives outlined in the last semi-annual report were accomplished. Specifically, these are: three-dimensional (3-D) fuel-optimal ascent trajectory of the aerospace plane and the effects of thrust vectoring control (TVC) on the fuel consumption and trajectory shaping were investigated; the maximum abort landing area (footprint) was studied; preliminary assessment of simultaneous design of the ascent trajectory and the vehicle configuration for the aerospace plane was also conducted. The work accomplished in the reporting period is summarized.

  17. Investigation of Nonstationary Modes of Atmospheric Pressure Needle-to-Plane Gas Discharge and Streamer Propagation

    DTIC Science & Technology

    2003-07-20

    known, that at atmospheric pressure in oxygen- I" - contained gases a various modes of discharge can be realized in the needle -to-plane electrode geometry... needle -to-plane electrode system was located in the discharge chamber (volume I dmi3) with controlled gas feeding. The gas pressure was an atmospheric...The 3. Experimental results positive DC voltage was applied to the needle electrode . The discharge voltage was varied from 3 to 15kV. The analysis of

  18. Geometric Structure of 3D Spinal Curves: Plane Regions and Connecting Zones

    PubMed Central

    Berthonnaud, E.; Hilmi, R.; Dimnet, J.

    2012-01-01

    This paper presents a new study of the geometric structure of 3D spinal curves. The spine is considered as an heterogeneous beam, compound of vertebrae and intervertebral discs. The spine is modeled as a deformable wire along which vertebrae are beads rotating about the wire. 3D spinal curves are compound of plane regions connected together by zones of transition. The 3D spinal curve is uniquely flexed along the plane regions. The angular offsets between adjacent regions are concentrated at level of the middle zones of transition, so illustrating the heterogeneity of the spinal geometric structure. The plane regions along the 3D spinal curve must satisfy two criteria: (i) a criterion of minimum distance between the curve and the regional plane and (ii) a criterion controlling that the curve is continuously plane at the level of the region. The geometric structure of each 3D spinal curve is characterized by the sizes and orientations of regional planes, by the parameters representing flexed regions and by the sizes and functions of zones of transition. Spinal curves of asymptomatic subjects show three plane regions corresponding to spinal curvatures: lumbar, thoracic and cervical curvatures. In some scoliotic spines, four plane regions may be detected. PMID:25031873

  19. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  20. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  1. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  2. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  3. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental... unattended spaces that adjoin areas to which OCS facility personnel and visitors have access; (9) Ensure OCS...

  4. Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui

    Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less

  5. Information-Flow-Based Access Control for Web Browsers

    NASA Astrophysics Data System (ADS)

    Yoshihama, Sachiko; Tateishi, Takaaki; Tabuchi, Naoshi; Matsumoto, Tsutomu

    The emergence of Web 2.0 technologies such as Ajax and Mashup has revealed the weakness of the same-origin policy[1], the current de facto standard for the Web browser security model. We propose a new browser security model to allow fine-grained access control in the client-side Web applications for secure mashup and user-generated contents. We propose a browser security model that is based on information-flow-based access control (IBAC) to overcome the dynamic nature of the client-side Web applications and to accurately determine the privilege of scripts in the event-driven programming model.

  6. India’s Emerging Security Strategy, Missile Defense, and Arms Control

    DTIC Science & Technology

    2004-06-01

    and contemplate a security strategy. Starting in July 1998, a series of negotiations between Foreign Minister Jaswant Singh and US envoy Strobe...arms control.46 The Singh -Talbott discussions eventually led to the reaffirmation of civilian command-and-control and a doctrine of “minimum...Council (NSC), including Prime Minister Vajpayee, Minister of Foreign Affairs Singh , and Minister of Defense Fernandes, and appointed a National Security

  7. Controlled Secure Direct Communication with Seven-Qubit Entangled States

    NASA Astrophysics Data System (ADS)

    Wang, Shu-Kai; Zha, Xin-Wei; Wu, Hao

    2018-01-01

    In this paper, a new controlled secure direct communication protocol based on a maximally seven-qubit entangled state is proposed. the outcomes of measurement is performed by the sender and the controller, the receiver can obtain different secret messages in a deterministic way with unit successful probability.In this scheme,by using entanglement swapping, no qubits carrying secret messages are transmitted.Therefore, the protocol is completely secure.

  8. On the control of a robot ball using two omniwheels

    NASA Astrophysics Data System (ADS)

    Ivanov, Alexander P.

    2015-07-01

    We discuss the dynamics of a balanced body of spherical shape on a rough plane, controlled by the movement of a built-in shell. These two shells are set in relative motion due to rotation of the two symmetrical omniwheels. It is shown that the ball can be moved to any point on the plane along a straight or (in the case of the initial degeneration) polygonal line. Moreover, any prescribed curvilinear trajectory of the ball center can be followed by an appropriate control strategy as far as the diameter connecting both wheels is nonvertical.

  9. Tangential acceleration feedback control of friction induced vibration

    NASA Astrophysics Data System (ADS)

    Nath, Jyayasi; Chatterjee, S.

    2016-09-01

    Tangential control action is studied on a phenomenological mass-on-belt model exhibiting friction-induced self-excited vibration attributed to the low-velocity drooping characteristics of friction which is also known as Stribeck effect. The friction phenomenon is modelled by the exponential model. Linear stability analysis is carried out near the equilibrium point and local stability boundary is delineated in the plane of control parameters. The system is observed to undergo a Hopf bifurcation as the eigenvalues determined from the linear stability analysis are found to cross the imaginary axis transversally from RHS s-plane to LHS s-plane or vice-versa as one varies the control parameters, namely non-dimensional belt velocity and the control gain. A nonlinear stability analysis by the method of Averaging reveals the subcritical nature of the Hopf bifurcation. Thus, a global stability boundary is constructed so that any choice of control parameters from the globally stable region leads to a stable equilibrium. Numerical simulations in a MATLAB SIMULINK model and bifurcation diagrams obtained in AUTO validate these analytically obtained results. Pole crossover design is implemented to optimize the filter parameters with an independent choice of belt velocity and control gain. The efficacy of this optimization (based on numerical results) in the delicate low velocity region is also enclosed.

  10. Building a Secure Library System.

    ERIC Educational Resources Information Center

    Benson, Allen C.

    1998-01-01

    Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…

  11. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3

    DTIC Science & Technology

    2009-04-01

    international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information

  12. Ultrasound-Guided Out-of-Plane vs. In-Plane Interscalene Catheters: A Randomized, Prospective Study.

    PubMed

    Schwenk, Eric S; Gandhi, Kishor; Baratta, Jaime L; Torjman, Marc; Epstein, Richard H; Chung, Jaeyoon; Vaghari, Benjamin A; Beausang, David; Bojaxhi, Elird; Grady, Bernadette

    2015-12-01

    Continuous interscalene blocks provide excellent analgesia after shoulder surgery. Although the safety of the ultrasound-guided in-plane approach has been touted, technical and patient factors can limit this approach. We developed a caudad-to-cephalad out-of-plane approach and hypothesized that it would decrease pain ratings due to better catheter alignment with the brachial plexus compared to the in-plane technique in a randomized, controlled study. To compare an out-of-plane interscalene catheter technique to the in-plane technique in a randomized clinical trial. Eighty-four patients undergoing open shoulder surgery were randomized to either the in-plane or out-of-plane ultrasound-guided continuous interscalene technique. The primary outcome was VAS pain rating at 24 hours. Secondary outcomes included pain ratings in the recovery room and at 48 hours, morphine consumption, the incidence of catheter dislodgments, procedure time, and block difficulty. Procedural data and all pain ratings were collected by blinded observers. There were no differences in the primary outcome of median VAS pain rating at 24 hours between the out-of-plane and in-plane groups (1.50; IQR, [0 - 4.38] vs. 1.25; IQR, [0 - 3.75]; P = 0.57). There were also no differences, respectively, between out-of-plane and in-plane median PACU pain ratings (1.0; IQR, [0 - 3.5] vs. 0.25; IQR, [0 - 2.5]; P = 0.08) and median 48-hour pain ratings (1.25; IQR, [1.25 - 2.63] vs. 0.50; IQR, [0 - 1.88]; P = 0.30). There were no differences in any other secondary endpoint. Our out-of-plane technique did not provide superior analgesia to the in-plane technique. It did not increase the number of complications. Our technique is an acceptable alternative in situations where the in-plane technique is difficult to perform.

  13. How to implement security controls for an information security program at CBRN facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lenaeus, Joseph D.; O'Neil, Lori Ross; Leitch, Rosalyn M.

    This document was prepared by PNNL within the framework of Project 19 of the European Union Chemical Biological Radiological and Nuclear Risk Mitigation Centres of Excellence Initiative entitled, ''Development of procedures and guidelines to create and improve secure information management systems and data exchange mechanisms for CBRN materials under regulatory control.'' It provides management and workers at CBRN facilities, parent organization managers responsible for those facilities, and regulatory agencies (governmental and nongovernmental) with guidance on the best practices for protecting information security. The security mitigation approaches presented in this document were chosen because they present generally accepted guidance in anmore » easy-to-understand manner, making it easier for facility personnel to grasp key concepts and envision how security controls could be implemented by the facility. This guidance is presented from a risk management perspective.« less

  14. Solute softening and defect generation during prismatic slip in magnesium alloys

    NASA Astrophysics Data System (ADS)

    Yi, Peng; Cammarata, Robert C.; Falk, Michael L.

    2017-12-01

    Temperature and solute effects on prismatic slip of 〈a〉 dislocations in Mg are studied using molecular dynamics simulation. Prismatic slip is controlled by the low mobility screw dislocation. The screw dislocation glides on the prismatic plane through alternating cross-slip between the basal plane and the prismatic plane. In doing so, it exhibits a locking-unlocking mechanism at low temperatures and a more continuous wavy propagation at high temperatures. The dislocation dissociates into partials on the basal plane and the constriction formation of the partials is identified to be the rate-limiting process for unlocking. In addition, the diffusion of partials on the basal plane enables the formation of jogs and superjogs for prismatic slip, which lead to the generation of vacancies and dislocation loops. Solute softening in Mg alloys was observed in the presence of both Al and Y solute. The softening in prismatic slip is found to be due to solute pinning on the basal plane, instead of the relative energy change of the screw dislocation on the basal and prismatic planes, as has been hypothesized.

  15. Express penetration of hydrogen on Mg(10͞13) along the close-packed-planes.

    PubMed

    Ouyang, Liuzhang; Tang, Jiajun; Zhao, Yujun; Wang, Hui; Yao, Xiangdong; Liu, Jiangwen; Zou, Jin; Zhu, Min

    2015-06-01

    Metal atoms often locate in energetically favorite close-packed planes, leading to a relatively high penetration barrier for other atoms. Naturally, the penetration would be much easier through non-close-packed planes, i.e. high-index planes. Hydrogen penetration from surface to the bulk (or reversely) across the packed planes is the key step for hydrogen diffusion, thus influences significantly hydrogen sorption behaviors. In this paper, we report a successful synthesis of Mg films in preferential orientations with both close- and non-close-packed planes, i.e. (0001) and a mix of (0001) and (10͞13), by controlling the magnetron sputtering conditions. Experimental investigations confirmed a remarkable decrease in the hydrogen absorption temperature in the Mg (10͞13), down to 392 K from 592 K of the Mg film (0001), determined by the pressure-composition-isothermal (PCI) measurement. The ab initio calculations reveal that non-close-packed Mg(10͞13) slab is advantageous for hydrogen sorption, attributing to the tilted close-packed-planes in the Mg(10͞13) slab.

  16. Single nanowire light-emitting diodes using uniaxial and coaxial InGaN/GaN multiple quantum wells synthesized by metalorganic chemical vapor deposition.

    PubMed

    Ra, Yong-Ho; Navamathavan, Rangaswamy; Yoo, Hee-Il; Lee, Cheul-Ro

    2014-03-12

    We report the controlled synthesis of InGaN/GaN multiple quantum well (MQW) uniaxial (c-plane) and coaxial (m-plane) nanowire (NW) heterostructures by metalorganic chemical vapor deposition. Two kinds of heterostructure NW light-emitting diodes (LEDs) have been fabricated: (1) 10 pairs of InGaN/GaN MQW layers in the c-plane on the top of n-GaN NWs where Mg-doped p-GaN NW is axially grown (2) p-GaN/10 pairs of InGaN/GaN shell structure were surrounded by n-GaN core. Here, we discuss a comparative analysis based on the m-plane and the c-plane oriented InGaN/GaN MQW NW arrays. High-resolution transmission electron microscopy studies revealed that the barrier and the well structures of MQW were observed to be substantially clear with regular intervals while the interface regions were extremely sharp. The c-plane and m-plane oriented MQW single NW was utilized for the parallel assembly fabrication of the LEDs via a focused ion beam. The polarization induced effects on the c-plane and m-plane oriented MQW NWs were precisely compared via power dependence electroluminescence. The electrical properties of m-plane NWs exhibited superior characteristics than that of c-plane NWs owing to the absence of piezoelectric polarization fields. According to this study, high-quality m-plane coaxial NWs can be utilized for the realization of high-brightness LEDs.

  17. Steganographic optical image encryption system based on reversible data hiding and double random phase encoding

    NASA Astrophysics Data System (ADS)

    Chuang, Cheng-Hung; Chen, Yen-Lin

    2013-02-01

    This study presents a steganographic optical image encryption system based on reversible data hiding and double random phase encoding (DRPE) techniques. Conventional optical image encryption systems can securely transmit valuable images using an encryption method for possible application in optical transmission systems. The steganographic optical image encryption system based on the DRPE technique has been investigated to hide secret data in encrypted images. However, the DRPE techniques vulnerable to attacks and many of the data hiding methods in the DRPE system can distort the decrypted images. The proposed system, based on reversible data hiding, uses a JBIG2 compression scheme to achieve lossless decrypted image quality and perform a prior encryption process. Thus, the DRPE technique enables a more secured optical encryption process. The proposed method extracts and compresses the bit planes of the original image using the lossless JBIG2 technique. The secret data are embedded in the remaining storage space. The RSA algorithm can cipher the compressed binary bits and secret data for advanced security. Experimental results show that the proposed system achieves a high data embedding capacity and lossless reconstruction of the original images.

  18. Optical security verification for blurred fingerprints

    NASA Astrophysics Data System (ADS)

    Soon, Boon Y.; Karim, Mohammad A.; Alam, Mohammad S.

    1998-12-01

    Optical fingerprint security verification is gaining popularity, as it has the potential to perform correlation at the speed of light. With advancement in optical security verification techniques, authentication process can be almost foolproof and reliable for financial transaction, banking, etc. In law enforcement, when a fingerprint is obtained from a crime scene, it may be blurred and can be an unhealthy candidate for correlation purposes. Therefore, the blurred fingerprint needs to be clarified before it is used for the correlation process. There are a several different types of blur, such as linear motion blur and defocus blur, induced by aberration of imaging system. In addition, we may or may not know the blur function. In this paper, we propose the non-singularity inverse filtering in frequency/power domain for deblurring known motion-induced blur in fingerprints. This filtering process will be incorporated with the pow spectrum subtraction technique, uniqueness comparison scheme, and the separated target and references planes method in the joint transform correlator. The proposed hardware implementation is a hybrid electronic-optical correlator system. The performance of the proposed system would be verified with computer simulation for both cases: with and without additive random noise corruption.

  19. Altered astronaut lower limb and mass center kinematics in downward jumping following space flight

    NASA Technical Reports Server (NTRS)

    Newman, D. J.; Jackson, D. K.; Bloomberg, J. J.

    1997-01-01

    Astronauts exposed to the microgravity conditions encountered during space flight exhibit postural and gait instabilities upon return to earth that could impair critical postflight performance. The aim of the present study was to determine the effects of microgravity exposure on astronauts' performance of two-footed jump landings. Nine astronauts from several Space Shuttle missions were tested both preflight and postflight with a series of voluntary, two-footed downward hops from a 30-cm-high step. A video-based, three-dimensional motion-analysis system permitted calculation of body segment positions and joint angular displacements. Phase-plane plots of knee, hip, and ankle angular velocities compared with the corresponding joint angles were used to describe the lower limb kinematics during jump landings. The position of the whole-body center of mass (COM) was also estimated in the sagittal plane using an eight-segment body model. Four of nine subjects exhibited expanded phase-plane portraits postflight, with significant increases in peak joint flexion angles and flexion rates following space flight. In contrast, two subjects showed significant contractions of their phase-plane portraits postflight and three subjects showed insignificant overall changes after space flight. Analysis of the vertical COM motion generally supported the joint angle results. Subjects with expanded joint angle phase-plane portraits postflight exhibited larger downward deviations of the COM and longer times from impact to peak deflection, as well as lower upward recovery velocities. Subjects with postflight joint angle phase-plane contraction demonstrated opposite effects in the COM motion. The joint kinematics results indicated the existence of two contrasting response modes due to microgravity exposure. Most subjects exhibited "compliant" impact absorption postflight, consistent with decreased limb stiffness and damping, and a reduction in the bandwidth of the postural control system. Fewer subjects showed "stiff" behavior after space flight, where contractions in the phase-plane portraits pointed to an increase in control bandwidth. The changes appeared to result from adaptive modifications in the control of lower limb impedance. A simple 2nd-order model of the vertical COM motion indicated that changes in the effective vertical stiffness of the legs can predict key features of the postflight performance. Compliant responses may reflect inflight adaptation due to altered demands on the postural control system in microgravity, while stiff behavior may result from overcompensation postflight for the presumed reduction in limb stiffness inflight.

  20. Cyber Security and Resilient Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Robert S. Anderson

    2009-07-01

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments tomore » date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.« less

  1. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  2. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  3. Magnetic domain configuration of (111)-oriented LaFeO 3 epitaxial thin films

    DOE PAGES

    Hallsteinsen, I.; Moreau, M.; Chopdekar, R. V.; ...

    2017-08-22

    In antiferromagnetic spintronics control of the domains and corresponding spin axis orientation is crucial for devices. Here we investigate the antiferromagnetic axis in (111)-oriented LaFeO 3 SrTiO 3 , which is coupled to structural twin domains. The structural domains have either the orthorhombic a- or b-axis along the in-plane <1more » $$\\bar{1}$$0> cubic directions of the substrate, and the corresponding magnetic domains have the antiferromagnetic axis in the sample plane. Six degenerate antiferromagnetic axes are found corresponding to the <1$$\\bar{1}$$0> and <11$$\\bar{2}$$> in-plane directions. This is in contrast to the biaxial anisotropy in (001)-oriented films and reflects how crystal orientation can be used to control magnetic anisotropy in antiferromagnets.« less

  4. An inverse dynamics approach to trajectory optimization for an aerospace plane

    NASA Technical Reports Server (NTRS)

    Lu, Ping

    1992-01-01

    An inverse dynamics approach for trajectory optimization is proposed. This technique can be useful in many difficult trajectory optimization and control problems. The application of the approach is exemplified by ascent trajectory optimization for an aerospace plane. Both minimum-fuel and minimax types of performance indices are considered. When rocket augmentation is available for ascent, it is shown that accurate orbital insertion can be achieved through the inverse control of the rocket in the presence of disturbances.

  5. CAS. Controlled Access Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Martinez, B.; Pomeroy, G.

    1989-12-01

    The Security Alarm System is a data acquisition and control system which collects data from intrusion sensors and displays the information in a real-time environment for operators. The Access Control System monitors and controls the movement of personnel with the use of card readers and biometrics hand readers.

  6. IT Security Support for Spaceport Command and Control System

    NASA Technical Reports Server (NTRS)

    McLain, Jeffrey

    2013-01-01

    During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.

  7. 5 CFR 1312.31 - Security violations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...

  8. 6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO WEST. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO

  9. 7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. LAUNCH CONTROL SUPPORT BUILDING. INTERIOR OF SECURITY OFFICE. VIEW TO NORTH. - Minuteman III ICBM Launch Control Facility November-1, 1.5 miles North of New Raymer & State Highway 14, New Raymer, Weld County, CO

  10. Impurity-assisted electric control of spin-valley qubits in monolayer MoS2

    NASA Astrophysics Data System (ADS)

    Széchenyi, G.; Chirolli, L.; Pályi, A.

    2018-07-01

    We theoretically study a single-electron spin-valley qubit in an electrostatically defined quantum dot in a transition metal dichalcogenide monolayer, focusing on the example of MoS2. Coupling of the qubit basis states for coherent control is challenging, as it requires a simultaneous flip of spin and valley. Here, we show that a tilted magnetic field together with a short-range impurity, such as a vacancy, a substitutional defect, or an adatom, can give rise to a coupling between the qubit basis states. This mechanism renders the in-plane g-factor nonzero, and allows to control the qubit with an in-plane ac electric field, akin to electrically driven spin resonance. We evaluate the dependence of the in-plane g-factor and the electrically induced qubit Rabi frequency on the type and position of the impurity. We reveal highly unconventional features of the coupling mechanism, arising from symmetry-forbidden intervalley scattering, in the case when the impurity is located at a S site. Our results provide design guidelines for electrically controllable qubits in two-dimensional semiconductors.

  11. Non-linear dynamic characteristics and optimal control of giant magnetostrictive film subjected to in-plane stochastic excitation

    NASA Astrophysics Data System (ADS)

    Zhu, Z. W.; Zhang, W. D.; Xu, J.

    2014-03-01

    The non-linear dynamic characteristics and optimal control of a giant magnetostrictive film (GMF) subjected to in-plane stochastic excitation were studied. Non-linear differential items were introduced to interpret the hysteretic phenomena of the GMF, and the non-linear dynamic model of the GMF subjected to in-plane stochastic excitation was developed. The stochastic stability was analysed, and the probability density function was obtained. The condition of stochastic Hopf bifurcation and noise-induced chaotic response were determined, and the fractal boundary of the system's safe basin was provided. The reliability function was solved from the backward Kolmogorov equation, and an optimal control strategy was proposed in the stochastic dynamic programming method. Numerical simulation shows that the system stability varies with the parameters, and stochastic Hopf bifurcation and chaos appear in the process; the area of the safe basin decreases when the noise intensifies, and the boundary of the safe basin becomes fractal; the system reliability improved through stochastic optimal control. Finally, the theoretical and numerical results were proved by experiments. The results are helpful in the engineering applications of GMF.

  12. 75 FR 14179 - Agency Information Collection Activities: Form I-9 CNMI; Revision to an Existing Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control No. 1615... Employment Eligibility Verification; OMB Control No. 1615- 0112. The Department of Homeland Security, U.S..., should be directed to the Department of Homeland Security (DHS), and to the Office of Management and...

  13. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...

  14. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...

  15. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...

  16. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...

  17. 48 CFR 1552.235-78 - Data Security for Toxic Substances Control Act Confidential Business Information (DEC 1997).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Data Security for Toxic... Acquisition Regulations System ENVIRONMENTAL PROTECTION AGENCY CLAUSES AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Texts of Provisions and Clauses 1552.235-78 Data Security for Toxic Substances Control Act...

  18. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  19. Shaping field for deep tissue microscopy

    NASA Astrophysics Data System (ADS)

    Colon, J.; Lim, H.

    2015-05-01

    Information capacity of a lossless image-forming system is a conserved property determined by two imaging parameters - the resolution and the field of view (FOV). Adaptive optics improves the former by manipulating the phase, or wavefront, in the pupil plane. Here we describe a homologous approach, namely adaptive field microscopy, which aims to enhance the FOV by controlling the phase, or defocus, in the focal plane. In deep tissue imaging, the useful FOV can be severely limited if the region of interest is buried in a thick sample and not perpendicular to the optic axis. One must acquire many z-scans and reconstruct by post-processing, which exposes tissue to excessive radiation and is also time consuming. We demonstrate the effective FOV can be substantially enhanced by dynamic control of the image plane. Specifically, the tilt of the image plane is continuously adjusted in situ to match the oblique orientation of the sample plane within tissue. The utility of adaptive field microscopy is tested for imaging tissue with non-planar morphology. Ocular tissue of small animals was imaged by two-photon excited fluorescence. Our results show that adaptive field microscopy can utilize the full FOV. The freedom to adjust the image plane to account for the geometrical variations of sample could be extremely useful for 3D biological imaging. Furthermore, it could facilitate rapid surveillance of cellular features within deep tissue while avoiding photo damages, making it suitable for in vivo imaging.

  20. Effects of ipsilateral anterior thigh soft tissue stretching on passive unilateral straight-leg raise.

    PubMed

    Clark, S; Christiansen, A; Hellman, D F; Hugunin, J W; Hurst, K M

    1999-01-01

    Randomized 3-group pretest-posttest with blind assessment of outcome. The purpose of this study was to examine the effect of sagittal plane hold-relax exercise applied to the ipsilateral anterior thigh, and prone positioning on passive unilateral straight-leg raise measurements. Straight-leg raising has been viewed as a measurement for hamstring muscle length, but literature suggests that other structures may affect this measurement. Sixty subjects (45 men, 15 women) qualified for inclusion into the study based on a straight-leg raise measurement of < or = 65 degrees. Subjects were randomly assigned to one of three groups: control, static stretch, or sagittal plane hold-relax exercise. Pretest and posttest straight-leg raise measurements of the right lower extremity were performed for each subject. A 1-way ANOVA of the change scores showed a significant difference between groups. A Tukey post hoc analysis of the change scores showed that both treatment groups' means differed significantly from the control group and from each other, with the sagittal plane hold-relax group exhibiting the largest change (mean of 7.8 degrees +/- 2.8 degrees). The results of this study show that sagittal plane hold-relax exercise and passive prone results of this study show that sagittal plane hold-relax and passive prone positioning can significantly increase straight-leg raise range of motion, however the sagittal plane hold-relax stretching of the anterior thigh is more effective than passive prone positioning.

  1. An inverse dynamics approach to trajectory optimization and guidance for an aerospace plane

    NASA Technical Reports Server (NTRS)

    Lu, Ping

    1992-01-01

    The optimal ascent problem for an aerospace planes is formulated as an optimal inverse dynamic problem. Both minimum-fuel and minimax type of performance indices are considered. Some important features of the optimal trajectory and controls are used to construct a nonlinear feedback midcourse controller, which not only greatly simplifies the difficult constrained optimization problem and yields improved solutions, but is also suited for onboard implementation. Robust ascent guidance is obtained by using combination of feedback compensation and onboard generation of control through the inverse dynamics approach. Accurate orbital insertion can be achieved with near-optimal control of the rocket through inverse dynamics even in the presence of disturbances.

  2. The stability of steady motion of magnetic domain wall: Role of higher-order spin-orbit torques

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    He, Peng-Bin, E-mail: hepengbin@hnu.edu.cn; Yan, Han; Cai, Meng-Qiu

    The steady motion of magnetic domain wall driven by spin-orbit torques is investigated analytically in the heavy/ferromagnetic metal nanowires for three cases with a current transverse to the in-plane and perpendicular easy axis, and along the in-plane easy axis. By the stability analysis of Walker wall profile, we find that if including the higher-order spin-orbit torques, the Walker breakdown can be avoided in some parameter regions of spin-orbit torques with a current transverse to or along the in-plane easy axis. However, in the case of perpendicular anisotropy, even considering the higher-order spin-orbit torques, the velocity of domain wall cannot bemore » efficiently enhanced by the current. Furthermore, the direction of wall motion is dependent on the configuration and chirality of domain wall with a current along the in-plane easy axis or transverse to the perpendicular one. Especially, the direction of motion can be controlled by the initial chirality of domain wall. So, if only involving the spin-orbit mechanism, it is preferable to adopt the scheme of a current along the in-plane easy axis for enhancing the velocity and controlling the direction of domain wall.« less

  3. Method for in situ combustion

    DOEpatents

    Pasini, III, Joseph; Shuck, Lowell Z.; Overbey, Jr., William K.

    1977-01-01

    This invention relates to an improved in situ combustion method for the recovery of hydrocarbons from subterranean earth formations containing carbonaceous material. The method is practiced by penetrating the subterranean earth formation with a borehole projecting into the coal bed along a horizontal plane and extending along a plane disposed perpendicular to the plane of maximum permeability. The subterranean earth formation is also penetrated with a plurality of spaced-apart vertical boreholes disposed along a plane spaced from and generally parallel to that of the horizontal borehole. Fractures are then induced at each of the vertical boreholes which project from the vertical boreholes along the plane of maximum permeability and intersect the horizontal borehole. The combustion is initiated at the horizontal borehole and the products of combustion and fluids displaced from the earth formation by the combustion are removed from the subterranean earth formation via the vertical boreholes. Each of the vertical boreholes are, in turn, provided with suitable flow controls for regulating the flow of fluid from the combustion zone and the earth formation so as to control the configuration and rate of propagation of the combustion zone. The fractures provide a positive communication with the combustion zone so as to facilitate the removal of the products resulting from the combustion of the carbonaceous material.

  4. From Fault-Diagnosis and Performance Recovery of a Controlled System to Chaotic Secure Communication

    NASA Astrophysics Data System (ADS)

    Hsu, Wen-Teng; Tsai, Jason Sheng-Hong; Guo, Fang-Cheng; Guo, Shu-Mei; Shieh, Leang-San

    Chaotic systems are often applied to encryption on secure communication, but they may not provide high-degree security. In order to improve the security of communication, chaotic systems may need to add other secure signals, but this may cause the system to diverge. In this paper, we redesign a communication scheme that could create secure communication with additional secure signals, and the proposed scheme could keep system convergence. First, we introduce the universal state-space adaptive observer-based fault diagnosis/estimator and the high-performance tracker for the sampled-data linear time-varying system with unanticipated decay factors in actuators/system states. Besides, robustness, convergence in the mean, and tracking ability are given in this paper. A residual generation scheme and a mechanism for auto-tuning switched gain is also presented, so that the introduced methodology is applicable for the fault detection and diagnosis (FDD) for actuator and state faults to yield a high tracking performance recovery. The evolutionary programming-based adaptive observer is then applied to the problem of secure communication. Whenever the tracker induces a large control input which might not conform to the input constraint of some physical systems, the proposed modified linear quadratic optimal tracker (LQT) can effectively restrict the control input within the specified constraint interval, under the acceptable tracking performance. The effectiveness of the proposed design methodology is illustrated through tracking control simulation examples.

  5. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  6. Transversus abdominis plane block reduces morphine consumption in the early postoperative period following microsurgical abdominal tissue breast reconstruction: a double-blind, placebo-controlled, randomized trial.

    PubMed

    Zhong, Toni; Ojha, M; Bagher, Shaghayegh; Butler, Kate; Srinivas, Coimbatore; McCluskey, Stuart A; Clarke, Hance; O'Neill, Anne C; Novak, Christine B; Hofer, Stefan O P

    2014-11-01

    The analgesic efficacy of the transversus abdominis plane peripheral nerve block following abdominal tissue breast reconstruction has not been studied in a randomized controlled trial. The authors conducted a double-blind, placebo-controlled, 1:1 allocation, two-arm parallel group, superiority design, randomized controlled trial in patients undergoing microsurgical abdominally based breast reconstruction. Intraoperatively, epidural catheters were inserted under direct vision through the triangle of Petit on both sides of the abdomen into the transversus abdominis plane just before rectus fascial closure. Patients received either bupivacaine (study group) or saline (placebo group) through the catheters for 2 postoperative days. All patients received hydromorphone by means of a patient-controlled analgesic pump. The primary outcome was the difference in the parenteral opioid consumption on each postoperative day between the groups. The secondary outcome measures included the following: total in-hospital opioid; antinausea medication; pain, nausea, and sedation scores; Quality of Recovery Score; time to ambulation; and hospital stay duration. Between September of 2011 and June of 2013, 93 patients were enrolled: 49 received bupivacaine and 44 received saline. There were 11 postoperative complications (13 percent); none were related to the catheter. Primary outcomes were completed by 85 of 93 patients (91.3 percent); the mean parenteral morphine consumption was significantly reduced on postoperative day 1 in the bupivacaine group (20.7±20.1 mg) compared with 30.0±19.1 mg in the control group (p=0.02). There were no significant differences in secondary outcomes. Following abdominally based breast reconstruction, transversus abdominis plane peripheral nerve block is safe and significantly reduces morphine consumption in the early postoperative period. Therapeutic, II.

  7. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    NASA Technical Reports Server (NTRS)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations. Certain protective measures for the general enterprise may not be as efficient within the ground segment. This is what the authors have concluded through observations and analysis of patterns identified from the various security assessments performed on NASA missions such as MAVEN, OSIRIS-REx, New Horizons and TESS, to name a few. The security audits confirmed that the framework for managing information system security developed by the National Institute of Standards and Technology (NIST) for the federal government, and adopted by NASA, is indeed effective. However, the selection of the technical, operational and management security controls offered by the NIST model - and how they are implemented - does not always fit the nature and the environment where the ground system operates in even though there is no apparent impact on mission success. The authors observed that unfit controls, that is, controls that are not necessarily applicable or sufficiently effective in protecting the mission systems, are often selected to facilitate compliance with security requirements and organizational expectations even if the selected controls offer minimum or non-existent protection. This paper identifies some of the standard security controls that can in fact protect the ground system, and which of them offer little or no benefit at all. It offers multiple scenarios from real security audits in which the controls are not effective without, of course, disclosing any sensitive information about the missions assessed. In addition to selection and implementation of controls, the paper also discusses potential impact of recent legislation such as the Federal Information Security Modernization Act (FISMA) of 2014 - aimed at the enterprise - on the ground system, and offers other recommendations to Information System Owners (ISOs).

  8. Comparative biomechanical effectiveness of over-the-counter devices for individuals with a flexible flatfoot secondary to forefoot varus.

    PubMed

    Hurd, Wendy J; Kavros, Steven J; Kaufman, Kenton R

    2010-11-01

    Evaluate effects of a new off-the-shelf insert on frontal plane foot biomechanics and compare effectiveness of the new and an existing off-the-shelf insert and a motion-control shoe in neutralizing frontal plane foot biomechanics. Descriptive. Biomechanics laboratory. Fifteen uninjured subjects with a flexible flatfoot secondary to forefoot varus. Three-dimensional kinematic and kinetic data were collected as subjects walked and jogged at their self-selected speed while wearing a motion-control running shoe, the shoe with a new off-the-shelf insert, and the shoe with an existing off-the-shelf insert. Frontal plane kinematics and rearfoot kinetics were evaluated during stance. Statistical analysis was performed using a repeated measures analysis of variance and Student-Newman-Keuls post hoc tests (α ≤ 0.05). The new insert and motion-control shoe placed the forefoot in a less-everted position than the existing off-the-shelf insert during walking. There were no differences in forefoot kinematics during jogging, nor were there differences in rearfoot motion during walking or jogging. The rearfoot eversion moment was significantly lower with the new off-the-shelf insert compared with the motion-control shoe and the existing insert during walking and jogging. A new off-the-shelf device is available that promotes more neutral frontal plane biomechanics, thus providing a theoretical rationale for using this device for injury prevention and treatment. The comparative biomechanical effectiveness of a motion-control shoe and the orthotic inserts may assist health care professionals in selecting a device to correct the flatfoot structure.

  9. 75 FR 73117 - New Agency Information Collection Activity Under OMB Review: Pipeline Corporate Security Review

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-29

    ... Collection Activity Under OMB Review: Pipeline Corporate Security Review AGENCY: Transportation Security.... Information Collection Requirement Title: Pipeline Corporate Security Review (PCSR). Type of Request: New collection. OMB Control Number: Not yet assigned. Form(s): Pipeline Corporate Security Review (PCSR) Protocol...

  10. 3-dimensional computed tomographic analysis of the pharynx in adult patients with unrepaired isolated cleft palate.

    PubMed

    Xu, Yi; Zhao, Shufan; Shi, Jiayu; Wang, Yan; Shi, Bing; Zheng, Qian; Lo, Lun-Jou

    2013-08-01

    This study investigated 3D differences of the pharynx in adult patients with unrepaired isolated cleft palate (ICP) versus normal adults using cone-beam computed tomography (CBCT). CBCT data of 32 adult patients with nonsyndromic unrepaired ICP and 30 normal controls were acquired. Image processing and analyses were performed using Mimics (Materialise NV, Leuven, Belgium). Linear, planar, and volumetric measurements and comparisons were performed between patients with ICP and controls. Interobserver and intraobserver reliabilities of 3D pharyngeal analysis were determined by the Pearson correlation coefficient. Statistical analyses comparing patients with ICP to normal adults were performed using independent-samples t test, with the significance threshold set at P = .05. Interobserver and intraobserver reliabilities were high. Pearson correlation coefficients ranged from 0.992 to 0.999 for interobserver measurements and from 0.994 to 0.999 for intraobserver measurements. Anterior height (P = .000), total depth (P = .003), and floor length (P = .034) of the bony nasopharynx; posteroanterior diameter of the pharyngeal airway at the palatal plane (P = .000); cross-sectional area of the pharyngeal airway at the palatal plane (P = .000); total volume (P = .031); volume above the palatal plane (P = .024); and the volume between the palatal plane and the plane of the most anterior point on the inferior margin of the outline of the body of the second cervical vertebra (P = .022) were larger in patients with ICP. This imaging study showed an enlarged nasopharynx in the sagittal plane and increased nasopharyngeal airway volume at the palatal plane in patients with ICP. Crown Copyright © 2013. Published by Elsevier Inc. All rights reserved.

  11. Characterizing Head Motion in 3 Planes during Combined Visual and Base of Support Disturbances in Healthy and Visually Sensitive Subjects

    PubMed Central

    Keshner, E.A.; Dhaher, Y.

    2008-01-01

    Multiplanar environmental motion could generate head instability, particularly if the visual surround moves in planes orthogonal to a physical disturbance. We combined sagittal plane surface translations with visual field disturbances in 12 healthy (29–31 years) and 3 visually sensitive (27–57 years) adults. Center of pressure (COP), peak head angles, and RMS values of head motion were calculated and a 3-dimensional model of joint motion11 was developed to examine gross head motion in 3 planes. We found that subjects standing quietly in front of a visual scene translating in the sagittal plane produced significantly greater (p<0.003) head motion in yaw than when on a translating platform. However, when the platform was translated in the dark or with a visual scene rotating in roll, head motion orthogonal to the plane of platform motion significantly increased (p<0.02). Visually sensitive subjects having no history of vestibular disorder produced large, delayed compensatory head motion. Orthogonal head motions were significantly greater in visually sensitive than in healthy subjects in the dark (p<0.05) and with a stationary scene (p<0.01). We concluded that motion of the visual field can modify compensatory response kinematics of a freely moving head in planes orthogonal to the direction of a physical perturbation. These results suggest that the mechanisms controlling head orientation in space are distinct from those that control trunk orientation in space. These behaviors would have been missed if only COP data were considered. Data suggest that rehabilitation training can be enhanced by combining visual and mechanical perturbation paradigms. PMID:18162402

  12. High contrast imaging through adaptive transmittance control in the focal plane

    NASA Astrophysics Data System (ADS)

    Dhadwal, Harbans S.; Rastegar, Jahangir; Feng, Dake

    2016-05-01

    High contrast imaging, in the presence of a bright background, is a challenging problem encountered in diverse applications ranging from the daily chore of driving into a sun-drenched scene to in vivo use of biomedical imaging in various types of keyhole surgeries. Imaging in the presence of bright sources saturates the vision system, resulting in loss of scene fidelity, corresponding to low image contrast and reduced resolution. The problem is exacerbated in retro-reflective imaging systems where the light sources illuminating the object are unavoidably strong, typically masking the object features. This manuscript presents a novel theoretical framework, based on nonlinear analysis and adaptive focal plane transmittance, to selectively remove object domain sources of background light from the image plane, resulting in local and global increases in image contrast. The background signal can either be of a global specular nature, giving rise to parallel illumination from the entire object surface or can be represented by a mosaic of randomly orientated, small specular surfaces. The latter is more representative of real world practical imaging systems. Thus, the background signal comprises of groups of oblique rays corresponding to distributions of the mosaic surfaces. Through the imaging system, light from group of like surfaces, converges to a localized spot in the focal plane of the lens and then diverges to cast a localized bright spot in the image plane. Thus, transmittance of a spatial light modulator, positioned in the focal plane, can be adaptively controlled to block a particular source of background light. Consequently, the image plane intensity is entirely due to the object features. Experimental image data is presented to verify the efficacy of the methodology.

  13. Navigation and Image Injection for Control of Bone Removal and Osteotomy Planes in Spine Surgery.

    PubMed

    Kosterhon, Michael; Gutenberg, Angelika; Kantelhardt, Sven Rainer; Archavlis, Elefterios; Giese, Alf

    2017-04-01

    In contrast to cranial interventions, neuronavigation in spinal surgery is used in few applications, not tapping into its full technological potential. We have developed a method to preoperatively create virtual resection planes and volumes for spinal osteotomies and export 3-D operation plans to a navigation system controlling intraoperative visualization using a surgical microscope's head-up display. The method was developed using a Sawbone ® model of the lumbar spine, demonstrating feasibility with high precision. Computer tomographic and magnetic resonance image data were imported into Amira ® , a 3-D visualization software. Resection planes were positioned, and resection volumes representing intraoperative bone removal were defined. Fused to the original Digital Imaging and Communications in Medicine data, the osteotomy planes were exported to the cranial version of a Brainlab ® navigation system. A navigated surgical microscope with video connection to the navigation system allowed intraoperative image injection to visualize the preplanned resection planes. The workflow was applied to a patient presenting with a congenital hemivertebra of the thoracolumbar spine. Dorsal instrumentation with pedicle screws and rods was followed by resection of the deformed vertebra guided by the in-view image injection of the preplanned resection planes into the optical path of a surgical microscope. Postoperatively, the patient showed no neurological deficits, and the spine was found to be restored in near physiological posture. The intraoperative visualization of resection planes in a microscope's head-up display was found to assist the surgeon during the resection of a complex-shaped bone wedge and may help to further increase accuracy and patient safety. Copyright © 2017 by the Congress of Neurological Surgeons

  14. Dynamic in-plane potential gradients for actively controlling electrochemical reactions: Part I. Characterization of 1- and 2-component alkanethiol monolayer gradients on thin gold films. Part II. Applications of in-plane potential gradients

    NASA Astrophysics Data System (ADS)

    Balss, Karin Maria

    The research contained in this thesis is focused on the formation and characterization of surface composition gradients on thin gold films that are formed by applications of in-plane potential gradients. Injecting milliamp currents into thin Au films yields significant in-plane voltage drops so that, rather than assuming a single value of potential, an in-plane potential gradient is imposed on the film which depends on the resistivity of the film, the cross sectional area and the magnitude of the potential drop. Furthermore, the in-plane electric potential gradient means that, relative to a solution reference couple, electrochemical reactions occurs at defined spatial positions corresponding to the local potential, V(x) ˜ E0. The spatial gradient in electrochemical potential can then produce spatially dependent electrochemistry. Surface-chemical potential gradients can be prepared by arranging the spread of potentials to span an electrochemical wave mediating redox-associated adsorption or desorption. Examples of reactions that can be spatially patterned include the electrosorption of alkanethiols and over-potential metal deposition. The unique advantage of this method for patterning spatial compositions is the control of surface coverage in both space and time. The thesis is organized into two parts. In Part I, formation and characterization of 1- and 2-component alkanethiol monolayer gradients is investigated. Numerous surface science tools are employed to examine the distribution in coverage obtained by application of in-plane potential gradients. Macroscopic characterization was obtained by sessile water drop contact angle measurements and surface plasmon resonance imaging. Gradients were also imaged on micron length scales with pulsed-force mode atomic force microscopy. Direct chemical evidence of surface compositions in aromatic thiol surface coverage was obtained by surface-enhanced Raman spectroscopy. In Part II, the applications of in-plane potential gradients is discussed. Electrochemical reactions other than electrosorption of alkanethiols were demonstrated with over-potential deposition of copper onto gold films. One application of these patterns is to control the movement of supermolecular objects. As a first step towards this goal, biological cells were seeded onto gradient patterns containing adhesion promoters and inhibitors. The morphology and adhesion was investigated as a function of concentration along the gradient.

  15. NASA guidelines for assuring the adequacy and appropriateness of security safeguards in sensitive applications

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1984-01-01

    The Office of Management and Budget (OMB) Circular A-71, transmittal Memorandum No. 1, requires that each agency establish a management control process to assure that appropriate administrative, physical and technical safeguards are incorporated into all new computer applications. In addition to security specifications, the management control process should assure that the safeguards are adequate for the application. The security activities that should be integral to the system development process are examined. The software quality assurance process to assure that adequate and appropriate controls are incorporated into sensitive applications is also examined. Security for software packages is also discussed.

  16. A Pilot Examination of the Methods Used to Counteract Insider Threat Security Risks Associated with the Use of Radioactive Materials in the Research and Clinical Setting.

    PubMed

    Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L

    2018-03-01

    While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.

  17. Ultrasound guided transversus abdominis plane vs surgeon administered intraoperative regional field infiltration with bupivacaine for early postoperative pain control in children undergoing open pyeloplasty.

    PubMed

    Lorenzo, Armando J; Lynch, Johanne; Matava, Clyde; El-Beheiry, Hossam; Hayes, Jason

    2014-07-01

    Regional analgesic techniques are commonly used in pediatric urology. Ultrasound guided transversus abdominis plane block has recently gained popularity. However, there is a paucity of information supporting a benefit over regional field infiltration. We present a parallel group, randomized, controlled trial evaluating ultrasound guided transversus abdominis plane block superiority over surgeon delivered regional field infiltration for children undergoing open pyeloplasty at a tertiary referral center. Following ethics board approval and registration, children 0 to 6 years old were recruited and randomized to undergo perioperative transversus abdominis plane block or regional field infiltration for early post-pyeloplasty pain control. General anesthetic delivery, surgical technique and postoperative analgesics were standardized. A blinded assessor regularly captured pain scores in the recovery room using the FLACC (Face, Legs, Activity, Cry, Consolability) scale. The primary outcome was the need for rescue morphine administration based on a FLACC score of 3 or higher. Two pediatric urologists performed 57 pyeloplasties during a 2.5-year period, enrolling 32 children (16 in each group, balanced for age and weight). There were statistically significant differences in the number of children requiring rescue morphine administration (13 of 16 receiving transversus abdominis plane block and 6 of 16 receiving regional field infiltration, p = 0.011), mean ± SD total morphine consumption (0.066 ± 0.051 vs 0.028 ± 0.040 mg/kg, p = 0.021) and mean ± SD pain scores (5 ± 5 vs 2 ± 3, p = 0.043) in the recovery room, in favor of surgeon administered regional field infiltration. No local anesthetic specific adverse events were noted. Ultrasound guided transversus abdominis plane block is not superior to regional field infiltration with bupivacaine as a strategy to minimize early opioid requirements following open pyeloplasty in children. Instead, our data suggest that surgeon delivered regional field infiltration provides better pain control. Copyright © 2014 American Urological Association Education and Research, Inc. Published by Elsevier Inc. All rights reserved.

  18. Knee joint contact mechanics during downhill gait and its relationship with varus/valgus motion and muscle strength in patients with knee osteoarthritis.

    PubMed

    Farrokhi, Shawn; Voycheck, Carrie A; Gustafson, Jonathan A; Fitzgerald, G Kelley; Tashman, Scott

    2016-01-01

    The objective of this exploratory study was to evaluate tibiofemoral joint contact point excursions and velocities during downhill gait and assess the relationship between tibiofemoral joint contact mechanics with frontal-plane knee joint motion and lower extremity muscle weakness in patients with knee osteoarthritis (OA). Dynamic stereo X-ray was used to quantify tibiofemoral joint contact mechanics and frontal-plane motion during the loading response phase of downhill gait in 11 patients with knee OA and 11 control volunteers. Quantitative testing of the quadriceps and the hip abductor muscles was also performed. Patients with knee OA demonstrated larger medial/lateral joint contact point excursions (p < 0.02) and greater heel-strike joint contact point velocities (p < 0.05) for the medial and lateral compartments compared to the control group. The peak medial/lateral joint contact point velocity of the medial compartment was also greater for patients with knee OA compared to their control counterparts (p = 0.02). Additionally, patients with knee OA demonstrated significantly increased frontal-plane varus motion excursions (p < 0.01) and greater quadriceps and hip abductor muscle weakness (p = 0.03). In general, increased joint contact point excursions and velocities in patients with knee OA were linearly associated with greater frontal-plane varus motion excursions (p < 0.04) but not with quadriceps or hip abductor strength. Altered contact mechanics in patients with knee OA may be related to compromised frontal-plane joint stability but not with deficits in muscle strength.

  19. Security of medical multimedia.

    PubMed

    Tzelepi, S; Pangalos, G; Nikolacopoulou, G

    2002-09-01

    The application of information technology to health care has generated growing concern about the privacy and security of medical information. Furthermore, data and communication security requirements in the field of multimedia are higher. In this paper we describe firstly the most important security requirements that must be fulfilled by multimedia medical data, and the security measures used to satisfy these requirements. These security measures are based mainly on modern cryptographic and watermarking mechanisms as well as on security infrastructures. The objective of our work is to complete this picture, exploiting the capabilities of multimedia medical data to define and implement an authorization model for regulating access to the data. In this paper we describe an extended role-based access control model by considering, within the specification of the role-permission relationship phase, the constraints that must be satisfied in order for the holders of the permission to use those permissions. The use of constraints allows role-based access control to be tailored to specifiy very fine-grained and flexible content-, context- and time-based access control policies. Other restrictions, such as role entry restriction also can be captured. Finally, the description of system architecture for a secure DBMS is presented.

  20. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    PubMed

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  1. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  2. 10 CFR 95.49 - Security of automatic data processing (ADP) systems.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security of automatic data processing (ADP) systems. 95.49 Section 95.49 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) FACILITY SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.49 Security of...

  3. Rotorcraft In-Plane Noise Reduction Using Active/Passive Approaches with Induced Vibration Tracking

    NASA Astrophysics Data System (ADS)

    Chia, Miang Hwee

    A comprehensive study of the use of active and passive approaches for in-plane noise reduction, including the vibrations induced during noise reduction, was conducted on a hingeless rotor configuration resembling the MBB BO-105 rotor. First, a parametric study was performed to examine the effects of rotor blade stiffness on the vibration and noise reduction performance of a 20%c plain trailing edge flap and a 1.5%c sliding microflap. This was accomplished using a comprehensive code AVINOR (for Active VIbration and NOise Reduction). A two-dimensional unsteady reduced order aerodynamic model (ROM), using the Rational Function Approximation approach and CFD-based oscillatory aerodynamic load data, was used in the comprehensive code. The study identified a hingeless blade configuration with torsional frequency of 3.17/rev as an optimum configuration for studying vibration and noise reduction using on-blade control devices such as flaps or microflaps. Subsequently, a new suite of computational tools capable of predicting in-plane low frequency sound pressure level (LFSPL) rotorcraft noise and its control was developed, replacing the acoustic module WOPWOP in AVINOR with a new acoustic module HELINOIR (for HELIcopter NOIse Reduction), which overcomes certain limitations associated with WOPWOP. The new suite, consisting of the AVINOR/HELINOIR combination, was used to study active flaps, as well as microflaps operating in closed-loop mode for in-plane noise reduction. An alternative passive in-plane noise reduction approach using modification to the blade tip in the 10%R outboard region was also studied. The new suite consisting of the AVINOR/HELINOIR combination based on a compact aeroacoustic model was validated by comparing with wind tunnel test results, and subsequently verified by comparing with computational results. For active control, the in-plane noise reduction obtained with a single 20%c plain trailing edge flap during level flight at a moderate advance ratio was examined. Different configurations of far-field and near-field feedback microphone locations were examined to develop a fundamental understanding of the feedback microphone locations on the noise reduction process A near-field microphone located on the tip of a nose boom was found to produce a LFSPL reduction of up to 6dB. However, this noise reduction was accompanied by an out-of-plane noise increase of 18dB and 60% increase in vertical hub shear. For passive control, three tip geometries having sweep, dihedral, and anhedral, were considered. The tip dihedral reduced LFSPL by up to 2dB without a vibratory load penalty. However, this was accompanied by an increase in the mid frequency sound pressure levels (MFSPL). The tip sweep and tip anhedral produced an increase in in-plane LFSPL below the horizon. A comparison of the active and passive approaches indicated that active approaches implemented by a plain flap with a feedback microphone located on the nose boom is superior to the passive control approaches. However, there is a general trade-off between LFSPL reduction, MFSPL generation and vibratory hub loads induced by noise control.

  4. 7 CFR 274.11 - Issuance and inventory record retention, and forms security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... processed within the State agency. The State agency shall use numbers, batching, inventory control logs, or...) Secure storage; (iii) Access limited to authorized personnel; (iv) Bulk inventory control records; (v... validation of inventory controls and records by parties not otherwise involved in maintaining control records...

  5. 12 CFR 1204.8 - How are records secured?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... § 1204.8 How are records secured? (a) What controls must FHFA have in place? Each FHFA office must establish administrative and physical controls to prevent unauthorized access to its systems of records... stringency of these controls should correspond to the sensitivity of the records that the controls protect...

  6. Digital watermarking for secure and adaptive teleconferencing

    NASA Astrophysics Data System (ADS)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  7. Topologically protected edge states for out-of-plane and in-plane bulk elastic waves.

    PubMed

    Huo, Shao-Yong; Chen, Jiu-Jiu; Huang, Hong-Bo

    2018-04-11

    Topological phononic insulators (TPnIs) show promise for application in the manipulation of acoustic waves for the design of low-loss transmission and perfectly integrated communication devices. Since solid phononic crystals exist as a transverse polarization mode and a mixed longitudinal-transverse polarization mode, the realization of topological edge states for both out-of-plane and in-plane bulk elastic waves is desirable to enhance the controllability of the edge waves in solid systems. In this paper, a two-dimensional (2D) solid/solid hexagonal-latticed phononic system that simultaneously supports the topologically protected edge states for out-of-plane and in-plane bulk elastic waves is investigated. Firstly, two pairs of two-fold Dirac cones, respectively corresponding to the out-of-plane and in-plane waves, are obtained at the same frequency by tuning the crystal parameters. Then, a strategy of zone folding is invoked to form double Dirac cones. By shrinking and expanding the steel scatterer, the lattice symmetry is broken, and band inversions induced, giving rise to an intriguing topological phase transition. Finally, the topologically protected edge states for both out-of-plane and in-plane bulk elastic waves, which can be simultaneously located at the frequency range from 1.223 to 1.251 MHz, are numerically observed. Robust pseudospin-dependent elastic edge wave propagation along arbitrary paths is further demonstrated. Our results will significantly broaden its practical application in the engineering field.

  8. Topologically protected edge states for out-of-plane and in-plane bulk elastic waves

    NASA Astrophysics Data System (ADS)

    Huo, Shao-Yong; Chen, Jiu-Jiu; Huang, Hong-Bo

    2018-04-01

    Topological phononic insulators (TPnIs) show promise for application in the manipulation of acoustic waves for the design of low-loss transmission and perfectly integrated communication devices. Since solid phononic crystals exist as a transverse polarization mode and a mixed longitudinal-transverse polarization mode, the realization of topological edge states for both out-of-plane and in-plane bulk elastic waves is desirable to enhance the controllability of the edge waves in solid systems. In this paper, a two-dimensional (2D) solid/solid hexagonal-latticed phononic system that simultaneously supports the topologically protected edge states for out-of-plane and in-plane bulk elastic waves is investigated. Firstly, two pairs of two-fold Dirac cones, respectively corresponding to the out-of-plane and in-plane waves, are obtained at the same frequency by tuning the crystal parameters. Then, a strategy of zone folding is invoked to form double Dirac cones. By shrinking and expanding the steel scatterer, the lattice symmetry is broken, and band inversions induced, giving rise to an intriguing topological phase transition. Finally, the topologically protected edge states for both out-of-plane and in-plane bulk elastic waves, which can be simultaneously located at the frequency range from 1.223 to 1.251 MHz, are numerically observed. Robust pseudospin-dependent elastic edge wave propagation along arbitrary paths is further demonstrated. Our results will significantly broaden its practical application in the engineering field.

  9. Fatigue Behavior of a Cross-Ply Metal Matrix Composite at Elevated Temperature Under Strain Controlled Mode.

    DTIC Science & Technology

    1994-12-01

    1991. 114 22. Nimmer, R. P. et al. "Fiber Array Geometry Effects Upon Composite Transverse Tensile Behavior," Titanium Aluminide Composites. February... Titanium , Silicon Carbide, Strain Control Mode 17. SECURITY CLASSIFICATION I18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFIKATION 20. LIMITATION OF...ends. Boyum was the first to examine fully reversed (R=-l) fatigue of a titanium composite under the load control mode, at both room and elevated

  10. Management of War-Related Ballistic Craniocerebral Injuries in a French Role 3 Hospital During the Afghan Campaign.

    PubMed

    Dagain, Arnaud; Aoun, Olivier; Bordes, Julien; Roqueplo, Cédric; Joubert, Christophe; Esnault, Pierre; Sellier, Aurore; Delmas, Jean-Marc; Desse, Nicolas; Fouet, Mathilde; Pernot, Philippe; Dulou, Renaud

    2017-06-01

    France deployed to Afghanistan from 2001 to 2014 within the International Security and Assistance Force. A French role 3 hospital was built in 2009 in the vicinity of Kabul International Airport (KaIA). The objectives of this study were to describe the epidemiology, management, and outcome of war-related craniocerebral injuries during the Afghan campaign in a French role 3 hospital. From March 1, 2010 to September 30, 2012, we conducted a retrospective descriptive study in Kabul, Afghanistan. All patients presenting with a ballistic craniocerebral injury to the KaIA role 3 hospital were included. We analyzed 48 records. Mean age was 21.9 years (1-46 years) with a 37:11 (male:female) sex ratio and a majority Afghan population (n = 41). Civilians represented 64.6% (n = 31) of casualties. On the battlefield, mean Glasgow Coma Scale score was 9.4 [3-15]. On arrival at the KaIA field hospital, 20 of the 48 patients were hemodynamically unstable. All patients underwent a full-body computed tomography scan. The majority of our casualties had associated injuries. Neurosurgery was indicated for 42 (87.5%) patients. The surgery consisted of wound debridement plane by plane associated with decompressive craniectomy (n = 11), debridement craniectomy (n = 19), and craniotomy (n = 12). A total of 32.4% wounded died at the point of injury, 8.4% at the emergency department, and 16.9% after surgery. War casualties with ballistic head injuries were predominantly multitraumatized patients with hemodynamic compromise requiring neurosurgical damage control management and multidisciplinary care. The neurosurgeon has thus an essential role to play. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. 17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES... System, the Office of the Comptroller of the Currency or the Federal Deposit Insurance Corporation...

  12. The Mid-plane of the Main Asteroid Belt

    NASA Astrophysics Data System (ADS)

    Cambioni, Saverio; Malhotra, Renu

    2018-03-01

    We measure the mid-plane of the main asteroid belt by using the observational data of a nearly complete and unbiased sample of asteroids and find that it has inclination \\bar{I}=0\\buildrel{\\circ}\\over{.} 93+/- 0\\buildrel{\\circ}\\over{.} 04 and longitude of ascending node \\bar{{{Ω }}}=87\\buildrel{\\circ}\\over{.} 6+/- 2\\buildrel{\\circ}\\over{.} 6 (in J2000 ecliptic-equinox coordinate system). This plane differs significantly from previously published measurements, and it is also distinctly different than the solar system’s invariable plane as well as Jupiter’s orbit plane. The mid-plane of the asteroid belt is theoretically expected to be a slightly warped sheet whose local normal is controlled by the gravity of the major planets. Specifically, its inclination and longitude of ascending node varies with semimajor axis and time (on secular timescales) and is defined by the forced solution of secular perturbation theory; the ν 16 nodal secular resonance is predicted to cause a significant warp of the mid-plane in the inner asteroid belt. We test the secular theory by measuring the current location of the asteroids’ mid-plane in finer semimajor axis bins. We find that the measured mid-plane in the middle and outer asteroid belt is consistent, within the 3σ confidence level, with the prediction of secular perturbation theory, but a notable discrepancy is present in the inner asteroid belt near ∼2 au.

  13. Giant room temperature magnetoelectric response in strain controlled nanocomposites

    NASA Astrophysics Data System (ADS)

    Rafique, Mohsin; Herklotz, Andreas; Dörr, Kathrin; Manzoor, Sadia

    2017-05-01

    We report giant magnetoelectric coupling at room temperature in a self-assembled nanocomposite of BiFeO3-CoFe2O4 (BFO-CFO) grown on a BaTiO3 (BTO) crystal. The nanocomposite consisting of CFO nanopillars embedded in a BFO matrix exhibits weak perpendicular magnetic anisotropy due to a small out-of-plane compression (˜0.3%) of the magnetostrictive (CFO) phase, enabling magnetization rotation under moderate in-plane compression. Temperature dependent magnetization measurements demonstrate strong magnetoelastic coupling between the BaTiO3 substrate and the nanocomposite film, which has been exploited to produce a large magnetoelectric response in the sample. The reorientation of ferroelectric domains in the BTO crystal upon the application of an electric field (E) alters the strain state of the nanocomposite film, thus enabling control of its magnetic anisotropy. The strain mediated magnetoelectric coupling coefficient α = μ o d M / d E calculated from remnant magnetization at room temperature is 2.6 × 10-7 s m-1 and 1.5 × 10-7 s m-1 for the out-of-plane and in-plane orientations, respectively.

  14. Fast optical switch having reduced light loss

    NASA Technical Reports Server (NTRS)

    Nelson, Bruce N. (Inventor); Cooper, Ronald F. (Inventor)

    1992-01-01

    An electrically controlled optical switch uses an electro-optic crystal of the type having at least one set of fast and slow optical axes. The crystal exhibits electric field induced birefringence such that a plane of polarization oriented along a first direction of a light beam passing through the crystal may be switched to a plane of polarization oriented along a second direction. A beam splitting polarizer means is disposed at one end of the crystal and directs a light beam passing through the crystal whose plane of polarization is oriented along the first direction differently from a light beam having a plane of polarization oriented along the second direction. The electro-optic crystal may be chosen from the crystal classes 43m, 42m, and 23. In a preferred embodiment, the electro-optic crystal is a bismuth germanium oxide crystal or a bismuth silicon oxide crystal. In another embodiment of the invention, polarization control optics are provided which transmit substantially all of the incident light to the electro-optic crystal, substantially reducing the insertion loss of the switch.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Witzke, Edward L.

    In 2014, the United States Department of Defense started tra nsitioning the way it performs risk management and accreditation of informatio n systems to a process entitled Risk Management Framework for DoD Information Technology or RMF for DoD IT. There are many more security and privacy contro ls (and control enhancements) from which to select in RMF, than there w ere in the previous Information Assurance process. This report is an attempt t o clarify the way security controls and enhancements are selected. After a brief overview and comparison of RMF for DoD I T with the previously used process,more » this report looks at the determination of systems as National Security Systems (NSS). Once deemed to be an NSS, this report addr esses the categorization of the information system with respect to impact level s of the various security objectives and the selection of an initial baseline o f controls. Next, the report describes tailoring the controls through the use of overl ays and scoping considerations. Finally, the report discusses organizatio n-defined values for tuning the security controls to the needs of the information system.« less

  16. Out-of-plane reflection and refraction of light by anisotropic optical antenna metasurfaces with phase discontinuities.

    PubMed

    Aieta, Francesco; Genevet, Patrice; Yu, Nanfang; Kats, Mikhail A; Gaburro, Zeno; Capasso, Federico

    2012-03-14

    Experiments on ultrathin anisotropic arrays of subwavelength optical antennas display out-of-plane refraction. A powerful three-dimensional (3D) extension of the recently demonstrated generalized laws of refraction and reflection shows that the interface imparts a tangential wavevector to the incident light leading to anomalous beams, which in general are noncoplanar with the incident beam. The refracted beam direction can be controlled by varying the angle between the plane of incidence and the antenna array. © 2012 American Chemical Society

  17. Optimal feedback strategies for pursuit-evasion and interception in a plane

    NASA Technical Reports Server (NTRS)

    Rajan, N.; Ardema, M. D.

    1983-01-01

    Variable-speed pursuit-evasion and interception for two aircraft moving in a horizontal plane are analyzed in terms of a coordinate frame fixed in the plane at termination. Each participant's optimal motion can be represented by extremal trajectory maps. These maps are used to discuss sub-optimal approximations that are independent of the other participant. A method of constructing sections of the barrier, dispersal, and control-level surfaces and thus determining feedback strategies is described. Some examples are shown for pursuit-evasion and the minimum-time interception of a straight-flying target.

  18. IT Security Support for the Spaceport Command Control System Development

    NASA Technical Reports Server (NTRS)

    Varise, Brian

    2014-01-01

    My job title is IT Security support for the Spaceport Command & Control System Development. As a cyber-security analyst it is my job to ensure NASA's information stays safe from cyber threats, such as, viruses, malware and denial-of-service attacks by establishing and enforcing system access controls. Security is very important in the world of technology and it is used everywhere from personal computers to giant networks ran by Government agencies worldwide. Without constant monitoring analysis, businesses, public organizations and government agencies are vulnerable to potential harmful infiltration of their computer information system. It is my responsibility to ensure authorized access by examining improper access, reporting violations, revoke access, monitor information request by new programming and recommend improvements. My department oversees the Launch Control System and networks. An audit will be conducted for the LCS based on compliance with the Federal Information Security Management Act (FISMA) and The National Institute of Standards and Technology (NIST). I recently finished analyzing the SANS top 20 critical controls to give cost effective recommendations on various software and hardware products for compliance. Upon my completion of this internship, I will have successfully completed my duties as well as gain knowledge that will be helpful to my career in the future as a Cyber Security Analyst.

  19. The craniofacial complex in 47, XXX females.

    PubMed

    Krusinskiene, Viktorija; Krusinskie, Viktorija; Alvesalo, Lassi; Sidlauskas, Antanas

    2005-08-01

    A study of the craniofacial complex in four 47, XXX Finnish females, or females with an extra X chromosome, was carried out using cephalometric analysis comprising linear and angular measurements. The lengths of the anterior and posterior cranial bases, the calvarium, mandibular ramus and posterior and upper anterior face heights were found to be significantly shorter than in female controls, while the angles between the foraminal and clival planes, the mandibular plane and cranial base, the maxillary and occlusal planes, the maxillary and mandibular planes and the foraminal and mandibular planes, and also the gonial angle, were significantly enlarged. The present findings of reduced linear measurements, together with the results of studies on the craniofacial complex of 47, XXY and 47, XYY males, suggest dimensional variation between these groups from the promoting effect of an extra Y chromosome and the retarding effect of an extra X chromosome on craniofacial growth.

  20. Design of a compact static Fourier transform spectrometer in integrated optics based on a leaky loop structure.

    PubMed

    Martin, Bruno; Morand, Alain; Benech, Pierre; Leblond, Gregory; Blaize, Sylvain; Lerondel, Gilles; Royer, Pascal; Kern, Pierre; Le Coarer, Etienne

    2009-01-15

    A compact static Fourier transform spectrometer for integrated optics is proposed. It is based on a plane leaky loop structure combined with a plane waveguide. The interference pattern produced in the loop structure leaks outside of it and is guided in the plane waveguide to the photodetector array. This configuration allows one to control the shape of the field pattern at the end of the plane waveguide. A large fringe pattern with a high interference fringe contrast is obtained. A two-dimensional model based on an aperiodic Fourier modal method is used to modelize the coupling between the bent and the plane waveguides, completed with the Helmholtz-Kirchhoff propagation. This concept gives access to plan and compact spectrometers requiring only a single low-cost realization process step. The simulation has been done to realize a spectrometer in glass integrated optics (Deltalambda=6.1 nm at 1500 nm).

  1. Cross-layer shared protection strategy towards data plane in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun

    2018-04-01

    In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.

  2. Chromatic X-ray magnifying method and apparatus by Bragg reflective planes on the surface of Abbe sphere

    DOEpatents

    Thoe, Robert S.

    1991-01-01

    Method and apparatus for producing sharp, chromatic, magnified images of X-ray emitting objects, are provided. The apparatus, which constitutes an X-ray microscope or telescope, comprises a connected collection of Bragg reflecting planes, comprised of either a bent crystal or a synthetic multilayer structure, disposed on and adjacent to a locus determined by a spherical surface. The individual Bragg planes are spatially oriented to Bragg reflect radiation from the object location toward the image location. This is accomplished by making the Bragg planes spatially coincident with the surfaces of either a nested series of prolate ellipsoids of revolution, or a nested series of spheres. The spacing between the Bragg reflecting planes can be tailored to control the wavelengths and the amount of the X-radiation that is Bragg reflected to form the X-ray image.

  3. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  4. 33 CFR 106.205 - Company Security Officer (CSO).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...

  5. 33 CFR 106.205 - Company Security Officer (CSO).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...

  6. 33 CFR 106.205 - Company Security Officer (CSO).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Methods of conducting audits, inspection, control, and monitoring; and (7) Techniques for security... security related communications; (7) Knowledge of current security threats and patterns; (8) Recognition and detection of dangerous substances and devices; (9) Recognition of characteristics and behavioral...

  7. 5 CFR 1312.22 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...

  8. 5 CFR 1312.22 - Responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...

  9. 5 CFR 1312.22 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...

  10. 5 CFR 1312.22 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...

  11. 5 CFR 1312.22 - Responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... computer systems meeting the appropriate security criteria. (a) EOP Security Officer. In cooperation with..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified... duty by employees will do much to ensure the adequate security of classified information in the...

  12. Stellar figure sensor

    NASA Technical Reports Server (NTRS)

    Peters, W. N.

    1973-01-01

    A compilation of analytical and experimental data is presented concerning the stellar figure sensor. The sensor is an interferometric device which is located in the focal plane of an orbiting large space telescope (LST). The device was designed to perform interferometry on the optical wavefront of a single star after it has propagated through the LST. An analytical model of the device was developed and its accuracy was verified by an operating laboratory breadboard. A series of linear independent control equations were derived which define the operations required for utilizing a focal plane figure sensor in the control loop for the secondary mirror position and for active control of the primary mirror.

  13. Credit BG. Northeast and northwest facades of Building 4496 (Security ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    Credit BG. Northeast and northwest facades of Building 4496 (Security Facility) as seen when looking south (178°) from entrance to secured area. The Control Tower (Building 4500) appears in background. The Security Facility is part of the secured Building 4505 complex - Edwards Air Force Base, North Base, Security Facility, Northeast of A Street, Boron, Kern County, CA

  14. Increasing security in inter-chip communication

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Edwards, Nathan J.; Hamlet, Jason; Bauer, Todd

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  15. Increasing security in inter-chip communication

    DOEpatents

    Edwards, Nathan J; Hamlet, Jason; Bauer, Todd; Helinski, Ryan

    2014-10-28

    An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both.

  16. New Regimes of Implosions of Larger Sized Wire Arrays With and Without Modified Central Plane at 1.5-1.7 MA Zebra

    NASA Astrophysics Data System (ADS)

    Safronova, A. S.; Kantsyrev, V. L.; Esaulov, A. A.; Weller, M. E.; Shrestha, I.; Shlyaptseva, V. V.; Stafford, A.; Keim, S. F.; Petkov, E. E.; Lorance, M.; Chuvatin, A. S.; Coverdale, C. A.; Jones, B.

    2013-10-01

    The recent experiments at 1.5-1.7 MA on Zebra at UNR with larger sized planar wires arrays (compared to the wire loads at 1 MA current) have demonstrated higher linear radiation yield and electron temperatures as well as advantages of better diagnostics access to observable plasma regions. Such multi-planar wire arrays had two outer wire planes from mid-Z material to create a global magnetic field (gmf) and mid-Z plasma flow between them. Also, they included a modified central plane with a few Al wires at the edges to influence gmf and to create Al plasma flow in the perpendicular direction. The stationary shock waves which existed over tens of ns on shadow images and the early x-ray emissions before the PCD peak on time-gated spectra were observed. The most recent experiments with similar loads but without the central wires demonstrated a very different regime of implosion with asymmetrical jets and no precursor formation. This work was supported by NNSA under DOE Cooperative Agreement DE-NA0001984 and in part by DE-FC52-06NA27616. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Company, for the U.S. Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000.

  17. Breathable NIPAAm Network with Controllable Hydration Supports Model Lipid Membrane

    NASA Astrophysics Data System (ADS)

    Jablin, Michael; Smith, Hillary; Zhernenkov, Mikhail; Vidyasagar, Ajay; Toomey, Ryan; Saiz, Jessica; Toperverg, Boris; Watkins, Erik; Kuhl, Tonya; Hurd, Alan; Majewski, Jaroslaw

    2009-03-01

    The interaction of a model lipid bilayer composed of DPPC with a surface-tethered poly(N-isopropylacrylamide) (NIPAAm) was explored with neutron reflectometry (NR). The Langmuir-Blodgett / Langmuir-Schaeffer method was used to deposit a lipid bilayer onto the polymer. NR measurements were used to probe the in- and out-of-plane structure of the system as a function of temperature. NR with fluorescence microscopy show that the polymer supports a lipid bilayer, and hydration of the support can be controlled. At low temp. the membrane develops out-of-plane undulations visible in off-specular scattering. Analysis of the off-specular reveals in-plane correlation of the bilayer fluctuations. The separation of the lipid bilayer from the solid support of a substrate constitutes a significant step towards a more realistic model of biological membranes.

  18. Birefringence control of solution-cast film of cellulose triacetate

    NASA Astrophysics Data System (ADS)

    Kiyama, Ayumi; Nobukawa, Shogo; Yamaguchi, Masayuki

    2017-10-01

    We controlled the optical anisotropy of a solution-cast film composed of cellulose triacetate (CTA) by adding ferrocene. Owing to the molecular orientation in the film plane of solution-cast films, which results from the normal stress applied during the solvent evaporation process, the average refractive index is usually higher in the plane of the film than in the thickness direction. We found that the addition of ferrocene, which is miscible with CTA, reduced the optical anisotropy by nematic interaction; i.e., ferrocene molecules are forcibly embedded into the film plane accompanying the CTA chains. Because the direction of anisotropic polarizability of ferrocene is perpendicular to the long axis of the molecule, the refractive index in the thickness direction is reduced. Furthermore, the stress-optical coefficient in the glassy state is reduced by the addition of ferrocene.

  19. INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project

    NASA Astrophysics Data System (ADS)

    D'Antonio, Salvatore; Romano, Luigi; Khelil, Abdelmajid; Suri, Neeraj

    The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.

  20. Adsorption induced modification of in-plane magnetic anisotropy in epitaxial Co and Fe/Co films on Fe(110)

    NASA Astrophysics Data System (ADS)

    Ślezak, M.; Ślezak, T.; Matlak, K.; DróŻdŻ, P.; Korecki, J.

    2018-05-01

    A study of in-plane magnetic anisotropy (MA) in epitaxial bcc Co films and Fe/Co bilayers on a Fe(110) surface is reported. Surface MA of as-deposited Co films and Fe/Co bilayers strongly depends on the Co (dCo) and Fe (dFe) thickness. Adsorption of residual gases drastically modifies in-plane MA of both Co films and Fe/Co bilayers. We present two dimensional MA maps in the (dCo, dFe) space for both as grown and adsorption-modified films. Our results indicate how to precisely engineer in-plane MA that can be controlled by dCo, dFe and is sensitive to the residual gas adsorption.

  1. Experimental Study on Ultrasonic Computed Tomography Using Transducers Arrayed on the Internal Surface of a Cylinder

    NASA Astrophysics Data System (ADS)

    Kim, Jung-Soon; Kim, Moo-Joon; Kim, Jung-Ho; Ha, Kang-Lyeol

    2005-06-01

    In this study, ultrasonic array transducers with 32 vibrators arranged on the internal surface of a part of a cylinder were fabricated. The vibrators were operated by the piezoelectric transverse effect. By controlling the phase of the input signal for every vibrator, a quasi plane wave was synthesized. Using the fabricated array, inverse scattering ultrasonic computed tomography (UCT) was carried out with a phantom specimen after checking the plane wave generation. It was confirmed that the plane wave was synthesized successfully and a sound velocity image of the phantom was obtained by the plane wave. Consequently, it was noted that the array could be employed as a transmitter and receiver for data acquisition in UCT.

  2. Measurement and control of in-plane surface chemistry during the oxidation of H-terminated (111) Si

    PubMed Central

    Gokce, Bilal; Adles, Eric J.; Aspnes, David E.; Gundogdu, Kenan

    2010-01-01

    In-plane directional control of surface chemistry during interface formation can lead to new opportunities regarding device structures and applications. Control of this type requires techniques that can probe and hence provide feedback on the chemical reactivity of bonds not only in specific directions but also in real time. Here, we demonstrate both control and measurement of the oxidation of H-terminated (111) Si. Control is achieved by externally applying uniaxial strain, and measurement by second-harmonic generation (SHG) together with the anisotropic-bond model of nonlinear optics. In this system anisotropy results because bonds in the strain direction oxidize faster than those perpendicular to it, leading in addition to transient structural changes that can also be detected at the bond level by SHG. PMID:20876145

  3. Constrained surface controllers for three-dimensional image data reformatting.

    PubMed

    Graves, Martin J; Black, Richard T; Lomas, David J

    2009-07-01

    This study did not require ethical approval in the United Kingdom. The aim of this work was to create two controllers for navigating a two-dimensional image plane through a volumetric data set, providing two important features of the ultrasonographic paradigm: orientation matching of the navigation device and the desired image plane in the three-dimensional (3D) data and a constraining surface to provide a nonvisual reference for the image plane location in the 3D data. The first constrained surface controller (CSC) uses a planar constraining surface, while the second CSC uses a hemispheric constraining surface. Ten radiologists were asked to obtain specific image reformations by using both controllers and a commercially available medical imaging workstation. The time taken to perform each reformatting task was recorded. The users were also asked structured questions comparing the utility of both methods. There was a significant reduction in the time taken to perform the specified reformatting tasks by using the simpler planar controller as compared with a standard workstation, whereas there was no significant difference for the more complex hemispheric controller. The majority of users reported that both controllers allowed them to concentrate entirely on the reformatting task and the related image rather than being distracted by the need for interaction with the workstation interface. In conclusion, the CSCs provide an intuitive paradigm for interactive reformatting of volumetric data. (c) RSNA, 2009.

  4. Fabrication of a Cryogenic Bias Filter for Ultrasensitive Focal Plane

    NASA Technical Reports Server (NTRS)

    Chervenak, James; Wollack, Edward

    2012-01-01

    A fabrication process has been developed for cryogenic in-line filtering for the bias and readout of ultrasensitive cryogenic bolometers for millimeter and submillimeter wavelengths. The design is a microstripline filter that cuts out, or strongly attenuates, frequencies (10 50 GHz) that can be carried by wiring staged at cryogenic temperatures. The filter must have 100-percent transmission at DC and low frequencies where the bias and readout lines will carry signal. The fabrication requires the encapsulation of superconducting wiring in a dielectric-metal envelope with precise electrical characteristics. Sufficiently thick insulation layers with high-conductivity metal layers fully surrounding a patterned superconducting wire in arrayable formats have been demonstrated. A degenerately doped silicon wafer has been chosen to provide a metallic ground plane. A metallic seed layer is patterned to enable attachment to the ground plane. Thick silicon dioxide films are deposited at low temperatures to provide tunable dielectric isolation without degrading the metallic seed layer. Superconducting wiring is deposited and patterned using microstripline filtering techniques to cut out the relevant frequencies. A low Tc superconductor is used so that it will attenuate power strongly above the gap frequency. Thick dielectric is deposited on top of the circuit, and then vias are patterned through both dielectric layers. A thick conductive film is deposited conformally over the entire circuit, except for the contact pads for the signal and bias attachments to complete the encapsulating ground plane. Filters are high-aspect- ratio rectangles, allowing close packing in one direction, while enabling the chip to feed through the wall of a copper enclosure. The chip is secured in the copper wall using a soft metal seal to make good thermal and electrical contact to the outer shield.

  5. 5 CFR 1312.31 - Security violations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  6. 49 CFR 1580.107 - Chain of custody and control requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... businesses, housing, schools, and hospitals. (4) Any information regarding threats to the facility. (5) Other...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION SECURITY Freight Rail Including Freight Railroad Carriers, Rail Hazardous Materials...

  7. FAA computer security : concerns remain due to personnel and other continuing weaknesses

    DOT National Transportation Integrated Search

    2000-08-01

    FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...

  8. Secure, Autonomous, Intelligent Controller for Integrating Distributed Sensor Webs

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2007-01-01

    This paper describes the infrastructure and protocols necessary to enable near-real-time commanding, access to space-based assets, and the secure interoperation between sensor webs owned and controlled by various entities. Select terrestrial and aeronautics-base sensor webs will be used to demonstrate time-critical interoperability between integrated, intelligent sensor webs both terrestrial and between terrestrial and space-based assets. For this work, a Secure, Autonomous, Intelligent Controller and knowledge generation unit is implemented using Virtual Mission Operation Center technology.

  9. 76 FR 35275 - Export Control Reform Initiative: Strategic Trade Authorization License Exception

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-16

    .... The Export Control Reform Initiative is designed to enhance U.S. national security and strengthen the... Security 15 CFR Parts 732, 738, 740, et al. Export Control Reform Initiative: Strategic Trade Authorization... Parts 732, 738, 740, 743, and 774 [Docket No. 100923470-1230-03] RIN 0694-AF03 Export Control Reform...

  10. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 27 Alcohol, Tobacco Products and Firearms 2 2010-04-01 2010-04-01 false What security controls... controls must I use for identification codes and passwords? If you use electronic signatures based upon use of identification codes in combination with passwords, you must employ controls to ensure their...

  11. The Potential and Electric Fields of a Conducting Sphere in the Presence of a Charged Conducting Plane

    DTIC Science & Technology

    1989-06-01

    polynomials : Po(cos 8) = 1 , P1(cos 8) = cos 0 P 2(cos 8) = (3 cos 20 - 1)/2 P3 (cos 8) = [(5 cos28 - 3) cos 0]/2 8 and the general relations, p/(-cos...AP DD Form 1473. JUN 86 Previous editions are obsolete. SECURITY CLASSIFICATION OF THIS PAGE Unclassified Foreword Thirty- some years ago Nick...1) and P. (cos 8) , (2) where n = 0, 1, 2, ..., and the Pn(cos 0) are the Legendre polynomials [13]. For convenience, we list the first few Legendre

  12. Orbit Stability of OSIRIS-REx in the Vicinity of Bennu Using a High-Fidelity Solar Radiation Model

    NASA Technical Reports Server (NTRS)

    Williams, Trevor; Hughes, Kyle; Mashiku, Alinda; Longuski, James

    2015-01-01

    The OSIRIS-REx mission (Origins Spectral Interpretation Resource Identification Security Regolith EXPlorer) is an asteroid sample return mission to Bennu (RQ36) that is scheduled to launch in 2016. The planned science operations precluding the small retrieval involve operations in terminator orbits (orbit plane is perpendicular to the sun). Over longer durations the solar radiation pressure (SRP) perturbs the orbit causing it to precess. Our work involves: modeling high fidelity SRP model to capture the perturbations during attitude changes; design a stable orbit from the high fidelity models to analyze the stability over time.

  13. Mechanical code comparator

    DOEpatents

    Peter, Frank J.; Dalton, Larry J.; Plummer, David W.

    2002-01-01

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  14. 76 FR 68242 - Self-Regulatory Organizations; Chicago Mercantile Exchange, Inc.; Order Approving Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... securities and funds which are in the custody or control of such clearing agency or for which it is... assure the safeguarding of securities and funds which are in its custody or control or for which it is... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65655; File No. SR-CME-2011-07] Self-Regulatory...

  15. Information Assurance and Cyber Defence (Assurance de l’information et cyberdefense)

    DTIC Science & Technology

    2010-11-01

    project is that knowledge exchange in a timely fashion is highly significant. Authentication and Authorisation of Users and Services in Federated...Detection, Protection and Countermeasures; • Security Models and Architectures; • Security Policies, Evaluation, Authorisation and Access Control; and...Evaluation, Authorisation and Access Control • Network and Information Security Awareness The topics for the symposium had been established

  16. Toward Privacy-preserving Content Access Control for Information Centric Networking

    DTIC Science & Technology

    2014-03-01

    REPORT Toward Privacy-preserving Content Access Control for Information Centric Networking 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Information...regardless the security mechanisms provided by different content hosting servers. However, using ABE has a drawback that the enforced content access...Encryption (ABE) is a flexible approach to enforce the content access policies regardless the security mechanisms provided by different content hosting

  17. DOE`s nation-wide system for access control can solve problems for the federal government

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Callahan, S.; Tomes, D.; Davis, G.

    1996-07-01

    The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less

  18. Lemnos interoperable security project.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halbgewachs, Ronald D.

    2010-03-01

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance inmore » a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.« less

  19. Investigation of electrodynamic stabilization and control of long orbiting tethers. [space shuttle payloads

    NASA Technical Reports Server (NTRS)

    Arnold, D. A.; Dobrowolny, M.

    1981-01-01

    An algorithm for using electric currents to control pendular oscillations induced by various perturbing forces on the Skyhook wire is considered. Transverse and vertical forces on the tether; tether instability modes and causes during retrieval by space shuttle; simple and spherical pendulum motion and vector damping; and current generation and control are discussed. A computer program for numerical integration of the in-plane and out-of-plane displacements of the tether vs time was developed for heuristic study. Some techniques for controlling instabilities during payload retrieval and methods for employing the tether for launching satellites from the space shuttle are considered. Derivations and analyses of a general nature used in all of the areas studied are included.

  20. Bounded parametric control of plane motions of space tethered system

    NASA Astrophysics Data System (ADS)

    Bezglasnyi, S. P.; Mukhametzyanova, A. A.

    2018-05-01

    This paper is focused on the problem of control of plane motions of a space tethered system (STS). The STS is modeled as a heavy rod with two point masses. Point masses are fixed on the rod. A third point mass can move along the rod. The control is realized as a continuous change of the distance from the centre of mass of the tethered system to the movable mass. New limited control laws processes of excitation and damping are built. Diametric reorientation and gravitational stabilization to the local vertical of an STS were obtained. The problem is solved by the method of Lyapunov's functions of the classical theory of stability. The theoretical results are confirmed by numerical calculations.

  1. An in-plane nano-mechanics approach to achieve reversible resonance control of photonic crystal nanocavities.

    PubMed

    Chew, Xiongyeu; Zhou, Guangya; Yu, Hongbin; Chau, Fook Siong; Deng, Jie; Loke, Yee Chong; Tang, Xiaosong

    2010-10-11

    Control of photonic crystal resonances in conjunction with large spectral shifting is critical in achieving reconfigurable photonic crystal devices. We propose a simple approach to achieve nano-mechanical control of photonic crystal resonances within a compact integrated on-chip approach. Three different tip designs utilizing an in-plane nano-mechanical tuning approach are shown to achieve reversible and low-loss resonance control on a one-dimensional photonic crystal nanocavity. The proposed nano-mechanical approach driven by a sub-micron micro-electromechanical system integrated on low loss suspended feeding nanowire waveguide, achieved relatively large resonance spectral shifts of up to 18 nm at a driving voltage of 25 V. Such designs may potentially be used as tunable optical filters or switches.

  2. Inhibitory Control Mediates the Association between Perceived Stress and Secure Relationship Quality.

    PubMed

    Herd, Toria; Li, Mengjiao; Maciejewski, Dominique; Lee, Jacob; Deater-Deckard, Kirby; King-Casas, Brooks; Kim-Spoon, Jungmeen

    2018-01-01

    Past research has demonstrated negative associations between exposure to stressors and quality of interpersonal relationships among children and adolescents. Nevertheless, underlying mechanisms of this association remain unclear. Chronic stress has been shown to disrupt prefrontal functioning in the brain, including inhibitory control abilities, and evidence is accumulating that inhibitory control may play an important role in secure interpersonal relationship quality, including peer problems and social competence. In this prospective longitudinal study, we examine whether changes in inhibitory control, measured at both behavioral and neural levels, mediate the association between stress and changes in secure relationship quality with parents and peers. The sample included 167 adolescents (53% males) who were first recruited at age 13 or 14 years and assessed annually three times. Adolescents' inhibitory control was measured by their behavioral performance and brain activities, and adolescents self-reported perceived stress levels and relationship quality with mothers, fathers, and peers. Results suggest that behavioral inhibitory control mediates the association between perceived stress and adolescent's secure relationship quality with their mothers and fathers, but not their peers. In contrast, given that stress was not significantly correlated with neural inhibitory control, we did not further test the mediation path. Our results highlight the role of inhibitory control as a process through which stressful life experiences are related to impaired secure relationship quality between adolescents and their mothers and fathers.

  3. Inhibitory Control Mediates the Association between Perceived Stress and Secure Relationship Quality

    PubMed Central

    Herd, Toria; Li, Mengjiao; Maciejewski, Dominique; Lee, Jacob; Deater-Deckard, Kirby; King-Casas, Brooks; Kim-Spoon, Jungmeen

    2018-01-01

    Past research has demonstrated negative associations between exposure to stressors and quality of interpersonal relationships among children and adolescents. Nevertheless, underlying mechanisms of this association remain unclear. Chronic stress has been shown to disrupt prefrontal functioning in the brain, including inhibitory control abilities, and evidence is accumulating that inhibitory control may play an important role in secure interpersonal relationship quality, including peer problems and social competence. In this prospective longitudinal study, we examine whether changes in inhibitory control, measured at both behavioral and neural levels, mediate the association between stress and changes in secure relationship quality with parents and peers. The sample included 167 adolescents (53% males) who were first recruited at age 13 or 14 years and assessed annually three times. Adolescents’ inhibitory control was measured by their behavioral performance and brain activities, and adolescents self-reported perceived stress levels and relationship quality with mothers, fathers, and peers. Results suggest that behavioral inhibitory control mediates the association between perceived stress and adolescent’s secure relationship quality with their mothers and fathers, but not their peers. In contrast, given that stress was not significantly correlated with neural inhibitory control, we did not further test the mediation path. Our results highlight the role of inhibitory control as a process through which stressful life experiences are related to impaired secure relationship quality between adolescents and their mothers and fathers. PMID:29535664

  4. 15 CFR 750.3 - Review of license applications by BIS and other government agencies and departments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... items controlled for national security, missile technology, nuclear nonproliferation, and chemical and... primarily with items controlled for national security, nuclear nonproliferation, missile technology...

  5. 15 CFR 750.3 - Review of license applications by BIS and other government agencies and departments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... items controlled for national security, missile technology, nuclear nonproliferation, and chemical and... primarily with items controlled for national security, nuclear nonproliferation, missile technology...

  6. 15 CFR 750.3 - Review of license applications by BIS and other government agencies and departments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... items controlled for national security, missile technology, nuclear nonproliferation, and chemical and... primarily with items controlled for national security, nuclear nonproliferation, missile technology...

  7. 33 CFR 101.400 - Enforcement.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Enforcement. 101.400 Section 101.400 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: GENERAL Control Measures for Security § 101.400 Enforcement. (a) The rules and...

  8. 78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-20

    ... DEPARTMENT OF STATE [Public Notice 8419] International Security Advisory Board (ISAB) Meeting.... App Sec. 10(a)(2), the Department of State announces a meeting of the International Security Advisory... all aspects of arms control, disarmament, political-military affairs, international security and...

  9. 10 CFR 71.47 - External radiation standards for all packages.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the vehicle; or in the case of a flat-bed style vehicle, at any point on the vertical planes...); or in the case of a flat-bed style vehicle, at any point 2 meters (6.6 feet) from the vertical planes... controls. The instructions must be included with the shipping paper information. (d) The written...

  10. 14 CFR 23.771 - Pilot compartment.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... the propellers so that no part of the pilot or the controls lies in the region between the plane of rotation of any inboard propeller and the surface generated by a line passing through the center of the propeller hub making an angle of 5 degrees forward or aft of the plane of rotation of the propeller. [Doc...

  11. 14 CFR 23.771 - Pilot compartment.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... the propellers so that no part of the pilot or the controls lies in the region between the plane of rotation of any inboard propeller and the surface generated by a line passing through the center of the propeller hub making an angle of 5 degrees forward or aft of the plane of rotation of the propeller. [Doc...

  12. 14 CFR 23.771 - Pilot compartment.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... the propellers so that no part of the pilot or the controls lies in the region between the plane of rotation of any inboard propeller and the surface generated by a line passing through the center of the propeller hub making an angle of 5 degrees forward or aft of the plane of rotation of the propeller. [Doc...

  13. JPEG 2000 Encoding with Perceptual Distortion Control

    NASA Technical Reports Server (NTRS)

    Watson, Andrew B.; Liu, Zhen; Karam, Lina J.

    2008-01-01

    An alternative approach has been devised for encoding image data in compliance with JPEG 2000, the most recent still-image data-compression standard of the Joint Photographic Experts Group. Heretofore, JPEG 2000 encoding has been implemented by several related schemes classified as rate-based distortion-minimization encoding. In each of these schemes, the end user specifies a desired bit rate and the encoding algorithm strives to attain that rate while minimizing a mean squared error (MSE). While rate-based distortion minimization is appropriate for transmitting data over a limited-bandwidth channel, it is not the best approach for applications in which the perceptual quality of reconstructed images is a major consideration. A better approach for such applications is the present alternative one, denoted perceptual distortion control, in which the encoding algorithm strives to compress data to the lowest bit rate that yields at least a specified level of perceptual image quality. Some additional background information on JPEG 2000 is prerequisite to a meaningful summary of JPEG encoding with perceptual distortion control. The JPEG 2000 encoding process includes two subprocesses known as tier-1 and tier-2 coding. In order to minimize the MSE for the desired bit rate, a rate-distortion- optimization subprocess is introduced between the tier-1 and tier-2 subprocesses. In tier-1 coding, each coding block is independently bit-plane coded from the most-significant-bit (MSB) plane to the least-significant-bit (LSB) plane, using three coding passes (except for the MSB plane, which is coded using only one "clean up" coding pass). For M bit planes, this subprocess involves a total number of (3M - 2) coding passes. An embedded bit stream is then generated for each coding block. Information on the reduction in distortion and the increase in the bit rate associated with each coding pass is collected. This information is then used in a rate-control procedure to determine the contribution of each coding block to the output compressed bit stream.

  14. 5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    5. SOUTH ELEVATION OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME

  15. 6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    6. SOUTHWEST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME

  16. 7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    7. SOUTHEAST CORNER OF BUILDING 8965 (SECURITY POLICE ENTRY CONTROL BUILDING). - Loring Air Force Base, Alert Area, Southeastern portion of base, east of southern end of runway, Limestone, Aroostook County, ME

  17. Food security is related to adult type 2 diabetes control over time in a United States safety net primary care clinic population.

    PubMed

    Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E

    2017-05-15

    Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high health-care utilization and cost.

  18. Recommended Practice for Securing Control System Modems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    James R. Davidson; Jason L. Wright

    2008-01-01

    This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.

  19. Model-Driven Configuration of SELinux Policies

    NASA Astrophysics Data System (ADS)

    Agreiter, Berthold; Breu, Ruth

    The need for access control in computer systems is inherent. However, the complexity to configure such systems is constantly increasing which affects the overall security of a system negatively. We think that it is important to define security requirements on a non-technical level while taking the application domain into respect in order to have a clear and separated view on security configuration (i.e. unblurred by technical details). On the other hand, security functionality has to be tightly integrated with the system and its development process in order to provide comprehensive means of enforcement. In this paper, we propose a systematic approach based on model-driven security configuration to leverage existing operating system security mechanisms (SELinux) for realising access control. We use UML models and develop a UML profile to satisfy these needs. Our goal is to exploit a comprehensive protection mechanism while rendering its security policy manageable by a domain specialist.

  20. Submillimetre wave imaging and security: imaging performance and prediction

    NASA Astrophysics Data System (ADS)

    Appleby, R.; Ferguson, S.

    2016-10-01

    Within the European Commission Seventh Framework Programme (FP7), CONSORTIS (Concealed Object Stand-Off Real-Time Imaging for Security) has designed and is fabricating a stand-off system operating at sub-millimetre wave frequencies for the detection of objects concealed on people. This system scans people as they walk by the sensor. This paper presents the top level system design which brings together both passive and active sensors to provide good performance. The passive system operates in two bands between 100 and 600GHz and is based on a cryogen free cooled focal plane array sensor whilst the active system is a solid-state 340GHz radar. A modified version of OpenFX was used for modelling the passive system. This model was recently modified to include realistic location-specific skin temperature and to accept animated characters wearing up to three layers of clothing that move dynamically, such as those typically found in cinematography. Targets under clothing have been modelled and the performance simulated. The strengths and weaknesses of this modelling approach are discussed.

Top