Science.gov

Sample records for detect relay attacks

  1. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Spear Phishing Attack Detection

    DTIC Science & Technology

    2011-03-24

    types: Windows Portable Executable and Common Object File Format (PE/ COFF ), Adobe Reader, and Microsoft Excel, Word, and PowerPoint. SPEAD’s malware...in PE/ COFF malware detection with an overall accuracy of 99.68% and an accuracy of 98.2% where new malware is involved. Additionally, SPEAD is...viii 4.2.2 Comparing File Detection Metrics ................................................ 73 4.2.2.1 PE/ COFF Malware Detection Results

  4. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  5. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  6. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  7. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  8. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  9. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  10. Detection of DoS attacks using intrusion detection sensors

    NASA Astrophysics Data System (ADS)

    Ramakrishna, Pathmenanthan; Maarof, Mohd A.

    2002-09-01

    Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where they run (sometimes even requiring a dedicated system) and are subject to tampering or disabling by an intruder. Additionally, intrusion detection systems have usually obtained information about host behavior through indirect means, such as audit trails or network packet traces. This potentially allows intruders to modify the information before the intrusion detection system obtains it and slows down the detection and prevention of DoS attacks, making it possible for an intruder to hide his activities. In this paper we propose work that will attempt to show that it is possible to perform intrusion detection mechanism of DoS attacks using small sensors embedded in a computer system. These sensors will look for signs of specific intrusions. They will perform target monitoring by observing the behavior of the through an audit trail or other indirect means in real time while the Snort IDS running. Furthermore, by being built into the computer system it could provide a flexible alert sensor which may not impose a considerable extra load on the host they monitor.

  11. Transmission line relay mis-operation detection based on time-synchronized field data

    DOE PAGES

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such,more » it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.« less

  12. Transmission line relay mis-operation detection based on time-synchronized field data

    SciTech Connect

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such, it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.

  13. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  14. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  15. Detection of low salience whisker stimuli requires synergy of tectal and thalamic sensory relays

    PubMed Central

    Cohen, Jeremy D.; Castro-Alamancos, Manuel A.

    2010-01-01

    Detection of a sensory stimulus depends on its psychophysical saliency; the higher the saliency, the easier the detection. But it is not known if sensory relay nuclei differ in their ability to detect low salient whisker stimuli. We found that reversible lesions of either the somatosensory thalamus or superior colliculus blocked detection of a low salience whisker conditioned stimulus (WCS) in an active avoidance task, without affecting detection of a high salience WCS. Thus, thalamic and tectal sensory relays work synergistically to detect low salient stimuli during avoidance behavior, but are redundant during detection of highly salient stimuli. We also recorded electrophysiological responses evoked by high and low salience stimuli in the superior colliculus and barrel cortex of freely behaving animals during active exploration, awake immobility and sensory detection in the active avoidance task. Field potential (FP) responses evoked in barrel cortex and superior colliculus by high intensity stimuli are larger and adapt more to frequency than those evoked by low intensity stimuli. FP responses are also more suppressed and adapt less during active exploration, and become further suppressed in barrel cortex during successful detection of either high or low salient stimuli in the active avoidance task. In addition, unit recordings revealed that firing rate increases in superior colliculus during active exploration, and especially during successful detection of either high or low salient stimuli in the active avoidance task. We conclude that detection of low salient stimuli is achieved by a sparse neural code distributed through multiple sensory relays. PMID:20147551

  16. Patrol Detection for Replica Attacks on Wireless Sensor Networks

    PubMed Central

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  17. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  18. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  19. Performance Evaluation and Optimal Detection of Relay-Assisted Diffusion-Based Molecular Communication with Drift.

    PubMed

    Tavakkoli, Nooshin; Azmi, Paeiz; Mokari, Nader

    2016-11-16

    In this paper, we consider a decode-and-forward (DF) relay-assisted diffusion-based molecular communication system inside one of the blood vessels of a human body with positive drift from transmitter to receiver. We use the normal approximation to the distribution of the number of received molecules and derive a closed-form expression for the end-toend bit error probability of the system. We then propose an optimization problem that aims at minimizing the bit error probability of the system and solve it at the receiver nanomachine by an algorithm based on the bisection method to determine the optimal detection threshold. Furthermore, we study the impact of the system parameters, such as drift velocity, position of the relay node and number of allocated molecules on the performance of the system. The numerical results show that with a constant molecular budget, DF relying strategy can considerably improve the system performance.

  20. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  1. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    DTIC Science & Technology

    2011-04-01

    we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and robust jamming detection for...analytical and experimental results, we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and...Based on our theoretical and ex- perimental results, we design and implement the JADE system (Jamming Attack Detection based on Estimation) to achieve

  2. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  3. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  4. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  5. Target-specific NMR detection of protein-ligand interactions with antibody-relayed (15)N-group selective STD.

    PubMed

    Hetényi, Anasztázia; Hegedűs, Zsófia; Fajka-Boja, Roberta; Monostori, Éva; Kövér, Katalin E; Martinek, Tamás A

    2016-12-01

    Fragment-based drug design has been successfully applied to challenging targets where the detection of the weak protein-ligand interactions is a key element. (1)H saturation transfer difference (STD) NMR spectroscopy is a powerful technique for this work but it requires pure homogeneous proteins as targets. Monoclonal antibody (mAb)-relayed (15)N-GS STD spectroscopy has been developed to resolve the problem of protein mixtures and impure proteins. A (15)N-labelled target-specific mAb is selectively irradiated and the saturation is relayed through the target to the ligand. Tests on the anti-Gal-1 mAb/Gal-1/lactose system showed that the approach is experimentally feasible in a reasonable time frame. This method allows detection and identification of binding molecules directly from a protein mixture in a multicomponent system.

  6. MULTOPS: A Data-Structure for Bandwidth Attack Detection

    DTIC Science & Technology

    2007-11-02

    Computer Systems, 18(3):263–297, August 2000. [Net00] Netscape . Leading Web sites under attack, February 2000. Available at http: //technews.netscape.com...to crash. This can have serious consequences for Web companies which rely on their online availability to do business. This paper intro- duces a data...packets. Another attack works by generating a huge amount of normal traffic by, for example, running a JavaScript pro- gram in a browser that pops up

  7. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  8. IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Du, Ping; Abe, Shunji

    Denial of service (DoS) attacks have become one of the most serious threats to the Internet. Enabling detection of attacks in network traffic is an important and challenging task. However, most existing volume-based schemes can not detect short-term attacks that have a minor effect on traffic volume. On the other hand, feature-based schemes are not suitable for real-time detection because of their complicated calculations. In this paper, we develop an IP packet size entropy (IPSE)-based DoS/DDoS detection scheme in which the entropy is markedly changed when traffic is affected by an attack. Through our analysis, we find that the IPSE-based scheme is capable of detecting not only long-term attacks but also short-term attacks that are beyond the volume-based schemes' ability to detect. Moreover, we test our proposal using two typical Internet traffic data sets from DARPA and SINET, and the test results show that the IPSE-based detection scheme can provide detection of DoS/DDoS attacks not only in a local area network (DARPA) and but also in academic backbone network (SINET).

  9. Direct transmission detection of tunable mechanical resonance in an individual carbon nanofiber relay.

    PubMed

    Eriksson, Anders; Lee, SangWook; Sourab, Abdelrahim A; Isacsson, Andreas; Kaunisto, Risto; Kinaret, Jari M; Campbell, Eleanor E B

    2008-04-01

    A direct on-chip transmission measurement of the resonance frequency of an individual singly clamped carbon nanofiber relay is reported. The experimental results are in good agreement with a small signal model and show the expected tuning of the resonance frequency with changing bias voltage.

  10. Method and apparatus for detecting cyber attacks on an alternating current power grid

    DOEpatents

    McEachern, Alexander; Hofmann, Ronald

    2017-04-11

    A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.

  11. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  12. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  13. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed.

  14. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  15. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  16. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  17. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  18. Analysis of Intrusion Detection and Attack Proliferation in Computer Networks

    NASA Astrophysics Data System (ADS)

    Rangan, Prahalad; Knuth, Kevin H.

    2007-11-01

    One of the popular models to describe computer worm propagation is the Susceptible-Infected (SI) model [1]. This model of worm propagation has been implemented on the simulation toolkit Network Simulator v2 (ns-2) [2]. The ns-2 toolkit has the capability to simulate networks of different topologies. The topology studied in this work, however, is that of a simple star-topology. This work introduces our initial efforts to learn the relevant quantities describing an infection given synthetic data obtained from running the ns-2 worm model. We aim to use Bayesian methods to gain a predictive understanding of how computer infections spread in real world network topologies. This understanding would greatly reinforce dissemination of targeted immunization strategies, which may prevent real-world epidemics. The data consist of reports of infection from a subset of nodes in a large network during an attack. The infection equation obtained from [1] enables us to derive a likelihood function for the infection reports. This prior information can be used in the Bayesian framework to obtain the posterior probabilities for network properties of interest, such as the rate at which nodes contact one another (also referred to as contact rate or scan rate). Our preliminary analyses indicate an effective spread rate of only 1/5th the actual scan rate used for a star-type of topology. This implies that as the population becomes saturated with infected nodes the actual spread rate will become much less than the scan rate used in the simulation.

  19. Information Assurance: Detection & Response to Web Spam Attacks

    DTIC Science & Technology

    2010-08-28

    As online social media applications such as blogs, social bookmarking (folksonomies), and wikis continue to gain its popularity, concerns about the...sites. The goal of this research is to investigate novel techniques to detect Web spam in social media web sites. Specifically, we have developed a...co-classification framework that simultaneously detects web spam and the spammers who are responsible for posting them on social media web sites. Using

  20. Methods, media, and systems for detecting attack on a digital processing device

    SciTech Connect

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  1. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.; Androulaki, Elli

    2017-02-21

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  2. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  3. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    PubMed Central

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A.

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  4. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  5. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    Control System IDS Intrusion Detection System IP Internet Protocol IT Information Technology JTAG Joint Test Action Group LAN Local Area Network PLC...firewalls or Intrusion Detection System (IDS), implementing cryptography, and improving protocol security. There are few vendors, however, that include...Mode Setting Register Values. Mode r0 Value r3 Value PRGM 0x11 0x1 RUN 0x11 0x2 REM PRGM 0x12 0x1 REM RUN 0x12 0x2 cpmode 1 contains two

  6. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dongil; Soh, Wooyoung; Kim, Seoksoo

    Botnet-based cyber attacks cause large-scale damage with increasingly intelligent tools, which has called for varied research on bot detection. In this study, we developed a method of monitoring behaviors of host-based processes from the point that a bot header attempts to make zombie PCs, detecting cyber attack precursor symptoms. We designed an algorithm that figures out characteristics of botnet which attempts to launch malicious behaviors by means of signature registration, which is for process/reputation/network traffic/packet/source analysis and a white list, as a measure to respond to bots from the end point.

  7. Autonomous mobile communication relays

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Everett, Hobart R.; Manouk, Narek; Verma, Ambrish

    2002-07-01

    Maintaining a solid radio communication link between a mobile robot entering a building and an external base station is a well-recognized problem. Modern digital radios, while affording high bandwidth and Internet-protocol-based automatic routing capabilities, tend to operate on line-of-sight links. The communication link degrades quickly as a robot penetrates deeper into the interior of a building. This project investigates the use of mobile autonomous communication relay nodes to extend the effective range of a mobile robot exploring a complex interior environment. Each relay node is a small mobile slave robot equipped with sonar, ladar, and 802.11b radio repeater. For demonstration purposes, four Pioneer 2-DX robots are used as autonomous mobile relays, with SSC-San Diego's ROBART III acting as the lead robot. The relay robots follow the lead robot into a building and are automatically deployed at various locations to maintain a networked communication link back to the remote operator. With their on-board external sensors, they also act as rearguards to secure areas already explored by the lead robot. As the lead robot advances and RF shortcuts are detected, relay nodes that become unnecessary will be reclaimed and reused, all transparent to the operator. This project takes advantage of recent research results from several DARPA-funded tasks at various institutions in the areas of robotic simulation, ad hoc wireless networking, route planning, and navigation. This paper describes the progress of the first six months of the project.

  8. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  9. Detection of Denial of QoS Attacks on Diffserv Networks

    DTIC Science & Technology

    2002-01-01

    validated by the simulations, the method is a strong candidate for QoS-intrusion detection for a low -cost commercial deployment. Report Documentation...work describes a real-time, scalable denial of QoS attack detection system with a low false alarm generation rate that can be deployed to protect...way or two-way delays, and jitter. For example, an EF service class SLA typically specifies low latency/delay and low jitter. An EF flow sensor then

  10. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  11. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    SciTech Connect

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O'Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  12. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    PubMed

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  13. Did NATO attacks in Yugoslavia cause a detectable environmental effect in Hungary?

    PubMed

    Kerekes, A; Capote-Cuellar, A; Köteles, G J

    2001-02-01

    Because of the intensive NATO bombardment of the neighboring region to Hungary, i.e., Vojvodina, North Yugoslavia, air monitoring for detection of depleted uranium particles supposed to be used as a component of bullets was extended to the Southern region of the country. Alpha spectrometry was applied as a sensitive analytical technique able to detect uranium. Though no depleted uranium was detected in air by the sensitive technique of alpha-spectrometry, the increased uranium content in natural ratio as a component of normal soil, natural gas, etc., is suggested to originate from well dispersed dust (2.5 microm size) emitted to the atmosphere by explosions during bombing. This observation is supported by the geographical distribution and the relatively rapid decrease of pollution after the bomb attacks ceased.

  14. Wind generated by an attacking bat: anemometric measurements and detection by the praying mantis cercal system.

    PubMed

    Triblehorn, Jeffrey D; Yager, David D

    2006-04-01

    The wind-sensitive cercal system, well-known for mediating terrestrial escape responses, may also mediate insect aerial bat-avoidance responses triggered by wind generated by the approaching bat. One crucial question is whether enough time exists between detection and capture for the insect to perform a successful evasive maneuver. A previous study estimated this time to be 16 ms, based on cockroach behavioral latencies and a prediction for the detection time derived from a simulated predator moving toward a simulated prey. However, the detection time may be underestimated since both the simulated predator and prey lacked certain characteristics present in the natural situation. In the present study, actual detection times are measured by recording from wind-sensitive interneurons of a tethered praying mantis that serves as the target for a flying, attacking bat. Furthermore, using hot-wire anemometry, we describe and quantify the wind generated by an attacking bat. Anemometer measurements revealed that the velocity of the bat-generated wind consistently peaks early with a high acceleration component (an important parameter for triggering wind-mediated terrestrial responses). The physiological recordings determined that the mantis cercal system detected an approaching bat 74 ms before contact, which would provide the insect with 36 ms to perform a maneuver before capture. This should be sufficient time for the mantis to respond. Although it probably would not have time for a full response that completely evades the bat, even a partial response might alter the mantid's trajectory enough to cause the bat to mishandle the insect, allowing it to escape.

  15. Ultrasensitive cardiac troponin I antibody based nanohybrid sensor for rapid detection of human heart attack.

    PubMed

    Bhatnagar, Deepika; Kaur, Inderpreet; Kumar, Ashok

    2017-02-01

    An ultrasensitive cardiac troponin I antibody conjugated with graphene quantum dots (GQD) and polyamidoamine (PAMAM) nanohybrid modified gold electrode based sensor was developed for the rapid detection of heart attack (myocardial infarction) in human. Screen printed gold (Au) electrode was decorated with 4-aminothiophenol for amine functionalization of the Au surface. These amino groups were further coupled with carboxyl functionalities of GQD with EDC-NHS reaction. In order to enhance the sensitivity of the sensor, PAMAM dendrimer was successively embedded on GQD through carbodiimide coupling to provide ultra-high surface area for antibody immobilization. The activated cardiac troponin I (cTnI) monoclonal antibody was immobilized on PAMAM to form nanoprobe for sensing specific heart attack marker cTnI. Various concentrations of cardiac marker, cTnI were electrochemically measured using cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in human blood serum. The modifications on sensor surface were characterized by FTIR and AFM techniques. The sensor is highly specific to cTnI and showed negligible response to non-specific antigens. The sensitivity of the sensor was 109.23μAcm(-2)μg(-1) and lower limit of detection of cTnI was found 20fgmL(-1).

  16. Seismic ruggedness of relays

    SciTech Connect

    Merz, K.L. )

    1991-08-01

    This report complements EPRI report NP-5223 Revision 1, February 1991, and presents additional information and analyses concerning generic seismic ruggedness of power plant relays. Existing and new test data have been used to construct Generic Equipment Ruggedness Spectra (GERS) which can be used in identifying rugged relays during seismic re-evaluation of nuclear power plants. This document is an EPRI tier 1 report. The results of relay fragility tests for both old and new relays are included in an EPRI tier 2 report with the same title. In addition to the presentation of relay GERS, the tier 2 report addresses the applicability of GERS to relays of older vintage, discusses the important identifying nomenclature for each relay type, and examines relay adjustment effects on seismic ruggedness. 9 refs., 3 figs, 1 tab.

  17. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    1999-06-01

    Mailbomb R-a-Deny(Administrative) .................................................................44 6.5 SYN Flood ( Neptune ) R-a-Deny(Temporary...a system which is actually a trojan horse containing malicious code that gives the attacker system access. Implementation Bug: Bugs in trusted...including many forms of malicious code such as trojan horses, viruses, attacks that take advantage of race conditions, and attacks that take advantage

  18. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  19. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  20. A configurable-hardware document-similarity classifier to detect web attacks.

    SciTech Connect

    Ulmer, Craig D.; Gokhale, Maya

    2010-04-01

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to reconfigurable hardware. The TFIDF classifier is used to detect web attacks in HTTP data. In our reconfigurable hardware approach, we design a streaming, real-time classifier by simplifying an existing sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. We have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires two orders of magnitude less memory than the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  1. Early attack reaction sensor (EARS), a man-wearable gunshot detection system

    NASA Astrophysics Data System (ADS)

    Chang, Jay; Mendyk, William; Thier, Lisa; Yun, Paul; LaRow, Andy; Shaw, Scott; Schoenborn, William

    2006-05-01

    The Early Attack Reaction Sensor (EARS) is a modified passive acoustic system that detects gunshots (muzzle blast and/or shockwave) to provide the user with relative azimuth and range of sniper fire via both audio alert and visual display. The EARS system consists of a microphone array in a small planar configuration and an equivalently sized Digital Signal Processing board, which is interfaced to a PDA via a PCMCIA slot. Hence, configuration easily provides portability. However, the system is being repackaged for man-wearable and vehicle mount applications. The EARS system in a PDA configuration has been tested in open fields at up to 500 meters range and has provided useable bearing and range information against the sniper rounds. This paper will discuss EARS system description, various test results, and EARS system capabilities and limitations.

  2. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1).

  3. Orthopoxvirus detection in environmental specimens during suspected bioterror attacks: inhibitory influences of common household products.

    PubMed

    Kurth, Andreas; Achenbach, John; Miller, Liljia; Mackay, Ian M; Pauli, Georg; Nitsche, Andreas

    2008-01-01

    After terrorists attacked the United States in 2001, the appearance of letters and other objects containing powdery substances with unknown potentials for biological threat focused attention on the speed, sensitivity, and reliability of diagnostic methods. This study summarizes the abilities and limitations of real-time PCR, electron microscopy (EM), and virus isolation when used to detect potential bioweapons. In particular, we investigated the inhibitory influences of different common household products present in environmental specimens on PCR yield, EM detection, and virus isolation. We used vaccinia virus as a model for orthopoxviruses by spiking it into specimens. In the second part of the study, we describe modifications of diagnostic methods to overcome inhibitory effects. A variety of PCR amplification enhancers, DNA extraction protocols, and applications of internal controls were evaluated to improve diagnostic simplicity, speed, and reliability. As a result, we strongly recommend using at least two different frontline techniques in parallel, e.g., EM and PCR. A positive result obtained by any one of these techniques should be followed by a biological method to confirm the putative diagnosis. Confirmatory methods include virus isolation followed by an agent-specific immunofluorescence assay to confirm the presence of replication-competent particles.

  4. Efficient live face detection to counter spoof attack in face recognition systems

    NASA Astrophysics Data System (ADS)

    Biswas, Bikram Kumar; Alam, Mohammad S.

    2015-03-01

    Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.

  5. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  6. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    PubMed

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.

  7. Optimised secure transmission through untrusted AF relays using link adaptation

    NASA Astrophysics Data System (ADS)

    Taki, Mehrdad; Sadeghi, Mohammad

    2016-05-01

    A new transmission scheme is presented for a two-hop relay network including two AF relays, considering physical layer security where relays are not able to detect signal with an acceptable bit error rate (BER) but the combined received signal is detected with an acceptable BER at the final receiver. It is assumed that there is no direct path between the transmitter and the receiver (relay network without diversity). Adaptive modulation and coding is utilised at the transmitter and transmission powers of the transmitter and of the relays are continuously adapted provisioning individual average power constraint for each node. Numerical evaluations show that an acceptable performance degradation is seen by the proposed secure relaying scheme compared to the optimum relay selection scheme without security constraint.

  8. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  9. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  10. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  11. That Article: Frame Relay.

    ERIC Educational Resources Information Center

    Schuyler, Michael

    1994-01-01

    Compares Frame Relay with digital and analog alternatives for connecting sites on a Wide Area Network. Cost considerations, the concepts on which the technology is based, its carrying capacity, the use of CD-ROM and Graphical User Interface (GUI) on Frame Relay, and engineering bandwidth limitations are covered. (KRN)

  12. MAVEN Relay Operations Concept

    NASA Technical Reports Server (NTRS)

    Chamberlain, Neil; Gladden, Roy; Bruvold, Kris

    2012-01-01

    The Mars Atmosphere and Volatile EvolutioN (MAVEN) mission will launch in late 2013 and following a 10 month cruise to Mars, will study the upper atmosphere of the planet. In addition to the science instruments, the MAVEN spacecraft is equipped with an Electra UHF transceiver to support relay communication with landed assets. This paper describes how UHF relay service is provisioned by MAVEN. The discussion includes a description of the Electra payload, the process by which relay activities are coordinated and accounted for, the process of a typical relay session, including uplink and downlink, as well as special commands to calibrate and verify relay performance. The operational processes for providing these services are inherited largely from prior Mars missions and take advantage of existing infrastructure and lessons learned from those missions. Preliminary data volume return capabilities using adaptive data rates and low-density parity check channel coding are presented.

  13. Relay Sequence Generation Software

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Khanampompan, Teerapat

    2009-01-01

    Due to thermal and electromagnetic interactivity between the UHF (ultrahigh frequency) radio onboard the Mars Reconnaissance Orbiter (MRO), which performs relay sessions with the Martian landers, and the remainder of the MRO payloads, it is required to integrate and de-conflict relay sessions with the MRO science plan. The MRO relay SASF/PTF (spacecraft activity sequence file/ payload target file) generation software facilitates this process by generating a PTF that is needed to integrate the periods of time during which MRO supports relay activities with the rest of the MRO science plans. The software also generates the needed command products that initiate the relay sessions, some features of which are provided by the lander team, some are managed by MRO internally, and some being derived.

  14. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  15. Effect of Wireless Channels on Detection and Classification of Asthma Attacks in Wireless Remote Health Monitoring Systems

    PubMed Central

    Al-Momani, Orobah; Gharaibeh, Khaled M.

    2014-01-01

    This paper aims to study the performance of support vector machine (SVM) classification in detecting asthma attacks in a wireless remote monitoring scenario. The effect of wireless channels on decision making of the SVM classifier is studied in order to determine the channel conditions under which transmission is not recommended from a clinical point of view. The simulation results show that the performance of the SVM classification algorithm in detecting asthma attacks is highly influenced by the mobility of the user where Doppler effects are manifested. The results also show that SVM classifiers outperform other methods used for classification of cough signals such as the hidden markov model (HMM) based classifier specially when wireless channel impairments are considered. PMID:24678318

  16. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks

    PubMed Central

    2016-01-01

    Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness). Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes it suitable for

  17. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  18. Multifunction protective relay

    NASA Astrophysics Data System (ADS)

    Harlow, J.; Yalla, M.; Kantor, J.

    1991-11-01

    Since the enactment of the National Energy Act of 1979, many private energy producers have been planning and building small generation and cogeneration facilities in order to sell power to the local utility. Many of the non-utility generators built after 1979 are connected directly to the closest utility distribution circuit. Aware of the problems associated with connecting generators in this manner, electric utilities across the country developed specifications and standards to allow safe and reliable interconnection. The report describes a malfunction protective relay which uses state-of-the-art digital signal processing procedures to accomplish the objective of providing most of the relay requirements of utility electrical interconnections. The relay has been demonstrated to be suitable for this critical application through extensive laboratory and in-service field testing. The relay, incorporating thirteen distinct protection functions affords the user the savings of the initial capital cost plus simplicity of installation and use.

  19. Fully relayed regenerative amplifier

    DOEpatents

    Glass, Alexander J.

    1981-01-01

    A regenerative laser apparatus and method using the optical relay concept to maintain high fill factors, to suppress diffraction effects, and to minimize phase distortions in a regenerative amplifier.

  20. A TRANSISTORIZED RELAY SERVO.

    DTIC Science & Technology

    DC motor is achieved with standard power transistors and a simple transistorized preamplifier, A permanent magnet, DC motor is used as the test vehicle to illustrate the feasibility of control without an amplidyne or mechanical relay. The ’bang-bang’, capability of the controller to operate as a near-ideal ’relay’ is emphasized. The inherent flexibility allowed in selecting the switching characteristics is also demonstrated. The discussion points toward practical application and stresses the analysis of the switching

  1. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  2. Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

    NASA Astrophysics Data System (ADS)

    Ali Mayouf, Mabroka; Shukur, Zarina

    Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

  3. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  4. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 234.263 Section 234.263 Transportation... Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that.... (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with...

  5. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 234.263 Section 234.263 Transportation... Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that.... (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with...

  6. Latching relay switch assembly

    SciTech Connect

    Duimstra, Frederick A.

    1991-01-01

    A latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes at least one permanent magnet and at least one electromagnet. The respective sections are, generally, arranged in separate locations or cavities in the assembly. The switch is latched by a permanent magnet assembly and selectively switched by an overriding electromagnetic assembly.

  7. A Practical Method for Assessing the Effectiveness of Vector Surge Relays for Distributed Generation Applications

    SciTech Connect

    Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun

    2005-01-01

    This paper presents simple and reliable method for predicting the islanding detection performance of vector surge relays. The relay performance is characterized by a tripping-time versus power-imbalance curve. With the curve, one can determine the time taken by a vector surge relay to detect islanding for any generation-load mismatch level. The main contribution of this paper is the development of analytical formulas for directly determining the behavior of vector surge relays. As a result, efforts needed to asses the relay performance for a given distributed generation scheme can be simplified significantly. The accuracy of the formulas has been verified by extensive simulation study results.

  8. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Taeghyoon; Choi, Seokjin; Lee, Cheolwon

    Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

  9. Detection of the sarin hydrolysis product in formalin-fixed brain tissues of victims of the Tokyo subway terrorist attack.

    PubMed

    Matsuda, Y; Nagao, M; Takatori, T; Niijima, H; Nakajima, M; Iwase, H; Kobayashi, M; Iwadate, K

    1998-06-01

    One of the hydrolysis products of sarin (isopropyl methylphosphonofluoridate) was detected in formalin-fixed brain tissues of victims poisoned in the Tokyo subway terrorist attack. Part of this procedure, used for the detection of sarin hydrolysis products in erythrocytes of sarin victims, has been described previously. The test materials were four individual cerebellums, which had been stored in formalin fixative for about 2 years. Sarin-bound acetylcholinesterase (AChE) was solubilized from these cerebellums, purified by immunoaffinity chromatography, and digested with trypsin. Then the sarin hydrolysis products bound to AChE were released by alkaline phosphatase digestion, subjected to trimethylsilyl derivatization (TMS), and detected by gas chromatography-mass spectrometry. Peaks at m/z 225 and m/z 240, which are indicative of TMS-methylphosphonic acid, were observed within the retention time range of authentic methylphosphonic acid. However, no isopropyl methylphosphonic acid was detected in the formalin-fixed cerebellums of these 4 sarin victims, probably because the isopropoxy group of isopropyl methylphosphonic acid underwent chemical hydrolysis during storage. This procedure will be useful for the forensic diagnosis of poisoning by protein-bound, highly toxic agents, such as sarin, which are easily hydrolysed. This appears to be the first time that intoxication by a nerve agent has been demonstrated by analyzing formalin-fixed brains obtained at autopsy.

  10. Relaying an optical wavefront

    DOEpatents

    Sweatt, William C.; Vawter, G. Allen

    2007-03-06

    A wavefront rely devices samples an incoming optical wavefront at different locations, optically relays the samples while maintaining the relative position of the samples and the relative phase between the samples. The wavefront is reconstructed due to interference of the samples. Devices can be designed for many different wavelengths, including for example the ultraviolet, visible, infrared and even longer wavelengths such as millimeter waves. In one application, the device function as a telescope but with negligible length.

  11. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  12. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  13. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  14. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  15. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  16. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  17. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  18. New sensitivity analysis attack

    NASA Astrophysics Data System (ADS)

    El Choubassi, Maha; Moulin, Pierre

    2005-03-01

    The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

  19. Distributed Quantum Packet Transmission in Non-maximally Entangled Relay System

    NASA Astrophysics Data System (ADS)

    Shi, Jinjing; Shi, Ronghua; Peng, Xiaoqi; Li, Yin; Guo, Ying

    2015-04-01

    A novel distributed quantum packet transmission scheme is proposed with teleportation in the non-maximally entangled relay channel. Quantum signals are encoded as quantum signal packets and transmitted from the source to the destination with assistance of the relay. The TDM (Time Division Multiplexing) technique is applied in order to improve the efficiency of quantum communications. The security depends on the security of signal particles and an upper bound of attackers' intercepting quantum information under their strongest collective attacks is derived. The communication efficiency can be improved to four times of the traditional schemes, and the timesaving percentage may approach to 75 %. It has a wide application in quantum networks as well.

  20. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  1. An overview of relay channels - Information theory of satellite data relay link

    NASA Astrophysics Data System (ADS)

    Iida, Takashi

    1987-03-01

    This paper gives an overview of the theory of the relay channel, the communication channel having a relay encoder between transmitter and receiver. The relay channel corresponds to a satellite data relay link. The basic problem of this theory is to find the channel capacity. The theory of the relay channel was introduced by Van der Meulen (1971) and was expanded by Cover and El Gamal (1979). This paper reviews the meaning of relay in communication, and discusses the general, degraded, Gaussian degraded, and feedback relay channels. Furthermore, the satellite data relay link is discussed in comparison with the relay channel theory.

  2. Radio Relays Improve Wireless Products

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  3. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  4. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  5. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  6. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  7. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  8. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  9. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  10. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  11. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  12. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  13. Laser Relay: Improving Space Communications

    NASA Video Gallery

    The Laser Communications Relay Demonstration mission proposes to revolutionize the way we send and receive data, video and other information, using lasers to encode and transmit data at rates 10 to...

  14. Differential network coding for two-way relay networks with massive arrays

    NASA Astrophysics Data System (ADS)

    Fang, Zhaoxi; Shao, Pengfei; Zheng, Wen; Pang, Zeping

    2016-10-01

    In this paper, we propose a low-complexity differential transmission scheme for a two-way relay network (TWRN) with two sources and one relay node, where each source is equipped with a single antenna, while the relay node is equipped with a large number of antennas. In the proposed scheme, no channel state information (CSI) is required at each source node for signal detection. It is shown that as the number of relay antennas becomes large, the received signal at each source node includes the desired signal only. Numerical results are presented to demonstrate the bit-to-error rate (BER) performance of the proposed scheme.

  15. Formulas for predicting the dynamic performance of ROCOF relays for embedded generation applications

    SciTech Connect

    Vieira, J.C. M.; Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun; Morelato, A.

    2006-07-13

    A set of formulas directly predict the performance of rate-of-change-of-frequency (ROCOF) relays used to detect islanding of embedded synchronous generators. The formulas are analytically derived from the dynamic model of the generator and relay. Dynamic simulation results obtained using a representative distribution system confirm the validity and accuracy. The formulas presented are a useful tool for protection engineers; they can be used, for example, to assess the effectiveness of anti-islanding schemes based on ROCOF relays, or to assist the selection of relay settings, significantly reducing the number of repeated dynamic simulations necessary to carry out such studies.

  16. The power relay satellite

    SciTech Connect

    Glaser, P.E.

    1994-12-31

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  17. The power relay satellite

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  18. PHOTOSENSITIVE RELAY CONTROL CIRCUIT

    DOEpatents

    Martin, C.F.

    1958-01-14

    adapted for the measurement of the time required for an oscillating member to pass through a preselected number of oscillations, after being damped to a certain maximum amplitude of oscillation. A mirror is attached to the moving member and directs light successively to a photocell which is part of a trigger unit and to first and second photocells which are part of a starter unit, as the member swings to its maximum amplitude. The starter and trigger units comprise thyratrons and relays so interconnected that the trigger circuit, although generating a counter pulse, does not register a count in the counter when the light traverses both photocells of the starter unit. When the amplitude of oscillation of the member decreases to where the second photocell is not transversed, the triggei pulse is received by the counter. The counter taen operates to register the desired number of oscillations and initiates and terminates a timer for measuring the time irterval for the preselected number of oscillations.

  19. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  20. 75 FR 51735 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ...; FCC 10-88] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... ways to amend its rules to detect and prevent fraud and misuse in the provision of Video Relay Service... changes in order to deter the billing of illegitimate minutes to the Interstate Telecommunications...

  1. EAGLE: relay mirror technology development

    NASA Astrophysics Data System (ADS)

    Hartman, Mary; Restaino, Sergio R.; Baker, Jeffrey T.; Payne, Don M.; Bukley, Jerry W.

    2002-06-01

    EAGLE (Evolutionary Air & Space Global Laser Engagement) is the proposed high power weapon system with a high power laser source, a relay mirror constellation, and the necessary ground and communications links. The relay mirror itself will be a satellite composed of two optically-coupled telescopes/mirrors used to redirect laser energy from ground, air, or space based laser sources to distant points on the earth or space. The receiver telescope captures the incoming energy, relays it through an optical system that cleans up the beam, then a separate transmitter telescope/mirror redirects the laser energy at the desired target. Not only is it a key component in extending the range of DoD's current laser weapon systems, it also enables ancillary missions. Furthermore, if the vacuum of space is utilized, then the atmospheric effects on the laser beam propagation will be greatly attenuated. Finally, several critical technologies are being developed to make the EAGLE/Relay Mirror concept a reality, and the Relay Mirror Technology Development Program was set up to address them. This paper will discuss each critical technology, the current state of the work, and the future implications of this program.

  2. Sealed reed relay limit switches

    NASA Astrophysics Data System (ADS)

    Ivanov, I. P.; Svintsov, G. P.; Yefimova, M. A.; Lebedev, A. V.; Samsonov, Y. P.

    1986-01-01

    Sealed reed relay limit switches are described which overcome the inherent deficiencies traditionally present in these devices: high material, labor consumption, and difficult operation. Series VSG limit switches developed at the All-Union Scientific Research and Technological Planning Institute for Relay Engineering (Cheboksary) for use in buildings are described. The VSG1 has a single switching contact, the VSG2 a single normally open contact, and the VSG3 a single normally closed contact. The VSG1 employs type MKS-27103 sealed reed relays, while the VSG2 and VSG3 employ KEM-1 reed relays. The magnet system, which consists of magnets and a plate, and the sealed reed relay are contained in a nonmagnetic casing with a slit in it. The mathematical expression defining the geometric dimensions of the magnet system is given. The basic parameteres of all three types of switches are tabulated. The VSG series switches can be used to replace VBK and BVK switches, thus saving electricity, labor, and materials, including silver.

  3. Satellite Relaying of Geophysical Data

    NASA Technical Reports Server (NTRS)

    Allenby, R. J.

    1977-01-01

    Data Collection Platforms (DCPs) for transmitting surface data to an orbiting satellite for relaying to a central data distribution center are being used in a number of geophysical applications. "Off-the-shelf" DCP's, transmitting through Landsat or GOES satellites, are fully capable of relaying data from low-data-rate instruments, such as tiltmeters or tide gauges. In cooperation with the Lamont-Doherty Geological Observatory, Goddard has successfully installed DCP systems on a tide gauge and tiltmeter array on Anegada, British Virgin Islands. Because of the high-data-rate requirements, a practical relay system capable of handling seismic information is not yet available. Such a system could become the basis of an operational hazard prediction system for reducing losses due to major natural catastrophies such as earthquakes, volcanic eruptions, landslides or tsunamis.

  4. Speech-to-Speech Relay Service

    MedlinePlus

    ... Speech-to-Speech (STS) is one form of Telecommunications Relay Service (TRS). TRS is a service that ... to STS, go to www. fcc. gov/ guides/ telecommunications- relay- service- trs. Filing a Complaint If you ...

  5. Performance limitations of relay neurons.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2012-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. For example, the visual thalamus contains relay neurons that receive driving inputs from the retina that encode a visual image, and modulating inputs from reticular activating system and layer 6 of visual cortex that control what aspects of the image will be relayed back to visual cortex for perception. What gets relayed depends on several factors such as attentional demands and a subject's goals. In this paper, we analyze a biophysical based model of a relay cell and use systems theoretic tools to construct analytic bounds on how well the cell transmits a driving input as a function of the neuron's electrophysiological properties, the modulating input, and the driving signal parameters. We assume that the modulating input belongs to a class of sinusoidal signals and that the driving input is an irregular train of pulses with inter-pulse intervals obeying an exponential distribution. Our analysis applies to any [Formula: see text] order model as long as the neuron does not spike without a driving input pulse and exhibits a refractory period. Our bounds on relay reliability contain performance obtained through simulation of a second and third order model, and suggest, for instance, that if the frequency of the modulating input increases or the DC offset decreases, then relay increases. Our analysis also shows, for the first time, how the biophysical properties of the neuron (e.g. ion channel dynamics) define the oscillatory patterns needed in the modulating input for appropriately timed relay of sensory information. In our discussion, we describe how our bounds predict experimentally observed neural activity in the basal ganglia in (i) health, (ii) in Parkinson's disease (PD), and (iii) in PD during therapeutic deep

  6. 78 FR 40581 - Structure and Practices of the Video Relay Service Program; Telecommunications Relay Services and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... Video Relay Service Program; Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities; Final Rule #0;#0;Federal Register / Vol. 78, No. 129... Structure and Practices of the Video Relay Service Program; Telecommunications Relay Services and...

  7. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  8. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  9. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  10. Relay Writing in an Adolescent Online Community

    ERIC Educational Resources Information Center

    Yi, Youngjoo

    2008-01-01

    "Welcome to Buckeye City" is an adolescent online community that was maintained by 25 Korean students who attended American schools. On the website, the students engaged in "relay writing"--a writing activity in which each person contributed a portion of an evolving story in a relayed manner. Relay writing offers teachers a new and valuable window…

  11. Signal Relay During Cell Migration

    NASA Astrophysics Data System (ADS)

    Guven, Can; Rericha, Erin; Ott, Edward; Losert, Wolfgang

    2012-02-01

    We developed a signal relay model to quantify the effect of intercellular communication in presence of an external signal, during the motion of groups of Dictyostelium discoideum cells. A key parameter is the ratio of amplitude of the cAMP (cyclic adenosine monophosphate) a signaling chemical secreted from individual cells versus the external cAMP field, which defines a time scale. Another time scale is set by the degradation rate of the cAMP. In our simulations, the competition between these two time scales results rich dynamics including uniform motion, as well as streaming and clustering instabilities. The simulations are compared to experiments for a wide range of different external signal strengths for both cells that secrete cAMP and a mutant which cannot relay cAMP. Under different strength of external linear cAMP gradient, the wild type cells form streams and exhibit clustering due to the intercellular signaling through individual cAMP secretion. In contrast, cells lacking signal relay move relatively straight. We find that the model captures both independent motion and the formation of aggregates when cells relay the signal.

  12. STBC AF relay for unmanned aircraft system

    NASA Astrophysics Data System (ADS)

    Adachi, Fumiyuki; Miyazaki, Hiroyuki; Endo, Chikara

    2015-01-01

    If a large scale disaster similar to the Great East Japan Earthquake 2011 happens, some areas may be isolated from the communications network. Recently, unmanned aircraft system (UAS) based wireless relay communication has been attracting much attention since it is able to quickly re-establish the connection between isolated areas and the network. However, the channel between ground station (GS) and unmanned aircraft (UA) is unreliable due to UA's swing motion and as consequence, the relay communication quality degrades. In this paper, we introduce space-time block coded (STBC) amplify-and-forward (AF) relay for UAS based wireless relay communication to improve relay communication quality. A group of UAs forms single frequency network (SFN) to perform STBC-AF cooperative relay. In STBC-AF relay, only conjugate operation, block exchange and amplifying are required at UAs. Therefore, STBC-AF relay improves the relay communication quality while alleviating the complexity problem at UAs. It is shown by computer simulation that STBC-AF relay can achieve better throughput performance than conventional AF relay.

  13. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  14. The magic of relay mirrors

    NASA Astrophysics Data System (ADS)

    Duff, Edward A.; Washburn, Donald C.

    2004-09-01

    Laser weapon systems would be significantly enhanced with the addition of high altitude or space-borne relay mirrors. Such mirrors, operating alone with a directed energy source, or many in a series fashion, can be shown to effectively move the laser source to the last, so-called fighting mirror. This "magically" reduces the range to target and offers to enhance the performance of directed energy systems like the Airborne Laser and even ground-based or ship-based lasers. Recent development of high altitude airships will be shown to provide stationary positions for such relay mirrors thereby enabling many new and important applications for laser weapons. The technical challenges to achieve this capability are discussed.

  15. Heart Attack Recovery FAQs

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Recovery FAQs Updated:Sep 19,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  16. On information flow in relay networks

    NASA Astrophysics Data System (ADS)

    El Gamal, A.

    Preliminary investigations conducted by El Gamal and Cover (1980) have shown that a max-flow min-cut interpretation for the capacity expressions of the classes of degraded and semideterministic relay channels can be found. In this paper it is shown that such an interpretation can also be found for fairly general classes of discrete memoryless relay networks. Cover and El Gamal (1979) have obtained general lower and upper bounds to capacity. However, the capacity of the general relay channel is not known. Past results are here extended to establish the capacity of deterministic relay networks with no interference and degraded relay networks. A general upper bound is given to the capacity of any relay network with this upper bound being a natural generalization of Theorem 4 in the study conducted by Cover and El Gamal (1979).

  17. Admittance relay helps wash out system instability

    SciTech Connect

    Sweezy, G.; Swift, G.; Zhang, Z.

    1996-01-01

    This article describes how delta-current admittance relays detect severe power system disturbances and initiate a power reduction signal on the dc transmission system to help stabilize the integrated ac/HVDC transmission system. It is always desirable to transmit as much power as possible over major transmission line interconnections, and the 500 kV line linking Manitoba in Canada to Minnesota in the US is a good example. A static var system (SVS) is part of this strategy. Note the southern end of an HVDC line through which the power is delivered from northern hydro-electric generation. The ability to quickly control dc-delivered power combined with the complication of SVS switching and the installation of series capacitors has led to special circumstances requiring an unusual approach to maintenance of system stability. The availability of a new protection-oriented computing platform has made the required algorithms feasible.

  18. The Laser Communications Relay and the Path to the Next Generation Near Earth Relay

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2015-01-01

    NASA Goddard Space Flight Center is currently developing the Laser Communications Relay Demonstration (LCRD) as a Path to the Next Generation Near Earth Space Communication Network. The current NASA Space Network or Tracking and Data Relay Satellite System is comprised of a constellation of Tracking and Data Relay Satellites (TDRS) in geosynchronous orbit and associated ground stations and operation centers. NASA is currently targeting a next generation of relay capability on orbit in the 2025 timeframe.

  19. Inhomogeneity induces relay synchronization in complex networks

    NASA Astrophysics Data System (ADS)

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  20. Inhomogeneity induces relay synchronization in complex networks.

    PubMed

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  1. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  2. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  3. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  4. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  5. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  6. Joint Source-Relay Design for Full-Duplex MIMO AF Relay Systems

    NASA Astrophysics Data System (ADS)

    Shi, Qingjiang; Hong, Mingyi; Gao, Xiqi; Song, Enbin; Cai, Yunlong; Xu, Weiqiang

    2016-12-01

    The performance of full-duplex (FD) relay systems can be greatly impacted by the self-interference (SI) at relays. By exploiting multi-antenna in FD relay systems, the spectral efficiency of FD relay systems can be enhanced through spatial SI mitigation. This paper studies joint source transmit beamforming and relay processing to achieve rate maximization for FD MIMO amplify-and-forward (AF) relay systems with consideration of relay processing delay. The problem is difficult to solve due mainly to the SI constraint induced by the relay processing delay. In this paper, we first present a sufficient condition under which the relay amplification matrix has rank one structure. Then, for the case of rank one amplification matrix, the rate maximization problem is equivalently simplified into an unconstrained problem which can be locally solved using gradient ascent method. Next, we propose a penalty-based algorithmic framework, called P-BSUM, for a class of constrained optimization problems which have difficult equality constraints in addition to some convex constraints. By rewriting the rate maximization problem with a set of auxiliary variables, we apply the P-BSUM algorithm to the rate maximization problem in the general case. Finally, numerical results validate the efficiency of the proposed algorithms and show that the joint source-relay design approach under the rank one assumption could be strictly suboptimal as compared to the P-BSUM-based joint source-relay design approach.

  7. A model of thalamocortical relay cells.

    PubMed

    Rhodes, Paul A; Llinás, Rodolfo

    2005-06-15

    It is well established that the main intrinsic electrophysiological properties of thalamocortical relay cells, production of a low threshold burst upon release from hyperpolarized potential and production of a train of single spikes following stimulation from depolarized potentials, can be readily modelled using a single compartment. There is, however, another less well explored intrinsic electrophysiological characteristic of relay cells for which models have not yet accounted: at somatic potentials near spike threshold, relay cells produce a fast ragged high threshold oscillation in somatic voltage. Optical [Ca(2+)] imaging and pharmacological tests indicate that this oscillation correlates with a high threshold Ca(2+) current in the dendrites. Here we present the development of a new compartment model of the thalamic relay cell guided by the simultaneous constraints that it must produce the familiar regular spiking relay mode and low threshold rebound bursts which characterize these cells, as well as the less-studied fast oscillation occurring at near-threshold somatic potentials. We arrive at a model cell which is capable of the production of isolated high threshold Ca(2+) spikes in distal branch segments, driven by a rapidly inactivating intermediate threshold Ca(2+) channel. Further, the model produces the low threshold spike behaviour of the relay cell without requiring high T-current density in the distal dendritic segments. The results thus support a new picture of the dendritic tree of relay cells which may have implications for the manner in which thalamic relay cells integrate descending input from the cortex.

  8. An adaptive out-of-step relay

    SciTech Connect

    Centeno, V.; Phadke, A.G.; Edris, A.; Benton, J.; Gaudi, M.; Michel, G.

    1997-01-01

    The paper describes the development of an adaptive out-of-step relay, from the formulation of its concept to its field implementation at the Florida-Georgia interface. Adaptive relaying seeks to make adjustments to the relay characteristics as system conditions change, thereby making the relay more attuned to the prevailing power system conditions. The work described here began as a theoretical examination of the out-of-step relaying application, its possible shortcomings, and the opportunities to make adaptive improvements. It is shown that for a system that behaves primarily as a two-machine power system, the out-of-step relay could be made more secure by applying the principle of equal area criterion. The paper describes the theory of such a relay, its hardware configuration, and the system as it is installed in the field. The newly developed technology of synchronized phasor measurements plays an important role in the realization of this relay. The paper includes a summary of the field experience gathered over a period of one year.

  9. G. Marconi: A Data Relay Satellite for Mars Communications

    NASA Astrophysics Data System (ADS)

    Dionisio, C.; Marcozzi, M.; Landriani, C.

    2002-01-01

    Mars has always been a source of intrigue and fascination. Recent scientific discoveries have stimulated this longstanding interest, leading to a renaissance in Mars exploration. Future missions to Mars will be capable of long-distance surface mobility, hyperspectral imaging, subsurface exploration, and even life-detection. Manned missions and, eventually, colonies may follow. No mission to the Red Planet stands alone. New scientific and technological knowledge is passed on from one mission to the next, not only improving the journey into space, but also providing benefits here on Earth. The Mars Relay Network, an international constellation of Mars orbiters with relay radios, directly supports other Mars missions by relaying communications between robotic vehicles at Mars and ground stations on Earth. The ability of robotic visitors from Earth to explore Mars will take a gigantic leap forward in 2007 with the launch of the Guglielmo Marconi Orbiter (GMO), the first spacecraft primarily dedicated to providing communication relay, navigation and timing services at Mars. GMO will be the preeminent node of the Mars Relay Network. GMO will relay communications between Earth and robotic vehicles near Mars. GMO will also provide navigation services to spacecraft approaching Mars. GMO will receive transmissions from ground stations on Earth at X-band and will transmit to ground stations on Earth at X- and Ka-bands. GMO will transmit to robotic vehicles at Mars at UHF and receive from these vehicles at UHF and X-band. GMO's baseline 4450 km circular orbit provides complete coverage of the planet for telecommunication and navigation support. GMO will arrive at Mars in mid-2008, just before the NetLander and Mars Scout missions that will be its first users. GMO is designed for a nominal operating lifetime of 10 years and will support nominal commanding and data acquisition, as well as mission critical events such as Mars Orbit Insertion, Entry, Descent and Landing, and Mars

  10. Improved BDF Relaying Scheme Using Time Diversity over Atmospheric Turbulence and Misalignment Fading Channels

    PubMed Central

    García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-01-01

    A novel bit-detect-and-forward (BDF) relaying scheme based on repetition coding with the relay is proposed, significantly improving the robustness to impairments proper to free-space optical (FSO) communications such as unsuitable alignment between transmitter and receiver as well as fluctuations in the irradiance of the transmitted optical beam due to the atmospheric turbulence. Closed-form asymptotic bit-error-rate (BER) expressions are derived for a 3-way FSO communication setup. Fully exploiting the potential time-diversity available in the relay turbulent channel, a relevant better performance is achieved, showing a greater robustness to the relay location since a high diversity gain is provided regardless of the source-destination link distance. PMID:24587711

  11. [Arranging first aid as voluntary work in Jukola-relay].

    PubMed

    Karhumäki, Lauri; Lommi, Marja-Liisa; Mononen, Sanna; Sippo-Tujunen, Inkeri; Lommi, Jyri

    2013-01-01

    Various aspects must be anticipated in the planning of first aid in the massive orienteering contest Jukola-relay. Spreading of the event to a wide forest terrain area, beyond the reach of roads, poses a challenge for the evacuation of injured persons. The communication chains must be secured. In addition to the competition center, first aid points must be devised at various off-road points. Capable volunteers must be recruited in sufficient numbers. Establishing a temporary, health center standard emergency preparedness for approximately 50 000 people necessitates the acquisition of equipment and medicines for emergency care. Preparations must be made for the treatment of injuries and attacks of illness among the competitors, the audience and the volunteers.

  12. Evolution of a radio communication relay system

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  13. New static relay for transmission line protection

    SciTech Connect

    Andrichak, J.G.; Massey, W.A.; Patterson, R.C.

    1981-01-01

    A new static ac voltage relay is described which meets the requirements of critical applications. This Static Line Voltage (SLV) relay consists of three independently adjustable detectors, each of which can be operated in the undervoltage or overvoltage mode. Each detector has a dropout to pickup ratio of 99 percent, and a high degree of immunity to harmonics (less than 3 percent variation in operating point with a voltage waveform containing 50 percent third harmonic). The outputs of the individual detectors are user programmable in the type SLV relay to provide AND, OR, or other logical combinations of output contact wiring to the external control circuits. 2 refs.

  14. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  15. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in...

  16. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  17. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  18. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  19. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  20. Feature-linked synchronization of thalamic relay cell firing induced by feedback from the visual cortex

    NASA Astrophysics Data System (ADS)

    Sillito, Adam M.; Jones, Helen E.; Gerstein, George L.; West, David C.

    1994-06-01

    THE function of the massive feedback projection from visual cortex to its thalamic relay nucleus1,2 has so far eluded any clear overview. This feedback exerts a range of effects3-6, including an increase in the inhibition elicited by moving contours7,8, but the functional logic of the direct connections to the thalamic cells that relay the retinal input to the cortex9-11 remains largely unknown. In contrast to its thalamic nucleus, the visual cortex is characterized by cells that are strongly sensitive to the orientation of moving contours. Here we report that when driven by moving oriented visual stimuli the cortical feedback induces correlated firing in relay cells. This cortically induced correlation of relay cell activity produces coherent firing in those groups of relay cells with receptive field alignments appropriate to signalling the particular orientation of the moving contour to the cortex. Synchronization of relay cell firing means that they will elicit temporally overlapping excitatory postsynaptic potentials in their cortical target cells, thus increasing the chance that the cortical cells will fire. Effectively this increases the gain of the input for feature-linked events detected by the cortex. We propose that this feedback loop serves to lock or focus the appropriate circuitry onto the stimulus feature.

  1. Using Internet Relay Chat in Teaching Chinese.

    ERIC Educational Resources Information Center

    Xie, Tianwei

    2002-01-01

    Explored the feasibility of using Internet Relay Chat (IRC) to facilitate Chinese language teaching and learning. Describes procedures for organizing and conducting chat sessions and discusses the benefits and problems of using IRC. (Author/VWL)

  2. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    SciTech Connect

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We

  3. Evolution of a Radio Communication Relay System

    DTIC Science & Technology

    2013-05-01

    communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the...to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC...unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the

  4. Physical Layer Security Using Two-Path Successive Relaying

    PubMed Central

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  5. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-06-09

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  6. Airborne Relay-Based Regional Positioning System

    PubMed Central

    Lee, Kyuman; Noh, Hongjun; Lim, Jaesung

    2015-01-01

    Ground-based pseudolite systems have some limitations, such as low vertical accuracy, multipath effects and near-far problems. These problems are not significant in airborne-based pseudolite systems. However, the monitoring of pseudolite positions is required because of the mobility of the platforms on which the pseudolites are mounted, and this causes performance degradation. To address these pseudolite system limitations, we propose an airborne relay-based regional positioning system that consists of a master station, reference stations, airborne relays and a user. In the proposed system, navigation signals are generated from the reference stations located on the ground and are relayed via the airborne relays. Unlike in conventional airborne-based systems, the user in the proposed system sequentially estimates both the locations of airborne relays and his/her own position. Therefore, a delay due to monitoring does not occur, and the accuracy is not affected by the movement of airborne relays. We conducted several simulations to evaluate the performance of the proposed system. Based on the simulation results, we demonstrated that the proposed system guarantees a higher accuracy than airborne-based pseudolite systems, and it is feasible despite the existence of clock offsets among reference stations. PMID:26029953

  7. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  8. Life After a Heart Attack

    MedlinePlus

    ... from the NHLBI on Twitter. Life After a Heart Attack Many people survive heart attacks and live active, ... a few weeks. Anxiety and Depression After a Heart Attack After a heart attack, many people worry about ...

  9. What Is a Heart Attack?

    MedlinePlus

    ... from the NHLBI on Twitter. What Is a Heart Attack? Español A heart attack happens when the flow ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  10. Performance analysis of relay subset selection for amplify-and-forward cognitive relay networks.

    PubMed

    Sultan, Kiran; Qureshi, Ijaz Mansoor; Malik, Aqdas Naveed; Zubair, Muhammad

    2014-01-01

    Cooperative communication is regarded as a key technology in wireless networks, including cognitive radio networks (CRNs), which increases the diversity order of the signal to combat the unfavorable effects of the fading channels, by allowing distributed terminals to collaborate through sophisticated signal processing. Underlay CRNs have strict interference constraints towards the secondary users (SUs) active in the frequency band of the primary users (PUs), which limits their transmit power and their coverage area. Relay selection offers a potential solution to the challenges faced by underlay networks, by selecting either single best relay or a subset of potential relay set under different design requirements and assumptions. The best relay selection schemes proposed in the literature for amplify-and-forward (AF) based underlay cognitive relay networks have been very well studied in terms of outage probability (OP) and bit error rate (BER), which is deficient in multiple relay selection schemes. The novelty of this work is to study the outage behavior of multiple relay selection in the underlay CRN and derive the closed-form expressions for the OP and BER through cumulative distribution function (CDF) of the SNR received at the destination. The effectiveness of relay subset selection is shown through simulation results.

  11. Traumatic tiger attack.

    PubMed

    Chum, Marvin; Ng, Wai Pui

    2011-11-01

    Attacks on humans by large cats are uncommon occurrences and thus the principles of managing such injuries are not well documented. The authors here report the case of an 11-year-old boy who was mauled by a privately owned tiger. The attack resulted in multiple cranial lacerations and fractures, dissection of the internal carotid artery, and persistent neurological deficits. This case outlines the multiple sources of injury and pathology that can result from such an attack. Discussion is focused on the pattern of injury seen in large feline attacks and the treatment approach.

  12. COMPASS Final Report: Lunar Relay Satellite (LRS)

    NASA Technical Reports Server (NTRS)

    Oleson, Steven R.; McGuire, Melissa L.

    2012-01-01

    The Lunar Relay Satellite (LRS) COllaborative Modeling and Parametric Assessment of Space Systems (COMPASS) session was tasked to design a satellite to orbit in an elliptical lunar polar orbit to provide relay communications between lunar South Pole assets and the Earth. The design included a complete master equipment list, power requirement list, configuration design, and brief risk assessment and cost analysis. The LRS is a half-TDRSS sized box spacecraft, which provides communications and navigation relay between lunar outposts (via Lunar Communications Terminals (LCT)) or Sortie parties (with user radios) and large ground antennas on Earth. The LRS consists of a spacecraft containing all the communications and avionics equipment designed by NASA Jet Propulsion Laboratory s (JPL) Team X to perform the relay between lunar-based assets and the Earth. The satellite design is a standard box truss spacecraft design with a thermal control system, 1.7 m solar arrays for 1 kWe power, a 1 m diameter Ka/S band dish which provides relay communications with the LCT, and a Q-band dish for communications to/from the Earth based assets. While JPL's Team X and Goddard Space Flight Center s (GSFC) I M Design Center (IMDC) have completed two other LRS designs, this NASA Glenn Research Center (GRC) COMPASS LRS design sits between them in terms of physical size and capabilities.

  13. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  14. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  15. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  16. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  17. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  18. Optical deep space communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Gagliardi, R. M.; Vilnrotter, V. A.; Dolinar, S. J., Jr.

    1981-01-01

    The possible use of an optical for high rate data transmission from a deep space vehicle to an Earth-orbiting relay satellite while RF links are envisioned for the relay to Earth link was studied. A preliminary link analysis is presented for initial sizing of optical components and power levels, in terms of achievable data rates and feasible range distances. Modulation formats are restricted to pulsed laser operation, involving bot coded and uncoded schemes. The advantage of an optical link over present RF deep space link capabilities is shown. The problems of acquisition, pointing and tracking with narrow optical beams are presented and discussed. Mathematical models of beam trackers are derived, aiding in the design of such systems for minimizing beam pointing errors. The expected orbital geometry between spacecraft and relay satellite, and its impact on beam pointing dynamics are discussed.

  19. Impact of relay placement on diversity order in adaptive selective DF relay-assisted FSO communications.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Beatriz; Castillo-Vázquez, Carmen

    2015-02-09

    The impact of relay placement on diversity order in adaptive selective decode-and-forward (DF) cooperative strategies is here investigated in the context of free-space optical (FSO) communications over atmospheric turbulence channels with pointing errors when line of sight is available. The irradiance of the transmitted optical beam here considered is susceptible to moderate-to-strong turbulence conditions, following a gamma-gamma (GG) distribution together with a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. Novel closed-form approximate bit error-rate (BER) expressions are obtained for a cooperative FSO communication setup with N relays, assuming that these relays are located in an area similar to an annulus around source or destination node. An analytical expression is here found that determines the best selection criterion based on the knowledge of the channel state information (CSI) of source-relay or relay-destination links in order to significantly increase the diversity order corresponding to the cooperative strategy under study. It is concluded that the highest diversity order is achieved when the relation β(SR(min)) > β(SD) + β(R(min)D) is satisfied, wherein β(SR(min)), β(R(min)D) and β(SD) are parameters corresponding to the atmospheric turbulence conditions of source-relay and relay-destination link with the greatest scintillation index, and source-destination link, respectively.

  20. Multiantenna relay beamforming design for QoS discrimination in two-way relay networks.

    PubMed

    Xiong, Ke; Zhang, Yu; Li, Dandan; Chang, Chih-Yung; Zhong, Zhangdui

    2013-01-01

    This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method.

  1. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  2. Deep space optical communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Dolinar, S.; Vilnrotter, V.; Gagliardi, R.

    1981-01-01

    The application of optical communications for a deep space link via an earth-orbiting relay satellite is discussed. The system uses optical frequencies for the free-space channel and RF links for atmospheric transmission. The relay satellite is in geostationary orbit and contains the optics necessary for data processing and formatting. It returns the data to earth through the RF terrestrial link and also transmits an optical beacon to the satellite for spacecraft return pointing and for the alignment of the transmitting optics. Future work will turn to modulation and coding, pointing and tracking, and optical-RF interfacing.

  3. Counterfactual quantum cryptography network with untrusted relay

    NASA Astrophysics Data System (ADS)

    Chen, Yuanyuan; Gu, Xuemei; Jiang, Dong; Xie, Ling; Chen, Lijun

    2015-07-01

    Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that the scheme can be realized with current technologies. We also prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untrusted relay can perform false operations.

  4. Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Mckenzie, J.; Vanek, C.

    1991-01-01

    The DSN (Deep Space Network) mission support requirements for the Tracking and Data Relay Satellite System (TDRSS) are summarized. The TDRSS consists of four identical satellites in geosynchronous orbits (35,800 km) and a dedicated ground station. The payload of each satellite is a telecommunications service system that relays communication signals between low earth-orbiting user spacecraft and the TDRSS ground terminal. Mission objectives are outlined and the DSN support requirements are defined through the presentation of tables and narratives describing the spacecraft flight profile; DSN support coverage; frequency assignments; support parameters for telemetry, command and support systems; and tracking support responsibility.

  5. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    Mars Relay Network is prepared to support MSL: a) ODY/MRO/MEX will all provide critical event comm support during EDL. b) New Electra/Electra-Lite capabilities on the MSL-MRO link will support >250 Mb/sol MSL data return. 2013 MAVEN orbiter will replenish on-orbit relay infrastructure as prior orbiters approach end-of-life. While NASA has withdrawn from the 2016 EMTGO and 2018 Joint Rover missions, analysis of the potential link shows a path to Gbit/sol relay capability 2012.

  6. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  7. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  8. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  9. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  10. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  11. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Timing relays and timing devices. 234.265 Section... Maintenance, Inspection, and Testing Inspections and Tests § 234.265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least once every twelve months. The timing shall...

  12. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  13. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  14. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  15. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  16. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  17. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  18. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  19. 76 FR 58412 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals...-First Century Communications and Video Accessibility Act of 2010, Section 105, Relay Services for...

  20. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  1. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... COMMISSION 47 CFR Parts 1 and 64 Contributions to the Telecommunications Relay Service Fund AGENCY: Federal...- interconnected VoIP service to participate in and contribute to the Telecommunications Relay Services (TRS) Fund... summary of the Commission's Contributions to the Telecommunications Relay Service Fund, Notice of...

  2. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  3. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  4. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  5. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  6. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  7. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... COMMISSION 47 CFR Parts 1 and 64 Contributions to the Telecommunications Relay Services Fund AGENCY: Federal... contributing to the interstate Telecommunications Relay Services (TRS) Fund in a manner prescribed by... to the Telecommunications Relay Service Fund, Report and Order (Order), document FCC 11-150,...

  8. 77 FR 20553 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Relay Services for Deaf-Blind Individuals, Report and Order, document FCC 11-56, published at 76 FR... Commission to allocate up to $10 million annually from the Interstate Telecommunications Relay Services...

  9. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  10. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  11. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Timing relays and timing devices. 234.265 Section... Maintenance, Inspection, and Testing Inspections and Tests § 234.265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least once every twelve months. The timing shall...

  12. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  13. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  14. Cable Television Service; Cable Television Relay Service.

    ERIC Educational Resources Information Center

    Federal Register, 1972

    1972-01-01

    The rules and regulations of the Federal Communications Commission (FCC) concerning cable television service and cable relay service are presented along with the comments of the National Cable Television Association, the National Association of Broadcasters, the Association of Maximum Service Telecasters, and a major group of program suppliers.…

  15. Relay cross metathesis reactions of vinylphosphonates.

    PubMed

    Malla, Raj K; Ridenour, Jeremy N; Spilling, Christopher D

    2014-01-01

    Dimethyl (β-substituted) vinylphosphonates do not readily undergo cross metathesis reactions with Grubbs catalyst and terminal alkenes. However, the corresponding mono- or diallyl vinylphosphonate esters undergo facile cross metathesis reactions. The improved reactivity is attributed to a relay step in the cross metathesis reaction mechanism.

  16. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  17. Supply Chain Attack Framework and Attack Patterns

    DTIC Science & Technology

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  18. Stroke following rottweiler attack.

    PubMed

    Miller, S J; Copass, M; Johansen, K; Winn, H R

    1993-02-01

    A previously healthy 50-year-old man suffered a major right cerebral infarction shortly after receiving head and neck bites in an attack by two rottweilers. Arteriography revealed occlusion of the right middle cerebral artery, an intimal flap and pseudoaneurysm in the high right internal carotid artery just proximal to the skull base, and an obstructed right vertebral artery. The powerful jaw mechanism of rottweilers and other large mastiff-type dogs makes their bites particularly destructive. The predilection of these animals for attacking the head and upper body makes occult crush injury to the extracranial cerebral vessels an important diagnostic consideration following such attacks.

  19. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  20. Using a micromachined magnetostatic relay in commutating a DC motor

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor); Lilienthal, Gerald (Inventor)

    2004-01-01

    A DC motor is commutated by rotating a magnetic rotor to induce a magnetic field in at least one magnetostatic relay in the motor. Each relay is activated in response to the magnetic field to deliver power to at least one corresponding winding connected to the relay. In some cases, each relay delivers power first through a corresponding primary winding and then through a corresponding secondary winding to a common node. Specific examples include a four-pole, three-phase motor in which each relay is activated four times during one rotation of the magnetic rotor.

  1. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  2. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  3. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  4. Fatal big cat attacks.

    PubMed

    Cohle, S D; Harlan, C W; Harlan, G

    1990-09-01

    Two cases of fatal attacks by large cats are presented. In the first case, a 30-year-old female zoo worker was attacked by a jaguar that had escaped its cage. In the second case, a 2-year-old girl was fatally injured by her father's pet leopard. The pattern of injuries in these cases is nearly identical to those of these cats' prey in the wild.

  5. High salinity relay as a postharvest processing strategy to reduce vibrio vulnificus levels in Chesapeake Bay oysters (Crassostrea virginica).

    PubMed

    Audemard, Corinne; Kator, Howard I; Rhodes, Martha W; Gallivan, Thomas; Erskine, A J; Leggett, A Thomas; Reece, Kimberly S

    2011-11-01

    In 2009 the U.S. Food and Drug Administration (FDA) announced its intention to implement postharvest processing (PHP) methods to eliminate Vibrio vulnificus from oysters intended for the raw, half-shell market that are harvested from the Gulf of Mexico during warmer months. FDA-approved PHP methods can be expensive and may be associated with unfavorable responses from some consumers. A relatively unexplored PHP method that uses relaying to high salinity waters could be an alternative strategy, considering that high salinities appear to negatively affect the survival of V. vulnificus. During relay, however, oysters may be exposed to rapid and large salinity increases that could cause increased mortality. In this study, the effectiveness of high salinity relay to reduce V. vulnificus to <30 most probable number (MPN) per g and the impact on oyster mortality were assessed in the lower Chesapeake Bay. Two relay experiments were performed during the summer and fall of 2010. Oysters collected from three grow-out sites, a low salinity site (14 to 15 practical salinity units [psu]) and two moderate salinity sites (22 to 25 psu), were relayed directly to a high salinity site (≥30 psu) on Virginia's Eastern Shore. Oysters were assayed for V. vulnificus and Vibrio parahaemolyticus (another Vibrio species of concern) densities at time 0 prior to relay and after 7 and 14 days of relay, using the FDA MPN enrichment method combined with detection by real-time PCR. After 14 days, both V. vulnificus and V. parahaemolyticus densities were ≤0.8 MPN/g, and decreases of 2 to 3 log in V. vulnificus densities were observed. Oyster mortalities were low (≤4%) even for oysters from the low salinity harvest site, which experienced a salinity increase of approximately 15 psu. Results, although preliminary and requiring formal validation and economic analysis, suggest that high salinity relay could be an effective PHP method.

  6. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  7. Spaceborne centrifugal relays for spacecraft propulsion

    NASA Technical Reports Server (NTRS)

    Ouzidane, Malika

    1991-01-01

    Acceleration using centrifugal relays is a recently discovered method for the acceleration of spaceborne payloads to high velocity at high thrust. Centrifugal relays are moving rotors which progressively accelerate reaction mass to higher velocities. One important engineering problem consists of accurately tracking the position of the projectiles and rotors and guiding each projectile exactly onto the appropriate guide tracks on each rotor. The topics of this research are the system kinematics and dynamics and the computerized guidance system which will allow the projectile to approach each rotor with exact timing with respect to the rotor rotation period and with very small errors in lateral positions. Kinematics studies include analysis of rotor and projectile positions versus time and projectile/rotor interactions. Guidance studies include a detailed description of the tracking mechanism (interrupt of optical beams) and the aiming mechanism (electromagnetic focusing) including the design of electromagnetic deflection coils and the switching circuitry.

  8. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  9. Non-latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A non-latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes a permanent magnet and an electromagnet. The respective sections are arranged in separate locations or cavities in the assembly. The switch has a "normal" position and is selectively switched by an overriding electromagnetic assembly. The switch returns to the "normal" position when the overriding electromagnetic assembly is inactive.

  10. Adjustable electronic load-alarm relay

    DOEpatents

    Mason, Charles H.; Sitton, Roy S.

    1976-01-01

    This invention is an improved electronic alarm relay for monitoring the current drawn by an AC motor or other electrical load. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage.

  11. Programming A Molecular Relay for Ultrasensitive Biodetection through 129 Xe NMR

    SciTech Connect

    Wang, Yanfei; Roose, Benjamin W.; Philbin, John P.; Doman, Jordan L.; Dmochowski, Ivan J.

    2015-12-21

    We reported a supramolecular strategy for detecting specific proteins in complex media by using hyperpolarized 129Xe NMR. A cucurbit[6]uril (CB[6])-based molecular relay was programmed for three sequential equilibrium conditions by designing a two-faced guest (TFG) that initially binds CB[6] and blocks the CB[6]–Xe interaction. Moreover, the protein analyte recruits the TFG and frees CB[6] for Xe binding. TFGs containing CB[6]- and carbonic anhydrase II (CAII)-binding domains were synthesized in one or two steps. X-ray crystallography confirmed TFG binding to Zn2+ in the deep CAII active-site cleft, which precludes simultaneous CB[6] binding. The molecular relay was reprogrammed to detect avidin by using a different TFG. Finally, Xe binding by CB[6] was detected in buffer and in E. coli cultures expressing CAII through ultrasensitive 129Xe NMR spectroscopy.

  12. Overview of optical data relay system in JAXA

    NASA Astrophysics Data System (ADS)

    Chishiki, Y.; Yamakawa, S.; Takano, Y.; Miyamoto, Y.; Araki, T.; Kohata, H.

    2016-03-01

    To meet increasing demands of high-speed data transmission, JAXA has started to develop a new optical data relay system. This system provides 1.8Gbit/s data relay service through optical inter-satellite link and Ka-band feeder link using JDRS, a data relay satellite. The first user satellite is the Advanced Optical Satellite, a Japanese optical observation satellite in low earth orbit. As a total data relay system, the data relay satellite, Ka-band ground stations and two optical terminals for JDRS and the Advanced Optical Satellite are developed together. Target launch year of JDRS is 2019 in Japanese fiscal year. This paper describes the development plan and technologies of the optical data relay system.

  13. On the HEMP environment for protective relays. [High-altitude electromagnetic pulse

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1994-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength.

  14. Laser Communications Relay Demonstration (LCRD) Update and the Path Towards Optical Relay Operations

    NASA Technical Reports Server (NTRS)

    Israel, David J.; Edwards, Bernard L.; Staren, John W.

    2017-01-01

    This Presentation provides a concept for an evolution of NASAs optical communications near Earth relay architecture. NASA's Laser Communications Relay Demonstration (LCRD), a joint project between NASAs Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory - California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will provide a minimum of two years of high data rate optical communications service experiments in geosynchronous orbit (GEO), following launch in 2019. This paper will provide an update of the LCRD mission status and planned capabilities and experiments, followed by a discussion of the path from LCRD to operational network capabilities.

  15. Laser Communications Relay Demonstration (LCRD) Update and the Path Towards Optical Relay Operations

    NASA Technical Reports Server (NTRS)

    Israel, David J.; Edwards, Bernard L.; Staren, John W.

    2017-01-01

    This paper provides a concept for an evolution of NASA's optical communications near Earth relay architecture. NASA's Laser Communications Relay Demonstration (LCRD), a joint project between NASA's Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory - California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will provide a minimum of two years of high data rate optical communications service experiments in geosynchronous orbit (GEO), following launch in 2019. This paper will provide an update of the LCRD mission status and planned capabilities and experiments, followed by a discussion of the path from LCRD to operational network capabilities.

  16. Automation of servicibility of radio-relay station equipment

    NASA Astrophysics Data System (ADS)

    Uryev, A. G.; Mishkin, Y. I.; Itkis, G. Y.

    1985-03-01

    Automation of the serviceability of radio relay station equipment must ensure central gathering and primary processing of reliable instrument reading with subsequent display on the control panel, detection and recording of failures soon enough, advance enough warning based on analysis of detertioration symptoms, and correct remote measurement of equipment performance parameters. Such an inspection will minimize transmission losses while reducing nonproductive time and labor spent on documentation and measurement. A multichannel automated inspection system for this purpose should operate by a parallel rather than sequential procedure. Digital data processing is more expedient in this case than analog method and, therefore, analog to digital converters are required. Spepcial normal, above limit and below limit test signals provide means of self-inspection, to which must be added adequate interference immunization, stabilization, and standby power supply. Use of a microcomputer permits overall refinement and expansion of the inspection system while it minimizes though not completely eliminates dependence on subjective judgment.

  17. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  18. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  19. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  20. High-performance inkjet-printed four-terminal microelectromechanical relays and inverters.

    PubMed

    Chung, Seungjun; Ul Karim, Muhammed Ahosan; Kwon, Hyuk-Jun; Subramanian, Vivek

    2015-05-13

    We report the first demonstration of inkjet-printed 4-terminal microelectromechanical (MEM) relays and inverters with hyper-abrupt switching that exhibit excellent electrical and mechanical characteristics. This first implementation of a printed 4-terminal device is critically important, since it allows for the realization of full complementary logic functions. The floated fourth terminal (body electrode), which allows the gate switching voltage to be adjusted, is bonded to movable channel beams via a printed epoxy layer in a planar structure, which can move downward together via the electrostatic force between the gate electrodes and body such that the channel can also actuate downward and touch the drain electrode. Because the body, channel, and drain electrodes are completely electrically separated, no detectable leakage or electrical interference between the electrodes is observed. The printed MEM relay exhibited an on-state resistance of only 3.48 Ω, immeasurable off-state leakage, subthreshold swing <1 mV/dec, and a stable operation over 10(4) cycles with a switching delay of 47 μs, and the relay inverter exhibits abrupt transitions between on/off states. The operation of the printed 4-terminal MEM relay was also verified against the results of a 3-dimensional (3D) finite element simulation.

  1. Outage probability of a relay strategy allowing intra-link errors utilizing Slepian-Wolf theorem

    NASA Astrophysics Data System (ADS)

    Cheng, Meng; Anwar, Khoirul; Matsumoto, Tad

    2013-12-01

    order exhibited in the outage curve converges to 1 when the bit streams are not fully correlated. Moreover, the Slepian-Wolf outage probability is proved to be smaller than that of the 2nd order maximum ratio combining (MRC) diversity, if the average SNRs of the two independent links are the same. Exact as well as asymptotic expressions of the outage probability are theoretically derived in the article. In addition, the theoretical outage results are compared with the frame-error-rate (FER) curves, obtained by a series of simulations for the Slepian-Wolf relay system based on bit-interleaved coded modulation with iterative detection (BICM-ID). It is shown that the FER curves exhibit the same tendency as the theoretical results.

  2. Improving control performance across AWGN channels using a relay node†

    NASA Astrophysics Data System (ADS)

    Kumar, Utsaw; Liu, Jie; Gupta, Vijay; Laneman, J. Nicholas

    2014-07-01

    Consider an unstable linear time-invariant system in which the sensor transmits information to a controller across an additive white Gaussian noise channel. The designer can optionally utilise a relay node to assist the controller; however, the total transmission power consumed by the sensor and the relay node is constant. We consider two topologies: (1) a Gaussian relay channel and (2) a cascade of two Gaussian point-to-point channels. We propose coding schemes and present sufficient conditions for the stabilisability of the plant through such schemes. The analysis suggests that it is useful to utilise a relay node, even if the total transmission power remains the same.

  3. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  4. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.

    PubMed

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.

  5. Detecting Sirex noctilio grey-attacked and lightning-struck pine trees using airborne hyperspectral data, random forest and support vector machines classifiers

    NASA Astrophysics Data System (ADS)

    Abdel-Rahman, Elfatih M.; Mutanga, Onisimo; Adam, Elhadi; Ismail, Riyad

    2014-02-01

    The visual progression of sirex (Sirex noctilio) infestation symptoms has been categorized into three distinct infestation phases, namely the green, red and grey stages. The grey stage is the final stage which leads to almost complete defoliation resulting in dead standing trees or snags. Dead standing pine trees however, could also be due to the lightning damage. Hence, the objective of the present study was to distinguish amongst healthy, sirex grey-attacked and lightning-damaged pine trees using AISA Eagle hyperspectral data, random forest (RF) and support vector machines (SVM) classifiers. Our study also presents an opportunity to look at the possibility of separating amongst the previously mentioned pine trees damage classes and other landscape classes on the study area. The results of the present study revealed the robustness of the two machine learning classifiers with an overall accuracy of 74.50% (total disagreement = 26%) for RF and 73.50% (total disagreement = 27%) for SVM using all the remaining AISA Eagle spectral bands after removing the noisy ones. When the most useful spectral bands as measured by RF were exploited, the overall accuracy was considerably improved; 78% (total disagreement = 22%) for RF and 76.50% (total disagreement = 24%) for SVM. There was no significant difference between the performances of the two classifiers as demonstrated by the results of McNemar's test (chi-squared; χ2 = 0.14, and 0.03 when all the remaining ASIA Eagle wavebands, after removing the noisy ones and the most important wavebands were used, respectively). This study concludes that AISA Eagle data classified using RF and SVM algorithms provide relatively accurate information that is important to the forest industry for making informed decision regarding pine plantations health protocols.

  6. Categorizing Network Attacks Using Pattern Classification Algorithms

    DTIC Science & Technology

    2002-03-01

    attacks into predefined categories such as Flooding Denial of Service, Distributed Denial of Service, Nukers, and Portscans . Such categorization decreases...Detection of Stealthy Portscans . Tech- nical Report, Silicon Defense, 2000. [Stevens94] Stevens, W. Richard. TCP/IP Illustrated Volume 1 . Reading: Addison

  7. Sparsity-aware multiple relay selection in large multi-hop decode-and-forward relay networks

    NASA Astrophysics Data System (ADS)

    Gouissem, A.; Hamila, R.; Al-Dhahir, N.; Foufou, S.

    2016-12-01

    In this paper, we propose and investigate two novel techniques to perform multiple relay selection in large multi-hop decode-and-forward relay networks. The two proposed techniques exploit sparse signal recovery theory to select multiple relays using the orthogonal matching pursuit algorithm and outperform state-of-the-art techniques in terms of outage probability and computation complexity. To reduce the amount of collected channel state information (CSI), we propose a limited-feedback scheme where only a limited number of relays feedback their CSI. Furthermore, a detailed performance-complexity tradeoff investigation is conducted for the different studied techniques and verified by Monte Carlo simulations.

  8. 78 FR 40407 - Structure and Practices of the Video Relay Service Program: Telecommunications Relay Services and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities AGENCY..., by commercial overnight courier, or by first-class or overnight U.S. Postal Service mail (although... the building. Commercial Mail sent by overnight mail (other than U.S. Postal Service Express Mail...

  9. 76 FR 24442 - Structure and Practices of the Video Relay Service Program; Telecommunications Relay Services and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities AGENCY... or messenger delivery, by commercial overnight courier, or by first-class or overnight U.S. Postal... before entering the building. Commercial Mail sent by overnight mail (other than U.S. Postal...

  10. Heart Attack Symptoms in Women

    MedlinePlus

    ... Peripheral Artery Disease Venous Thromboembolism Aortic Aneurysm More Heart Attack Symptoms in Women Updated:Jan 10,2017 Heart Attack Signs in Women Uncomfortable pressure, squeezing, fullness or ...

  11. An Attack Surface Metric

    DTIC Science & Technology

    2005-07-01

    Introduction Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community , and is of...our approach to related work in Section 2. We introduce the entry point and exit point framework in Section 3. We present the definitions of...ignores the specific system configuration that gave rise to the vulnerability, and it does not capture a system’s future attackability. Our approach

  12. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  13. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  14. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  15. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  16. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front...

  17. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  18. Progressively Communicating Rich Telemetry from Autonomous Underwater Vehicles via Relays

    DTIC Science & Technology

    2012-06-01

    2012-10 DOCTORAL DISSERTATION by Chris Murphy June 2012 Progressively Communicating Rich Telemetry from Autonomous Underwater Vehicles via Relays MIT...MIT/WHO I 2012-10 Progressively Communicating Rich Telemetry from Autonomous Underwater Vehicles via Relays by Chris Murphy Massachusetts...States Government. This thesis should be cited as: Chris Murphy, 2012. Progressively Communicating Rich Telemetry from Autonomous Underwater Vehicles

  19. MaROS Strategic Relay Planning and Coordination Interfaces

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  20. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  1. Using the 5 P Relay in Task Groups

    ERIC Educational Resources Information Center

    Stanley, Paula Helen

    2006-01-01

    This article describes the 5 P Relay, a group exercise that can increase the effectiveness of task groups. The 5 P Relay is based on the principles and concepts of the Invitational Model, which emphasizes the importance of assessing the effectiveness or health of five aspects of an organization's environment: people, places, programs, processes,…

  2. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... COMMISSION 47 CFR Part 64 Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal... rules that govern access to toll-free numbers by users of Internet- based Telecommunications Relay... an impact on any rules of particular applicability. Subject: Internet-Based Telecommunications...

  3. 77 FR 42187 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals, Order... the Twenty-first Century Communications and Video Accessibility Act of 2010, Section 105,...

  4. A Geosynchronous Orbit Optical Communications Relay Architecture

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2014-01-01

    NASA is planning to fly a Next Generation Tracking and Data Relay Satellite (TDRS) next decade. While the requirements and architecture for that satellite are unknown at this time, NASA is investing in communications technologies that could be deployed on the satellite to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in December 2017 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the Next Generation TDRS. While it is obvious that a small to medium sized optical communications terminal could be flown on a GEO satellite to provide support to Near Earth missions, it is also possible to deploy a large terminal on the satellite to support Deep Space missions. Onboard data processing and Delay Tolerant Networking (DTN) are two additional technologies that could be used to optimize optical communications link services and enable additional mission and network operations. This paper provides a possible architecture for the optical communications augmentation of a Next Generation TDRS and touches on the critical technology work currently being done at NASA. It will also describe the impact of clouds on such an architecture and possible mitigation techniques.

  5. An economically viable space power relay system

    NASA Astrophysics Data System (ADS)

    Bekey, Ivan; Boudreault, Richard

    1999-09-01

    This paper describes and analyzes the economics of a power relay system that takes advantage of recent technological advances to implement a system that is economically viable. A series of power relay systems are described and analyzed which transport power ranging from 1,250 megawatts to 5,000 megawatts, and distribute it to receiving sites at transcontinental distances. Two classes of systems are discussed—those with a single reflector and delivering all the power to a single rectenna, and a second type which has multiple reflectors and distributes it to 10 rectenna sites, sharing power among them. It is shown that when offering electricity at prices competitive to those prevalent in developed cities in the US that a low IRR is inevitable, and economic feasibility of a business is unlikely. However, when the target market is Japan where the prevalent electricity prices are much greater, that an IRR exceeding 65% is readily attainable. This is extremely attractive to potential investors, making capitalization of a venture likely. The paper shows that the capital investment required for the system can be less than 1 per installed watt, contributing less than 0.02 /KW-hr to the cost of energy provision. Since selling prices in feasible regions range from 0.18 to over 030 $/kW-hr, these costs are but a small fraction of the operating expenses. Thus a very large IRR is possible for such a business.

  6. Relay exchanges in elite short track speed skating.

    PubMed

    Hext, Andrew; Heller, Ben; Kelley, John; Goodwill, Simon

    2017-06-01

    In short track speed skating, the relay exchange provides an additional strategic component to races by allowing a team to change the skater involved in the pack race. Typically executed every 1½ laps, it is the belief of skaters and coaches that during this period of the race, time can be gained or lost due to the execution of the relay exchange. As such, the aim of this study was to examine the influence of the relay exchange on a team's progression through a 5000 m relay race. Using data collected from three World Cup relay events during the 2012-2013 season, the time taken to complete the straight for the scenarios with and without the relay exchange were compared at different skating speeds for the corner exit prior to the straight. Overall, the influence of the relay exchange was found to be dependent on this corner exit speed. At slower corner exit speeds (12.01-13.5 m/s), relay exchange straight times were significantly faster than the free skating scenario (P < 0.01). While at faster corner exit speeds (14.01-15 m/s), straight times were significantly slower (P < 0.001). The findings of this study suggest that the current norm of executing relay exchanges every 1½ laps may not be optimal. Instead, varying the frequency of relay exchange execution throughout the race could allow: (1) time to be gained relative to other teams; and (2) facilitate other race strategies by providing an improved opportunity to overtake.

  7. Generalizing performance limitations of relay neurons: application to Parkinson's disease.

    PubMed

    Agarwal, Rahul; Santaniello, Sabato; Sarma, Sridevi V

    2014-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. Relay reliability of a relay cell is defined as the fraction of pulses in the driving input that generate action potentials at the neuron's output, and is in general a complicated function of the driving input, the modulating input and the cell's properties. In a recent study, we computed analytic bounds on the reliability of relay neurons for a class of Poisson driving inputs and sinusoidal modulating inputs. Here, we generalize our analysis and compute bounds on the relay reliability for any modulating input. Furthermore, we show that if the modulating input is generated by a colored Gaussian process, closed form expressions for bounds on relay reliability can be derived. We applied our analysis to investigate relay reliability of thalamic cells in health and in Parkinson's disease (PD). It is hypothesized that in health, neurons in the motor thalamus relay information only when needed and this capability is compromised in PD due to exaggerated beta-band oscillations in the modulating input from the basal ganglia (BG). To test this hypothesis, we used modulating and driving inputs simulated from a detailed computational model of the cortico-BG-thalamo-cortical motor loop and computed our theoretical bounds in both PD and healthy conditions. Our bounds match well with our empirically computed reliability and show that the relay reliability is larger in the healthy condition across the population of thalamic neurons. Furthermore, we show that the increase in power in the beta-band of the modulating input (output of BG) is causally related with the decrease in relay reliability in the PD condition.

  8. Modeling Partial Attacks with Alloy

    NASA Astrophysics Data System (ADS)

    Lin, Amerson; Bond, Mike; Clulow, Jolyon

    The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are attacks that do not immediately break a system but weaken the security sufficiently for the adversary. We term these attacks partial attacks and present the first methodology for the modeling and automated analysis of this genre of attacks by describing two approaches. The first approach reasons about entropy and was used to simulate and verify an attack on the ECB|ECB|OFB triple-mode DES block-cipher. The second approach reasons about possibility sets and was used to simulate and verify an attack on the personal identification number (PIN) derivation algorithm used in the IBM 4758 Common Cryptographic Architecture.

  9. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  10. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    action [From 2] The same origin policy is also called Single Origin or Same Site Policy. It was originally released with Netscape Navigator 2.0 and...success Netscape 8.2.1 Windows XP / SP2 success Opera 9.0.2 Windows 2000 / SP4 success Table 6. Satoh’s attack results using Adobe Flash Player...dns/dns-rebinding.pdf. Retrieved May 2009. [4] D. Dean, E. W. Felten, and D. S. Wallach “Java Security: From HotJava to Netscape and Beyond

  11. How Is a Heart Attack Treated?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Treated? Early treatment for a heart attack can ... or years after the procedure. Other Treatments for Heart Attack Other treatments for heart attack include: Medicines Medical ...

  12. How Is a Heart Attack Diagnosed?

    MedlinePlus

    ... from the NHLBI on Twitter. How Is a Heart Attack Diagnosed? Your doctor will diagnose a heart attack ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  13. Feasible attack on detector-device-independent quantum key distribution.

    PubMed

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  14. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  15. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  16. Satellite data-relay activities in Arizona

    USGS Publications Warehouse

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  17. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; Schratz, Brian C.; Shihabi, Mazen M.; Srinivasan, Jeffrey M.; Varghese, Phillip; Sanders, Stephen S.; Denis, Michel

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  18. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay

    NASA Astrophysics Data System (ADS)

    Zeng, Yong; Zhang, Rui

    2016-12-01

    Wireless information surveillance, by which suspicious wireless communications are closely monitored by legitimate agencies, is an integral part of national security. To enhance the information surveillance capability, we propose in this paper a new proactive eavesdropping approach via a spoofing relay, where the legitimate monitor operates in a full-duplex manner with simultaneous eavesdropping and spoofing relaying to vary the source transmission rate in favor of the eavesdropping performance. To this end, a power splitting receiver is proposed, where the signal received at each antenna of the legitimate monitor is split into two parts for information eavesdropping and spoofing relaying, respectively. We formulate an optimization problem to maximize the achievable eavesdropping rate by jointly optimizing the power splitting ratios and relay beamforming matrix at the multi-antenna monitor. Depending on the suspicious and eavesdropping channel conditions, the optimal solution corresponds to three possible spoofing relay strategies, namely \\emph{constructive relaying}, \\emph{jamming}, and \\emph{simultaneous jamming and destructive relaying}. Numerical results show that the proposed technique significantly improves the eavesdropping rate of the legitimate monitor as compared to the existing passive eavesdropping and jamming-based eavesdropping schemes.

  19. Electrical and chemical synapses between relay neurons in developing thalamus.

    PubMed

    Lee, Seung-Chan; Cruikshank, Scott J; Connors, Barry W

    2010-07-01

    Gap junction-mediated electrical synapses interconnect diverse types of neurons in the mammalian brain, and they may play important roles in the synchronization and development of neural circuits. Thalamic relay neurons are the major source of input to neocortex. Electrical synapses have not been directly observed between relay neurons in either developing or adult animals. We tested for electrical synapses by recording from pairs of relay neurons in acute slices of developing ventrobasal nucleus (VBN) of the thalamus from rats and mice. Electrical synapses were common between VBN relay neurons during the first postnatal week, and then declined sharply during the second week. Electrical coupling was reduced among cells of connexin36 (Cx36) knockout mice; however, some neuron pairs remained coupled. This implies that electrical synapses between the majority of coupled VBN neurons require Cx36 but that other gap junction proteins also contribute. The anatomical distribution of a beta-galactosidase reporter indicated that Cx36 was expressed in some VBN neurons during the first postnatal week and sharply declined over the second week, consistent with our physiological results. VBN relay neurons also communicated via chemical synapses. Rare pairs of relay neurons excited one another monosynaptically. Much more commonly, spikes in one relay neuron evoked disynaptic inhibition (via the thalamic reticular nucleus) in the same or a neighbouring relay neuron. Disynaptic inhibition between VBN cells emerged as electrical coupling was decreasing, during the second postnatal week. Our results demonstrate that thalamic relay neurons communicate primarily via electrical synapses during early postnatal development, and then lose their electrical coupling as a chemical synapse-mediated inhibitory circuit matures.

  20. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  1. From Onions to Shallots: Rewarding Tor Relays with TEARS

    DTIC Science & Technology

    2014-07-18

    From Onions to Shallots: Rewarding Tor Relays with TEARS Rob Jansen1, Andrew Miller2, Paul Syverson1, and Bryan Ford3 1 U.S. Naval Research... Onions to Shallots: Rewarding Tor Relays with TEARS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e...which, as in BRAIDS [15], may be contained within an onion -wrapped message). Thus, with- out needing to interact with the bank, the relay can confirm the

  2. Lessons Learned from Coordinating Relay Activities at Mars

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Hwang, Pauline; Waggoner, Bruce; McLaughlin, Bruce; Fieseler, Paul; Thomas, Reid; Bigwood, Maria; Herrera, Paul

    2005-01-01

    The Mission Management Office at the Jet Propulsion Laboratory was tasked with coordinating the relay of data between multiple spacecraft at Mars in support of the Mars Exploration Rover Missions in early 2004. The confluence of three orbiters (Mars Global Surveyor, Mars Odyssey, and Mars Express), two rovers (Spirit and Opportunity), and one lander (Beagle 2) has provided a challenging operational scenario that required careful coordination between missions to provide the necessary support and to avoid potential interference during simultaneous relay sessions. As these coordination efforts progressed, several important lessons were learned that should be applied to future Mars relay activities.

  3. A monolithically integrated torsional CMOS-MEMS relay

    NASA Astrophysics Data System (ADS)

    Riverola, M.; Sobreviela, G.; Torres, F.; Uranga, A.; Barniol, N.

    2016-11-01

    We report experimental demonstrations of a torsional microelectromechanical (MEM) relay fabricated using the CMOS-MEMS approach (or intra-CMOS) which exploits the full foundry inherent characteristics enabling drastic reduction of the fabrication costs and batch production. In particular, the relay is monolithically integrated in the back end of line of a commercial standard CMOS technology (AMS 0.35 μm) and released by means of a simple one-step mask-less wet etching. The fabricated torsional relay exhibits an extremely steep switching behaviour symmetrical about both contact sides with an on-state contact resistance in the k Ω -range throughout the on-off cycling test.

  4. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  5. On the HEMP (high-altitude electromagnetic pulse) response of protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Barnes, P.R.; Oak Ridge National Lab., TN )

    1990-01-01

    An assessment of the susceptibility of protective relays to the transients produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms responsible for coupling of HEMP to relay terminals are examined. The predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse. 11 refs., 16 figs.

  6. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  7. 75 FR 25255 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-07

    ... COMMISSION Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... of calls made through Video Relay Service (VRS), a form of Telecommunications Relay Service (TRS... purposes of setting VRS compensation rates. The Relay Services Data Request form, which is submitted to...

  8. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  9. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  10. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  11. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  12. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  13. Dog pack attack: hunting humans.

    PubMed

    Avis, S P

    1999-09-01

    Dog bite-related fatalities, although unusual, accounted for 304 deaths in the United States between 1979 and 1996 and 6 fatalities in Canada between 1994 and 1996. Fatal dog pack attacks and attacks involving human predation are less common. The following describes a dog pack attack on a family of four involving 2 fatalities with predation of the victims. Factors previously identified that contribute to pack attacks and predation, including prior group hunting, social feeding, territorial defense, lack of human interaction, and prey stimuli, are discussed.

  14. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  15. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    eywell’s Scyllarus correlation framework [18], and a simulated-annealing-based approach for detecting stealthy portscans [35]. For detecting multistep...California, May 12–15, 2002. [35] S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans . Journal of

  16. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  17. On the HEMP (high-altitude electromagnetic pulse) environment for protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1990-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength. 12 refs., 13 figs., 3 tabs.

  18. 129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  19. 111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL, UMBILICAL MAST PUMP ROOM (109), LSB (BLDG. 770) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 West, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  20. 20. OBLIQUE VIEW, VANE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. OBLIQUE VIEW, VANE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  1. 34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER P.H. #3, JUNE 23, 1943. SCE drawing no. 413187-1. - Santa Ana River Hydroelectric System, SAR-3 Powerhouse, San Bernardino National Forest, Redlands, San Bernardino County, CA

  2. 18. VIEW OF URBAN DISPATCH RELAY ROOM, FIRST FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. VIEW OF URBAN DISPATCH - RELAY ROOM, FIRST FLOOR (THIS IS THE CONTROL CENTER FOR TRACK SWITCHES) - Pennsylvania Railroad, Harrisburg Station & Trainshed, Market & South Fourth Streets, Harrisburg, Dauphin County, PA

  3. Reliable quantum communication over a quantum relay channel

    SciTech Connect

    Gyongyosi, Laszlo; Imre, Sandor

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  4. 130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  5. 132. INTERIOR OF HYDRAULIC PUMPING UNIT RELAY BOX ON SOUTH ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    132. INTERIOR OF HYDRAULIC PUMPING UNIT RELAY BOX ON SOUTH WALL OF CONTROL ROOM (114), LSB (BLDG. 770) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 West, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  6. 16. FRONT VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    16. FRONT VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  7. 51. Electrical contacts and relays in the south machinery room ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    51. Electrical contacts and relays in the south machinery room (interior of both machinery rooms is identical). Facing south. - Henry Ford Bridge, Spanning Cerritos Channel, Los Angeles-Long Beach Harbor, Los Angeles, Los Angeles County, CA

  8. INTERIOR, FIRST FLOOR, SHOWING BANKS OF ELECTROMECHANICAL RELAYS, CAMERA FACING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    INTERIOR, FIRST FLOOR, SHOWING BANKS OF ELECTRO-MECHANICAL RELAYS, CAMERA FACING SOUTHEAST. - New Haven Rail Yard, Interlocking Control Building, Vicinity of Union Avenue, New Haven, New Haven County, CT

  9. 19. FRONT VIEW, VALVE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. FRONT VIEW, VALVE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  10. 10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS Baltimore ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS - Baltimore & Potomac Interlocking Tower, Adjacent to AMTRAK railroad tracks in block bounded by Howard Street, Jones Falls Expressway, Maryland Avenue & Falls Road, Baltimore, Independent City, MD

  11. 17. SIDE VIEW, DETAIL, MODEL 15 VANE RELAY, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    17. SIDE VIEW, DETAIL, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  12. 8. North elevation of electric relay station showing electrical cable ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. North elevation of electric relay station showing electrical cable connection to tower. - New York, New Haven, & Hartford Railroad, Shell Interlocking Tower, New Haven Milepost 16, approximately 100 feel east of New Rochelle Junction, New Rochelle, Westchester County, NY

  13. 18. SIDE VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. SIDE VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  14. 76 FR 31261 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission. ACTION: Final rule; correction. SUMMARY: The Federal Communications Commission (FCC) is correcting...

  15. Signal relay during the life cycle of Dictyostelium.

    PubMed

    Mahadeo, Dana C; Parent, Carole A

    2006-01-01

    A fundamental property of multicellular organisms is signal relay, the process by which information is transmitted from one cell to another. The integration of external information, such as nutritional status or developmental cues, is critical to the function of organisms. In addition, the spatial organizations of multicellular organisms require intricate signal relay mechanisms. Signal relay is remarkably exhibited during the life cycle of the social amoebae Dictyostelium discoideum, a eukaryote that retains a simple way of life, yet it has greatly contributed to our knowledge of the mechanisms cells use to communicate and integrate information. This chapter focuses on the molecules and mechanisms that Dictyostelium employs during its life cycle to relay temporal and spatial cues that are required for survival.

  16. 14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  17. 15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  18. Preamble-based channel estimation in single-relay networks using FBMC/OQAM

    NASA Astrophysics Data System (ADS)

    Mavrokefalidis, Christos; Kofidis, Eleftherios; Rontogiannis, Athanasios A.; Theodoridis, Sergios

    2014-12-01

    Preamble-based channel estimation in filter bank-based multicarrier (FBMC) systems using offset quadrature amplitude modulation (OQAM) has been extensively studied in the last few years, due to the many advantages this modulation scheme can offer over cyclic prefix (CP)-based orthogonal frequency division multiplexing (OFDM) and in view of the interesting challenges posed on the channel estimator by the interference effect inherent in such an FBMC system. In particular, preambles of short duration and of both the block ( full) and comb ( sparse) types were designed so as to minimize the channel estimation mean squared error (MSE) subject to a given transmit energy. In the light of the important role that relay-based cooperative networks are expected to play in future wireless communication systems, it is of interest to consider FBMC/OQAM, and in particular questions associated to preamble-based channel estimation, in such a context as well. The goal of this paper is to address these problems and come up with optimal solutions that extend existing results in a single relay-based cooperative network. Both low and medium frequency selective channels are considered. In addition to optimal preamble and estimator design, the equalization/detection task is studied, shedding light to a relay-generated interference effect and proposing a simple way to come over it. The reported simulation results corroborate the analysis and reveal interesting behavior with respect to channel frequency selectivity and signal-to-noise ratio.

  19. Quantum relays and noise suppression using linear optics

    SciTech Connect

    Jacobs, B.C.; Pittman, T.B.; Franson, J.D.

    2002-11-01

    Probabilistic quantum nondemolition (QND) measurements can be performed using linear optics and postselection. Here we show how QND devices of this kind can be used in a straightforward way to implement a quantum relay, which is capable of extending the range of a quantum cryptography system by suppressing the effects of detector noise. Unlike a quantum repeater, a quantum relay system does not require entanglement purification or the ability to store photons.

  20. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  1. Controllability Analysis for Operation Margin of Zone 3 Impedance Relay

    NASA Astrophysics Data System (ADS)

    Li, Shenghu; Yorino, Naoto; Zoka, Yoshifumi

    Undesirable operation of zone 3 impedance relay (mho relays) is a possible factor for causing cascading failure as seen in several previous large scale blackouts, where power flow redistribution and power swing caused by outage or switching operations satisfy the condition for the relay operation. So far, the condition itself has not fully been investigated, and therefore, there has been little attempt to avoid the relay operation by means of direct power flow control. This paper analyzes the condition for zone 3 relay operation from the viewpoint of its sensitivity to power flow. An operating margin for security is defined for each relay to carry out effective monitoring. It is newly pointed out that undesirable operation can be effectively avoided by reactive power controls as well as real power controls. The method to compute the operation margin is also given through the analysis of the optimal Var location to control the operation margin. Effectiveness of the proposed method is demonstrated using the IEEE test systems.

  2. Scenario Graphs and Attack Graphs

    DTIC Science & Technology

    2004-04-14

    46 6.1 Vulnerability Analysis of a Network . . . . . . . . . . . . . . . . . . . . . . . . . 53 6.2 Sandia Red Team Attack Graph...asymptotic bound. The test machine was a 1Ghz Pentium III with 1GB of RAM, running Red Hat Linux 7.3. Figure 4.1(a) plots running time of the implemen...host scanning tools network information vulnerability Attack Graph network Red

  3. Gout attacks and lunar cycle.

    PubMed

    Mikulecký, M; Rovenský, J

    2000-07-01

    The aim was to search for periodical fluctuations in daily occurrence of gout attacks during the synodic lunar cycle. 126 gout attacks were recorded between 1972 and 1994 at known calendar dates. The synodic plexogram, displaying the number of attacks for each day of the cycle, was processed by cosinor regression. A pronounced cycling was found, with highest peaks under the new and full moon (syzygigies). Thus, the maximal occurrence of attacks coincides with the peaking lunisolar tidal effect. Similar relation of attacks to synodic moon was seen in bronchial asthma of children, and a reciprocal one in paroxysmal tachyarrhythmia. Differing pathogenetic backgrounds of these diseases substantiate the observed differences in their putative reactions on the changing cosmogeophysical environment.

  4. A Survey of Insider Attack Detection Research

    DTIC Science & Technology

    2008-08-25

    many commands unobserved in the training data, a Markov model is not usable . Here, a simple independence model with probabilities estimated from a...a predefined reordering between commands. They achieve high accuracy but also high false positive rates on their experiments. Seo and Cha [Error...scope of this paper. How- ever, some work has been done focusing on web profiling for security problems. Kim, Cho, Seo , Lee, and Cha studied the

  5. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  6. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  7. Reducing Communication Detection and Eavesdropping using Mobile Agent Relay Networks

    DTIC Science & Technology

    2010-12-01

    to maintain a wireless network to support the users. This type of solution is often used in Mobile Ad Hoc Networking (MANET) ( Corson 1999). MANET...USA: IEEE Computer Society. Corson , S. 1999. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC

  8. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond

    PubMed Central

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. PMID:27898712

  9. Can You Recognize a Heart Attack? Quiz

    MedlinePlus

    ... Heart Attack? Updated:Sep 16,2016 Begin the quiz Heart Attack • Home • About Heart Attacks Acute Coronary ... in Women “Can you recognize a heart attack?” Quiz • Understand Your Risks to Prevent a Heart Attack ...

  10. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... No. 03-123; DA 10-1235] Telecommunications Relay Services and Speech-to-Speech Services for... waivers of certain Telecommunications Relay Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP Relay). The waived TRS mandatory minimum standards are:...

  11. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    DTIC Science & Technology

    2001-10-01

    capacity • Reducing the amount of resources consumed • Monitoring traffic volume • Tracing attack packets though the Internet Detecting subverted...attempt to reduce the amount of resources consumed during a DDoS attack. NetBSD will accelerate its timeouts of partially opened TCP connections at times...should be nearly comparable to a system that does not use the payment mechanisms. There is prior work on how pricing can be used to influence consumer

  12. Analysis on Soft-Decision-and-Forward Cooperative Networks with Multiple Relays

    NASA Astrophysics Data System (ADS)

    Song, Kyoung-Young; Kim, Jaehong; No, Jong-Seon; Chung, Habong

    In this paper, we analyze the best relay selection scheme for the soft-decision-and-forward (SDF) cooperative networks with multiple relays. The term ‘best relay selection’ implies that the relay having the largest end-to-end signal-to-noise ratio is selected to transmit in the second phase transmission. The approximate performances in terms of pairwise error probability (PEP) and bit error rate (BER) are analyzed and compared with the conventional multiple-relay transmission scheme where all the relays participate in the second phase transmission. Using the asymptotics of the Fox's H-function, the diversity orders of the best relay selection and conventional relay scheme for the SDF cooperative networks are derived. It is shown that both have the same full diversity order. The numerical results show that the best relay selection scheme outperforms the conventional one in terms of bit error rate.

  13. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  14. Relay Selection Based Double-Differential Transmission for Cooperative Networks with Multiple Carrier Frequency Offsets: Model, Analysis, and Optimization

    NASA Astrophysics Data System (ADS)

    Zhao, Kun; Zhang, Bangning; Pan, Kegang; Liu, Aijun; Guo, Daoxing

    2014-07-01

    Due to the distributed nature, cooperative networks are generally subject to multiple carrier frequency offsets (MCFOs), which make the channels time-varying and drastically degrade the system performance. In this paper, to address the MCFOs problem in detect-andforward (DetF) multi-relay cooperative networks, a robust relay selection (RS) based double-differential (DD) transmission scheme, termed RSDDT, is proposed, where the best relay is selected to forward the source's double-differentially modulated signals to the destination with the DetF protocol. The proposed RSDDT scheme can achieve excellent performance over fading channels in the presence of unknown MCFOs. Considering double-differential multiple phase-shift keying (DDMPSK) is applied, we first derive exact expressions for the outage probability and average bit error rate (BER) of the RSDDT scheme. Then, we look into the high signal-to-noise ratio (SNR) regime and present simple and informative asymptotic outage probability and average BER expressions, which reveal that the proposed scheme can achieve full diversity. Moreover, to further improve the BER performance of the RSDDT scheme, we investigate the optimum power allocation strategy among the source and the relay nodes, and simple analytical solutions are obtained. Numerical results are provided to corroborate the derived analytical expressions and it is demonstrated that the proposed optimum power allocation strategy offers substantial BER performance improvement over the equal power allocation strategy.

  15. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  16. Allergens might trigger migraine attacks.

    PubMed

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  17. High Angle of Attack Aerodynamics

    DTIC Science & Technology

    1979-01-01

    HIGH ANGLE OF ATTACK IN A VERY LOW TURBULENCE LEVEL AIR STREAM by B.L.Hunt and P.C.Dexter 17 WIND AND WATER TUNNEL INVESTIGATIONS OF THE INTERACTION OF...FIGURE 1. TYPICAL FIGffTER FOREBODY LENGTHS It baa been convincingly shown in small-scale wind tunnel and water tunnel experiments that the apfro...attack taken during a water tunnel test. jn asymmetric vor~ox pattern io clearly ubewn. LOW ANGLE OF ATTACKC HIGH ANGLE OF ATTACK (SYMMETRIC

  18. Relays from Mars demonstrate international interplanetary networking

    NASA Astrophysics Data System (ADS)

    2004-08-01

    On 4 August at 14:24 CEST, as Mars Express flew over one of NASA’s Mars exploration rovers, Opportunity, it successfully received data previously collected and stored by the rover. The data, including 15 science images from the rover's nine cameras, were then downlinked to ESA’s European Space Operations Centre in Darmstadt (Germany) and immediately relayed to the Mars Exploration Rovers team based at the Jet Propulsion Laboratory in Pasadena, USA. NASA orbiters Mars Odyssey and Mars Global Surveyor have so far relayed most of the data produced by the rovers since they landed in January. Communication compatibility between Mars Express and the rovers had already been demonstrated in February, although at a low rate that did not convey much data. The 4 August session, at a transmit rate of 42.6 megabits in about six minutes, set a new mark for international networking around another planet. The success of this demonstration is the result of years of groundwork and was made possible because both Mars Express and the Mars rovers use the same communication protocol. This protocol, called Proximity-1, was developed by the international Consultative Committee for Space Data Systems, an international partnership for standardising techniques for handling space data. Mars Express was 1400 kilometres above the Martian surface during the 4 August session with Opportunity, with the goal of a reliable transfer of lots of data. Engineers for both agencies plan to repeat this display of international cooperation today, 10 August, with another set of Opportunity images. “We're delighted how well this has been working, and thankful to have Mars Express in orbit,” said Richard Horttor of NASA's Jet Propulsion Laboratory, Pasadena, California, project manager for NASA's role in Mars Express. JPL engineer Gary Noreen of the Mars Network Office said: “the capabilities that our international teamwork is advancing this month could be important in future exploration of Mars

  19. Understand Your Risk of Heart Attack

    MedlinePlus

    ... Aneurysm More Understand Your Risks to Prevent a Heart Attack Updated:Sep 16,2016 Knowledge is power, so ... medication. This content was last reviewed June 2016. Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  20. Lifestyle Changes for Heart Attack Prevention

    MedlinePlus

    ... from the NHLBI on Twitter. How Can a Heart Attack Be Prevented? Lowering your risk factors for coronary ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  1. Associative Covalent Relay: An Oxadiazolone Strategy for Rhodium(III)-Catalyzed Synthesis of Primary Pyridinylamines.

    PubMed

    Yu, Xiaolong; Chen, Kehao; Wang, Qi; Guo, Shan; Zha, Shanke; Zhu, Jin

    2017-04-05

    A relay formalism is proposed herein for categorizing the interplay among reactants, target product, and catalytic center in transition-metal catalysis, an important factor that can dictate overall catalysis viability and efficiency. In this formalism, transition-metal catalysis can proceed by dissociative relay, associative covalent relay, and associative dative relay modes. An intriguing associative covalent relay process operates in rhodium(III)-catalyzed oxadiazolone-directed alkenyl C-H coupling with alkynes and allows efficient access to primary pyridinylamines. Although the primary pyridinylamine synthesis mechanism is posteriori rationalized, the relay formalism formulated herein can provide an important mechanistic conceptual framework for future catalyst design and reaction development.

  2. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  3. Commercialization and Standardization Progress Towards an Optical Communications Earth Relay

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2015-01-01

    NASA is planning to launch the next generation of a space based Earth relay in 2025 to join the current Space Network, consisting of Tracking and Data Relay Satellites in space and the corresponding infrastructure on Earth. While the requirements and architecture for that relay satellite are unknown at this time, NASA is investing in communications technologies that could be deployed to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in 2018 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the next generation space based relay. This paper will describe NASA efforts in the on-going commercialization of optical communications and the development of inter-operability standards. Both are seen as critical to making optical communications a reality on future NASA science and exploration missions. Commercialization is important because NASA would like to eventually be able to simply purchase an entire optical communications terminal from a commercial provider. Inter-operability standards are needed to ensure that optical communications terminals developed by one vendor are compatible with the terminals of another. International standards in optical communications would also allow the space missions of one nation to use the infrastructure of another.

  4. Energy efficiency analysis of relay-assisted cellular networks

    NASA Astrophysics Data System (ADS)

    Yu, Huan; Li, Yunzhou; Kountouris, Marios; Xu, Xibin; Wang, Jing

    2014-12-01

    To meet the demand for higher throughput, improved coverage and enhanced reliability, future wireless cellular networks face significant technical challenges. One promising solution is to place relay stations between transmitters and receivers in the cellular network. Meanwhile, as energy consumption reduction has been an important concern for the wireless industry, energy-efficient communications is of prime interest for future networks. In this paper, we study whether and how relays can improve the energy efficiency of cellular networks. Specifically, the energy efficiency of relay-assisted cellular networks is analyzed using tools of stochastic geometry. We first derive the coverage probability for the macro base station (MBS) to user (UE), the MBS to relay station (RS), and the RS to UE links, and then we model the power consumption at the MBS and RS. Based on the analytical model and expressions, the energy efficiency of relay-assisted cellular networks is then evaluated and is shown to be strictly quasi-concave on the transmit power for MBS to UE link or the RS to UE link. Numerical results show that the energy efficiency first improves while it hits a ceiling as the MBS density increases.

  5. Learning relay start strategies in swimming: What feedback is best?

    PubMed

    Fischer, Sebastian; Braun, Claudia; Kibele, Armin

    2017-04-01

    In the past, studies and book recommendations on relay starts in swimming have been predominantly focused on the change-over time (COT) as a performance criterion. Aside from the circular backswing start with parallel foot placement, few studies have analysed differences in the take-off movement including step approaches as well. Although trends could be identified, the results remained still somewhat inconclusive. In contrast, no study has examined as has examined whether a reduction of COT in between wall contact of the income swimmer and the take-off of the outgoing swimmer is an optimal relay start strategy, as advocated by various swimming experts. Therefore, the purpose of this study was to compare two different relay start strategies: offensive strategy minimizing COT and conservative strategy to maximize horizontal peak force (HPF). In this regard, a learning intervention with 24 elite-level swimmers (12 females, 12 male) was conducted to compare both strategies regarding relay start time, HPF and COT. Subjects were randomly assigned to two feedback groups: COT versus HPF at take-off. The results of this study showed a clear advantage for HPF feedback for relay start performance measured by wall contact of the incoming swimmer and head passage at 7.5 m of the outgoing swimmer. In addition, similar reductions in COTs were found in both training groups. In conclusion, swimmers should focus on force production rather than minimizing COT. For the latter, deteriorating consequences for force production must be considered.

  6. A novel relay method for determining low-clearance values.

    PubMed

    Di, Li; Trapa, Patrick; Obach, R Scott; Atkinson, Karen; Bi, Yi-An; Wolford, Angela C; Tan, Beijing; McDonald, Thomas S; Lai, Yurong; Tremaine, Larry M

    2012-09-01

    A novel relay method has been developed using cryopreserved human hepatocytes to measure intrinsic clearance of low-clearance compounds. The relay method involved transferring the supernatant from hepatocyte incubations to freshly thawed hepatocytes at the end of the 4-h incubation to prolong the exposure time to active enzymes in hepatocytes. An accumulative incubation time of 20 h or longer in hepatoctyes can be achieved using the method. The relay method was validated using seven commercial drugs (diazepam, disopyramide, theophylline, timolol, tolbutamide, S-warfarin, and zolmitriptan) that were metabolized by various cytochrome P450s with low human in vivo intrinsic clearance at approximately 2 to 15 ml · min⁻¹ · kg⁻¹. The results showed that the relay method produced excellent predictions of human in vivo clearance. The difference between in vitro and in vivo intrinsic clearance was within 2-fold for most compounds, which is similar to the standard prediction accuracy for moderate to high clearance compounds using hepatocytes. The relay method is a straightforward, relatively low cost, and easy-to-use new tool to address the challenges of low clearance in drug discovery and development.

  7. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  8. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2013-12-01

    2005 FEB 2005 Selective Availability Anti- Spoofing Module (SAASM)/ GPS Anti-Jam Production Award N/A MAR 2005 SEP 2005 MAR 2005 Change Explanations...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2015 President’s Budget...2013 to 00-00-2013 4. TITLE AND SUBTITLE Joint Direct Attack Munition (JDAM) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  9. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  10. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  11. Bilayer Protograph Codes for Half-Duplex Relay Channels

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; VanNguyen, Thuy; Nosratinia, Aria

    2013-01-01

    Direct to Earth return links are limited by the size and power of lander devices. A standard alternative is provided by a two-hops return link: a proximity link (from lander to orbiter relay) and a deep-space link (from orbiter relay to Earth). Although direct to Earth return links are limited by the size and power of lander devices, using an additional link and a proposed coding for relay channels, one can obtain a more reliable signal. Although significant progress has been made in the relay coding problem, existing codes must be painstakingly optimized to match to a single set of channel conditions, many of them do not offer easy encoding, and most of them do not have structured design. A high-performing LDPC (low-density parity-check) code for the relay channel addresses simultaneously two important issues: a code structure that allows low encoding complexity, and a flexible rate-compatible code that allows matching to various channel conditions. Most of the previous high-performance LDPC codes for the relay channel are tightly optimized for a given channel quality, and are not easily adapted without extensive re-optimization for various channel conditions. This code for the relay channel combines structured design and easy encoding with rate compatibility to allow adaptation to the three links involved in the relay channel, and furthermore offers very good performance. The proposed code is constructed by synthesizing a bilayer structure with a pro to graph. In addition to the contribution to relay encoding, an improved family of protograph codes was produced for the point-to-point AWGN (additive white Gaussian noise) channel whose high-rate members enjoy thresholds that are within 0.07 dB of capacity. These LDPC relay codes address three important issues in an integrative manner: low encoding complexity, modular structure allowing for easy design, and rate compatibility so that the code can be easily matched to a variety of channel conditions without extensive

  12. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; Thomas, Reid C.; Varghese, Phil; Signori, Gina; Schmitz, Peter

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  13. Recent results in Mars Relay Network planning and scheduing

    NASA Technical Reports Server (NTRS)

    Lee, C. H.; Cheung, K. M.

    2003-01-01

    At different time periods in the future, Mars missions will overlap and previous studies indicate that during such periods existing deep space communication infrastructure will not be able to handle all Mars communication needs. A plausible solution is to perform optimal resource allocation for the Mars relay communication network; a network consisting of multiple surface units and orbiters on Mars and the Deep Space Stations. Unlike direct-to-earth, a relay communication, either in real-time or store-and-forward, can increase network science data return, reduce surface unit's direct-to-earth communication demands, and enable communication even when the surface unit is not facing Earth. It is the objective of this paper to take advantage of the relay operation to efficiently plan and schedule the network communications.

  14. VoiceRelay: voice key operation using visual basic.

    PubMed

    Abrams, Lise; Jennings, David T

    2004-11-01

    Using a voice key is a popular method for recording vocal response times in a variety of language production tasks. This article describes a class module called VoiceRelay that can be easily utilized in Visual Basic programs for voice key operation. This software-based voice key offers the precision of traditional voice keys (although accuracy is system dependent), as well as the flexibility of volume and sensitivity control. However, VoiceRelay is a considerably less expensive alternative for recording vocal response times because it operates with existing PC hardware and does not require the purchase of external response boxes or additional experiment-generation software. A sample project demonstrating implementation of the VoiceRelay class module may be downloaded from the Psychonomic Society Web archive, www.psychonomic.org/archive.

  15. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  16. The countermeasures against the blinding attack in quantum key distribution

    NASA Astrophysics Data System (ADS)

    Wang, Jindong; Wang, Hong; Qin, Xiaojuan; Wei, Zhengjun; Zhang, Zhiming

    2016-01-01

    It has been shown that the single photon detectors (SPDs) based on the avalanche photodiode (APD) can be blinded and controlled by the bright light and short trigger pulses. Eavesdropper can get the full information without causing additional quantum bit error rate. Hence, in order to guarantee the security of the quantum key distribution (QKD) systems, some countermeasures, by changing the characteristic of the SPD or monitoring the parameters of the detector, are presented by some research groups. In this paper, we provide a new and effective countermeasure against the blinding attack based on improving the optical scheme of the decoding unit in the QKD system rather than only considering the characteristic of the SPD. In our proposal we use a coupler with asymmetric splitting ratio to distinguish the detection characteristic of the SPD with blinding attack from that without blinding attack. The detailed analysis shows that the proposed scheme is feasible to defense the blinding attack.

  17. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  18. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  19. An analytical study of relay neuron's reliability: dependence on input and model parameters.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2011-01-01

    Relay neurons are widely found in our nervous system, including the Thalamus, spinal cord and lateral geniculate body. They receive a modulating input (background activity) and a reference input. The modulating input modulates relay of the reference input. This modulation is critical for correct functioning of relay neurons, but is poorly understood. In this paper, we use a biophysical-based model and systems theoretic tools to calculate how well a single relay neuron relays a reference input signal as a function of the neuron's electro physiological properties (i.e. model parameters), the modulating signal, and the reference signal parameters. Our analysis is more rigorous than previous related works and is generalizable to all relay cells in the body. Our analytical expression matches relay performance obtained in simulation and suggest that increasing the frequency of a sinusoidal modulating input or decreasing its DC offset increases the relay cell reliability.

  20. 77 FR 18106 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-27

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... Relay Service (VRS) industry. DATES: Effective September 26, 2011. FOR FURTHER INFORMATION...

  1. 77 FR 33662 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., August 5, 2011. The interim regulations require Internet- based Telecommunications Relay Service...

  2. Overview and status of the laser communication relay demonstration

    NASA Astrophysics Data System (ADS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-03-01

    NASA is presently developing the first all-optical high data rate satellite relay system, LCRD. To be flown on a geosynchronous satellite, it will communicate with DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory, and another on a Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments.

  3. Overview and Status of the Laser Communication Relay Demonstration

    NASA Technical Reports Server (NTRS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-01-01

    NASA is presently developing first all optical high data rate satellite relay system, LCRD. To be flown on commercial geosynchronous satellite, it will communicate at DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory and another on Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments. In this paper we will report on the current state of LCRD system development, planned operational scenarios and expected system performance.

  4. Profiler-2000: Attacking the Insider Threat

    DTIC Science & Technology

    2005-09-01

    s/ JOSEPH CAMERA, Chief Information & Intelligence Exploitation Division Information Directorate REPORT...Approaches to undermining anomaly detectors………………………………9 3.3 Detection coverage of an anomaly detector………………………………….10 3.4 Deploying Exploits and Sensors...13 3.5 Where and how an attack manifests in the data……………………………...13 3.6 Manipulating the manifestation; modifying exploits

  5. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-07

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  7. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  8. Performance Analysis of MIMO Relay Network via Propagation Measurement in L-Shaped Corridor Environment

    NASA Astrophysics Data System (ADS)

    Lertwiram, Namzilp; Tran, Gia Khanh; Mizutani, Keiichi; Sakaguchi, Kei; Araki, Kiyomichi

    Setting relays can address the shadowing problem between a transmitter (Tx) and a receiver (Rx). Moreover, the Multiple-Input Multiple-Output (MIMO) technique has been introduced to improve wireless link capacity. The MIMO technique can be applied in relay network to enhance system performance. However, the efficiency of relaying schemes and relay placement have not been well investigated with experiment-based study. This paper provides a propagation measurement campaign of a MIMO two-hop relay network in 5GHz band in an L-shaped corridor environment with various relay locations. Furthermore, this paper proposes a Relay Placement Estimation (RPE) scheme to identify the optimum relay location, i.e. the point at which the network performance is highest. Analysis results of channel capacity show that relaying technique is beneficial over direct transmission in strong shadowing environment while it is ineffective in non-shadowing environment. In addition, the optimum relay location estimated with the RPE scheme also agrees with the location where the network achieves the highest performance as identified by network capacity. Finally, the capacity analysis shows that two-way MIMO relay employing network coding has the best performance while cooperative relaying scheme is not effective due to shadowing effect weakening the signal strength of the direct link.

  9. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  10. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ... Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities AGENCY... Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and Speech-to-Speech Services..., in order to be eligible for compensation from the Interstate Telecommunications Relay Service...

  11. 76 FR 67118 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... . SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Structure and Practices of the Video Relay..., 254(k), 616 and 620, unless otherwise noted. Subpart F--Telecommunications Relay Services and...

  12. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  13. 76 FR 68328 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Structure and Practices of the Video Relay Service Program, CG Docket No. 10-51; FCC 11-118, published at...

  14. 76 FR 24437 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... proposed modifications to its certification process for Internet-based relay providers to ensure that all entities seeking certification to provide Internet-based telecommunications relay services (TRS) in...

  15. 76 FR 68116 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... No. 10-51; FCC 11-118] Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Practices of the Video Relay Service Program, CG Docket No. 10-51, FCC 11-118, published at 76 FR...

  16. Development of a Relay Performance Web Tool for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.

  17. 76 FR 30841 - Structure and Practices of the Video Relay Service Program; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-27

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program; Correction AGENCY... document ] adopted rules to address fraud, waste, and abuse in the Video Relay Service (VRS) industry... Internet-based relay service, including documentation on loans for equipment, inventory,...

  18. 75 FR 39859 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... addressing the certification of provider information for Telecommunications Relay Services (TRS) calls. By... the Video Relay Service Program, Order, document FCC 10-88, adopted May 24, 2010, and released May...

  19. 75 FR 39945 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... COMMISSION Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... Telecommunications Relay Service (TRS) Fund (Fund) payments may be suspended to providers that do not submit to... summary of the Commission's Structure and Practices of the Video Relay Service Program, Declaratory...

  20. 76 FR 8659 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Date: January 31, 2014. Title: Structure and Practices of the Video Relay Service Program, CG Docket...

  1. 76 FR 59557 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... proceeding concerning Structure and Practices of the Video Relay Service Program, Second Report and Order and... oppositions and replies. In light of impending deadlines for initial and ] recertification Video Relay...

  2. 76 FR 47469 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... COMMISSION 47 CFR Part 64 CG Docket No. 10-51; FCC 11-118] Structure and Practices of the Video Relay Service... Commission adopts modifications to its certification process for all Internet-based telecommunications relay... Commission's Structure and Practices of the Video Relay Service Program, Second Report and Order...

  3. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  4. 76 FR 68642 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-07

    ...; FCC 11-155] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... information collection associated with the Commission's Structure and Practices of the Video Relay Service... Practices of the Video Relay Service Program; Sprint Nextel Corporation Expedited Petition for...

  5. 78 FR 55249 - Transmission Relay Loadability Reliability Standard; Notice of Compliance Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... Energy Regulatory Commission Transmission Relay Loadability Reliability Standard; Notice of Compliance... Interconnections. \\1\\ Transmission Relay Loadability Reliability Standard, Order No. 733, 130 FERC ] 61, 221 (2010..., Order No. 733-B, 136 FERC ] 61,185 (2011). \\2\\ Transmission Relay Loadability Reliability Standard,...

  6. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  7. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  8. 77 FR 60630 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-04

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... 2, 2011, 76 FR 24393. The final regulations address fraud, waste, and abuse in the Video Relay... Relay Service (TRS) Fund administrator and the Commission on the need to inquire further about, and...

  9. 76 FR 58424 - Transmission Relay Loadability Reliability Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... Energy Regulatory Commission 18 CFR Parts 39 and 40 Transmission Relay Loadability Reliability Standard... section 215 of the Federal Power Act, the Commission proposes to approve Reliability Standard PRC-023-2... Reliability Corporation (NERC), the Electric Reliability Organization (ERO) certified by the Commission....

  10. Spacecraft Orbits for Earth/Mars-Lander Radio Relay

    NASA Technical Reports Server (NTRS)

    Noreen, Gary; Diehl, Roger; Neelon, Joseph

    2004-01-01

    A report discusses a network of spacecraft, in orbit around Mars, used to relay radio communications between Earth stations and mobile exploratory robots (rovers) as well as stationary scientific instruments that have been landed on the Mars surface. The relay spacecraft include two already in orbit plus several others planned to arrive at Mars in the years 2004 through 2008. A major portion of the report is devoted to the orbit of the G. Macroni Orbiter, which is in the midst of an iterative design process and is intended to be the first Mars orbiter designed primarily for radio relay. Candidate orbits are analyzed with a view toward choosing one that maximizes the amount of time available for communication with surface units, taking account of visibility as a function of position, the limit on communication distance at low power, and the fact that surface units can transmit more easily when they are in sunlight. Two promising new orbits for Mars relay satellites are identified: a 1/2-sol apoapsis-at-constant-time-of-day equatorial orbit and a 1/4-sol apoapsis-at-constant-time-of-day, critical-inclination orbit.

  11. Protection Relaying Scheme Based on Fault Reactance Operation Type

    NASA Astrophysics Data System (ADS)

    Tsuji, Kouichi

    The theories of operation of existing relays are roughly divided into two types: one is the current differential types based on Kirchhoff's first law and the other is impedance types based on second law. We can apply the Kirchhoff's laws to strictly formulate fault phenomena, so the circuit equations are represented non linear simultaneous equations with variables fault point k and fault resistance Rf. This method has next two defect. 1) heavy computational burden for the iterative calculation on N-R method, 2) relay operator can not easily understand principle of numerical matrix operation. The new protection relay principles we proposed this paper focuses on the fact that the reactance component on fault point is almost zero. Two reactance Xf(S), Xf(R) on branch both ends are calculated by operation of solving linear equations. If signs of Xf(S) and Xf(R) are not same, it can be judged that the fault point exist in the branch. This reactance Xf corresponds to difference of branch reactance between actual fault point and imaginaly fault point. And so relay engineer can to understand fault location by concept of “distance". The simulation results using this new method indicates the highly precise estimation of fault locations compared with the inspected fault locations on operating transmission lines.

  12. The Tracking & Data Relay Satellite System. The New Space Network.

    ERIC Educational Resources Information Center

    Froehlich, Walter

    This publication describes the giant-capacity space communications installation called the "Tracking and Data Relay Satellite System" (TDRSS). Chapters include: (1) "A New Communications Bridge to Orbit" (illustrating what it is and how it looks); (2) "TDRSS Goes to Work" (describing how it functions); (3) "The…

  13. Hydrologic data relay by satellite from remote areas

    NASA Technical Reports Server (NTRS)

    Halliday, R. A. (Principal Investigator)

    1977-01-01

    The author has identified the following significant results. Experimental use of LANDSAT data collection system and the GOES system has demonstrated the feasibility of using this technology to relay hydrologic data from remote areas on a near real time basis. The system has proved to be accurate, reliable, and cost effective.

  14. 9. Detail of electrical cables from relay station to upper ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    9. Detail of electrical cables from relay station to upper floor of tower. Note the penetrations in the wall, right of center where cables formerly passed into the control room. - New York, New Haven, & Hartford Railroad, Shell Interlocking Tower, New Haven Milepost 16, approximately 100 feel east of New Rochelle Junction, New Rochelle, Westchester County, NY

  15. DETAIL OF ELECTROMECHANICAL RELAYS ON SHELVES, FIRST FLOOR, CAMERA FACING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    DETAIL OF ELECTRO-MECHANICAL RELAYS ON SHELVES, FIRST FLOOR, CAMERA FACING SOUTHWEST. THESE "UNION ROUTE INTERLOCKING SELECTION UNITS" ALLOWED RELATIVELY EASY REPLACEMENT OF MALFUNCTIONING CIRCUITS. - New Haven Rail Yard, Interlocking Control Building, Vicinity of Union Avenue, New Haven, New Haven County, CT

  16. 32. View of relay assembly group and interconnecting group electronic ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. View of relay assembly group and interconnecting group electronic modules located on second floor of transmitter building no. 102 in MIP area. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  17. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  18. Molecular orbital studies of enzyme activity: I: Charge relay system and tetrahedral intermediate in acylation of serine proteinases.

    PubMed Central

    Scheiner, S; Kleier, D A; Lipscomb, W N

    1975-01-01

    The charge relay ststem and its role in the acylation of serine proteinases is studied using the partial retention of diatomic differential overlap (PRDDO) technique to perform approximate ab initio molecular orbital calculations on a model of the enzyme-substrate complex. The aspartate in the charge relay system is seen to act as the ultimate proton acceptor during the charging of the serine nucleophile. A projection of the potential energy surface is obtained in a subspace corresponding to this charge transfer and to the coupled motions of active site residues and the substrate. These results together with extended basis set results for cruder models suggest that a concerted transfer of protons from Ser-195 to His-57 and from His-57 to Asp-102 occurs with an energy barrier of 20-25 kcal/mole (84-105 kJ/mole). The subsequent nucleophilic attack on the scissile peptide linkage by the charged serine is then seen to proceed energetically downhill to the tetrahedral intermediate. The formation of the tetrahedral intermediate from the Michaelis complex is calculated to be nearly thermoneutral. PMID:1058476

  19. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  20. Countermeasure against tailored bright illumination attack for DPS-QKD.

    PubMed

    Honjo, Toshimori; Fujiwara, Mikio; Shimizu, Kaoru; Tamaki, Kiyoshi; Miki, Shigehito; Yamashita, Taro; Terai, Hirotaka; Wang, Zhen; Sasaki, Masahide

    2013-02-11

    We propose a countermeasure against the so-called tailored bright illumination attack for differential-phase-shift QKD (DPS-QKD). By monitoring a rate of coincidence detection at a pair of superconducting nanowire single-photon detectors (SSPDs) which is connected at each of the output ports of Bob's Mach-Zehnder interferometer, Alice and Bob can detect and defeat this kind of attack. We also experimentally confirmed the feasibility of this countermeasure using our 1 GHz-clocked DPS-QKD system. In the emulation of the attack, we achieved much lower power of the bright illumination light compared with the original demonstration by using a pulse stream instead of broad pulses.

  1. Failure analysis of blistered gold plating on spot welded electrical relays

    NASA Technical Reports Server (NTRS)

    Sokolowski, Witold; O'Donnell, Tim

    1989-01-01

    Gold-plated stainless-steel sideplates, part of a JPL Galileo spacecraft electronic-relay assembly, exhibited blistering after resistance spot welding. Unacceptable relays had heavy nonuniform gold electrodeposited layers with thicknesses 4.5-11.5 microns. SEM and metallographic investigations indicated much higher heat input generated during the resistance spot welding in unacceptable relays. The attributes of acceptable welded relays are contrasted with unacceptable relays; the possible mechanism of laminar formation of polymeric material in the gold plating is discussed; and some recommendations are provided to prevent similar problems.

  2. Analysis and Measurement of Residual Stress in Bridge Membrane MEMS Relays

    NASA Astrophysics Data System (ADS)

    Ruan, Yong; Wang, Weizhong; Zhu, Yong; You, Zheng

    2017-04-01

    Microelectromechanical system (MEMS) relays are gradually replacing traditional relays because they are smaller and lighter and consume less power. However, performance parameters of MEMS relays, such as the pull-down voltage, response time, and resonant frequency, often deviate from those originally designed, due to residual stress generated during the fabrication process. We present herein a method to measure this residual stress, based on a metal bridge membrane MEMS relay, with the help of a nanoindenter and the finite-element method (FEM). The testing result lies in a reasonable range, indicating that this simple method is reliable and helpful for MEMS relay optimization.

  3. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... registrants as guest users prior to taking reasonable measures to verify their registration information. The... and registration system. In order to enable users to make calls under this ``guest user'' procedure... because in order to make IP Relay calls as a guest user, the user is given a ten-digit number that...

  4. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  5. Mitigating Higher Ed Cyber Attacks

    ERIC Educational Resources Information Center

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  6. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  7. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  8. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ... Relay Services; Telecommunications Relay Services and Speech-to-Speech Services for Individuals With... this document, the Commission amends telecommunications relay services (TRS) mandatory minimum standards applicable to Speech- to-Speech (STS) relay service. This action is necessary to ensure...

  9. A novel flavone-based fluorescent probe for relay recognition of HSO3(-) and Al(3+).

    PubMed

    Xu, Shuai; Tang, Ruiren; Wang, Zhen; Zhou, Yin; Yan, Rui

    2015-01-01

    In this work, a new flavone-based fluorescent probe 3-hydroxy-3'-formylflavone (3HFF) was designed to achieve highly selective relay recognition of HSO3(-) and Al(3+) in DMSO-H2O (2:8, v/v) solution. 3HFF displayed a highly selective response to HSO3(-) with a green fluorescence appearing at 524 nm. Moreover, the in situ generated 3HFF+HSO3(-) system demonstrated eminent relay recognition capability for Al(3+) with a blue fluorescence appearing at 453 nm by the formation of a 1:1 complex between 3HFF and Al(3+) in DMSO-H2O (2:8, v/v) solution. However, only slight change was observed in emission intensity with addition of Al(3+) to 3HFF, and indicated HSO3(-) was essential for the sensing of Al(3+). This work achieves the detection of HSO3(-) and Al(3+) by only one probe and provides another example for this rare combination (anion/metal).

  10. Crony Attack: Strategic Attack’s Silver Bullet

    DTIC Science & Technology

    2006-11-01

    by distributing a large amount of private goods to the selectorate—the cronies—can be termed kleptocracies . Many govern- ments do indeed resemble...where the high-private goods kleptocracy is a good model. Furthermore, while not an example of crony attack to affect policy change (as opposed to...information about those nearest to the leader. The relationships part is only the start. Kleptocracies , like orga- nized crime leaders, are clever

  11. The effect of asymmetric attack on trim angle of attack

    NASA Technical Reports Server (NTRS)

    Kruse, R. L.

    1983-01-01

    Ballistic range tests were conducted to determine the effect of an asymmetrically ablated heat shield on the trim angle of attack of an entry vehicle. The tests, which were in support of Project Galileo, were conducted in atmospheric air at Mach numbers from 0.7 to 2.0. For the results for the configuration that was tested, the deduced trim angle varied between 13 deg and 21 deg.

  12. Detection and Classification of Network Intrusions Using Hidden Markov Models

    DTIC Science & Technology

    2002-01-01

    system was able to detect buffer overflows, ftp-write attack, warez attack, guess telnet, guest and HTTPtunnel attacks. They claim that no false...already known attack that has been altered or a completely new attack. 95 Bibliography [1] Stuart McClure et. al “ Hacking Exposed: Network Security

  13. Point Relay Scanner Utilizing Ellipsoidal Mirrors

    NASA Technical Reports Server (NTRS)

    Manhart, Paul K. (Inventor); Pagano, Robert J. (Inventor)

    1997-01-01

    A scanning system uses a polygonal mirror assembly with each facet of the polygon having an ellipsoidal mirror located thereon. One focal point of each ellipsoidal mirror is located at a common point on the axis of rotation of the polygonal mirror assembly. As the mirror assembly rotates. a second focal point of the ellipsoidal mirrors traces out a scan line. The scanner can be utilized for scanned output display of information or for scanning information to be detected.

  14. A Black Hole Attack Model for Reactive Ad-Hoc Protocols

    DTIC Science & Technology

    2012-03-01

    Technology Conference. IEEE, 2003. pp. 2286-2290. [BhS09] N. Bhalaji, and A. Shanmugam. "Association Between Nodes to Combat Blackhole Attack in DSR...2012. 102 [PSA09] A. Prathapani, L. Santhanam, and P. Agrawal. "Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh

  15. On Distributed Strategies in Defense of a High Value Unit (HVU) Against a Swarm Attack

    DTIC Science & Technology

    2012-09-01

    and some may carry explosive with the intent of conducting a suicide attack. The HVU detects these attackers on its radar and determines that it is...for suicidal attacks. The maximum effective ranges of these types of weapons do not exceed 1 nmi (~1.8 km). Therefore, to be able to intercept the...the defenders as they try to intercept them, as they will be focused on the task at hand to destroy the HVU using a suicidal attack. 8 The

  16. Zika Attacks Nerves, Muscles, Other Tissues

    MedlinePlus

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  17. Beware Heart Attack Risk from Shoveling Snow

    MedlinePlus

    ... https://medlineplus.gov/news/fullstory_163566.html Beware Heart Attack Risk From Shoveling Snow Canadian study finds cases ... why men are more likely to suffer a heart attack after a heavy snowfall, researchers report. In a ...

  18. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  19. Adaptive selective relaying in cooperative free-space optical systems over atmospheric turbulence and misalignment fading channels.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-06-30

    In this paper, a novel adaptive cooperative protocol with multiple relays using detect-and-forward (DF) over atmospheric turbulence channels with pointing errors is proposed. The adaptive DF cooperative protocol here analyzed is based on the selection of the optical path, source-destination or different source-relay links, with a greater value of fading gain or irradiance, maintaining a high diversity order. Closed-form asymptotic bit error-rate (BER) expressions are obtained for a cooperative free-space optical (FSO) communication system with Nr relays, when the irradiance of the transmitted optical beam is susceptible to either a wide range of turbulence conditions, following a gamma-gamma distribution of parameters α and β, or pointing errors, following a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. A greater robustness for different link distances and pointing errors is corroborated by the obtained results if compared with similar cooperative schemes or equivalent multiple-input multiple-output (MIMO) systems. Simulation results are further demonstrated to confirm the accuracy and usefulness of the derived results.

  20. Network Attack Reference Data Set

    DTIC Science & Technology

    2004-12-01

    services they offer. When the attacker attempts to access system services in order to determine which are available, the scan is called a “ portscan ”. Network...Scans The following portscans were crafted using simPortScan.cc (Appendix B.2). Filename: scan V TCP fast seq small.tcp Source: Crafted...Stealthy Portscans . Journal of Computer Security, 10, 105–136. 6. Yegneswaran, V., Barford, P., and Ullrich, J. (2003). Internet Intrusions: Global

  1. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  2. The Case for Deep Space Telecommunications Relay Stations

    NASA Technical Reports Server (NTRS)

    Chandler, Charles W.; Miranda, Felix A. (Technical Monitor)

    2004-01-01

    Each future mission to Jupiter and beyond must carry the traditional suite of telecommunications systems for command and control and for mission data transmission to earth. The telecommunications hardware includes the large antenna and the high-power transmitters that enable the communications link. Yet future spacecraft will be scaled down from the hallmark missions of Galileo and Cassini to Jupiter and Saturn, respectively. This implies that a higher percentage of the spacecraft weight and power must be dedicated to telecommunications system. The following analysis quantifies this impact to future missions and then explores the merits of an alternative approach using deep space relay stations for the link back to earth. It will be demonstrated that a telecommunications relay satellite would reduce S/C telecommunications weight and power sufficiently to add one to two more instruments.

  3. Terror attacks influence driving behavior in Israel

    PubMed Central

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  4. Flashbulb memories of Paris attacks

    PubMed Central

    El Haj, Mohamad; Gandolphe, Marie-Charlotte; Wawrziczny, Emilie; Antoine, Pascal

    2016-01-01

    Abstract Rationale: Flashbulb memories are detailed and vivid memories of attributes of the reception context of surprising and emotionally arousing public events. Patient concerns and diagnosis: This paper offers a fine-grained view of flashbulb memories in a patient with mild Alzheimer's disease (AD). Interventions: The patient underwent a directed interview about the 13 November 2015 attacks in Paris. Outcomes: Unlike her memory about the date and month of the attacks, the patient provided accurate information about the year, time and places they occurred. The patient also provided accurate information about how she first became aware of the attacks, where she was, with whom, what she was doing, and what time it was when she learned about them. As for the affective characteristics of these memories, she tended to have high ratings of vividness and rehearsal. Negative emotional states and great surprise and novelty were also reported. Lessons: By assessing the impact of flashbulb memories in this patient with AD, this paper offers a unique view into how such memories may trigger a considerable recall of context as well much subjective reliving. PMID:27861395

  5. The Reverse Statistical Disclosure Attack

    NASA Astrophysics Data System (ADS)

    Mallesh, Nayantara; Wright, Matthew

    Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on finding the receivers to whom a given targeted user sends. In this paper, we investigate the effectiveness of statistical disclosure in finding all of a users' contacts, including those from whom she receives messages. To this end, we propose a new attack called the Reverse Statistical Disclosure Attack (RSDA). RSDA uses observations of all users sending patterns to estimate both the targeted user's sending pattern and her receiving pattern. The estimated patterns are combined to find a set of the targeted user's most likely contacts. We study the performance of RSDA in simulation using different mix network configurations and also study the effectiveness of cover traffic as a countermeasure. Our results show that that RSDA outperforms the traditional SDA in finding the user's contacts, particularly as the amounts of user traffic and cover traffic rise.

  6. Strain compatibility and fault linkage in relay zones on normal faults

    NASA Astrophysics Data System (ADS)

    Long, Jonathan J.; Imber, Jonathan

    2012-03-01

    Relay zones on normal faults are unlikely to have tabular geometries as depicted in idealised models. Rotation of a relay ramp between non-parallel and non-planar relay-bounding faults will inevitably lead to strain compatibility problems causing open gaps or overlaps within the relay zone. Linkage of relay-bounding faults does not evolve from a single branch point. Rather, linkage occurs at multiple points along the fault tip lines giving rise to initially discontinuous branch lines. Where linkage occurs along a discontinuous slip-aligned branch line, displacement at different levels within the relay zone is partitioned between variable amounts of ramp rotation and slip across the branch line. The linking fault propagates when strain compatibility can no longer be maintained by continuous deformation processes, such as thickening or thinning of incompetent layers within the relay ramp. Step-like changes in vertical displacement vs. distance (D - x) profiles on horizons containing apparently intact relay ramps are probably indicative of incipient breaching and can be used predict the presence of a slip-aligned branch line in the sub-surface. Despite the complexity of the strain distribution within relay zones, the total vertical displacement across the relay remains geometrically coherent at all levels.

  7. Distributed beamforming designs to improve physical layer security in wireless relay networks

    NASA Astrophysics Data System (ADS)

    Qian, Mujun; Liu, Chen; Fu, Youhua

    2014-12-01

    This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

  8. The Dynamic Disulfide Relay of Quiescin Sulfhydryl Oxidase

    PubMed Central

    Alon, Assaf; Grossman, Iris; Gat, Yair; Kodali, Vamsi K.; DiMaio, Frank; Mehlman, Tevie; Haran, Gilad; Baker, David; Thorpe, Colin; Fass, Deborah

    2012-01-01

    Protein stability, assembly, localization, and regulation often depend on formation of disulfide cross-links between cysteine side chains. Enzymes known as sulfhydryl oxidases catalyze de novo disulfide formation and initiate intra- and intermolecular dithiol/disulfide relays to deliver the disulfides to substrate proteins1,2. Quiescin sulfhydryl oxidase (QSOX) is a unique, multi-domain disulfide catalyst that is localized primarily to the Golgi apparatus and secreted fluids3 and has attracted attention due to its over-production in tumors4,5. In addition to its physiological importance, QSOX is a mechanistically intriguing enzyme, encompassing functions typically carried out by a series of proteins in other disulfide formation pathways. How disulfides are relayed through the multiple redox-active sites of QSOX and whether there is a functional benefit to concatenating these sites on a single polypeptide are open questions. We determined the first crystal structure of an intact QSOX enzyme, derived from a trypanosome parasite. Notably, sequential sites in the disulfide relay were found more than 40 Å apart in this structure, too far for direct disulfide transfer. To resolve this puzzle, we trapped and crystallized an intermediate in the disulfide hand-off, which showed a 165° domain rotation relative to the original structure, bringing the two active sites within disulfide bonding distance. The comparable structure of a mammalian QSOX enzyme, also presented herein, reveals additional biochemical features that facilitate disulfide transfer in metazoan orthologs. Finally, we quantified the contribution of concatenation to QSOX activity, providing general lessons for the understanding of multi-domain enzymes and the design of novel catalytic relays. PMID:22801504

  9. Spatial filter system as an optical relay line

    DOEpatents

    Hunt, John T.; Renard, Paul A.

    1979-01-01

    A system consisting of a set of spatial filters that are used to optically relay a laser beam from one position to a downstream position with minimal nonlinear phase distortion and beam intensity variation. The use of the device will result in a reduction of deleterious beam self-focusing and produce a significant increase in neutron yield from the implosion of targets caused by their irradiation with multi-beam glass laser systems.

  10. Tracking and Data Relay Satellite System (TDRSS) frequency plan

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The functions of the Tracking and Data Relay Satellite System (TDRSS) are discussed. The primary purpose of the system is to transmit signals to and receive signals from earth orbiting user spacecraft, and provide data from which user spacecraft ephemerides can be calculated. The system configuration is described and illustrated. The frequency plan is analyzed to show the frequency coverage and the signal handling capability of the system. The characteristics of the components of the system are tabulated.

  11. Advanced Relay Design and Technology for Energy-Efficient Electronics

    DTIC Science & Technology

    2011-07-07

    4.3.2.2. Monotonicity Analysis vs. Finite - Element -Method Analysis .......................... 53 4.3.3. Summary of Design Optimization Study... film thickness. The movable structure is gradually buckled upward from its anchors toward its geometric center (it appears like an open umbrella...pull-in mode (with a TCONTACT-to-TACT ratio of 0.7 to 0.8) [25]. To validate the new relay design, Finite - Element -Method (FEM) analysis was performed

  12. Science Hybrid Orbiter and Lunar Relay (SCHOLR) Architecture and Design

    NASA Technical Reports Server (NTRS)

    Trase, Kathryn K.; Barch, Rachel A.; Chaney, Ryan E.; Coulter, Rachel A.; Gao, Hui; Huynh, David P.; Iaconis, Nicholas A.; MacMillan, Todd S.; Pitner, Gregory M.; Schwab, Devin T.

    2011-01-01

    Considered both a stepping-stone to deep space and a key to unlocking the mysteries of planetary formation, the Moon offers a unique opportunity for scientific study. Robotic precursor missions are being developed to improve technology and enable new approaches to exploration. Robots, lunar landers, and satellites play significant roles in advancing science and technologies, offering close range and in-situ observations. Science and exploration data gathered from these nodes and a lunar science satellite is intended to support future human expeditions and facilitate future utilization of lunar resources. To attain a global view of lunar science, the nodes will be distributed over the lunar surface, including locations on the far side of the Moon. Given that nodes on the lunar far side do not have direct line-of-sight for Earth communications, the planned presence of such nodes creates the need for a lunar communications relay satellite. Since the communications relay capability would only be required for a small portion of the satellite s orbit, it may be possible to include communication relay components on a science spacecraft. Furthermore, an integrated satellite has the potential to reduce lunar surface mission costs. A SCience Hybrid Orbiter and Lunar Relay (SCHOLR) is proposed to accomplish scientific goals while also supporting the communications needs of landers on the far side of the Moon. User needs and design drivers for the system were derived from the anticipated needs of future robotic and lander missions. Based on these drivers and user requirements, accommodations for communications payload aboard a science spacecraft were developed. A team of interns identified and compared possible SCHOLR architectures. The final SCHOLR architecture was analyzed in terms of orbiter lifetime, lunar surface coverage, size, mass, power, and communications data rates. This paper presents the driving requirements, operational concept, and architecture views for SCHOLR

  13. Review of Existing Wormhole Attack Discovery Techniques

    DTIC Science & Technology

    2006-08-01

    Review of Existing Wormhole Attack Discovery Techniques Maria Alexandrovna Gorlatova The scientific or...DATES COVERED - 4. TITLE AND SUBTITLE Review of Existing Wormhole Attack Discovery Techniques 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c...ABSTRACT unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Review of Existing Wormhole Attack

  14. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  15. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  16. Mars Express Forward Link Capabilities for the Mars Relay Operations Service (MaROS)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul

    2012-01-01

    This software provides a new capability for landed Mars assets to perform forward link relay through the Mars Express (MEX) European Union orbital spacecraft. It solves the problem of standardizing the relay interface between lander missions and MEX. The Mars Operations Relay Service (MaROS) is intended as a central point for relay planning and post-pass analysis for all Mars landed and orbital assets. Through the first two phases of implementation, MaROS supports relay coordination through the Odyssey orbiter and the Mars Reconnaissance Orbiter (MRO). With this new software, MaROS now fully integrates the Mars Express spacecraft into the relay picture. This new software generates and manages a new set of file formats that allows for relay request to MEX for forward and return link relay, including the parameters specific to MEX. Existing MEX relay planning interactions were performed via email exchanges and point-to-point file transfers. By integrating MEX into MaROS, all transactions are managed by a centralized service for tracking and analysis. Additionally, all lander missions have a single, shared interface with MEX and do not have to integrate on a mission-by mission basis. Relay is a critical element of Mars lander data management. Landed assets depend largely upon orbital relay for data delivery, which can be impacted by the availability and health of each orbiter in the network. At any time, an issue may occur to prevent relay. For this reason, it is imperative that all possible orbital assets be integrated into the overall relay picture.

  17. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  18. Spacecraft Data and Relay Management using Delay Tolerant Networking

    NASA Technical Reports Server (NTRS)

    Torgerson, J. Leigh; Schoolcraft, Joshua B.; Pang, Jackson N; Segui, John S; Jennings, Esther H.; Krupiarz, Christopher J.

    2006-01-01

    NASA's demonstration of the successful transmission of relay data through the orbiting Mars Odyssey, Mars Global Surveyor, and Mars Express by the Mars Exploration Rovers has shown not only the benefit of using a relay satellite for multiple landed assets in a deep space environment but also the benefit of international standards for such architecture. As NASA begins the quest defined in the Vision for Exploration with robotic and manned missions to the Moon, continues its study of Mars, and is joined in these endeavors by countries world-wide, landed assets transmitting data through relay satellites will be crucial for completing mission objectives. However, this method of delivery of data will result in increased complexity in routing and prioritization of data transmission as the number of missions increases. Also, there is currently no standard method among organizations conducting such missions to return these data sets to Earth given a complex environment. One possibility for establishing such a standard is for mission designers to deploy protocols which fall under the umbrella of Delay Tolerant Networking (DTN). These developing standards include the Bundle Protocol (BP) which provides a standard, secure, store and forward mechanism designed for high latency and asymmetric communication links and the Licklider Transmission Protocol (LTP) which is used to provide a reliable deep space link transmission service.

  19. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  20. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  1. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  2. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2017 President’s Budget Defense Acquisition...RDT&E - Research, Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then Year...N/A Feb 2005 Feb 2005 Feb 2005 Selective Availability Anti-Spoofing Module (SAASM)/GPS Anti-Jam Production Award N/A Mar 2005 Mar 2005 Mar 2005

  3. Warning Signs of Heart Attack, Stroke and Cardiac Arrest

    MedlinePlus

    ... a Heart Attack WARNING SIGNS OF HEART ATTACK, STROKE & CARDIAC ARREST HEART ATTACK WARNING SIGNS CHEST DISCOMFORT ... nausea or lightheadedness. Learn more about heart attack STROKE WARNING SIGNS Spot a stroke F.A.S.T.: - ...

  4. What Are the Symptoms of a Heart Attack?

    MedlinePlus

    ... on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks begin with the sudden, ... This Content: NEXT >> Featured Video What is a heart attack? 05/22/2014 Describes how a heart attack ...

  5. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Aneurysm More Coronary Artery Dissection: Not Just a Heart Attack Updated:Oct 4,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) ...

  6. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  7. A cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks

    NASA Astrophysics Data System (ADS)

    Liu, Shanzhi; Liu, Kai; Wang, Rui; Fang, Ruochen; Liu, Feng

    2017-01-01

    To solve performance degradation caused by channel fading, we propose a cooperative MAC protocol with error-aware relay selection for wireless ad hoc networks in this paper. In the protocol, the transmission error of data packet caused by channel fading are considered in order to achieve the best cooperative gain in the poor quality channel. In the relay selection process, potential relay nodes satisfying corresponding requirement can compete to sever as final relay node by means of priority selection and collision resolution process. Finally, simulation results show that the proposed protocol outperforms other protocol in terms of packet error rate and the saturation throughput.

  8. A computer package for teaching relay coordination and loop based network solution

    SciTech Connect

    Goswami, S.K.; Basu, S.K. . Electrical Engineering Dept.)

    1994-05-01

    This paper reports the development of a relay coordination package specially designed as a teaching aid. Fault studies required for relay coordination has been performed by using a newly developed loop impedance matrix. This new method of forming loop impedance matrix is particularly suitable for multiple fault studies environment as required in relay coordination. A simple topology searching technique has been used to find all loops of the network. This package simultaneously serves the purpose of teaching relay coordination, loop analysis technique and the method of topology searching.

  9. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  10. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  11. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  12. Real-Time Multimission Event Notification System for Mars Relay

    NASA Technical Reports Server (NTRS)

    Wallick, Michael N.; Allard, Daniel A.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    As the Mars Relay Network is in constant flux (missions and teams going through their daily workflow), it is imperative that users are aware of such state changes. For example, a change by an orbiter team can affect operations on a lander team. This software provides an ambient view of the real-time status of the Mars network. The Mars Relay Operations Service (MaROS) comprises a number of tools to coordinate, plan, and visualize various aspects of the Mars Relay Network. As part of MaROS, a feature set was developed that operates on several levels of the software architecture. These levels include a Web-based user interface, a back-end "ReSTlet" built in Java, and databases that store the data as it is received from the network. The result is a real-time event notification and management system, so mission teams can track and act upon events on a moment-by-moment basis. This software retrieves events from MaROS and displays them to the end user. Updates happen in real time, i.e., messages are pushed to the user while logged into the system, and queued when the user is not online for later viewing. The software does not do away with the email notifications, but augments them with in-line notifications. Further, this software expands the events that can generate a notification, and allows user-generated notifications. Existing software sends a smaller subset of mission-generated notifications via email. A common complaint of users was that the system-generated e-mails often "get lost" with other e-mail that comes in. This software allows for an expanded set (including user-generated) of notifications displayed in-line of the program. By separating notifications, this can improve a user's workflow.

  13. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  14. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  15. Coordination procedure for radio relay and communication satellite services

    NASA Technical Reports Server (NTRS)

    Eckerman, J.

    1973-01-01

    A global rain rate statistic model is used to link microwave propagation statistics to measurable rain statistics in order to develop international telecommunication site criteria for radio relay and communication satellite services that minimize interference between receivers and transmitters. This rain coordination procedure utilizes a rain storm cell size, a statistical description of the rainfall rate within the cell valid for most of the earth's surface, approximations between Raleigh scatter and constancy of precipitation with altitude, and an analytic relation between radar reflectivity and rain rate.

  16. Fabricating and using a micromachined magnetostatic relay or switch

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor)

    2001-01-01

    A micromachined magnetostatic relay or switch includes a springing beam on which a magnetic actuation plate is formed. The springing beam also includes an electrically conductive contact. In the presence of a magnetic field, the magnetic material causes the springing beam to bend, moving the electrically conductive contact either toward or away from another contact, and thus creating either an electrical short-circuit or an electrical open-circuit. The switch is fabricated from silicon substrates and is particularly useful in forming a MEMs commutation and control circuit for a miniaturized DC motor.

  17. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin

    2011-01-01

    Throughout this development and deployment process we have followed a few guiding principles: (1) Ensure ubiquitous access through ReSTful and web interfaces; (2) Design a system that is mission and even planet agnostic so that future missions may be added with little hassle, and the system itself may be redeployed for other planetary relay networks; (3) Accept constant input and feedback between mission operators and the development team to ensure that there is a useful product that may be used for years to come.

  18. MGS and Odyssey - relay satellites for the MER mission

    NASA Technical Reports Server (NTRS)

    Esposito, Pasquale B.; Bhat, R.; Demeak, S.; Ardalan, S.; Breeden, J.; Helfrich, C.; Jefferson, D.; Stauch, J.

    2004-01-01

    Both Mars Global Surveyor (MGS) and Odyssey are currently in low altitude, nearly circular and highly inclined orbits about Mars. Thus, they are available adn compartible to serve as relay satellites for the Mars Exploration Rovers (MER) mission. Consequently, the MER project developed requirements for MGS to be overhead for MER-A (Spirit) at Gusev crater, at maximum elevation, mudway between lander separation and initial touchdown; in time, this was specified as 01/04/04. 04:24:55 UTC/SCET with a 30 sec tolerance.

  19. Design analysis tracking and data relay satellite simulation system

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.

  20. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  1. Relay discovery and selection for large-scale P2P streaming.

    PubMed

    Zhang, Chengwei; Wang, Angela Yunxian; Hei, Xiaojun

    2017-01-01

    In peer-to-peer networks, application relays have been commonly used to provide various networking services. The service performance often improves significantly if a relay is selected appropriately based on its network location. In this paper, we studied the location-aware relay discovery and selection problem for large-scale P2P streaming networks. In these large-scale and dynamic overlays, it incurs significant communication and computation cost to discover a sufficiently large relay candidate set and further to select one relay with good performance. The network location can be measured directly or indirectly with the tradeoffs between timeliness, overhead and accuracy. Based on a measurement study and the associated error analysis, we demonstrate that indirect measurements, such as King and Internet Coordinate Systems (ICS), can only achieve a coarse estimation of peers' network location and those methods based on pure indirect measurements cannot lead to a good relay selection. We also demonstrate that there exists significant error amplification of the commonly used "best-out-of-K" selection methodology using three RTT data sets publicly available. We propose a two-phase approach to achieve efficient relay discovery and accurate relay selection. Indirect measurements are used to narrow down a small number of high-quality relay candidates and the final relay selection is refined based on direct probing. This two-phase approach enjoys an efficient implementation using the Distributed-Hash-Table (DHT). When the DHT is constructed, the node keys carry the location information and they are generated scalably using indirect measurements, such as the ICS coordinates. The relay discovery is achieved efficiently utilizing the DHT-based search. We evaluated various aspects of this DHT-based approach, including the DHT indexing procedure, key generation under peer churn and message costs.

  2. Cement composition and sulfate attack

    SciTech Connect

    Shanahan, Natalya; Zayed, Abla . E-mail: zayed@eng.usf.edu

    2007-04-15

    Four cements were used to address the effect of tricalcium silicate content of cement on external sulfate attack in sodium sulfate solution. The selected cements had similar fineness and Bogue-calculated tricalcium aluminate content but variable tricalcium silicates. Durability was assessed using linear expansion and compressive strength. Phases associated with deterioration were examined using scanning electron microscopy and X-ray diffraction. Mineralogical phase content of the as-received cements was studied by X-ray diffraction using two methods: internal standard and Rietveld analysis. The results indicate that phase content of cements determined by X-ray mineralogical analysis correlates better with the mortar performance in sulfate environment than Bogue content. Additionally, it was found that in cements containing triclacium aluminate only in the cubic form, the observed deterioration is affected by tricalcium silicate content. Morphological similarities between hydration products of high tricalcium aluminate and high tricalcium silicate cements exposed to sodium sulfate environment were also observed.

  3. Cougar attacks on humans: a case report.

    PubMed

    McKee, Denise

    2003-01-01

    Cougar attacks on humans are increasing. Presented is a case report of a nonfatal 2-year-old male cougar attack on an 8-year-old girl in British Columbia. Discussions of wound management, rabies postexposure prophylaxis (RPEP), and the possible psychologic ramifications of such an attack are presented. Also reviewed are recommendations on actions that may be helpful in preventing an attack following a sudden encounter with a cougar. Humans must learn to coexist with cougars, which present a small but real threat to people.

  4. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    NASA Astrophysics Data System (ADS)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  5. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics.

    PubMed

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  6. Optimal space-time attacks on system state estimation under a sparsity constraint

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  7. Tracking and data relay satellite system configuration and tradeoff study, part 1. Volume 3: Telecommunications service system

    NASA Technical Reports Server (NTRS)

    1972-01-01

    The results of the telecommunications subsystem analysis are presented. The relay system requirements and constraints, interference analysis, frequency selection, modulation and coding analysis, and the performance analysis of the relay system are included.

  8. Considerations for an Earth Relay Satellite with RF and Optical Trunklines

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2016-01-01

    Support for user platforms through the use of optical links to geosynchronous relay spacecraft are expected to be part of the future space communications architecture. The European Data Relay Satellite System (EDRS) has its first node, EDRS-A, in orbit. The EDRS architecture includes space-to-space optical links with a Ka-Band feeder link or trunkline. NASA's Laser Communications Relay Demonstration (LCRD) mission, originally baselined to support a space-to-space optical link relayed with an optical trunkline, has added an Radio Frequency (RF) trunkline. The use of an RF trunkline avoids the outages suffered by an optical trunkline due to clouds, but an RF trunkline will be bandwidth limited. A space relay architecture with both RF and optical trunklines could relay critical realtime data, while also providing a high data volume capacity. This paper considers the relay user scenarios that could be supported, and the implications to the space relay system and operations. System trades such as the amount of onboard processing and storage required, the use of link layer switching vs. network layer routing, and the use of Delay/Disruption Tolerant Networking (DTN) are discussed.

  9. Development of Autonomous Optimal Cooperative Control in Relay Rover Configured Small Unmanned Aerial Systems

    DTIC Science & Technology

    2013-03-01

    integrated into ground control software that takes telemetry data (the current position of the ground station , rover UAV, and relay UAV) to determine...where to navigate the relay aircraft for optimal communication signal strength. The ground station operator flies the rover aircraft in the extended line...

  10. 75 FR 41863 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-19

    ... COMMISSION Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications Commission. ACTION: Notice. SUMMARY: In this document, the Commission takes a fresh look at its video relay.... SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Structure and Practices of the Video...

  11. 47 CFR 64.6040 - Rates for Telecommunications Relay Service (TRS) calling.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 3 2014-10-01 2014-10-01 false Rates for Telecommunications Relay Service (TRS) calling. 64.6040 Section 64.6040 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON....6040 Rates for Telecommunications Relay Service (TRS) calling. No Provider shall levy or collect...

  12. 76 FR 59269 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... effective date of these rule sections. See, In the Matter of Structure and Practices of the Video...

  13. 76 FR 47476 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... requiring that Internet-based Telecommunications Relay Service (iTRS) providers certify, under penalty of... . SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Structure and Practices of the Video...

  14. Coding, modulation, and relays for deep space communication Mars Rovers Case Study

    NASA Technical Reports Server (NTRS)

    Statman, Joseph I.; Edwards, Charles D.

    2004-01-01

    This paper presents the communications challenges for the MER mission, the use of DSN and MER tools to maximize the science return, and the application of standards-based relays to the problem. To date, more than 90% of the data returned from MER has been returned via relays, not direct-to-Earath (DTE).

  15. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false VRS and IP Relay provider and TRS program... CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Telecommunications Relay Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP...

  16. The Baton Problem: Physics and the 4 x 100 M Relay

    ERIC Educational Resources Information Center

    Harris, Frank

    2012-01-01

    Success in any relay race depends on the speeds achieved by the individual runners and the successful handover of the baton from each runner to the next. Choosing top sprinters is the easy part but there are many ways for the passing of the baton to go wrong. In this article, the knowledge and judgement required by the coach for a relay team are…

  17. 78 FR 21929 - Transmission Relay Loadability Reliability Standard; Notice of Compliance Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-12

    ... Federal Energy Regulatory Commission Transmission Relay Loadability Reliability Standard; Notice of... utilities in three Interconnections. \\1\\ Transmission Relay Loadability Reliability Standard, Order No. 733... ] 61,127 (2011); clarified, Order No. 733-B, 136 FERC ] 61,185 (2011). \\2\\ Transmission...

  18. 78 FR 28633 - TE Connectivity, a Subsidiary of Tyco Electronics Corporation, Relay Products Business Unit...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-15

    ... Employment and Training Administration TE Connectivity, a Subsidiary of Tyco Electronics Corporation, Relay... Assistance on March 12, 2013, applicable to workers of TE Connectivity, a subsidiary of Tyco Electronics... Connectivity, a subsidiary of Tyco Electronics Corporation, Relay Products Business Unit. The Department...

  19. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    PubMed

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  20. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  1. Polar On-Line Acquisition Relay and Transmission System (POLARATS)

    SciTech Connect

    Yuracko, K.

    2004-07-15

    POLARATS (Polar On-Line Acquisition Relay And Transmission System) is being developed by YAHSGS LLC (YAHSGS) and Oak Ridge National Laboratory (ORNL) to provide remote, unattended monitoring of environmental parameters under harsh environmental conditions. In particular, instrumental design and engineering is oriented towards protection of human health in the Arctic, and with the additional goal of advancing Arctic education and research. POLARATS will obtain and transmit environmental data from hardened monitoring devices deployed in locations important to understanding atmospheric and aquatic pollutant migration as it is biomagnified in Arctic food chains. An Internet- and personal computer (PC)-based educational module will provide real time sensor data, on-line educational content, and will be integrated with workbooks and textbooks for use in middle and high school science programs. The educational elements of POLARATS include an Internet-based educational module that will instruct students in the use of the data and how those data fit into changing Arctic environments and food chains. POLARATS will: (1) Enable students, members of the community, and scientific researchers to monitor local environmental conditions in real time over the Internet; and (2) Provide additional educational benefits through integration with middle- and high-school science curricula. Information will be relayed from POLARATS devices to classrooms and libraries along with custom-designed POLARATS teaching materials that will be integrated into existing curricula to enhance the educational benefits realized from the information obtained.

  2. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    PubMed

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-06-29

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels.

  3. Phoenix Mars Scout UHF Relay-Only Operations

    NASA Technical Reports Server (NTRS)

    Lewicki, Christopher A.; Krajewski, Joel; Ilott, Peter; Dates, Jason

    2006-01-01

    The Phoenix Mars Scout Lander will launch in August 2007 and land on the northern plains of Mars in May of 2008. In a departure from traditional planetary surface mission operations, it will have no direct-to-Earth communications capability and will rely entirely on Mars-orbiting relays in order to facilitate command and control as well as the return of science and engineering data. The Mars Exploration Rover missions have demonstrated the robust data-return capability using this architecture, and also have demonstrated the capability of using this method for command and control. The Phoenix mission will take the next step and incorporate this as the sole communications link. Operations for 90 Sols will need to work within the constraints of Odyssey and Mars Reconnaissance Orbiter communications availability, anomalies must be diagnosed and responded to through an intermediary and on-board fault responses must be tolerant to loss of a relay. These and other issues pose interesting challenges and changes in paradigm for traditional space operations and spacecraft architecture, and the approach proposed for the Phoenix mission is detailed herein.

  4. Three Generations of Tracking and Data Relay Satellite (TDRS) Spacecraft

    NASA Technical Reports Server (NTRS)

    Zaleski, Ron

    2016-01-01

    The current Tracking and Data Relay Satellite configuration consists of nine in-orbit satellites (four first generation, three second generation and two third generation satellites) globally distributed in geosynchronous orbit to provide near continuous data relay service to missions like Hubble Space Telescope and the International Space Station. The 1st generation spacecraft were designed by TRW/Northrop Grumman with their launches of the five spacecraft ranging from 1983 through 1995. The 2nd and 3rd generation spacecraft were designed by Boeing with their launches ranging 2000 - 2002 and 2013 - 2017 respectively. TDRS-3 is now 27 years on orbit, continues to be a capable asset for the TDRS constellation. Lack of need for inclination control combined with large fuel reserves and redundancy on critical elements provides spacecraft that operate well past design life, all of which contributes to expanded TDRS constellation support capabilities. All spacecraft generations have issues. Significant issues will be summarized with the focus on the Boeing related problems. Degradations and failures are continually assessed and provide the foundation for yearly updates to spacecraft reliability models, constellation service projections and deorbit plans (in order to meet NASAs mandate of limiting orbital debris). Even when accounting for degradations and failures, the life expectancy for the Boeing delivered 2nd generation TDRS-8, 9 10 TDRS are anticipated to be 25+ years.

  5. Mars Relay Spacecraft: A Low-Cost Approach

    NASA Technical Reports Server (NTRS)

    SvitekT, .; King, J.; Fulton, R.; McOmber, R.; Hastrup, R.; Miller, A.

    1995-01-01

    The next phase of Mars exploration will utilize numerous globally distributed small low-cost devices including landers penetrators microrovers and balloons. Direct-to-Earth communications links if required for these landers will drive the lander design for two reasons: a) mass and complexity needed for a steerable high-gain antenna and b) power requirements for a high-power amplifier (i.e. solar panel and battery mass). Total mass of the direct link hardware for several recent small-lander designs exceeded the mass of the scientific payload. Alternatively if communications are via a Mars-orbiting relay spacecraft resource requirements for the local UHF communication link are comparatively trivial: a simple whip antenna and less than 1 watt power. Clearly using a Mars relay spacecraft (MRS) is the preferred option if the MRS mission can be accomplished in an affordable and robust way. Our paper describes a point design for such a mission launched in the s001 or 2003 opportunity.

  6. UHF Relay Antenna Measurements on Phoenix Mars Lander Mockup

    NASA Technical Reports Server (NTRS)

    Ilott, Peter; Harrel, Jefferson; Arnold, Bradford; Bliznyuk, Natalia; Nielsen, Rick; Dawson, David; McGee, Jodi

    2006-01-01

    The Phoenix Lander, a NASA Discovery mission which lands on Mars in the spring of 2008, will rely entirely on UHF relay links between it and Mars orbiting assets, (Odyssey and Mars Reconnaissance Orbiter (MRO)), to communicate with the Earth. As with the Mars Exploration Rover (MER) relay system, non directional antennas will be used to provide roughly emispherical coverage of the Martian sky. Phoenix lander deck object pattern interference and obscuration are significant, and needed to be quantified to answer system level design and operations questions. This paper describes the measurement campaign carried out at the SPAWAR (Space and Naval Warfare Research) Systems Center San Diego (SSC-SD) hemispherical antenna range, using a Phoenix deck mockup and engineering model antennas. One goal of the measurements was to evaluate two analysis tools, the time domain CST, and the moment method WIPL-D software packages. These would subsequently be used to provide pattern analysis for configurations that would be difficult and expensive to model and test on Earth.

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  8. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  9. Multiple Retinal Axons Converge onto Relay Cells in the Adult Mouse Thalamus.

    PubMed

    Hammer, Sarah; Monavarfeshani, Aboozar; Lemon, Tyler; Su, Jianmin; Fox, Michael Andrew

    2015-09-08

    Activity-dependent refinement of neural circuits is a fundamental principle of neural development. This process has been well studied at retinogeniculate synapses-synapses that form between retinal ganglion cells (RGCs) and relay cells within the dorsal lateral geniculate nucleus. Physiological studies suggest that shortly after birth, inputs from ∼20 RGCs converge onto relay cells. Subsequently, all but just one to two of these inputs are eliminated. Despite widespread acceptance, this notion is at odds with ultrastructural studies showing numerous retinal terminals clustering onto relay cell dendrites in the adult. Here, we explored this discrepancy using brainbow AAVs and serial block face scanning electron microscopy (SBFSEM). Results with both approaches demonstrate that terminals from numerous RGCs cluster onto relay cell dendrites, challenging the notion that only one to two RGCs innervate each relay cell. These findings force us to re-evaluate our understanding of subcortical visual circuitry.

  10. Practical security and privacy attacks against biometric hashing using sparse recovery

    NASA Astrophysics Data System (ADS)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  11. 77 FR 75894 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ...] Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities... numbers associated with Internet-based Telecommunications Relay Service (iTRS). For the reasons set forth.... No party opposed Sorenson's Petition, and one party--Hamilton Relay--filed in support....

  12. EMTP transient modeling of a distance relay and a comparison with EMTP laboratory testing. [ElectroMagnetics Transient Program

    SciTech Connect

    Wilson, R.E. ); Nordstrom, J.M. )

    1993-07-01

    This paper reports on a method to test the transient performance of a sampled-data relay. A model of one measuring unit of a digital relay was created on a personal computer. The simulations are compared with laboratory results obtained by applying digitally generated waveforms to the actual relay. Computer modelling of the digital relay is done within the Models version of the Transient Analysis of Control System (TACS) subsection of the ElectroMagnetics Transient Program (EMTP). The input filter, analog to digital converter, Fourier fundamental frequency detector, and the relay measuring principle of one digital microprocessor based relay are modeled. The modeling of these components within an EMTP environment represents new work. An actual 115 Kv 150 mile long transmission line was simulated using the EMTP. The faults simulated on the transmission line were applied both to the digital model of the relay and the actual relay. The physical testing used the Bonneville Power Administration (BPA) Relay Evaluation System (RES). Results from the digital relay simulation are compared with results from an actual relay. The educational value of observing relay waveforms at various stages within the simulation is discussed.

  13. 76 FR 44326 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-25

    ... COMMISSION Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and Speech Disabilities; Structure and Practices of the Video Relay Service Program AGENCY: Federal... extends the current tiered, per-minute video relay service (``VRS'') compensation rates, and adopts...

  14. British used Congreve Rockets to Attack Napoleon

    NASA Technical Reports Server (NTRS)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  15. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  16. Preventive attack in the 1990s

    SciTech Connect

    Prebeck, S.R.

    1993-05-28

    The decline of the Soviet Union upset the world`s balance of power and opened the door to third world proliferation since the superpowers no longer have tight control over their client-states. This increase in proliferation raised the issue of how the United States (US) should respond to a third world nation that is acquiring nuclear weapons. Should the United States depend on preventive attacks to stop the proliferation of nuclear weapons. This is not a new issue. Proliferation and preventive war have both been issues since the end of World War II. The United States considered a preventive attack against the Soviet Union in the postwar years. The Soviet Union considered preventive attacks against the People`s Republic of China in 1969. Israel conducted a preventive attack in 1981 against the Osiraq nuclear reactor in Iraq. Preventive attacks are politically untenable and are not militarily possible. Without perfect political conditions, it is unacceptable for the only remaining superpower to attack a second-rate power. It is militarily impossible for the United States to guarantee the removal of all nuclear weapons in a single preventive attack. This study concludes that the United States should not depend on preventive attacks to stop proliferation of nuclear weapons.

  17. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-06

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities.

  18. The cost of attack in competing networks

    PubMed Central

    Podobnik, B.

    2015-01-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator–prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  19. Exomars orbiter science and data-relay mission / looking for trace gases on Mars

    NASA Astrophysics Data System (ADS)

    Fratacci, Olivier

    EXOMARS Orbiter Module: looking for trace gas on Mars and providing data relay support for future Mars Surface assets O.Fratacci, M.Mesrine, H.Renault, Thales Alenia Space France B.Musetti, M.Montagna, Thales Alenia Space Italy M.Kesselmann, M.Barczewski OHB P.Mitschdoerfer, D.Dellantonio Euro-pean Space Agency / ESTEC The European Space Agency (ESA) in a joint cooperation with NASA, will launch in 2016 the EXOMARS spacecraft composite to develop European landing technologies and provide a science orbiter with data-relay capability around Mars until end 2022. The spacecraft composite is composed of the Orbitr Module (OM), provided by TAS-France, an entry descent and landing demonstrator module (EDM) provided by TAS-Italy, and a set of six scientific payloads to be selected by the JPL during 2010. Recent observations of the planet Mars have indicated detection of methane as well as temporal, perhaps spatial variability in the detected signal while current photochemical models cannot explain the presence of methane in the atmosphere of Mars nor its reported rapid variations in space and time. The triple scientific objectives that drive the selection of these six instruments for the Exomars 2016 mission is to detect trace gases in Mars atmosphere, to characterise their spatial and temporal variation and to explore the source of the key trace gases (e.g. methane) on the surface. The launch is scheduled in January 2016 from Kennedy Space Center (KSC) using an ATLAS V 421 launcher with a total launch mass of 4.4 tons. After release of the EDM on Mars, the OM will perform the Mars Orbit Insertion manoeuvre and then reduce its elliptic orbit by implementing the first European Aerobraking around Mars for about 6 to 9 months, to finally end on a circular 400x400km orbit with an altitude in the range of 350km to 420km. From this orbit, a science phase will follow lasting 2 years in which the Mars atmosphere and surface is continuously observed. Science instruments composed of

  20. Formal Methods for Information Protection Technology. Task 2: Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection in Computer Networks. Part 2

    DTIC Science & Technology

    2003-11-01

    www.agentbuilder.com. [Agrawal-95] R. Agrawal. Mining Generalized Association Rules. Proceedings of the 21st VLDB Conference, Zurich, 1995. [ Ali ...145 [Chan et al-03] P. Chan, M. Mahoney & M. Arshad . Learning Rules and Clusters for Anomaly Detection in Network Traffic, Managing Cyber Threats