Science.gov

Sample records for detect relay attacks

  1. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-08-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Detection of complex cyber attacks

    NASA Astrophysics Data System (ADS)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  4. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.; JOHNS, B.R.

    1999-12-21

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  5. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    JOHNS, B.R.

    1999-05-05

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping and Instrumentation Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  6. Commercial Grade Item (CGI) Dedication for Leak Detection Relays

    SciTech Connect

    KOCH, M.R.

    2000-02-28

    This Test Plan provides a test method to dedicate the leak detection relays used on the new Pumping Instrumentation and Control (PIC) skids. The new skids are fabricated on-site. The leak detection system is a safety class system per the Authorization Basis.

  7. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  8. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  9. Attack detection in unattended sensor networks

    NASA Astrophysics Data System (ADS)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  10. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. PMID:20804980

  11. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework. PMID:25807571

  14. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  15. Maintaining defender's reputation in anomaly detection against insider attacks.

    PubMed

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  16. Transmission line relay mis-operation detection based on time-synchronized field data

    SciTech Connect

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such, it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.

  17. Transmission line relay mis-operation detection based on time-synchronized field data

    DOE PAGES

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such,more » it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.« less

  18. Detection of low salience whisker stimuli requires synergy of tectal and thalamic sensory relays

    PubMed Central

    Cohen, Jeremy D.; Castro-Alamancos, Manuel A.

    2010-01-01

    Detection of a sensory stimulus depends on its psychophysical saliency; the higher the saliency, the easier the detection. But it is not known if sensory relay nuclei differ in their ability to detect low salient whisker stimuli. We found that reversible lesions of either the somatosensory thalamus or superior colliculus blocked detection of a low salience whisker conditioned stimulus (WCS) in an active avoidance task, without affecting detection of a high salience WCS. Thus, thalamic and tectal sensory relays work synergistically to detect low salient stimuli during avoidance behavior, but are redundant during detection of highly salient stimuli. We also recorded electrophysiological responses evoked by high and low salience stimuli in the superior colliculus and barrel cortex of freely behaving animals during active exploration, awake immobility and sensory detection in the active avoidance task. Field potential (FP) responses evoked in barrel cortex and superior colliculus by high intensity stimuli are larger and adapt more to frequency than those evoked by low intensity stimuli. FP responses are also more suppressed and adapt less during active exploration, and become further suppressed in barrel cortex during successful detection of either high or low salient stimuli in the active avoidance task. In addition, unit recordings revealed that firing rate increases in superior colliculus during active exploration, and especially during successful detection of either high or low salient stimuli in the active avoidance task. We conclude that detection of low salient stimuli is achieved by a sparse neural code distributed through multiple sensory relays. PMID:20147551

  19. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  20. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  1. Patrol detection for replica attacks on wireless sensor networks.

    PubMed

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods.

  2. Presentation attack detection for face recognition using light field camera.

    PubMed

    Raghavendra, R; Raja, Kiran B; Busch, Christoph

    2015-03-01

    The vulnerability of face recognition systems isa growing concern that has drawn the interest from both academic and research communities. Despite the availability of a broad range of face presentation attack detection (PAD)(or countermeasure or antispoofing) schemes, there exists no superior PAD technique due to evolution of sophisticated presentation attacks (or spoof attacks). In this paper, we present a new perspective for face presentation attack detection by introducing light field camera (LFC). Since the use of a LFC can record the direction of each incoming ray in addition to the intensity, it exhibits an unique characteristic of rendering multiple depth(or focus) images in a single capture. Thus, we present a novel approach that involves exploring the variation of the focus between multiple depth (or focus) images rendered by the LFC that in turn can be used to reveal the presentation attacks. To this extent, we first collect a new face artefact database using LFC that comprises of 80 subjects. Face artefacts are generated by simulating two widely used attacks, such as photo print and electronic screen attack. Extensive experiments carried out on the light field face artefact database have revealed the outstanding performance of the proposed PAD scheme when benchmarked with various well established state-of-the-art schemes. PMID:25622320

  3. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  4. Intelligent Power Swing Detection Scheme to Prevent False Relay Tripping Using S-Transform

    NASA Astrophysics Data System (ADS)

    Mohamad, Nor Z.; Abidin, Ahmad F.; Musirin, Ismail

    2014-06-01

    Distance relay design is equipped with out-of-step tripping scheme to ensure correct distance relay operation during power swing. The out-of-step condition is a consequence result from unstable power swing. It requires proper detection of power swing to initiate a tripping signal followed by separation of unstable part from the entire power system. The distinguishing process of unstable swing from stable swing poses a challenging task. This paper presents an intelligent approach to detect power swing based on S-Transform signal processing tool. The proposed scheme is based on the use of S-Transform feature of active power at the distance relay measurement point. It is demonstrated that the proposed scheme is able to detect and discriminate the unstable swing from stable swing occurring in the system. To ascertain validity of the proposed scheme, simulations were carried out with the IEEE 39 bus system and its performance has been compared with the wavelet transform-based power swing detection scheme.

  5. Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    de Graaf, Rennie; Hegazy, Islam; Horton, Jeffrey; Safavi-Naini, Reihaneh

    Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.

  6. Resource distribution in multiple attacks with imperfect detection of the attack outcome.

    PubMed

    Levitin, Gregory; Hausken, Kjell

    2012-02-01

    This article extends the previous research of consecutive attacks strategy by assuming that an attacker observes the outcome of each attack imperfectly. With given probabilities it may wrongly identify a destroyed target as undestroyed, and wrongly identify an undestroyed target as destroyed. The outcome of each attack is determined by a contest success function that depends on the amount of resources allocated by the defender and the attacker to each attack. The article suggests a probabilistic model of the multiple attacks and analyzes how the target destruction probability and the attacker's relative resource expenditure are impacted by the two probabilities of incorrect observation, the attacker's and defender's resource ratio, the contest intensity, the number of attacks, and the resource distribution across attacks. We analyze how the attacker chooses the number of attacks, the attack stopping rule, and the optimal resource distribution across attacks to maximize its utility.

  7. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  8. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  9. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    PubMed

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  10. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  11. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  12. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  13. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  14. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  15. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  16. Distance Relaying with Power Swing Detection based on Voltage and Reactive Power Sensitivity

    NASA Astrophysics Data System (ADS)

    Patel, Ujjaval J.; Chothani, Nilesh G.; Bhatt, Praghnesh J.

    2016-02-01

    Sudden changes in loading or configuration of an electrical network causes power swing which may result in an unwanted tripping of the distance relay. Hence, it becomes utmost necessary to rapidly and reliably discriminate between actual fault and power swing conditions in order to prevent instability in power network due to mal operation of distance relay. This paper proposes a novel method for the discrimination between fault and power swing based on rate of change of voltage and reactive power measured at relay location. The effectiveness of the proposed algorithm is evaluated by simulating series of power swing conditions in PSCAD/EMTDC® software for different disturbances such as change in mechanical power input to synchronous generator, tripping of parallel line due to fault and sudden application of heavy load. It is revealed that the distance relay gives successful tripping in case of different fault conditions and remains inoperative for power swing with the implementation of the proposed algorithm. Moreover, the proposed scheme has ability to distinguish the symmetrical and asymmetrical fault occurrence during power swing condition.

  17. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  18. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  19. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  20. A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs

    NASA Astrophysics Data System (ADS)

    Chen, Honglong; Lou, Wei; Wang, Zhi

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sniffs packets at one point in the network, tunnels them through a wired or wireless link to another point, and the other of which relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization process and propose a novel consistency-based secure localization scheme against wormhole attacks, which includes wormhole attack detection, valid locators identification and self-localization. We also conduct the simulations to demonstrate the effectiveness of our proposed scheme.

  1. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed.

  2. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  3. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  4. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  5. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  6. Magnetoresistor monitors relay performance

    NASA Technical Reports Server (NTRS)

    Krebs, D. Q.

    1966-01-01

    Magnetoresistor monitors the action of relays without disturbing circuit parameters or degrading relay performance. The magnetoresistor measures the relay magnetic flux produced under transient conditions to establish the characteristic signature of the relay.

  7. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  8. Autonomous mobile communication relays

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Everett, Hobart R.; Manouk, Narek; Verma, Ambrish

    2002-07-01

    Maintaining a solid radio communication link between a mobile robot entering a building and an external base station is a well-recognized problem. Modern digital radios, while affording high bandwidth and Internet-protocol-based automatic routing capabilities, tend to operate on line-of-sight links. The communication link degrades quickly as a robot penetrates deeper into the interior of a building. This project investigates the use of mobile autonomous communication relay nodes to extend the effective range of a mobile robot exploring a complex interior environment. Each relay node is a small mobile slave robot equipped with sonar, ladar, and 802.11b radio repeater. For demonstration purposes, four Pioneer 2-DX robots are used as autonomous mobile relays, with SSC-San Diego's ROBART III acting as the lead robot. The relay robots follow the lead robot into a building and are automatically deployed at various locations to maintain a networked communication link back to the remote operator. With their on-board external sensors, they also act as rearguards to secure areas already explored by the lead robot. As the lead robot advances and RF shortcuts are detected, relay nodes that become unnecessary will be reclaimed and reused, all transparent to the operator. This project takes advantage of recent research results from several DARPA-funded tasks at various institutions in the areas of robotic simulation, ad hoc wireless networking, route planning, and navigation. This paper describes the progress of the first six months of the project.

  9. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  10. Node ID based detection of Sybil attack in mobile wireless sensor network

    NASA Astrophysics Data System (ADS)

    Sharmila, S.; Umamaheswari, G.

    2013-10-01

    Security is the major issue in wireless sensor networks and many defence mechanisms have been developed to secure the network from these alarming attacks by detecting the malicious nodes which hinder the performance of the network. Sybil attack can make the network vulnerable. Sybil attack means a node which illegitimately claims multiple identities. This attack threatens wireless sensor network in routing, voting system, fair resource allocation, data aggregation and misbehaviour detection. Hence, the research is carried out to prevent the Sybil attack and improve the network performance. The node ID-based scheme is proposed, where the detection is based on node registration, consisting of two phases and the assignment of ID to the node is done dynamically. The ID's corresponding to the nodes registered is at the base station and the node active time is monitored, any abnormalities in the above phases confirm the presence of Sybil nodes in the network. The scheme is simulated using NS2. The energy consumed for this algorithm is 2.3 J. The proposed detection scheme is analysed based on the network's PDR and found that the throughput has improved, which prove that this scheme may be used in the environment where security is needed.

  11. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  12. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  13. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    PubMed Central

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A.

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  14. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  15. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dongil; Soh, Wooyoung; Kim, Seoksoo

    Botnet-based cyber attacks cause large-scale damage with increasingly intelligent tools, which has called for varied research on bot detection. In this study, we developed a method of monitoring behaviors of host-based processes from the point that a bot header attempts to make zombie PCs, detecting cyber attack precursor symptoms. We designed an algorithm that figures out characteristics of botnet which attempts to launch malicious behaviors by means of signature registration, which is for process/reputation/network traffic/packet/source analysis and a white list, as a measure to respond to bots from the end point.

  16. Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Hussain, Sajid; Rahman, Md Shafayat

    2009-04-01

    With the advent of powerful and efficient wireless sensor nodes, the usage of wireless sensor networks (WSNs) has been greatly increased. However, various kinds of security breaches have also been introduced, which exposes the vulnerability of these nodes to defend the valuable data from some specific types of attacks. In this paper, we address node replication, replacement, and man-in-the-middle attacks. We analyze the feasibility of using received signal strength indicator (RSSI) values measured at the receiver node to detect these kinds of attacks. As RSSI value is readily available for every message received by a node, a successful utilization of this information in security breach detection can be a very important contribution.

  17. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  18. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  19. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    SciTech Connect

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O'Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  20. A novel error detection due to joint CRC aided denoise-and-forward network coding for two-way relay channels.

    PubMed

    Cheng, Yulun; Yang, Longxiang

    2014-01-01

    In wireless two-way (TW) relay channels, denoise-and-forward (DNF) network coding (NC) is a promising technique to achieve spectral efficiency. However, unsuccessful detection at relay severely deteriorates the diversity gain, as well as end-to-end pairwise error probability (PEP). To handle this issue, a novel joint cyclic redundancy code (CRC) check method (JCRC) is proposed in this paper by exploiting the property of two NC combined CRC codewords. Firstly, the detection probability bounds of the proposed method are derived to prove its efficiency in evaluating the reliability of NC signals. On the basis of that, three JCRC aided TW DNF NC schemes are proposed, and the corresponding PEP performances are also derived. Numerical results reveal that JCRC aided TW DNF NC has similar PEP comparing with the separate CRC one, while the complexity is reduced to half. Besides, it demonstrates that the proposed schemes outperform the conventional one with log-likelihood ratio threshold.

  1. Statistical issues and challenges associated with rapid detection of bio-terrorist attacks.

    PubMed

    Fienberg, Stephen E; Shmueli, Galit

    2005-02-28

    The traditional focus for detecting outbreaks of an epidemic or bio-terrorist attack has been on the collection and analysis of medical and public health data. Although such data are the most direct indicators of symptoms, they tend to be collected, delivered, and analysed days, weeks, and even months after the outbreak. By the time this information reaches decision makers it is often too late to treat the infected population or to react in some other way. In this paper, we explore different sources of data, traditional and non-traditional, that can be used for detecting a bio-terrorist attack in a timely manner. We set our discussion in the context of state-of-the-art syndromic surveillance systems and we focus on statistical issues and challenges associated with non-traditional data sources and the timely integration of multiple data sources for detection purposes.

  2. Seismic ruggedness of relays

    SciTech Connect

    Merz, K.L. )

    1991-08-01

    This report complements EPRI report NP-5223 Revision 1, February 1991, and presents additional information and analyses concerning generic seismic ruggedness of power plant relays. Existing and new test data have been used to construct Generic Equipment Ruggedness Spectra (GERS) which can be used in identifying rugged relays during seismic re-evaluation of nuclear power plants. This document is an EPRI tier 1 report. The results of relay fragility tests for both old and new relays are included in an EPRI tier 2 report with the same title. In addition to the presentation of relay GERS, the tier 2 report addresses the applicability of GERS to relays of older vintage, discusses the important identifying nomenclature for each relay type, and examines relay adjustment effects on seismic ruggedness. 9 refs., 3 figs, 1 tab.

  3. Wind generated by an attacking bat: anemometric measurements and detection by the praying mantis cercal system.

    PubMed

    Triblehorn, Jeffrey D; Yager, David D

    2006-04-01

    The wind-sensitive cercal system, well-known for mediating terrestrial escape responses, may also mediate insect aerial bat-avoidance responses triggered by wind generated by the approaching bat. One crucial question is whether enough time exists between detection and capture for the insect to perform a successful evasive maneuver. A previous study estimated this time to be 16 ms, based on cockroach behavioral latencies and a prediction for the detection time derived from a simulated predator moving toward a simulated prey. However, the detection time may be underestimated since both the simulated predator and prey lacked certain characteristics present in the natural situation. In the present study, actual detection times are measured by recording from wind-sensitive interneurons of a tethered praying mantis that serves as the target for a flying, attacking bat. Furthermore, using hot-wire anemometry, we describe and quantify the wind generated by an attacking bat. Anemometer measurements revealed that the velocity of the bat-generated wind consistently peaks early with a high acceleration component (an important parameter for triggering wind-mediated terrestrial responses). The physiological recordings determined that the mantis cercal system detected an approaching bat 74 ms before contact, which would provide the insect with 36 ms to perform a maneuver before capture. This should be sufficient time for the mantis to respond. Although it probably would not have time for a full response that completely evades the bat, even a partial response might alter the mantid's trajectory enough to cause the bat to mishandle the insect, allowing it to escape. PMID:16574803

  4. Early attack reaction sensor (EARS), a man-wearable gunshot detection system

    NASA Astrophysics Data System (ADS)

    Chang, Jay; Mendyk, William; Thier, Lisa; Yun, Paul; LaRow, Andy; Shaw, Scott; Schoenborn, William

    2006-05-01

    The Early Attack Reaction Sensor (EARS) is a modified passive acoustic system that detects gunshots (muzzle blast and/or shockwave) to provide the user with relative azimuth and range of sniper fire via both audio alert and visual display. The EARS system consists of a microphone array in a small planar configuration and an equivalently sized Digital Signal Processing board, which is interfaced to a PDA via a PCMCIA slot. Hence, configuration easily provides portability. However, the system is being repackaged for man-wearable and vehicle mount applications. The EARS system in a PDA configuration has been tested in open fields at up to 500 meters range and has provided useable bearing and range information against the sniper rounds. This paper will discuss EARS system description, various test results, and EARS system capabilities and limitations.

  5. A configurable-hardware document-similarity classifier to detect web attacks.

    SciTech Connect

    Ulmer, Craig D.; Gokhale, Maya

    2010-04-01

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to reconfigurable hardware. The TFIDF classifier is used to detect web attacks in HTTP data. In our reconfigurable hardware approach, we design a streaming, real-time classifier by simplifying an existing sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. We have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires two orders of magnitude less memory than the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  6. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1). PMID:26748366

  7. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1).

  8. Optimised secure transmission through untrusted AF relays using link adaptation

    NASA Astrophysics Data System (ADS)

    Taki, Mehrdad; Sadeghi, Mohammad

    2016-05-01

    A new transmission scheme is presented for a two-hop relay network including two AF relays, considering physical layer security where relays are not able to detect signal with an acceptable bit error rate (BER) but the combined received signal is detected with an acceptable BER at the final receiver. It is assumed that there is no direct path between the transmitter and the receiver (relay network without diversity). Adaptive modulation and coding is utilised at the transmitter and transmission powers of the transmitter and of the relays are continuously adapted provisioning individual average power constraint for each node. Numerical evaluations show that an acceptable performance degradation is seen by the proposed secure relaying scheme compared to the optimum relay selection scheme without security constraint.

  9. Efficient live face detection to counter spoof attack in face recognition systems

    NASA Astrophysics Data System (ADS)

    Biswas, Bikram Kumar; Alam, Mohammad S.

    2015-03-01

    Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.

  10. Orthopoxvirus detection in environmental specimens during suspected bioterror attacks: inhibitory influences of common household products.

    PubMed

    Kurth, Andreas; Achenbach, John; Miller, Liljia; Mackay, Ian M; Pauli, Georg; Nitsche, Andreas

    2008-01-01

    After terrorists attacked the United States in 2001, the appearance of letters and other objects containing powdery substances with unknown potentials for biological threat focused attention on the speed, sensitivity, and reliability of diagnostic methods. This study summarizes the abilities and limitations of real-time PCR, electron microscopy (EM), and virus isolation when used to detect potential bioweapons. In particular, we investigated the inhibitory influences of different common household products present in environmental specimens on PCR yield, EM detection, and virus isolation. We used vaccinia virus as a model for orthopoxviruses by spiking it into specimens. In the second part of the study, we describe modifications of diagnostic methods to overcome inhibitory effects. A variety of PCR amplification enhancers, DNA extraction protocols, and applications of internal controls were evaluated to improve diagnostic simplicity, speed, and reliability. As a result, we strongly recommend using at least two different frontline techniques in parallel, e.g., EM and PCR. A positive result obtained by any one of these techniques should be followed by a biological method to confirm the putative diagnosis. Confirmatory methods include virus isolation followed by an agent-specific immunofluorescence assay to confirm the presence of replication-competent particles. PMID:17965204

  11. Orthopoxvirus detection in environmental specimens during suspected bioterror attacks: inhibitory influences of common household products.

    PubMed

    Kurth, Andreas; Achenbach, John; Miller, Liljia; Mackay, Ian M; Pauli, Georg; Nitsche, Andreas

    2008-01-01

    After terrorists attacked the United States in 2001, the appearance of letters and other objects containing powdery substances with unknown potentials for biological threat focused attention on the speed, sensitivity, and reliability of diagnostic methods. This study summarizes the abilities and limitations of real-time PCR, electron microscopy (EM), and virus isolation when used to detect potential bioweapons. In particular, we investigated the inhibitory influences of different common household products present in environmental specimens on PCR yield, EM detection, and virus isolation. We used vaccinia virus as a model for orthopoxviruses by spiking it into specimens. In the second part of the study, we describe modifications of diagnostic methods to overcome inhibitory effects. A variety of PCR amplification enhancers, DNA extraction protocols, and applications of internal controls were evaluated to improve diagnostic simplicity, speed, and reliability. As a result, we strongly recommend using at least two different frontline techniques in parallel, e.g., EM and PCR. A positive result obtained by any one of these techniques should be followed by a biological method to confirm the putative diagnosis. Confirmatory methods include virus isolation followed by an agent-specific immunofluorescence assay to confirm the presence of replication-competent particles.

  12. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  13. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    PubMed

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes. PMID:27189623

  14. MAVEN Relay Operations Concept

    NASA Technical Reports Server (NTRS)

    Chamberlain, Neil; Gladden, Roy; Bruvold, Kris

    2012-01-01

    The Mars Atmosphere and Volatile EvolutioN (MAVEN) mission will launch in late 2013 and following a 10 month cruise to Mars, will study the upper atmosphere of the planet. In addition to the science instruments, the MAVEN spacecraft is equipped with an Electra UHF transceiver to support relay communication with landed assets. This paper describes how UHF relay service is provisioned by MAVEN. The discussion includes a description of the Electra payload, the process by which relay activities are coordinated and accounted for, the process of a typical relay session, including uplink and downlink, as well as special commands to calibrate and verify relay performance. The operational processes for providing these services are inherited largely from prior Mars missions and take advantage of existing infrastructure and lessons learned from those missions. Preliminary data volume return capabilities using adaptive data rates and low-density parity check channel coding are presented.

  15. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  16. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  18. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  19. Fully relayed regenerative amplifier

    DOEpatents

    Glass, Alexander J.

    1981-01-01

    A regenerative laser apparatus and method using the optical relay concept to maintain high fill factors, to suppress diffraction effects, and to minimize phase distortions in a regenerative amplifier.

  20. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  1. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  2. Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

    NASA Astrophysics Data System (ADS)

    Ali Mayouf, Mabroka; Shukur, Zarina

    Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

  3. Relay contact monitoring system

    SciTech Connect

    Mehta, V.

    1994-01-11

    A switching system for switching on and off heating and air conditioning units in an environmental control system. The switching system includes a thermostat and a relay conductively coupled to the thermostat. The relay has a contact, which is responsive to a change signal for changing its position. The system further includes a programmable monitor having predetermined positions stored in a memory. The monitor is conductively coupled to the contact and to the thermostat for continually determining the position of the contact, and for sending a change signal to the relay for switching the position of the contact, as needed, to be in conformance with a predetermined position stored in the memory. 3 figs.

  4. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  5. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  6. Versatile solid-state relay

    NASA Technical Reports Server (NTRS)

    Fox, D. A.

    1977-01-01

    Solid-state relay (SSR), containing multinode control logic, is operated as normally open, normally closed, or latched. Moreover several can be paralleled to form two-pole or double-throw relays. Versatile unit ends need to design custom control circuit for every relay application. Technique can be extended to incorporate selectable time delay, on operation or release, or pulsed output.

  7. Internet Relay Chat.

    ERIC Educational Resources Information Center

    Simpson, Carol

    2000-01-01

    Describes Internet Relay Chats (IRCs), electronic conversations over the Internet that allow multiple users to write messages, and their applications to educational settings such as teacher collaboration and conversations between classes. Explains hardware and software requirements, IRC organization into nets and channels, and benefits and…

  8. Latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes at least one permanent magnet and at least one electromagnet. The respective sections are, generally, arranged in separate locations or cavities in the assembly. The switch is latched by a permanent magnet assembly and selectively switched by an overriding electromagnetic assembly.

  9. Joint source and relay optimization for parallel MIMO relay networks

    NASA Astrophysics Data System (ADS)

    Toding, Apriana; Khandaker, Muhammad RA; Rong, Yue

    2012-12-01

    In this article, we study the optimal structure of the source precoding matrix and the relay amplifying matrices for multiple-input multiple-output (MIMO) relay communication systems with parallel relay nodes. Two types of receivers are considered at the destination node: (1) The linear minimal mean-squared error (MMSE) receiver; (2) The nonlinear decision feedback equalizer based on the minimal MSE criterion. We show that for both receiver schemes, the optimal source precoding matrix and the optimal relay amplifying matrices have a beamforming structure. Using such optimal structure, joint source and relay power loading algorithms are developed to minimize the MSE of the signal waveform estimation at the destination. Compared with existing algorithms for parallel MIMO relay networks, the proposed joint source and relay beamforming algorithms have significant improvement in the system bit-error-rate performance.

  10. Detection of atrial fibrillation with concurrent holter monitoring and continuous cardiac telemetry following ischemic stroke and transient ischemic attack.

    PubMed

    Lazzaro, Marc A; Krishnan, Kousik; Prabhakaran, Shyam

    2012-02-01

    Atrial fibrillation (AF) is a major risk factor for recurrent ischemic stroke. We aimed to compare the detection rate of AF using continuous cardiac telemetry (CCT) versus Holter monitoring in hospitalized patients with ischemic stroke or transient ischemic attack (TIA). Between June 2007 and December 2008, 133 patients were admitted to an academic institution for ischemic stroke or TIA and underwent concurrent inpatient CCT and Holter monitoring. Rates of AF detection by CCT and Holter monitoring were compared using the McNemar paired proportion test. Among the 133 patients, 8 (6.0%) were diagnosed with new-onset AF. On average, Holter monitoring was performed for 29.8 hours, and CCT was performed for 73.6 hours. The overall rate of AF detection was higher for Holter monitoring compared with CCT (6.0%; 95% confidence interval [CI], 2.9-11.6 vs 0; 95% CI, 0-3.4; P = .008). Holter detection of AF was even higher in specific subgroups (those with an embolic infarct pattern, those age >65 years, and those with coronary artery disease). Holter monitoring detected AF in 6% of hospitalized ischemic stroke and TIA patients, with higher proportions in high-risk subgroups. Compared with CCT, Holter monitoring is significantly more likely to detect arrhythmias.

  11. Relaying an optical wavefront

    DOEpatents

    Sweatt, William C.; Vawter, G. Allen

    2007-03-06

    A wavefront rely devices samples an incoming optical wavefront at different locations, optically relays the samples while maintaining the relative position of the samples and the relative phase between the samples. The wavefront is reconstructed due to interference of the samples. Devices can be designed for many different wavelengths, including for example the ultraviolet, visible, infrared and even longer wavelengths such as millimeter waves. In one application, the device function as a telescope but with negligible length.

  12. Heart Attack

    MedlinePlus

    ... attack treatment works best when it's given right after symptoms occur. Prompt treatment of a heart attack can help prevent or limit damage to the heart and prevent sudden death. Call 9-1-1 Right Away A heart ...

  13. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Taeghyoon; Choi, Seokjin; Lee, Cheolwon

    Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

  14. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    NASA Astrophysics Data System (ADS)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  15. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  16. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  17. Radio Relays Improve Wireless Products

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  18. An overview of relay channels - Information theory of satellite data relay link

    NASA Astrophysics Data System (ADS)

    Iida, Takashi

    1987-03-01

    This paper gives an overview of the theory of the relay channel, the communication channel having a relay encoder between transmitter and receiver. The relay channel corresponds to a satellite data relay link. The basic problem of this theory is to find the channel capacity. The theory of the relay channel was introduced by Van der Meulen (1971) and was expanded by Cover and El Gamal (1979). This paper reviews the meaning of relay in communication, and discusses the general, degraded, Gaussian degraded, and feedback relay channels. Furthermore, the satellite data relay link is discussed in comparison with the relay channel theory.

  19. Heart Attack

    MedlinePlus

    ... lower “bad” cholesterol (also called LDL, or low-density lipoprotein) levels and may help increase “good” cholesterol (also called HDL, or high-density lipoprotein). If you have had a heart attack, ...

  20. Laser Relay: Improving Space Communications

    NASA Video Gallery

    The Laser Communications Relay Demonstration mission proposes to revolutionize the way we send and receive data, video and other information, using lasers to encode and transmit data at rates 10 to...

  1. The power relay satellite

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  2. The power relay satellite

    SciTech Connect

    Glaser, P.E.

    1994-12-31

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  3. Shark attack.

    PubMed

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  4. Satellite Relaying of Geophysical Data

    NASA Technical Reports Server (NTRS)

    Allenby, R. J.

    1977-01-01

    Data Collection Platforms (DCPs) for transmitting surface data to an orbiting satellite for relaying to a central data distribution center are being used in a number of geophysical applications. "Off-the-shelf" DCP's, transmitting through Landsat or GOES satellites, are fully capable of relaying data from low-data-rate instruments, such as tiltmeters or tide gauges. In cooperation with the Lamont-Doherty Geological Observatory, Goddard has successfully installed DCP systems on a tide gauge and tiltmeter array on Anegada, British Virgin Islands. Because of the high-data-rate requirements, a practical relay system capable of handling seismic information is not yet available. Such a system could become the basis of an operational hazard prediction system for reducing losses due to major natural catastrophies such as earthquakes, volcanic eruptions, landslides or tsunamis.

  5. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  6. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Automatic Train Stop, Train Control and Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be...

  7. Relay Writing in an Adolescent Online Community

    ERIC Educational Resources Information Center

    Yi, Youngjoo

    2008-01-01

    "Welcome to Buckeye City" is an adolescent online community that was maintained by 25 Korean students who attended American schools. On the website, the students engaged in "relay writing"--a writing activity in which each person contributed a portion of an evolving story in a relayed manner. Relay writing offers teachers a new and valuable window…

  8. Contrasting origins of breached relay zone geometries

    NASA Astrophysics Data System (ADS)

    Conneally, J.; Childs, C.; Walsh, J. J.

    2014-01-01

    Relay zones accommodate transfer of displacement between pairs of adjacent segments of a fault array that become linked to form a through-going fault as displacement increases. 3D geometric and kinematic analysis of two vertically aligned relay zones, that form a complex boundary between two fault segments, generally support this model of relay zone growth but they also highlight some departures from this scheme. The two seismically mapped relay zones, although separated vertically by 100 m, were synchronously active over most of their development history. A causal relationship between them is proposed with the geometric complexity arising from the formation of the lower relay zone triggering the formation of the upper. The lower relay zone is now breached but originally formed a hole within the fault surface up to throws of ca. 50 m. The upper relay zone displays both breached and intact relay zone geometries at different structural levels demonstrating that relay zone breaching is a protracted rather than geologically instantaneous process. Geometrically the lower part of this structure resembles a breached relay zone, but it formed by propagation of a splay fault from a pre-existing bend to enclose an intervening and steepening ramp, a growth scheme which is the opposite of conventional relay zone models.

  9. The magic of relay mirrors

    NASA Astrophysics Data System (ADS)

    Duff, Edward A.; Washburn, Donald C.

    2004-09-01

    Laser weapon systems would be significantly enhanced with the addition of high altitude or space-borne relay mirrors. Such mirrors, operating alone with a directed energy source, or many in a series fashion, can be shown to effectively move the laser source to the last, so-called fighting mirror. This "magically" reduces the range to target and offers to enhance the performance of directed energy systems like the Airborne Laser and even ground-based or ship-based lasers. Recent development of high altitude airships will be shown to provide stationary positions for such relay mirrors thereby enabling many new and important applications for laser weapons. The technical challenges to achieve this capability are discussed.

  10. Telemetry data via communications relay

    NASA Astrophysics Data System (ADS)

    Strock, O. J.; Witchey, Michael

    This paper responds to a test range engineer's need to relay one or more channels of various types of telemetry data from a remotely-located receiving station to the central telemetry station at range headquarters for real-time processing and display. Several types of data are identified, and specific equipment and technology for multiplexing, transmission, and demultiplexing up to eight streams from a variety of sources is discussed. The widely-used T3 communications link, also known as DS-3, can relay data via satellite, microwave link, or other high-speed path at 44.736 megabits per second, of which about 95 percent can be actual telemetry data; other standard links operate at lower aggregate rates. Several links and rates are discussed, with emphasis in the high-rate T3 link.

  11. Energy efficient circuit design using nanoelectromechanical relays

    NASA Astrophysics Data System (ADS)

    Venkatasubramanian, Ramakrishnan

    Nano-electromechanical (NEM) relays are a promising class of emerging devices that offer zero off-state leakage and behave like an ideal switch. Recent advances in planar fabrication technology have demonstrated that microelectromechanical (MEMS) scale miniature relays could be manufactured reliably and could be used to build fully functional, complex integrated circuits. The zero leakage operation of relays has renewed the interest in relay based low power logic design. This dissertation explores circuit architectures using NEM relays and NEMS-CMOS heterogeneous integration. Novel circuit topologies for sequential logic, memory, and power management circuits have been proposed taking into consideration the NEM relay device properties and optimizing for energy efficiency and area. In nanoscale electromechanical devices, dispersion forces like Van der Waals' force (vdW) affect the pull-in stability of the relay devices significantly. Verilog-A electromechanical model of the suspended gate relay operating at 1V with a nominal air gap of 5 - 10nm has been developed taking into account all the electrical, mechanical and dispersion effects. This dissertation explores different relay based latch and flip-flop topologies. It has been shown that as few as 4 relay cells could be used to build flip-flops. An integrated voltage doubler based flip flop that improves the performance by 2X by overdriving Vgb has been proposed. Three NEM relay based parallel readout memory bitcell architectures have been proposed that have faster access time, and remove the reliability issues associated with previously reported serial readout architectures. A paradigm shift in design of power switches using NEM relays is proposed. An interesting property of the relay device is that the ON state resistance (Ron) of the NEM relay switch is constant and is insensitive to the gate slew rate. This coupled with infinite OFF state resistance (Roff ) offers significant area and power advantages over CMOS

  12. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  13. The Laser Communications Relay and the Path to the Next Generation Near Earth Relay

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2015-01-01

    NASA Goddard Space Flight Center is currently developing the Laser Communications Relay Demonstration (LCRD) as a Path to the Next Generation Near Earth Space Communication Network. The current NASA Space Network or Tracking and Data Relay Satellite System is comprised of a constellation of Tracking and Data Relay Satellites (TDRS) in geosynchronous orbit and associated ground stations and operation centers. NASA is currently targeting a next generation of relay capability on orbit in the 2025 timeframe.

  14. Heart Attack Recovery FAQs

    MedlinePlus

    ... Pressure High Blood Pressure Tools & Resources Stroke More Heart Attack Recovery FAQs Updated:Aug 24,2016 Most people ... recovery. View an animation of a heart attack . Heart Attack Recovery Questions and Answers What treatments will I ...

  15. A multi-data source surveillance system to detect a bioterrorism attack during the G8 Summit in Scotland.

    PubMed

    Meyer, N; McMenamin, J; Robertson, C; Donaghy, M; Allardice, G; Cooper, D

    2008-07-01

    In 18 weeks, Health Protection Scotland (HPS) deployed a syndromic surveillance system to early-detect natural or intentional disease outbreaks during the G8 Summit 2005 at Gleneagles, Scotland. The system integrated clinical and non-clinical datasets. Clinical datasets included Accident & Emergency (A&E) syndromes, and General Practice (GPs) codes grouped into syndromes. Non-clinical data included telephone calls to a nurse helpline, laboratory test orders, and hotel staff absenteeism. A cumulative sum-based detection algorithm and a log-linear regression model identified signals in the data. The system had a fax-based track for real-time identification of unusual presentations. Ninety-five signals were triggered by the detection algorithms and four forms were faxed to HPS. Thirteen signals were investigated. The system successfully complemented a traditional surveillance system in identifying a small cluster of gastroenteritis among the police force and triggered interventions to prevent further cases. PMID:17678556

  16. A multi-data source surveillance system to detect a bioterrorism attack during the G8 Summit in Scotland

    PubMed Central

    MEYER, N.; McMENAMIN, J.; ROBERTSON, C.; DONAGHY, M.; ALLARDICE, G.; COOPER, D.

    2008-01-01

    SUMMARY In 18 weeks, Health Protection Scotland (HPS) deployed a syndromic surveillance system to early-detect natural or intentional disease outbreaks during the G8 Summit 2005 at Gleneagles, Scotland. The system integrated clinical and non-clinical datasets. Clinical datasets included Accident & Emergency (A&E) syndromes, and General Practice (GPs) codes grouped into syndromes. Non-clinical data included telephone calls to a nurse helpline, laboratory test orders, and hotel staff absenteeism. A cumulative sum-based detection algorithm and a log-linear regression model identified signals in the data. The system had a fax-based track for real-time identification of unusual presentations. Ninety-five signals were triggered by the detection algorithms and four forms were faxed to HPS. Thirteen signals were investigated. The system successfully complemented a traditional surveillance system in identifying a small cluster of gastroenteritis among the police force and triggered interventions to prevent further cases. PMID:17678556

  17. Radio-relay and satellite transmission systems

    NASA Astrophysics Data System (ADS)

    Nemirovskii, A. S.

    The present work is a handbook on the design and analysis of radio-relay, tropospheric, and satellite transmission systems. Particular consideration is given to the propagation of decimeter and centimeter waves; antenna and feed devices for relay and satellite systems; noise and distortions; the signal fading problem; EMC; and the optimization of the transmission systems.

  18. G. Marconi: A Data Relay Satellite for Mars Communications

    NASA Astrophysics Data System (ADS)

    Dionisio, C.; Marcozzi, M.; Landriani, C.

    2002-01-01

    Mars has always been a source of intrigue and fascination. Recent scientific discoveries have stimulated this longstanding interest, leading to a renaissance in Mars exploration. Future missions to Mars will be capable of long-distance surface mobility, hyperspectral imaging, subsurface exploration, and even life-detection. Manned missions and, eventually, colonies may follow. No mission to the Red Planet stands alone. New scientific and technological knowledge is passed on from one mission to the next, not only improving the journey into space, but also providing benefits here on Earth. The Mars Relay Network, an international constellation of Mars orbiters with relay radios, directly supports other Mars missions by relaying communications between robotic vehicles at Mars and ground stations on Earth. The ability of robotic visitors from Earth to explore Mars will take a gigantic leap forward in 2007 with the launch of the Guglielmo Marconi Orbiter (GMO), the first spacecraft primarily dedicated to providing communication relay, navigation and timing services at Mars. GMO will be the preeminent node of the Mars Relay Network. GMO will relay communications between Earth and robotic vehicles near Mars. GMO will also provide navigation services to spacecraft approaching Mars. GMO will receive transmissions from ground stations on Earth at X-band and will transmit to ground stations on Earth at X- and Ka-bands. GMO will transmit to robotic vehicles at Mars at UHF and receive from these vehicles at UHF and X-band. GMO's baseline 4450 km circular orbit provides complete coverage of the planet for telecommunication and navigation support. GMO will arrive at Mars in mid-2008, just before the NetLander and Mars Scout missions that will be its first users. GMO is designed for a nominal operating lifetime of 10 years and will support nominal commanding and data acquisition, as well as mission critical events such as Mars Orbit Insertion, Entry, Descent and Landing, and Mars

  19. Improved BDF relaying scheme using time diversity over atmospheric turbulence and misalignment fading channels.

    PubMed

    García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-01-01

    A novel bit-detect-and-forward (BDF) relaying scheme based on repetition coding with the relay is proposed, significantly improving the robustness to impairments proper to free-space optical (FSO) communications such as unsuitable alignment between transmitter and receiver as well as fluctuations in the irradiance of the transmitted optical beam due to the atmospheric turbulence. Closed-form asymptotic bit-error-rate (BER) expressions are derived for a 3-way FSO communication setup. Fully exploiting the potential time-diversity available in the relay turbulent channel, a relevant better performance is achieved, showing a greater robustness to the relay location since a high diversity gain is provided regardless of the source-destination link distance.

  20. Improved BDF Relaying Scheme Using Time Diversity over Atmospheric Turbulence and Misalignment Fading Channels

    PubMed Central

    García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-01-01

    A novel bit-detect-and-forward (BDF) relaying scheme based on repetition coding with the relay is proposed, significantly improving the robustness to impairments proper to free-space optical (FSO) communications such as unsuitable alignment between transmitter and receiver as well as fluctuations in the irradiance of the transmitted optical beam due to the atmospheric turbulence. Closed-form asymptotic bit-error-rate (BER) expressions are derived for a 3-way FSO communication setup. Fully exploiting the potential time-diversity available in the relay turbulent channel, a relevant better performance is achieved, showing a greater robustness to the relay location since a high diversity gain is provided regardless of the source-destination link distance. PMID:24587711

  1. Evolution of a radio communication relay system

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  2. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  3. Modeling study of the ABS relay valve

    NASA Astrophysics Data System (ADS)

    Lei, Ming; Lin, Min; Guo, Bin; Luo, Zai; Xu, Weidong

    2011-05-01

    The ABS (anti-lock braking system) relay valve is the key component of anti-lock braking system in most commercial vehicles such as trucks, tractor-trailers, etc. In this paper, structure of ABS relay valve and its work theory were analyzed. Then a mathematical model of ABS relay valve, which was investigated by dividing into electronic part, magnetic part, pneumatic part and mechanical part, was set up. The displacement of spools and the response of pressure increasing, holding, releasing of ABS relay valve were simulated and analyzed under conditions of control pressure 500 KPa, braking pressure 600 KPa, atmospheric pressure 100 KPa and air temperature 310 K. Thisarticle provides reliable theory for improving the performance and efficiency of anti-lock braking system of vehicles.

  4. Modeling study of the ABS relay valve

    NASA Astrophysics Data System (ADS)

    Lei, Ming; Lin, Min; Guo, Bin; Luo, Zai; Xu, Weidong

    2010-12-01

    The ABS (anti-lock braking system) relay valve is the key component of anti-lock braking system in most commercial vehicles such as trucks, tractor-trailers, etc. In this paper, structure of ABS relay valve and its work theory were analyzed. Then a mathematical model of ABS relay valve, which was investigated by dividing into electronic part, magnetic part, pneumatic part and mechanical part, was set up. The displacement of spools and the response of pressure increasing, holding, releasing of ABS relay valve were simulated and analyzed under conditions of control pressure 500 KPa, braking pressure 600 KPa, atmospheric pressure 100 KPa and air temperature 310 K. Thisarticle provides reliable theory for improving the performance and efficiency of anti-lock braking system of vehicles.

  5. Speech-to-Speech Relay Service

    MedlinePlus

    ... all forms of TRS, STS uses Communications Assistants (CAs) – to relay the conversation back and forth between ... and the other party to the call. STS CAs are operators who are specifically trained in understanding ...

  6. ESA's advanced relay and technology mission

    NASA Astrophysics Data System (ADS)

    Lechte, H.; Bird, A. G.; van Holtz, L.; Oppenhauser, G.

    1990-05-01

    The Advanced Relay and Technology Mission is discussed. The objective of the mission is to develop, launch, and operate a single geostationary satellite. The proposed satellite includes advanced communications payloads with data-relay, mobile, and fixed-service applications. The semiconductor laser intersatellite link experiment (Silex), which is aimed at developing an optical communications data-relay system, is described. The Silex configuration is designed for LEO or GEO applications and has a 65 Mbit/s data rate over the optical return link. Consideration is given to the phased-array technology utilized in the S-band data-relay payload; the L-band land mobile payload; diagnostics and propagation packages; and technology experiments for improving the platform.

  7. Airborne Relay-Based Regional Positioning System

    PubMed Central

    Lee, Kyuman; Noh, Hongjun; Lim, Jaesung

    2015-01-01

    Ground-based pseudolite systems have some limitations, such as low vertical accuracy, multipath effects and near-far problems. These problems are not significant in airborne-based pseudolite systems. However, the monitoring of pseudolite positions is required because of the mobility of the platforms on which the pseudolites are mounted, and this causes performance degradation. To address these pseudolite system limitations, we propose an airborne relay-based regional positioning system that consists of a master station, reference stations, airborne relays and a user. In the proposed system, navigation signals are generated from the reference stations located on the ground and are relayed via the airborne relays. Unlike in conventional airborne-based systems, the user in the proposed system sequentially estimates both the locations of airborne relays and his/her own position. Therefore, a delay due to monitoring does not occur, and the accuracy is not affected by the movement of airborne relays. We conducted several simulations to evaluate the performance of the proposed system. Based on the simulation results, we demonstrated that the proposed system guarantees a higher accuracy than airborne-based pseudolite systems, and it is feasible despite the existence of clock offsets among reference stations. PMID:26029953

  8. Physical Layer Security Using Two-Path Successive Relaying

    PubMed Central

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  9. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-06-09

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  10. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  11. About Heart Attacks

    MedlinePlus

    ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ... survive. A heart attack occurs when the blood flow that brings oxygen to the heart muscle is severely reduced or ...

  12. Performance analysis of relay subset selection for amplify-and-forward cognitive relay networks.

    PubMed

    Sultan, Kiran; Qureshi, Ijaz Mansoor; Malik, Aqdas Naveed; Zubair, Muhammad

    2014-01-01

    Cooperative communication is regarded as a key technology in wireless networks, including cognitive radio networks (CRNs), which increases the diversity order of the signal to combat the unfavorable effects of the fading channels, by allowing distributed terminals to collaborate through sophisticated signal processing. Underlay CRNs have strict interference constraints towards the secondary users (SUs) active in the frequency band of the primary users (PUs), which limits their transmit power and their coverage area. Relay selection offers a potential solution to the challenges faced by underlay networks, by selecting either single best relay or a subset of potential relay set under different design requirements and assumptions. The best relay selection schemes proposed in the literature for amplify-and-forward (AF) based underlay cognitive relay networks have been very well studied in terms of outage probability (OP) and bit error rate (BER), which is deficient in multiple relay selection schemes. The novelty of this work is to study the outage behavior of multiple relay selection in the underlay CRN and derive the closed-form expressions for the OP and BER through cumulative distribution function (CDF) of the SNR received at the destination. The effectiveness of relay subset selection is shown through simulation results. PMID:24737980

  13. Ground wave emergency network environmental assessment for northwestern Colorado relay node site number RN 8C924CO

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  14. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  15. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    SciTech Connect

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We

  16. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  17. COMPASS Final Report: Lunar Relay Satellite (LRS)

    NASA Technical Reports Server (NTRS)

    Oleson, Steven R.; McGuire, Melissa L.

    2012-01-01

    The Lunar Relay Satellite (LRS) COllaborative Modeling and Parametric Assessment of Space Systems (COMPASS) session was tasked to design a satellite to orbit in an elliptical lunar polar orbit to provide relay communications between lunar South Pole assets and the Earth. The design included a complete master equipment list, power requirement list, configuration design, and brief risk assessment and cost analysis. The LRS is a half-TDRSS sized box spacecraft, which provides communications and navigation relay between lunar outposts (via Lunar Communications Terminals (LCT)) or Sortie parties (with user radios) and large ground antennas on Earth. The LRS consists of a spacecraft containing all the communications and avionics equipment designed by NASA Jet Propulsion Laboratory s (JPL) Team X to perform the relay between lunar-based assets and the Earth. The satellite design is a standard box truss spacecraft design with a thermal control system, 1.7 m solar arrays for 1 kWe power, a 1 m diameter Ka/S band dish which provides relay communications with the LCT, and a Q-band dish for communications to/from the Earth based assets. While JPL's Team X and Goddard Space Flight Center s (GSFC) I M Design Center (IMDC) have completed two other LRS designs, this NASA Glenn Research Center (GRC) COMPASS LRS design sits between them in terms of physical size and capabilities.

  18. Bacteriophage as models for virus removal from Pacific oysters (Crassostrea gigas) during re-laying.

    PubMed Central

    Humphrey, T. J.; Martin, K.

    1993-01-01

    A study was undertaken to examine the feasibility of using naturally-occurring bacteriophages to assess the impact of re-laying on levels of viral contamination in Crassostrea gigas, the Pacific oyster. Two phages were chosen. One, male-specific (F+), was enumerated using Salmonella typhimurium. The other, a somatic phage, was detected using an, as yet, uncharacterized Escherichia coli. Investigations, using a variety of re-laying sites, demonstrated that numbers of F+ phage in oyster tissue declined more rapidly than those of somatic phage. For example, in oysters placed in commercially-used sea water ponds, F+ phage reached undetectable levels within 2-3 weeks, whereas somatic phage could still be detected 5 weeks after re-laying. The studies suggest that F+ phage may not be a suitable indicator for virus removal and that somatic phage may be better suited to this role. PMID:8405159

  19. Optical deep space communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Gagliardi, R. M.; Vilnrotter, V. A.; Dolinar, S. J., Jr.

    1981-01-01

    The possible use of an optical for high rate data transmission from a deep space vehicle to an Earth-orbiting relay satellite while RF links are envisioned for the relay to Earth link was studied. A preliminary link analysis is presented for initial sizing of optical components and power levels, in terms of achievable data rates and feasible range distances. Modulation formats are restricted to pulsed laser operation, involving bot coded and uncoded schemes. The advantage of an optical link over present RF deep space link capabilities is shown. The problems of acquisition, pointing and tracking with narrow optical beams are presented and discussed. Mathematical models of beam trackers are derived, aiding in the design of such systems for minimizing beam pointing errors. The expected orbital geometry between spacecraft and relay satellite, and its impact on beam pointing dynamics are discussed.

  20. Impact of relay placement on diversity order in adaptive selective DF relay-assisted FSO communications.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Beatriz; Castillo-Vázquez, Carmen

    2015-02-01

    The impact of relay placement on diversity order in adaptive selective decode-and-forward (DF) cooperative strategies is here investigated in the context of free-space optical (FSO) communications over atmospheric turbulence channels with pointing errors when line of sight is available. The irradiance of the transmitted optical beam here considered is susceptible to moderate-to-strong turbulence conditions, following a gamma-gamma (GG) distribution together with a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. Novel closed-form approximate bit error-rate (BER) expressions are obtained for a cooperative FSO communication setup with N relays, assuming that these relays are located in an area similar to an annulus around source or destination node. An analytical expression is here found that determines the best selection criterion based on the knowledge of the channel state information (CSI) of source-relay or relay-destination links in order to significantly increase the diversity order corresponding to the cooperative strategy under study. It is concluded that the highest diversity order is achieved when the relation β(SR(min)) > β(SD) + β(R(min)D) is satisfied, wherein β(SR(min)), β(R(min)D) and β(SD) are parameters corresponding to the atmospheric turbulence conditions of source-relay and relay-destination link with the greatest scintillation index, and source-destination link, respectively. PMID:25836124

  1. Impact of relay placement on diversity order in adaptive selective DF relay-assisted FSO communications.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Beatriz; Castillo-Vázquez, Carmen

    2015-02-01

    The impact of relay placement on diversity order in adaptive selective decode-and-forward (DF) cooperative strategies is here investigated in the context of free-space optical (FSO) communications over atmospheric turbulence channels with pointing errors when line of sight is available. The irradiance of the transmitted optical beam here considered is susceptible to moderate-to-strong turbulence conditions, following a gamma-gamma (GG) distribution together with a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. Novel closed-form approximate bit error-rate (BER) expressions are obtained for a cooperative FSO communication setup with N relays, assuming that these relays are located in an area similar to an annulus around source or destination node. An analytical expression is here found that determines the best selection criterion based on the knowledge of the channel state information (CSI) of source-relay or relay-destination links in order to significantly increase the diversity order corresponding to the cooperative strategy under study. It is concluded that the highest diversity order is achieved when the relation β(SR(min)) > β(SD) + β(R(min)D) is satisfied, wherein β(SR(min)), β(R(min)D) and β(SD) are parameters corresponding to the atmospheric turbulence conditions of source-relay and relay-destination link with the greatest scintillation index, and source-destination link, respectively.

  2. Multiantenna relay beamforming design for QoS discrimination in two-way relay networks.

    PubMed

    Xiong, Ke; Zhang, Yu; Li, Dandan; Chang, Chih-Yung; Zhong, Zhangdui

    2013-01-01

    This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method.

  3. Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Mckenzie, J.; Vanek, C.

    1991-01-01

    The DSN (Deep Space Network) mission support requirements for the Tracking and Data Relay Satellite System (TDRSS) are summarized. The TDRSS consists of four identical satellites in geosynchronous orbits (35,800 km) and a dedicated ground station. The payload of each satellite is a telecommunications service system that relays communication signals between low earth-orbiting user spacecraft and the TDRSS ground terminal. Mission objectives are outlined and the DSN support requirements are defined through the presentation of tables and narratives describing the spacecraft flight profile; DSN support coverage; frequency assignments; support parameters for telemetry, command and support systems; and tracking support responsibility.

  4. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  5. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts or through front and polar contacts of the track relay for the adjoining track circuit....

  6. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  7. Wild boar attacks.

    PubMed

    Gunduz, Abdulkadir; Turedi, Suleyman; Nuhoglu, Irfan; Kalkan, Asim; Turkmen, Suha

    2007-01-01

    Attacks on humans by wild boar (Sus scrofa) are occasionally reported in rural areas of Turkey. While fatalities are rare, individuals may sustain significant soft tissue trauma. Lower extremity lacerations of up to 10 cm in length and 4 cm deep were seen in the 3 cases reviewed. Injuries to the upper abdomen and chest occurred in one case. Attacks frequently occur in forested areas covered by dense brushwood, and their incidence is increased during the rutting season. In contrast to other large, feral animal attacks, injuries sustained from wild boar typically are limited to the lower extremities. This case series examines 3 attacks by wild boar in rural Turkey.

  8. Pressure and fluid-flow response to production from reservoirs bounded by faults with relay structures

    SciTech Connect

    Matthaei, S.K.; Aydin, A.; Pollard, D.D. )

    1996-01-01

    Compartmentatilization of hydrocarbon reservoirs by faults is a widely observed phenomenon in the North Sea and the Niger delta oil fields among others. Faults with significant throw or heave are identifiable in seismic surveys. However, toward their terminations or near relay structures, slip decreases so portions of the faults may be invisible in seismic data. Therefore, we use outcrop analogs to constrain the model geometry and permeability distributions to investigate the influence on fluid flow during production of such relay structures and the apparent terminations of faults in seismic images. We employ field measurements of the geometry, width and permeability of fault terminations and relay structures in the Entrada Sandstone, Arches National Park, Utah, to construct fluid flow models of a fault-bounded analog reservoir. Production from wells drilled into this reservoir is simulated with a novel high-resolution finite element code. Starting with initially uniform reservoir pressure, the results of these simulations based on geologically realistic parameters, comprise pressure differentials that build up during production across seismically detectable faults with associated deformation bands and joints in the relay structure. For a typical relay structure, we explore the implications of these results for fault-seal stability and for changes in reservoir flow patterns if fault permeability changes during production.

  9. Pressure and fluid-flow response to production from reservoirs bounded by faults with relay structures

    SciTech Connect

    Matthaei, S.K.; Aydin, A.; Pollard, D.D.

    1996-12-31

    Compartmentatilization of hydrocarbon reservoirs by faults is a widely observed phenomenon in the North Sea and the Niger delta oil fields among others. Faults with significant throw or heave are identifiable in seismic surveys. However, toward their terminations or near relay structures, slip decreases so portions of the faults may be invisible in seismic data. Therefore, we use outcrop analogs to constrain the model geometry and permeability distributions to investigate the influence on fluid flow during production of such relay structures and the apparent terminations of faults in seismic images. We employ field measurements of the geometry, width and permeability of fault terminations and relay structures in the Entrada Sandstone, Arches National Park, Utah, to construct fluid flow models of a fault-bounded analog reservoir. Production from wells drilled into this reservoir is simulated with a novel high-resolution finite element code. Starting with initially uniform reservoir pressure, the results of these simulations based on geologically realistic parameters, comprise pressure differentials that build up during production across seismically detectable faults with associated deformation bands and joints in the relay structure. For a typical relay structure, we explore the implications of these results for fault-seal stability and for changes in reservoir flow patterns if fault permeability changes during production.

  10. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  11. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  12. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  13. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  14. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  15. Factors affecting performance during an endurance relay.

    PubMed

    Lloyd, E L; Henderson, W; Covell, B; Bryce, G R

    1977-09-01

    A successful attempt by Edinburgh Athletic Club on the world record for the 24-hour 10-man x 1 mile relay is reported. The effects of a variety of factors on the performances of the athletes are assessed, and some physiological changes noted. In the light of these observations recommendations are made to help the planning of future record attempts.

  16. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  17. Transient Ischemic Attack

    MedlinePlus

    Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only ... TIA is that with TIA the blockage is transient (temporary). TIA symptoms occur rapidly and last a ...

  18. Using a micromachined magnetostatic relay in commutating a DC motor

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor); Lilienthal, Gerald (Inventor)

    2004-01-01

    A DC motor is commutated by rotating a magnetic rotor to induce a magnetic field in at least one magnetostatic relay in the motor. Each relay is activated in response to the magnetic field to deliver power to at least one corresponding winding connected to the relay. In some cases, each relay delivers power first through a corresponding primary winding and then through a corresponding secondary winding to a common node. Specific examples include a four-pole, three-phase motor in which each relay is activated four times during one rotation of the magnetic rotor.

  19. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  20. Relay-and-antenna selection and digital transceiver design for two-way AF-MIMO multiple-relay systems

    NASA Astrophysics Data System (ADS)

    Hu, Chia-Chang; Su, Hao-Hsian; Tang, Kang-Tsao

    2014-09-01

    This paper considers a two-way multiple-input multiple-output (MIMO) relaying system with multiple relays between two terminals nodes. The relay antenna selection scheme based on channel singular valued decomposition (SVD) is used to reduce energy consumption. To enhance the system performance, we apply a SVD-based algorithm with MSE criterion which calculates optimal linear transceivers precoding jointly at the source nodes and relay nodes for amplify-and-forward (AF) protocols. In computer simulations, we use an iteration method to compute the non-convex function of joint source and relays power allocation. The simulation results show the SVD-based precoding design with SVD-based relay and antenna selection scheme can achieve a superior system bit error rate (BER) performance and reduce the power consume of relay antennas.

  1. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  2. Solar concentrator with a toroidal relay module.

    PubMed

    Lin, Jhe-Syuan; Liang, Chao-Wen

    2015-10-01

    III-V multijunction solar cells require solar concentrators with a high concentration ratio to reduce per watt cost and to increase solar energy transforming efficiency. This paper discusses a novel solar concentrator design that features a high concentration ratio, high transfer efficiency, thin profile design, and a high solar acceptance angle. The optical design of the concentrator utilizes a toroidal relay module, which includes both the off-axis relay lens and field lens design in a single concentric toroidal lens shape. The optical design concept of the concentrator is discussed and the simulation results are shown. The given exemplary design has an aspect ratio of 0.24, a high averaged optical concentration ratio 1230×, a maximum efficiency of 76.8%, and the solar acceptance angle of ±0.9°.

  3. Spaceborne centrifugal relays for spacecraft propulsion

    NASA Technical Reports Server (NTRS)

    Ouzidane, Malika

    1991-01-01

    Acceleration using centrifugal relays is a recently discovered method for the acceleration of spaceborne payloads to high velocity at high thrust. Centrifugal relays are moving rotors which progressively accelerate reaction mass to higher velocities. One important engineering problem consists of accurately tracking the position of the projectiles and rotors and guiding each projectile exactly onto the appropriate guide tracks on each rotor. The topics of this research are the system kinematics and dynamics and the computerized guidance system which will allow the projectile to approach each rotor with exact timing with respect to the rotor rotation period and with very small errors in lateral positions. Kinematics studies include analysis of rotor and projectile positions versus time and projectile/rotor interactions. Guidance studies include a detailed description of the tracking mechanism (interrupt of optical beams) and the aiming mechanism (electromagnetic focusing) including the design of electromagnetic deflection coils and the switching circuitry.

  4. Non-latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A non-latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes a permanent magnet and an electromagnet. The respective sections are arranged in separate locations or cavities in the assembly. The switch has a "normal" position and is selectively switched by an overriding electromagnetic assembly. The switch returns to the "normal" position when the overriding electromagnetic assembly is inactive.

  5. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  6. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... of patients with unstable angina/non-ST-elevation myocardial infarction (updating the 2007 guideline and replacing the 2011 ...

  7. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  8. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  9. High salinity relay as a postharvest processing strategy to reduce vibrio vulnificus levels in Chesapeake Bay oysters (Crassostrea virginica).

    PubMed

    Audemard, Corinne; Kator, Howard I; Rhodes, Martha W; Gallivan, Thomas; Erskine, A J; Leggett, A Thomas; Reece, Kimberly S

    2011-11-01

    In 2009 the U.S. Food and Drug Administration (FDA) announced its intention to implement postharvest processing (PHP) methods to eliminate Vibrio vulnificus from oysters intended for the raw, half-shell market that are harvested from the Gulf of Mexico during warmer months. FDA-approved PHP methods can be expensive and may be associated with unfavorable responses from some consumers. A relatively unexplored PHP method that uses relaying to high salinity waters could be an alternative strategy, considering that high salinities appear to negatively affect the survival of V. vulnificus. During relay, however, oysters may be exposed to rapid and large salinity increases that could cause increased mortality. In this study, the effectiveness of high salinity relay to reduce V. vulnificus to <30 most probable number (MPN) per g and the impact on oyster mortality were assessed in the lower Chesapeake Bay. Two relay experiments were performed during the summer and fall of 2010. Oysters collected from three grow-out sites, a low salinity site (14 to 15 practical salinity units [psu]) and two moderate salinity sites (22 to 25 psu), were relayed directly to a high salinity site (≥30 psu) on Virginia's Eastern Shore. Oysters were assayed for V. vulnificus and Vibrio parahaemolyticus (another Vibrio species of concern) densities at time 0 prior to relay and after 7 and 14 days of relay, using the FDA MPN enrichment method combined with detection by real-time PCR. After 14 days, both V. vulnificus and V. parahaemolyticus densities were ≤0.8 MPN/g, and decreases of 2 to 3 log in V. vulnificus densities were observed. Oyster mortalities were low (≤4%) even for oysters from the low salinity harvest site, which experienced a salinity increase of approximately 15 psu. Results, although preliminary and requiring formal validation and economic analysis, suggest that high salinity relay could be an effective PHP method.

  10. Adjustable electronic load-alarm relay

    DOEpatents

    Mason, Charles H.; Sitton, Roy S.

    1976-01-01

    This invention is an improved electronic alarm relay for monitoring the current drawn by an AC motor or other electrical load. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage.

  11. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  12. An assessment of fire vulnerability for aged electrical relays

    SciTech Connect

    Vigil, R.A. |; Nowlen, S.P.

    1995-03-01

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized.

  13. Relay test program. Series 2 tests: Integral testing of relays and circuit breakers

    SciTech Connect

    Bandyopadhyay, K.K.; Kunkel, C.; Shteyngart, S.

    1994-02-01

    This report presents the results of a relay test program conducted by Brookhaven National Laboratory (BNL) under the sponsorship of the US Nuclear Regulatory Commission (NRC). The program is a continuation of an earlier test program the results of which were published in NUREG/CR-4867. The current program was carried out in two phases: electrical testing and vibration testing. The objective was primarily to focus on the electrical discontinuity or continuity of relays and circuit breaker tripping mechanisms subjected to electrical pulses and vibration loads. The electrical testing was conducted by KEMA-Powertest Company and the vibration testing was performed at Wyle Laboratories, Huntsville, Alabama. This report discusses the test procedures, presents the test data, includes an analysis of the data and provides recommendations regarding reliable relay testing.

  14. Transient modeling of electromechanical relays. Part 2: Plunger type 50 relays

    SciTech Connect

    Glinkowski, M.T.; Esztergalyos, J.

    1996-04-01

    Electromechanical, plunger type 50 relay is modeled in EMTP/ATP using TACS. Mechanical magnetic, and electrical characteristics are represented in the form of simple mathematical models that can provide a useful tool for studying the dynamic responses of the Type 50 devices and incorporating them into a power system transient analysis. This paper is the second part of a summary report by Rensselaer Polytechnic Institute (RPI) of work on relay modeling sponsored by the Bonneville Power Administration (BPA). Part 2 presents the Electro-Magnetic Transient Program/Alternative Transient Program (EMTP/ATP) model for plunger type 50 instantaneous overcurrent relays that compare with actual tests performed on the devices on a Power System Simulator (PSS).

  15. Overview of optical data relay system in JAXA

    NASA Astrophysics Data System (ADS)

    Chishiki, Y.; Yamakawa, S.; Takano, Y.; Miyamoto, Y.; Araki, T.; Kohata, H.

    2016-03-01

    To meet increasing demands of high-speed data transmission, JAXA has started to develop a new optical data relay system. This system provides 1.8Gbit/s data relay service through optical inter-satellite link and Ka-band feeder link using JDRS, a data relay satellite. The first user satellite is the Advanced Optical Satellite, a Japanese optical observation satellite in low earth orbit. As a total data relay system, the data relay satellite, Ka-band ground stations and two optical terminals for JDRS and the Advanced Optical Satellite are developed together. Target launch year of JDRS is 2019 in Japanese fiscal year. This paper describes the development plan and technologies of the optical data relay system.

  16. Programming A Molecular Relay for Ultrasensitive Biodetection through 129 Xe NMR

    SciTech Connect

    Wang, Yanfei; Roose, Benjamin W.; Philbin, John P.; Doman, Jordan L.; Dmochowski, Ivan J.

    2015-12-21

    We reported a supramolecular strategy for detecting specific proteins in complex media by using hyperpolarized 129Xe NMR. A cucurbit[6]uril (CB[6])-based molecular relay was programmed for three sequential equilibrium conditions by designing a two-faced guest (TFG) that initially binds CB[6] and blocks the CB[6]–Xe interaction. Moreover, the protein analyte recruits the TFG and frees CB[6] for Xe binding. TFGs containing CB[6]- and carbonic anhydrase II (CAII)-binding domains were synthesized in one or two steps. X-ray crystallography confirmed TFG binding to Zn2+ in the deep CAII active-site cleft, which precludes simultaneous CB[6] binding. The molecular relay was reprogrammed to detect avidin by using a different TFG. Finally, Xe binding by CB[6] was detected in buffer and in E. coli cultures expressing CAII through ultrasensitive 129Xe NMR spectroscopy.

  17. On the HEMP environment for protective relays. [High-altitude electromagnetic pulse

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1994-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength.

  18. Internet Relaying of Total Solar Eclipse on 11 August,1999

    NASA Astrophysics Data System (ADS)

    Nagai, T.; Takahashi, N.; Okyudo, M.; Suginaka, M.; Matsumoto, N.; Team Of Live! Eclipse

    The total solar eclipse was relayed live through the Internet from Siberia, Russia, on 9 March 1997. Subsequently, the total solar eclipse was relayed from Venezuela and Guadeloupe in the Caribbean Sea in 26 February 1998, the annular solar eclipse from Malaysia on 21 August 1998, and the annular solar eclipse from Australia on 16 February 1999. The Internet was used to relay the total solar eclipse to be seen in Europe, Rumania, Turkey, and Iran. We succeeded in transmitting images from Turkey.

  19. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  20. Ground wave emergency network final operational capability: Environmental assessment for southern Nevada relay node site number RN 8W918NV

    NASA Astrophysics Data System (ADS)

    1993-03-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in southern Nevada consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  1. Ground wave emergency network final operational capability: Environmental assessment for northwestern Nebraska relay node, site number RN 8C930NE

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-altitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence. The GWEN system consists of a network of relay nodes, receive-only stations, and input/output stations. Each relay node, such as the one proposed in northwestern Nebraska, consists of a guyed radio tower facility similar to those used by commercial AM broadcast transmitters.

  2. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  3. Shark attack in Natal.

    PubMed

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  4. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  5. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  6. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  7. An economically viable space power relay system

    NASA Astrophysics Data System (ADS)

    Bekey, Ivan; Boudreault, Richard

    1999-09-01

    This paper describes and analyzes the economics of a power relay system that takes advantage of recent technological advances to implement a system that is economically viable. A series of power relay systems are described and analyzed which transport power ranging from 1,250 megawatts to 5,000 megawatts, and distribute it to receiving sites at transcontinental distances. Two classes of systems are discussed—those with a single reflector and delivering all the power to a single rectenna, and a second type which has multiple reflectors and distributes it to 10 rectenna sites, sharing power among them. It is shown that when offering electricity at prices competitive to those prevalent in developed cities in the US that a low IRR is inevitable, and economic feasibility of a business is unlikely. However, when the target market is Japan where the prevalent electricity prices are much greater, that an IRR exceeding 65% is readily attainable. This is extremely attractive to potential investors, making capitalization of a venture likely. The paper shows that the capital investment required for the system can be less than 1 per installed watt, contributing less than 0.02 /KW-hr to the cost of energy provision. Since selling prices in feasible regions range from 0.18 to over 030 $/kW-hr, these costs are but a small fraction of the operating expenses. Thus a very large IRR is possible for such a business.

  8. A Geosynchronous Orbit Optical Communications Relay Architecture

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2014-01-01

    NASA is planning to fly a Next Generation Tracking and Data Relay Satellite (TDRS) next decade. While the requirements and architecture for that satellite are unknown at this time, NASA is investing in communications technologies that could be deployed on the satellite to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in December 2017 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the Next Generation TDRS. While it is obvious that a small to medium sized optical communications terminal could be flown on a GEO satellite to provide support to Near Earth missions, it is also possible to deploy a large terminal on the satellite to support Deep Space missions. Onboard data processing and Delay Tolerant Networking (DTN) are two additional technologies that could be used to optimize optical communications link services and enable additional mission and network operations. This paper provides a possible architecture for the optical communications augmentation of a Next Generation TDRS and touches on the critical technology work currently being done at NASA. It will also describe the impact of clouds on such an architecture and possible mitigation techniques.

  9. The data-relay preparatory programme

    NASA Astrophysics Data System (ADS)

    Dickinson, A.

    1990-02-01

    The data-relay preparatory program establishes and defines the preferred configuration for the data-relay system (DRS) space and ground segments, information-transmission, telemetry, telecommand and ranging sevices for foreseen European space programs, including Columbus, Ariane-5, Hermes and advanced earth-observation systems. This program has been conducted in two main areas: system studies and technological development. The system study has been divided in three main phases: (1) system design, i.e., configuration of the ground and spaceborne elements (1988); (2) definition of configuration and capacity of DRS satellites (1989); and (3) design of satellites and ground-segment facilities on the subsystem level (1990). As a result of the study, the DRS configuration will provide two operational satellites in geostationary orbit with orbital position of 44 deg W and 59 deg E which will allow almost full global coverage. The European DRS will be served by independent user earth terminals, with mission control center (MCC) in Darmstadt. The first system is planned to be fully operational in 1996.

  10. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... impact upon small entities. 26. Additionally, the TRS rules currently impose a minimum $25 contribution... COMMISSION 47 CFR Parts 1 and 64 Contributions to the Telecommunications Relay Service Fund AGENCY: Federal... summary of the Commission's Contributions to the Telecommunications Relay Service Fund, Notice of...

  11. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  12. 77 FR 42187 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals,...

  13. MaROS Strategic Relay Planning and Coordination Interfaces

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  14. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... subcarrier or any other communications technology may be used to distribute State emergency messages. ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  15. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... subcarrier or any other communications technology may be used to distribute State emergency messages. ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  16. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... subcarrier or any other communications technology may be used to distribute State emergency messages. ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  17. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  18. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20... Network. This network is composed of State Relay (SR) sources, leased common carrier communications facilities or any other available communication facilities. The network distributes State EAS...

  19. Relay studies: Existing data, current testing and cabinet amplification

    SciTech Connect

    Bandyopadhyay, K.; Hofmayer, C.; Kassir, M.; Pepper, S.

    1988-01-01

    The seismic fragility of most electrical equipment is governed by the malfunction of relays. This paper discusses the combined study being performed at BNL by evaluating existing fragility test data, conducting a new relay test program and estimating the cabinet amplification at relay locations. Existing test data for relays have been collected and evaluated at BNL. The data base consists of results from a wide variety of test programs - single frequency, single axis, multifrequency, multiaxis tests. For most relays, the non-operating condition controls the chatter fragility limit. In order to characterize the effect of various parameters on the relay seismic capacity, a test program has been initiated at BNL. Selected test specimens will be tested to determine the influence of frequency of vibration, direction of motion, adjustments of relay parts, among others, on the relay capacities. The amplification study involves computing dynamic amplification factors at various device locations in motor control centers and switchgear cabinets. Fragility and high level qualification data have been used for this purpose. This paper includes a summary of the amplification results. 4 refs., 6 figs., 1 tab.

  20. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  1. How well do train driver's sleep in relay vans?

    PubMed

    Lamond, Nicole; Darwent, David; Dawson, Drew

    2005-01-01

    Relay working operations typically require two crews of train drivers to work a rotating 8-h schedule for two or more days. While one crew is driving, the other has the opportunity to sleep onboard the train. The current study investigated the impact of relay work on drivers sleep quantity and quality. Fourteen drivers wore wrist activity monitors and completed sleep/wake diaries for 3 d prior to and during short (<48 h) relay trips. Drivers obtained an average of 7.8 h sleep per night while at home, and an average of 4 h sleep per opportunity during the relay trip. Sleep obtained in the relay van was associated with longer sleep onset latencies, lower efficiency and poorer subjective quality than sleep at home. During the relay trip, drivers obtained significantly more sleep during opportunities that occurred in the evening, than those that occurred early morning or during the day. These findings suggest that while drivers are able to obtain sleep during short relay operations, it is of poorer quality than sleep obtained at home. Further, the timing of the sleep opportunities during the relay trip impacts on the quantity and quality of sleep obtained.

  2. Effects of relay chatter in seismic probabilistic safety analysis

    SciTech Connect

    Reed, J.W.; Shiu, K.K.

    1985-01-01

    In the Zion and Indian Point Probabilistic Safety Studies, relay chatter was dismissed as a credible event and hence was not formally included in the analyses. Although little discussion is given in the Zion and Indian Point PSA documentation concerning the basis for this decision, it has been expressed informally that it was assumed that the operators will be able to reset all relays in a timely manner. Currently, it is the opinion of many professionals that this may be an oversimplification. The three basic areas which must be considered in addressing relay chatter include the fragility of the relays per se, the reliability of the operators to reset the relays and finally the systems response aspects. Each of these areas is reviewed and the implications for seismic PSA are discussed. Finally, recommendations for future research are given.

  3. Facial dog attack injuries.

    PubMed

    Lin, Wei; Patil, Pavan Manohar

    2015-02-01

    The exposed position of the face makes it vulnerable to dog bite injuries. This fact combined with the short stature of children makes them a high-risk group for such attacks. In contrast to wounds inflicted by assaults and accidents, dog bite wounds are deep puncture type wounds compounded by the presence of pathologic bacteria from the saliva of the attacking dog. This, combined with the presence of crushed, devitalized tissue makes these wounds highly susceptible to infection. Key to successful management of such wounds are meticulous cleansing of the wound, careful debridement, primary repair, appropriate antibiotic therapy, and rabies and tetanus immunization where indicated. This review presents an overview of the epidemiology, presentation, management of such emergencies, and the recent advances in the care of such patients. PMID:25829713

  4. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed.

  5. Preparedness for an anthrax attack.

    PubMed

    Franz, David R

    2009-12-01

    Bacillus anthracis is a long-known bacterial organism with a uniquely stable spore stage. Its stability and the lethal disease which results when the spore is inhaled made it a favorite of state-sponsored biological weapons programs throughout the Cold War era. It is also believed to be high on the list of candidate microbial agents which could be used by terrorist groups or lone actors. Its unique characteristics make protection of humans, especially civilians, from an intentional biological attack very difficult. The author argues that an all-hazards/public health approach - which would also be needed for any natural or deliberate outbreak, no matter the agent - should serve as a foundation of preparation for the specific anthrax countermeasures. Because B. anthracis is a unique organism, specific countermeasures for anthrax detection, diagnostics, prophylaxis and therapy, should be developed in nations or regions where the threat of biological attack is believed to warrant such preparation. Other considerations for a nation interested in anthrax preparedness are discussed. PMID:19619577

  6. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  7. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection. PMID:25910268

  8. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  9. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  10. Satellite data-relay activities in Arizona

    USGS Publications Warehouse

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  11. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; Schratz, Brian C.; Shihabi, Mazen M.; Srinivasan, Jeffrey M.; Varghese, Phillip; Sanders, Stephen S.; Denis, Michel

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  12. Lessons Learned from Coordinating Relay Activities at Mars

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Hwang, Pauline; Waggoner, Bruce; McLaughlin, Bruce; Fieseler, Paul; Thomas, Reid; Bigwood, Maria; Herrera, Paul

    2005-01-01

    The Mission Management Office at the Jet Propulsion Laboratory was tasked with coordinating the relay of data between multiple spacecraft at Mars in support of the Mars Exploration Rover Missions in early 2004. The confluence of three orbiters (Mars Global Surveyor, Mars Odyssey, and Mars Express), two rovers (Spirit and Opportunity), and one lander (Beagle 2) has provided a challenging operational scenario that required careful coordination between missions to provide the necessary support and to avoid potential interference during simultaneous relay sessions. As these coordination efforts progressed, several important lessons were learned that should be applied to future Mars relay activities.

  13. A monolithically integrated torsional CMOS-MEMS relay

    NASA Astrophysics Data System (ADS)

    Riverola, M.; Sobreviela, G.; Torres, F.; Uranga, A.; Barniol, N.

    2016-11-01

    We report experimental demonstrations of a torsional microelectromechanical (MEM) relay fabricated using the CMOS-MEMS approach (or intra-CMOS) which exploits the full foundry inherent characteristics enabling drastic reduction of the fabrication costs and batch production. In particular, the relay is monolithically integrated in the back end of line of a commercial standard CMOS technology (AMS 0.35 μm) and released by means of a simple one-step mask-less wet etching. The fabricated torsional relay exhibits an extremely steep switching behaviour symmetrical about both contact sides with an on-state contact resistance in the k Ω -range throughout the on-off cycling test.

  14. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  15. Primary Traffic Based Cooperative Multihop Relaying with Preliminary Farthest Relay Selection in Cognitive Radio Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Lin, I.-Te; Sasase, Iwao

    We propose a primary traffic based multihop relaying algorithm with cooperative transmission (PTBMR-CT). It enlarges the hop transmission distances to reduce the number of cognitive relays on the route from the cognitive source (CS) to the cognitive destination (CD). In each hop, from the cognitive nodes in a specified area depending on whether the primary source (PS) transmits data to the primary destination (PD), the cognitive node that is farthest away from the cognitive relay that sends data is selected as the other one that receives data. However, when the PS is transmitting data to the PD, from the cognitive nodes in a specified area, another cognitive node is also selected and prepared to be the cognitive relay that receives data of cooperative transmission. Cooperative transmission is performed if the PS is still transmitting data to the PD when the cognitive relay that receives data of the next hop transmission is being searched. Simulation results show that the average number of cognitive relays is reduced by PTBMR-CT compared to conventional primary traffic based farthest neighbor relaying (PTBFNR), and PTBMR-CT outperforms conventional PTBFNR in terms of the average end-to-end reliability, the average end-to-end throughput, the average required transmission power of transmitting data from the CS to the CD, and the average end-to-end transmission latency.

  16. On the HEMP (high-altitude electromagnetic pulse) response of protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Barnes, P.R.; Oak Ridge National Lab., TN )

    1990-01-01

    An assessment of the susceptibility of protective relays to the transients produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms responsible for coupling of HEMP to relay terminals are examined. The predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse. 11 refs., 16 figs.

  17. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  18. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  19. Orbiting deep space relay station. Volume 3: Implementation plan

    NASA Technical Reports Server (NTRS)

    Hunter, J. A.

    1979-01-01

    An implementation plan for the Orbiting Deep Space Relay Station (ODSRS) is described. A comparison of ODSRS life cycle costs to other configuration options meeting future communication requirements is presented.

  20. Biased differential relay with digital real time integration

    NASA Astrophysics Data System (ADS)

    Hijazi, M. E. A.; Basak, A.

    1993-05-01

    A new algorithm has been developed for a single phase relay. This can be used for the protection of both single phase and three phase transformers. This paper presents a new scheme using the real time integration technique to determine the differential current caused by either magnetizing inrush current or an internal fault. The proposed relay has been simulated for continuous monitoring of the behavior of the differential current wave form, through the peak value of each current cycle and digital integration of that cycle. The trip of the relay depends on any changes in the area under the differential current wave form. The magnetizing inrush current waveform has less area under its curve than the fault current wave form which contains a sinusoidal wave and a transient dc component. This phenomenon has been used to block the operation of the relay on ``not true'' fault current seen as differential current.

  1. Applying fuzzy logic to power system protective relays

    SciTech Connect

    Kolla, S.R.

    1997-06-01

    Power systems occasionally experience faults resulting from insulation failures caused by atmospheric disturbances or switching surges. If such a fault occurs, it can cause expensive damage to equipment and substantial revenue loss due to service interruption. A faulted element must, therefore, be disconnected without unnecessary delay. For this purpose, protective relays continuously monitor system elements (synchronous generators, transformers, transmission lines, motors, etc.) and isolate faulted elements by operating by operating circuit breakers. Originally, protective relays were designed containing electromechanical devices. Recently, however, rapid advances in digital-processor technology have prompted applying microprocessors to protective relays. This artical presents an application of a fuzzy-logic (FL) technique to microprocessor-based power system protective relays specifically for identifying unbalanced shunt faults on a power transmission line. 10 figs.

  2. Coordination of directional overcurrent relay timing using linear programming

    SciTech Connect

    Urdaneta, A.J.; Restrepo, H.; Marquez, S.; Sanchez, J.

    1996-01-01

    A successive linear programming methodology is presented to treat more effectively those applications where a local structure change is performed to a system already in operation, and where the modification of the settings of already existent relays is not desirable. The dimension of the optimization problems to be solved is substantially reduced, and a sequence of small linear programming problems is stated and solved in terms of the time dial settings, until a feasible solution is reached. With the proposed technique, the number of relays of the original system to be reset is reduced substantially. It is found that there is a trade-off between the number of relays to be reset and the optimality of the settings of the relays.

  3. 15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  4. 14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  5. 34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER P.H. #3, JUNE 23, 1943. SCE drawing no. 413187-1. - Santa Ana River Hydroelectric System, SAR-3 Powerhouse, San Bernardino National Forest, Redlands, San Bernardino County, CA

  6. Reliable quantum communication over a quantum relay channel

    SciTech Connect

    Gyongyosi, Laszlo; Imre, Sandor

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  7. On the HEMP (high-altitude electromagnetic pulse) environment for protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1990-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength. 12 refs., 13 figs., 3 tabs.

  8. The importance of upgrading power stations with numerical protection relays

    NASA Astrophysics Data System (ADS)

    Vilceanu, Radu-Constantin; Surianu, Flavius-Dan

    2016-06-01

    In this paper we present the importance of upgrading power stations with numerical protection relays. We will study the gravity and the economic impact of a power system fault when it appears and it is not cleared by old protection devices. Also we will compare how an old protection scheme works when it clears a power fault with how modern numerical protection relays work. The trip decision and the actual circuit breaker open times will be compared and analyzed.

  9. Preamble-based channel estimation in single-relay networks using FBMC/OQAM

    NASA Astrophysics Data System (ADS)

    Mavrokefalidis, Christos; Kofidis, Eleftherios; Rontogiannis, Athanasios A.; Theodoridis, Sergios

    2014-12-01

    Preamble-based channel estimation in filter bank-based multicarrier (FBMC) systems using offset quadrature amplitude modulation (OQAM) has been extensively studied in the last few years, due to the many advantages this modulation scheme can offer over cyclic prefix (CP)-based orthogonal frequency division multiplexing (OFDM) and in view of the interesting challenges posed on the channel estimator by the interference effect inherent in such an FBMC system. In particular, preambles of short duration and of both the block ( full) and comb ( sparse) types were designed so as to minimize the channel estimation mean squared error (MSE) subject to a given transmit energy. In the light of the important role that relay-based cooperative networks are expected to play in future wireless communication systems, it is of interest to consider FBMC/OQAM, and in particular questions associated to preamble-based channel estimation, in such a context as well. The goal of this paper is to address these problems and come up with optimal solutions that extend existing results in a single relay-based cooperative network. Both low and medium frequency selective channels are considered. In addition to optimal preamble and estimator design, the equalization/detection task is studied, shedding light to a relay-generated interference effect and proposing a simple way to come over it. The reported simulation results corroborate the analysis and reveal interesting behavior with respect to channel frequency selectivity and signal-to-noise ratio.

  10. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  11. Steep Subthreshold Switching With Nanomechanical FET Relays

    NASA Astrophysics Data System (ADS)

    Unluer, Dincer; Ghosh, Avik W.

    2016-04-01

    We present a physical model for electronic switching in cantilever based nano-electro-mechanical field effect transistors, focusing on the steepness of its switching curve. We find that the subthreshold swing of the voltage transfer characteristic is governed by two separate considerations - the ability of the charges to correlate together through dipolar interactions and amplify the active torque, versus the active pull-in forces that drive an abrupt phase transition and close the air gap between the tip of the cantilever and the drain. For small sized relays, dipolar and short-range Van Der Waals 'sticking' forces dominate, while for longer cantilevers the capacitive energy acquires a major role. The individual pull-in and pull-out phases demonstrate a remarkably low subthreshold swing driven by the capacitive forces, sharpened further by dipolar correlation. The sharp switching, however, comes at the expense of strong hysteresis as the metastable and stable states interchange along the forward and reverse phases of the voltage scan.

  12. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  13. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  14. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  15. The anthrax attacks 10 years later.

    PubMed

    Bush, Larry M; Perez, Maria T

    2012-01-01

    Ten years ago, just weeks after the September 11 attacks, the United States experienced a deliberate act of bioterrorism. Through use of the postal service, anthrax spores were widely disseminated, including to homes, the Senate, and major newsrooms, resulting in morbidity and mortality and effectively disrupting our way of life and revealing our vulnerability. Even though such attacks had been the subject of much writing and had been planned for, detection of and the appropriate response to an attack with an agent from the so-called "Category 'A' List" had only been considered in theoretical terms. What transpired during the following difficult weeks, including how public health and federal government agencies performed, has been both praised and criticized. An intertwined epidemiologic and criminal investigation of such magnitude was unprecedented in U.S. history. To address the question of whether we as a nation are now better prepared for future threats involving biologic agents, it is important to learn from the lessons of the 2001 anthrax attacks, including the critical role of clinicians in surveillance. As physicians involved in diagnosing anthrax in the index case and alerting authorities, we offer our perspective on these events a decade after their occurrence. PMID:21969275

  16. Mobility-Based Mobile Relay Selection in MANETs

    NASA Astrophysics Data System (ADS)

    Kim, Gilnam; Lee, Hyoungjoo; Lee, Kwang Bok

    The future wireless mobile communication networks are expected to provide seamless wireless access and data exchange to mobile users. In particular, it is expected that the demand for ubiquitous data exchange between mobile users will increase with the widespread use of various wireless applications of the intelligent transportation system (ITS) and intelligent vehicles. Mobile ad hoc networks (MANETs) are one of the representative research areas pursuing the technology needed to satisfy the increasing mobile communication requirements. However, most of the works on MANET systems do not take into account the continuous and dynamic changes of nodal mobility to accommodate system design and performance evaluation. The mobility of nodes limits the reliability of communication between the source and the destination node since a link between two continuously moving nodes is established only when one node enters the transmission range of the other. To alleviate this problem, mobile relay has been studied. In particular, it is shown that relay selection is an efficient way to support nodal mobility in MANET systems. In this paper, we propose a mobility-based relay selection algorithm for the MANET environment. Firstly, we define the lifetime as the maximum link duration for which the link between two nodes remains active. Therefore, the lifetime indicates the reliability of the relay link which measures its capability to successfully support relayed communication when requested by the source node. Furthermore, we consider a series of realistic scenarios according to the randomness of nodal mobility. Thus, the proposed algorithm can be easily applied in practical MANET systems by choosing the appropriate node mobility behavior. The numerical results show that the improved reliability of the proposed algorithm's relayed communication is achieved with a proper number of mobile relay nodes rather than with the conventional selection algorithm. Lastly, we show that random

  17. Sequential defense against random and intentional attacks in complex networks

    NASA Astrophysics Data System (ADS)

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  18. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  19. Synthetic cation transporters incorporating crown ethers and calixarenes as headgroups and central relays: a comparison of sodium and chloride selectivity†

    PubMed Central

    Iglesias-Sánchez, José Carlos; Wang, Wei; Ferdani, Riccardo; Prados, Pilar; de Mendoza, Javier

    2009-01-01

    An earlier study showed that a calix[4]arene could function as a central relay unit to form an ion conductance pathway through a phospholipid bilayer membrane. The present study expands the range of compounds from calix[4]arene to calix[6]arene and incorporates them either as central units or as headgroups, substituting one or more diaza-18-crown-6 residues in functioning hydraphiles. Ion release was assayed by detecting either Na+ or Cl− release from phospholipid vesicles. The ion transport activity for calix[4]arenes in either position is modest, but is almost non-existent when calix[6] residues were incorporated either as head groups or central relay units. The poor activity of the calix[6]arenes may result from an inability to penetrate to the midplane of the bilayer or pass entirely through it to form a conductance pathway. The transmembrane “flip-flop” may result from high polarity or steric bulk, or both. A hydraphile incorporating a single –NHCOC6H4OCH2CONH– as a central relay proved to be an excellent Na+ conductor, but less selective for Cl−. The fact that this new hydraphile molecule shows selectivity for Na + over Cl− transport and possesses two secondary amide residues in the central relay suggests a means to control ion selectivity in synthetic ion transporters. PMID:21720497

  20. Relay Selection Based Double-Differential Transmission for Cooperative Networks with Multiple Carrier Frequency Offsets: Model, Analysis, and Optimization

    NASA Astrophysics Data System (ADS)

    Zhao, Kun; Zhang, Bangning; Pan, Kegang; Liu, Aijun; Guo, Daoxing

    2014-07-01

    Due to the distributed nature, cooperative networks are generally subject to multiple carrier frequency offsets (MCFOs), which make the channels time-varying and drastically degrade the system performance. In this paper, to address the MCFOs problem in detect-andforward (DetF) multi-relay cooperative networks, a robust relay selection (RS) based double-differential (DD) transmission scheme, termed RSDDT, is proposed, where the best relay is selected to forward the source's double-differentially modulated signals to the destination with the DetF protocol. The proposed RSDDT scheme can achieve excellent performance over fading channels in the presence of unknown MCFOs. Considering double-differential multiple phase-shift keying (DDMPSK) is applied, we first derive exact expressions for the outage probability and average bit error rate (BER) of the RSDDT scheme. Then, we look into the high signal-to-noise ratio (SNR) regime and present simple and informative asymptotic outage probability and average BER expressions, which reveal that the proposed scheme can achieve full diversity. Moreover, to further improve the BER performance of the RSDDT scheme, we investigate the optimum power allocation strategy among the source and the relay nodes, and simple analytical solutions are obtained. Numerical results are provided to corroborate the derived analytical expressions and it is demonstrated that the proposed optimum power allocation strategy offers substantial BER performance improvement over the equal power allocation strategy.

  1. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  2. Commercialization and Standardization Progress Towards an Optical Communications Earth Relay

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2015-01-01

    NASA is planning to launch the next generation of a space based Earth relay in 2025 to join the current Space Network, consisting of Tracking and Data Relay Satellites in space and the corresponding infrastructure on Earth. While the requirements and architecture for that relay satellite are unknown at this time, NASA is investing in communications technologies that could be deployed to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in 2018 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the next generation space based relay. This paper will describe NASA efforts in the on-going commercialization of optical communications and the development of inter-operability standards. Both are seen as critical to making optical communications a reality on future NASA science and exploration missions. Commercialization is important because NASA would like to eventually be able to simply purchase an entire optical communications terminal from a commercial provider. Inter-operability standards are needed to ensure that optical communications terminals developed by one vendor are compatible with the terminals of another. International standards in optical communications would also allow the space missions of one nation to use the infrastructure of another.

  3. Opportunistic Resource Scheduling for a Wireless Network with Relay Stations

    NASA Astrophysics Data System (ADS)

    Kwon, Jeong-Ahn; Lee, Jang-Won

    In this paper, we study an opportunistic scheduling scheme for the TDMA wireless network with relay stations. We model the time-varying channel condition of a wireless link as a stochastic process. Based on this model, we formulate an optimization problem for the opportunistic scheduling scheme that maximizes the expected system throughput while satisfying the QoS constraint of each user. In the opportunistic scheduling scheme for the system without relay stations, each user has only one communication path between the base station and itself, and thus only user selection is considered. However, in our opportunistic scheduling scheme for the system with relay stations, since there may exist multiple paths between the base station and a user, not only user selection but also path selection for the scheduled user is considered. In addition, we also propose an opportunistic time-sharing method for time-slot sharing between base station and relay stations. With the opportunistic time-sharing method, our opportunistic scheduling provides opportunistic resource sharing in three places in the system: user selection in a time-slot, path selection for the selected user, and time-slot sharing between base station and relay stations. Simulation results show that as the number of places that opportunistic resource sharing is applied to increases, the performance improvement also increases.

  4. Relay communications strategies for Mars exploration through 2020

    NASA Astrophysics Data System (ADS)

    Edwards, C. D., Jr.; Arnold, B.; Depaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2006-07-01

    Mars exploration poses significant telecommunications challenges, including the return of large data volumes from high-resolution surface instruments, highly constrained mass, power, and energy for surface spacecraft, frequent telemetry and command sessions for supporting complex surface operations, and high-risk mission events such as entry, descent, and landing for which the capture of engineering telemetry is deemed critical. Relay telecommunication via Mars-orbiting spacecraft offers significant advantages in meeting these challenges, relative to conventional direct-to-Earth communications. NASA's Mars Global Surveyor and Mars Odyssey orbiters, along with ESA's Mars Express orbiter, represent an initial relay telecommunications infrastructure that has successfully supported the Spirit and Opportunity rovers. With the arrival of the Mars Reconnaissance Orbiter in 2006, this expanded relay network will provide key support to the 2007 Phoenix Lander and 2009 Mars Science Laboratory missions later this decade. Second-decade mission concepts will introduce new communications challenges; the provision of relay payloads on science orbiters provides a cost-effective means to sustain and evolve the Mars relay network.

  5. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  6. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  7. Analysis and visualization of large complex attack graphs for networks security

    NASA Astrophysics Data System (ADS)

    Chen, Hongda; Chen, Genshe; Blasch, Erik; Kruger, Martin; Sityar, Irma

    2007-04-01

    In this paper, we have proposed a comprehensive and innovative approach for analysis and visualization of large complex multi-step cyber attack graphs. As an automated tool for cyber attack detection, prediction, and visualization, the newly proposed method transforms large quantities of network security data into real-time actionable intelligence, which can be used to (1) provide guidance on network hardening to prevent attacks, (2) perform real-time attack event correlation during active attacks, and (3) formulate post-attack responses. We show that it is possible to visualize the complex graphs, including all possible network attack paths while still keeping complexity manageable. The proposed analysis and visualization tool provides an efficient and effective solution for predicting potential attacks upon observed intrusion evidence, as well as interactive multi-resolution views such that an analyst can first obtain high-level overviews quickly, and then drill down to specific details.

  8. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  9. Recent results in Mars Relay Network planning and scheduing

    NASA Technical Reports Server (NTRS)

    Lee, C. H.; Cheung, K. M.

    2003-01-01

    At different time periods in the future, Mars missions will overlap and previous studies indicate that during such periods existing deep space communication infrastructure will not be able to handle all Mars communication needs. A plausible solution is to perform optimal resource allocation for the Mars relay communication network; a network consisting of multiple surface units and orbiters on Mars and the Deep Space Stations. Unlike direct-to-earth, a relay communication, either in real-time or store-and-forward, can increase network science data return, reduce surface unit's direct-to-earth communication demands, and enable communication even when the surface unit is not facing Earth. It is the objective of this paper to take advantage of the relay operation to efficiently plan and schedule the network communications.

  10. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; Thomas, Reid C.; Varghese, Phil; Signori, Gina; Schmitz, Peter

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  11. Bilayer Protograph Codes for Half-Duplex Relay Channels

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; VanNguyen, Thuy; Nosratinia, Aria

    2013-01-01

    Direct to Earth return links are limited by the size and power of lander devices. A standard alternative is provided by a two-hops return link: a proximity link (from lander to orbiter relay) and a deep-space link (from orbiter relay to Earth). Although direct to Earth return links are limited by the size and power of lander devices, using an additional link and a proposed coding for relay channels, one can obtain a more reliable signal. Although significant progress has been made in the relay coding problem, existing codes must be painstakingly optimized to match to a single set of channel conditions, many of them do not offer easy encoding, and most of them do not have structured design. A high-performing LDPC (low-density parity-check) code for the relay channel addresses simultaneously two important issues: a code structure that allows low encoding complexity, and a flexible rate-compatible code that allows matching to various channel conditions. Most of the previous high-performance LDPC codes for the relay channel are tightly optimized for a given channel quality, and are not easily adapted without extensive re-optimization for various channel conditions. This code for the relay channel combines structured design and easy encoding with rate compatibility to allow adaptation to the three links involved in the relay channel, and furthermore offers very good performance. The proposed code is constructed by synthesizing a bilayer structure with a pro to graph. In addition to the contribution to relay encoding, an improved family of protograph codes was produced for the point-to-point AWGN (additive white Gaussian noise) channel whose high-rate members enjoy thresholds that are within 0.07 dB of capacity. These LDPC relay codes address three important issues in an integrative manner: low encoding complexity, modular structure allowing for easy design, and rate compatibility so that the code can be easily matched to a variety of channel conditions without extensive

  12. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Mass Measurement System Using Relay Feedback with Hysteresis

    NASA Astrophysics Data System (ADS)

    Mizuno, Takeshi; Adachi, Takahiro; Takasaki, Masaya; Ishino, Yuji

    Mass measurement using a relay feedback system was studied experimentally. The measurement system has an on-off relay with hysteresis and switches force acting on the object in relation to its velocity. Such nonlinear control induces a limit cycle in the feedback system. The mass of the object is determined from the period of this limit cycle. The apparatus manufactured for experimental study uses two voice coil motors (VCM's), one of which is for driving the object and the other is for generating prescribed disturbances. The effects of system parameters and disturbances on measurement accuracy were examined experimentally.

  14. User's manual for the Functional Relay Operation Monitor (FROM)

    SciTech Connect

    Gustke, F.R.

    1981-02-01

    Sandia's Digital Systems Development Division 1521 has developed a new functional relay tester. Capabilities of this tester include the measurement of coil and contact resistance, hipot, operate current, and contact operation and bounce times. The heart of the tester is a Hewlett-Packard 21MX minicomputer that uses BASIC or FORTRAN programming languages. All measurements are made by means of simple program calls, and all measurement standards are traceable to the National Bureau of Standards. Functional relay test data are stored on a disc drive and can be output as hard copy, manipulated in the computer, or sent over a distributed-system link to other Sandia computers. 17 figures, 4 tables.

  15. Overview and Status of the Laser Communication Relay Demonstration

    NASA Technical Reports Server (NTRS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-01-01

    NASA is presently developing first all optical high data rate satellite relay system, LCRD. To be flown on commercial geosynchronous satellite, it will communicate at DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory and another on Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments. In this paper we will report on the current state of LCRD system development, planned operational scenarios and expected system performance.

  16. Overview and status of the laser communication relay demonstration

    NASA Astrophysics Data System (ADS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-03-01

    NASA is presently developing the first all-optical high data rate satellite relay system, LCRD. To be flown on a geosynchronous satellite, it will communicate with DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory, and another on a Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments.

  17. 47 CFR 64.6040 - Rates for Telecommunications Relay Service (TRS) calling.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 3 2014-10-01 2014-10-01 false Rates for Telecommunications Relay Service (TRS....6040 Rates for Telecommunications Relay Service (TRS) calling. No Provider shall levy or collect any... Charges for any form of TRS call....

  18. Secure relay selection based on learning with negative externality in wireless networks

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  19. 75 FR 39945 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... summary of the Commission's Structure and Practices of the Video Relay Service Program, Declaratory...

  20. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  1. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. Attack vulnerability of complex networks

    NASA Astrophysics Data System (ADS)

    Holme, Petter; Kim, Beom Jun; Yoon, Chang No; Han, Seung Kee

    2002-05-01

    We study the response of complex networks subject to attacks on vertices and edges. Several existing complex network models as well as real-world networks of scientific collaborations and Internet traffic are numerically investigated, and the network performance is quantitatively measured by the average inverse geodesic length and the size of the largest connected subgraph. For each case of attacks on vertices and edges, four different attacking strategies are used: removals by the descending order of the degree and the betweenness centrality, calculated for either the initial network or the current network during the removal procedure. It is found that the removals by the recalculated degrees and betweenness centralities are often more harmful than the attack strategies based on the initial network, suggesting that the network structure changes as important vertices or edges are removed. Furthermore, the correlation between the betweenness centrality and the degree in complex networks is studied.

  3. Baiting Inside Attackers Using Decoy Documents

    NASA Astrophysics Data System (ADS)

    Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore J.

    The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms and a deployment platform for addressing the problem of insiders attempting to exfiltrate and use sensitive information. The goal is to confuse and confound an adversary requiring more effort to identify real information from bogus information and provide a means of detecting when an attempt to exploit sensitive information has occurred. “Decoy Documents” are automatically generated and stored on a file system by the D3 System with the aim of enticing a malicious user. We introduce and formalize a number of properties of decoys as a guide to design trap-based defenses to increase the likelihood of detecting an insider attack. The decoy documents contain several different types of bogus credentials that when used, trigger an alert. We also embed “stealthy beacons” inside the documents that cause a signal to be emitted to a server indicating when and where the particular decoy was opened. We evaluate decoy documents on honeypots penetrated by attackers demonstrating the feasibility of the method.

  4. Duloxetine-related panic attacks.

    PubMed

    Sabljić, Vladimir; Rakun, Radmir; Ružić, Klementina; Grahovac, Tanja

    2011-03-01

    Side-effects arising on the grounds of antidepressant administration pose as a substantial obstacle hindering successful depressive disorder treatment. Side-effects, especially those severe or those manifested through dramatic clinical presentations such as panic attacks, make the treatment far more difficult and shake patients' trust in both the treatment and the treating physician. This case report deals with a patient experiencing a moderately severe depressive episode, who responded to duloxetine treatment administered in the initial dose of 30 mg per day with as many as three panic attacks in two days. Upon duloxetine withdrawal, these panic attacks ceased as well. The patient continued tianeptine and alprazolam treatment during which no significant side-effects had been seen, so that she gradually recovered. Some of the available literature sources have suggested the possibility of duloxetine administration to the end of generalised anxiety disorder and panic attack treatment. However, they are outnumbered by the contributions reporting about duloxetine-related anxiety, aggressiveness and panic attacks. In line with the foregoing, further monitoring of each and every duloxetine-administered patient group needs to be pursued so as to be able to evaluate treatment benefits and weigh them against risks of anxiety or panic attack onset.

  5. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    NASA Astrophysics Data System (ADS)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  6. Development of a Relay Performance Web Tool for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.

  7. 47 CFR 64.606 - VRS and IP Relay provider and TRS program certification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Telecommunications Relay Services and Related Customer Premises Equipment for Persons With Disabilities § 64.606 VRS and IP Relay... provide VRS or IP Relay services, independent from any certified state TRS program or any TRS...

  8. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  9. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  10. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  11. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  12. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Battery or power supply with respect to relay..., AND APPLIANCES Automatic Block Signal Systems Standards § 236.206 Battery or power supply with respect to relay; location. The battery or power supply for each signal control relay circuit, where an...

  13. Ground wave emergency network final operational capability. Environmental assessment for southern Arkansas relay node site no. RN 8C912AR

    NASA Astrophysics Data System (ADS)

    1993-02-01

    The Ground Wave Emergency Network (GWEN) is a radio communication system designed to relay emergency messages between strategic military areas in the continental United States. The system is immune to the effects of high-attitude electromagnetic pulse (HEMP) energy surges caused by nuclear bursts in the ionosphere that would disrupt conventional communications equipment such as telephones and shortwave radios. A failure of such equipment would prevent timely communications among top military and civilian leaders and strategic Air Force locations and prevent U.S. assessment and retaliation during an attack. GWEN is an essential part of a defense modernization program to upgrade and improve our nation's communications system, thereby strengthening deterrence.

  14. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting.

    PubMed

    Zhao, H Vicky; Wu, Min; Wang, Z Jane; Liu, K J Ray

    2005-05-01

    Digital fingerprinting is a technology for tracing the distribution of multimedia content and protecting them from unauthorized redistribution. Unique identification information is embedded into each distributed copy of multimedia signal and serves as a digital fingerprint. Collusion attack is a cost-effective attack against digital fingerprinting, where colluders combine several copies with the same content but different fingerprints to remove or attenuate the original fingerprints. In this paper, we investigate the average collusion attack and several basic nonlinear collusions on independent Gaussian fingerprints, and study their effectiveness and the impact on the perceptual quality. With unbounded Gaussian fingerprints, perceivable distortion may exist in the fingerprinted copies as well as the copies after the collusion attacks. In order to remove this perceptual distortion, we introduce bounded Gaussian-like fingerprints and study their performance under collusion attacks. We also study several commonly used detection statistics and analyze their performance under collusion attacks. We further propose a preprocessing technique of the extracted fingerprints specifically for collusion scenarios to improve the detection performance.

  15. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... the Telecommunications Relay Services Fund, Notice of Proposed Rulemaking, published at 76 FR 18490... established in the CPE Bundling Order for allocating revenues, published at 66 FR 19398, April 6, 2001. The... required to take any action. 21. In the TRS Contribution NPRM, published at 76 FR 18490, April 4, 2011,...

  16. A scheduling model for the aerial relay system

    NASA Technical Reports Server (NTRS)

    Ausrotas, R. A.; Liu, E. W.

    1980-01-01

    The ability of the Aerial Relay System to handle the U.S. transcontinental large hub passenger flow was analyzed with a flexible, interactive computer model. The model incorporated city pair time of day demand and a demand allocation function which assigned passengers to their preferred flights.

  17. Scan mirrors relay for high resolution laser scanning systems

    NASA Astrophysics Data System (ADS)

    Kessler, David

    2014-09-01

    Two dimensional beam deflection is often required in medical laser scanning systems such as OCT or confocal microscopy. Commonly two linear galvo mirrors are used for performance in terms of their large apertures and scan angles. The galvo mirrors are placed at the vicinity of entrance pupil of the scan lens with a "displacement distance" separating them. This distance limits the scan fields and/or reduces the effective aperture of the scan lens. Another option is to use a beam or pupil relay, and image one galvo mirror onto the other. However, beam (or pupil) relays are notoriously complicated, expensive and can add significant aberrations. This paper discusses a simple, all reflective, diffraction limited, color corrected, beam relay, capable of large scan angles and large deflecting mirrors. The design is based on a unique combination of an Offner configuration with a Schmidt aspheric corrector. The design is highly corrected up to large scan mirrors and large scan angles down to milliwaves of aberrations. It allows significantly larger scan field and or scan lenses with higher numerical aperture as compared with scanners using galvos separated by the displacement distance. While this relay is of exceptionally high performance, it has one element located where the beam is focused which may present a problem for high power lasers. Thus modifications of the above design are introduced where the beam is focused in mid air thus making it usable for high power systems such including laser marking and fabrication systems.

  18. Usefulness of relay-information-transfer for radar QPE

    NASA Astrophysics Data System (ADS)

    Kim, Jungho; Yoo, Chulsang; Lim, Sanghun; Choi, Jeongho

    2015-12-01

    This study proposes a method of relay-information-transfer for radar QPE (quantitative precipitation estimation) to overcome the limitation of the current QPE in Korea. The Z-R relationship was selected as the QPE information to be transferred. To examine the applicability of the proposed method, three different cases of relay-information-transfer were considered: (1) from the sea to inland, (2) from inland to another inland location, and (3) over a long distance. The results were: (1) Between the two parameters of the Z-R relationship, the parameter A was found to have an explanatory power of more than 70% of the Z-R relationship from one radar to the other. (2) All three cases showed that the relay-information-transfer of the parameter A was highly applicable, especially in the initial period of a storm. (3) Areal average rainfall and the root mean square error of the radar rain rate also confirmed that the relay-information-transfer method resulted in more reasonable estimates of the parameter A in the initial period of a storm. After the initial period, however, both the conventional method and the method proposed in this study were found to provide similar and reasonable estimates.

  19. 32. View of relay assembly group and interconnecting group electronic ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    32. View of relay assembly group and interconnecting group electronic modules located on second floor of transmitter building no. 102 in MIP area. - Clear Air Force Station, Ballistic Missile Early Warning System Site II, One mile west of mile marker 293.5 on Parks Highway, 5 miles southwest of Anderson, Anderson, Denali Borough, AK

  20. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a... the station upon cessation of reception of the activating continuous coded tone signal. Licensees may utilize a combination of digital selection and continuous coded tone control where required to...

  1. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a... the station upon cessation of reception of the activating continuous coded tone signal. Licensees may utilize a combination of digital selection and continuous coded tone control where required to...

  2. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a... the station upon cessation of reception of the activating continuous coded tone signal. Licensees may utilize a combination of digital selection and continuous coded tone control where required to...

  3. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a... the station upon cessation of reception of the activating continuous coded tone signal. Licensees may utilize a combination of digital selection and continuous coded tone control where required to...

  4. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a... the station upon cessation of reception of the activating continuous coded tone signal. Licensees may utilize a combination of digital selection and continuous coded tone control where required to...

  5. Adapting the 5-P Relay for Inviting Quality Family Time.

    ERIC Educational Resources Information Center

    Briscall, Monica A.

    1993-01-01

    Presents personal disclosure revealing how author and her family adapted an invitational approach, the 5-P Relay, to restructure their family time. Describes goals and procedures of the plan, obstacles encountered, an evaluation of the process, and a conclusion that the family began experiencing greater enjoyment as a family unit as soon as they…

  6. 75 FR 16913 - Transmission Relay Loadability Reliability Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ...\\ Transmission Relay Loadability Reliability Standard, Notice of Proposed Rulemaking, 74 FR 35830 (Jul. 21, 2009... adequately address the Commission's underlying concern or goal as efficiently and effectively as the... meet this goal, the Commission stated that the process for identifying critical 100 kV-200...

  7. Staged-Fault Testing of Distance Protection Relay Settings

    NASA Astrophysics Data System (ADS)

    Havelka, J.; Malarić, R.; Frlan, K.

    2012-01-01

    In order to analyze the operation of the protection system during induced fault testing in the Croatian power system, a simulation using the CAPE software has been performed. The CAPE software (Computer-Aided Protection Engineering) is expert software intended primarily for relay protection engineers, which calculates current and voltage values during faults in the power system, so that relay protection devices can be properly set up. Once the accuracy of the simulation model had been confirmed, a series of simulations were performed in order to obtain the optimal fault location to test the protection system. The simulation results were used to specify the test sequence definitions for the end-to-end relay testing using advanced testing equipment with GPS synchronization for secondary injection in protection schemes based on communication. The objective of the end-to-end testing was to perform field validation of the protection settings, including verification of the circuit breaker operation, telecommunication channel time and the effectiveness of the relay algorithms. Once the end-to-end secondary injection testing had been completed, the induced fault testing was performed with three-end lines loaded and in service. This paper describes and analyses the test procedure, consisting of CAPE simulations, end-to-end test with advanced secondary equipment and staged-fault test of a three-end power line in the Croatian transmission system.

  8. Quantum cloning attacks against PUF-based quantum authentication systems

    NASA Astrophysics Data System (ADS)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  9. Prevention of Tunneling Attack in endairA

    NASA Astrophysics Data System (ADS)

    Fanaei, Mohammad; Fanian, Ali; Berenjkoub, Mehdi

    endairA is one of the most secure on-demand ad hoc network source routing protocols which provides several defense mechanisms against so many types of attacks. In this paper, we prove the vulnerability of endairA to the tunneling attack by presenting an attack scenario against it. We also propose a new security mechanism to defend it against the tunneling attack by the utilization of the delay between receiving and sending its control packets computed locally by all intermediate nodes. Our proposed security mechanism can detect probable tunnels in the route as well as approximate locations of the adversarial nodes. It needs no time synchronization between mobile nodes of the network. It also does not change the number of control packets involved in endairA and only modifies the RREP messages slightly.

  10. Lethality of sea lamprey attacks on lake trout in relation to location on the body surface

    USGS Publications Warehouse

    Bergstedt, Roger A.; Schneider, Clifford P.; O'Gorman, Robert

    2001-01-01

    We compared the locations of healed attack marks of the sea lamprey Petromyzon marinus on live lake trout Salvelinus namaycush with those of unhealed attack marks on dead lake trout to determine if the lethality of a sea lamprey attack was related to attack location. Lake trout were collected from Lake Ontario, live fish with gill nets in September 1985 and dead fish with trawls in October 1983−1986. Attack location was characterized by the percent distances from snout to tail and from the ventral to the dorsal midline. Kolmogorov−Smirnov two-sample tests did not detect significant differences in the distribution of attack location along either the anteroposterior axis or the dorsoventral axis. When attack locations were grouped into six anatomical regions historically used to record sea lamprey attacks, dead fish did not exhibit a significantly higher proportion of attacks in the more anterior regions. Even if the differences in attack location on live and dead fish were significant, they were too small to imply substantial spatial differences in attack lethality that should be accounted for when modeling the effects of sea lampreys feeding on lake trout. We suggest that the tendency for sea lamprey attacks to occur on the anterior half of the fish is related to the lower amplitude of lateral body movement there during swimming and thus the lower likelihood of being dislodged.

  11. TCPL: A Defense against wormhole attacks in wireless sensor networks

    NASA Astrophysics Data System (ADS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  12. TCPL: A Defense against wormhole attacks in wireless sensor networks

    SciTech Connect

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-10-26

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  13. Collaborative mission planning for UAV cluster to optimize relay distance

    NASA Astrophysics Data System (ADS)

    Tanil, Cagatay; Warty, Chirag; Obiedat, Esam

    Unmanned Aerial Vehicles (UAVs) coordinated path planning and intercommunication for visual exploration of a geographical region has recently become crucial. Multiple UAVs cover larger area than a single UAV and eliminate blind spots. To improve the surveillance, survivability and quality of the communication, we propose two algorithms for the route planning of UAV cluster operated in obstacle rich environment: (i) Multiple Population Genetic Algorithm (MPGA) (ii) Relay Selection Criteria (RSC). The main objective of MPGA is to minimize the total mission time while maintaining an optimal distance for communication between the neighboring nodes. MPGA utilizes evolutionary speciation techniques with a novel Feasible Population Creation Method (FPCM) and enhanced Inter-species Crossover Mechanism (ISCM) to obtain diversified routes in remarkably short time. In obtaining collision-free optimum paths, UAVs are subjected to constraints such as limited communication range, maximum maneuverability and fuel capacity. In addition to the path planning, RSC is developed for selection of UAVs relay nodes that is based on the location of the relay relative to source and destination. It is crucial since the Bit Error Rate (BER) performance of the link significantly depends on the location of the selected relay. In this paper, path planning and relay allocation algorithms are combined to have a seamless high quality monitoring of the region and to provide superior Quality of Service (QoS) for audio-video applications. Also, simulations in different operation zones with a cluster of up to six UAVs are performed to verify the feasibility of the proposed algorithms both in optimality and computation time.

  14. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... Relay Service Program, CG Docket No. 10-51, Second Report and Order, FCC 11-118; published at 76 FR 47469, August 5, 2011 and at 76 FR 47476, August 5, 2011 (iTRS Certification Order) (defining iTRS to... Notice of Proposed Rulemaking, FCC 06-58; published at 71 FR 31131, 2006 (2006 FNPRM). The...

  15. Analytical Characterization of Internet Security Attacks

    ERIC Educational Resources Information Center

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  16. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  17. Eyespots divert attacks by fish

    PubMed Central

    Kjernsmo, Karin; Merilaita, Sami

    2013-01-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish’ own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments. PMID:23864602

  18. Eyespots divert attacks by fish.

    PubMed

    Kjernsmo, Karin; Merilaita, Sami

    2013-09-01

    Eyespots (colour patterns consisting of concentric rings) are found in a wide range of animal taxa and are often assumed to have an anti-predator function. Previous experiments have found strong evidence for an intimidating effect of eyespots against passerine birds. Some eyespots have been suggested to increase prey survival by diverting attacks towards less vital body parts or a direction that would facilitate escape. While eyespots in aquatic environments are widespread, their function is extremely understudied. Therefore, we investigated the protective function of eyespots against attacking fish. We used artificial prey and predator-naive three-spined sticklebacks (Gasterosteus aculeatus) as predators to test both the diversion (deflection) and the intimidation hypothesis. Interestingly, our results showed that eyespots smaller than the fish' own eye very effectively draw the attacks of the fish towards them. Furthermore, our experiment also showed that this was not due to the conspicuousness of the eyespot, because attack latency did not differ between prey items with and without eyespots. We found little support for an intimidating effect by larger eyespots. Even though also other markings might misdirect attacks, we can conclude that the misdirecting function may have played an important role in the evolution of eyespots in aquatic environments.

  19. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... Service (VRS) and Internet Protocol Relay (IP Relay). The waived TRS mandatory minimum standards are: One... technologically infeasible for VRS and IP Relay providers to offer these services at this time. All of these... of certain TRS mandatory minimum standards for VRS and IP Relay will expire on July 1, 2011, or...

  20. Comparison of radio frequency and optical architectures for deep-space communications via a relay satellite

    NASA Astrophysics Data System (ADS)

    Mecherle, G. Stephen; Horstein, Michael

    1994-08-01

    Parametric tradeoffs were performed for candidate technologies to support an orbiting relay satellite for communication with spacecraft in deep-space in the early 21st century. Both RF and optical system architectures were examined with a methodology which equitably compared the performance and attractiveness for the deep-space communication mission. Two candidate system architectures based on optical technologies were recommended for more detailed design-a system using coherent detection with an astronomical quality 4 meter telescope, and a system using direct detection with a 10 meter photon bucket telescope. Both of these systems appear capable of providing more than an order of magnitude improvement in communication performance over the DSN after it is upgraded to Ka Band.

  1. Vulnerability of water supply systems to cyber-physical attacks

    NASA Astrophysics Data System (ADS)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  2. Point Relay Scanner Utilizing Ellipsoidal Mirrors

    NASA Technical Reports Server (NTRS)

    Manhart, Paul K. (Inventor); Pagano, Robert J. (Inventor)

    1997-01-01

    A scanning system uses a polygonal mirror assembly with each facet of the polygon having an ellipsoidal mirror located thereon. One focal point of each ellipsoidal mirror is located at a common point on the axis of rotation of the polygonal mirror assembly. As the mirror assembly rotates. a second focal point of the ellipsoidal mirrors traces out a scan line. The scanner can be utilized for scanned output display of information or for scanning information to be detected.

  3. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  4. Attack Coverage in High-Level Men's Volleyball: Organization on the Edge of Chaos?

    PubMed

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-09-29

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men's volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer's V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  5. Evaluation of Word Attack Skills.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A framework for more apt and sensitive evaluation of generalized word attack skill--the heart of oral reading skill--is presented. The paper envisions the design and development of oral reading instruction as bounded by a fully-specified evaluation scheme. (Author)

  6. Condensation and jumping relay of droplets on lotus leaf

    NASA Astrophysics Data System (ADS)

    Lv, Cunjing; Hao, Pengfei; Yao, Zhaohui; Song, Yu; Zhang, Xiwen; He, Feng

    2013-07-01

    Dynamic behavior of micro water droplet condensed on a lotus leaf with two-tier roughness is studied. Under laboratory environment, the contact angle of the micro droplet on single micro papilla increases smoothly from 80° to 160° during the growth of condensed water. The best-known "self-cleaning" phenomenon will be lost. A striking observation is the out-of-plane jumping relay of condensed droplets triggered by falling droplets, as well as its sustained speed obtained in continuous jumping relays. The underlying mechanism can be used to enhance the automatic removal of dropwise condensation without the help from any external force. The surface tension energy dissipation is the main reason controlling the critical size of jumping droplet and its onset velocity of rebounding.

  7. ESTL tracking and data relay satellite /TDRSS/ simulation system

    NASA Technical Reports Server (NTRS)

    Kapell, M. H.

    1980-01-01

    The Tracking Data Relay Satellite System (TDRSS) provides single access forward and return communication links with the Shuttle/Orbiter via S-band and Ku-band frequency bands. The ESTL (Electronic Systems Test Laboratory) at Lyndon B. Johnson Space Center (JSC) utilizes a TDRS satellite simulator and critical TDRS ground hardware for test operations. To accomplish Orbiter/TDRSS relay communications performance testing in the ESTL, a satellite simulator was developed which met the specification requirements of the TDRSS channels utilized by the Orbiter. Actual TDRSS ground hardware unique to the Orbiter communication interfaces was procured from individual vendors, integrated in the ESTL, and interfaced via a data bus for control and status monitoring. This paper discusses the satellite simulation hardware in terms of early development and subsequent modifications. The TDRS ground hardware configuration and the complex computer interface requirements are reviewed. Also, special test hardware such as a radio frequency interference test generator is discussed.

  8. Zero-Lag Synchronization Despite Inhomogeneities in a Relay System

    PubMed Central

    Ghasemi Esfahani, Zahra; Valizadeh, Alireza

    2014-01-01

    A novel proposal for the zero-lag synchronization of the delayed coupled neurons, is to connect them indirectly via a third relay neuron. In this study, we develop a Poincaré map to investigate the robustness of the synchrony in such a relay system against inhomogeneity in the neurons and synaptic parameters. We show that when the inhomogeneity does not violate the symmetry of the system, synchrony is maintained and in some cases inhomogeneity enhances synchrony. On the other hand if the inhomogeneity breaks the symmetry of the system, zero lag synchrony can not be preserved. In this case we give analytical results for the phase lag of the spiking of the neurons in the stable state. PMID:25486522

  9. The Case for Deep Space Telecommunications Relay Stations

    NASA Technical Reports Server (NTRS)

    Chandler, Charles W.; Miranda, Felix A. (Technical Monitor)

    2004-01-01

    Each future mission to Jupiter and beyond must carry the traditional suite of telecommunications systems for command and control and for mission data transmission to earth. The telecommunications hardware includes the large antenna and the high-power transmitters that enable the communications link. Yet future spacecraft will be scaled down from the hallmark missions of Galileo and Cassini to Jupiter and Saturn, respectively. This implies that a higher percentage of the spacecraft weight and power must be dedicated to telecommunications system. The following analysis quantifies this impact to future missions and then explores the merits of an alternative approach using deep space relay stations for the link back to earth. It will be demonstrated that a telecommunications relay satellite would reduce S/C telecommunications weight and power sufficiently to add one to two more instruments.

  10. Value of ABCD2-F in Predicting Cerebral Ischemic Attacks: Three Months Follow-Up after the Primary Attack.

    PubMed

    Chardoli, Mojtaba; Firoozabadi, Nader H; Nouri, Mohsen; Rahimi-Movaghar, Vafa

    2016-06-01

    Cerebrovascular attack (CVA) and transient ischemic attack (TIA) are major causes of emergency department visits around the globe. A significant number of these patients may experience repeat attacks if left untreated. Several risk stratifying scoring systems have been developed in recent years to point out the high risk patients. ABCD2 is based on age, blood pressure, clinical status, diabetes mellitus, and duration of symptoms and is used commonly for this purpose. In this study, we were to enhance its sensitivity and specificity with the addition of another criterion namely atrial fibrillation and making ABCD2-F. A prospective study in two hospitals was performed and 138 patients diagnosed with TIA/CVA were enrolled. Demographic, clinical, and paraclinical data of all patients were registered. All patients were followed for three months for any sign or symptom of a recurrent ischemic attack. Recurrent ischemic attacks happened in 9.4% of the patients. None of the criteria of ABCD2-F was associated with higher chance of ischemic attacks. Similarly, ABCD2-F was not different between patients with or without repeat cerebral ischemia. The addition of atrial fibrillation to ABCD2 did not enhance the accuracy of this scoring system to detect patients high risk for repeat cerebral ischemia. More studies in the future to improve sensitivity and specificity of this test are warranted. PMID:27306346

  11. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  12. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    PubMed

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  13. Spatial filter system as an optical relay line

    DOEpatents

    Hunt, John T.; Renard, Paul A.

    1979-01-01

    A system consisting of a set of spatial filters that are used to optically relay a laser beam from one position to a downstream position with minimal nonlinear phase distortion and beam intensity variation. The use of the device will result in a reduction of deleterious beam self-focusing and produce a significant increase in neutron yield from the implosion of targets caused by their irradiation with multi-beam glass laser systems.

  14. Science Hybrid Orbiter and Lunar Relay (SCHOLR) Architecture and Design

    NASA Technical Reports Server (NTRS)

    Trase, Kathryn K.; Barch, Rachel A.; Chaney, Ryan E.; Coulter, Rachel A.; Gao, Hui; Huynh, David P.; Iaconis, Nicholas A.; MacMillan, Todd S.; Pitner, Gregory M.; Schwab, Devin T.

    2011-01-01

    Considered both a stepping-stone to deep space and a key to unlocking the mysteries of planetary formation, the Moon offers a unique opportunity for scientific study. Robotic precursor missions are being developed to improve technology and enable new approaches to exploration. Robots, lunar landers, and satellites play significant roles in advancing science and technologies, offering close range and in-situ observations. Science and exploration data gathered from these nodes and a lunar science satellite is intended to support future human expeditions and facilitate future utilization of lunar resources. To attain a global view of lunar science, the nodes will be distributed over the lunar surface, including locations on the far side of the Moon. Given that nodes on the lunar far side do not have direct line-of-sight for Earth communications, the planned presence of such nodes creates the need for a lunar communications relay satellite. Since the communications relay capability would only be required for a small portion of the satellite s orbit, it may be possible to include communication relay components on a science spacecraft. Furthermore, an integrated satellite has the potential to reduce lunar surface mission costs. A SCience Hybrid Orbiter and Lunar Relay (SCHOLR) is proposed to accomplish scientific goals while also supporting the communications needs of landers on the far side of the Moon. User needs and design drivers for the system were derived from the anticipated needs of future robotic and lander missions. Based on these drivers and user requirements, accommodations for communications payload aboard a science spacecraft were developed. A team of interns identified and compared possible SCHOLR architectures. The final SCHOLR architecture was analyzed in terms of orbiter lifetime, lunar surface coverage, size, mass, power, and communications data rates. This paper presents the driving requirements, operational concept, and architecture views for SCHOLR

  15. Security of quantum key distribution using a simplified trusted relay

    NASA Astrophysics Data System (ADS)

    Stacey, William; Annabestani, Razieh; Ma, Xiongfeng; Lütkenhaus, Norbert

    2015-01-01

    We propose a QKD protocol for trusted node relays. Our protocol shifts the communication and computational weight of classical postprocessing to the end users by reassigning the roles of error correction and privacy amplification, while leaving the exchange of quantum signals untouched. We perform a security analysis for this protocol based on the Bennett-Brassard 1984 protocol on the level of infinite key formulas, taking into account weak coherent implementations involving decoy analysis.

  16. Tracking and Data Relay Satellite System (TDRSS) frequency plan

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The functions of the Tracking and Data Relay Satellite System (TDRSS) are discussed. The primary purpose of the system is to transmit signals to and receive signals from earth orbiting user spacecraft, and provide data from which user spacecraft ephemerides can be calculated. The system configuration is described and illustrated. The frequency plan is analyzed to show the frequency coverage and the signal handling capability of the system. The characteristics of the components of the system are tabulated.

  17. Adaptive selective relaying in cooperative free-space optical systems over atmospheric turbulence and misalignment fading channels.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-06-30

    In this paper, a novel adaptive cooperative protocol with multiple relays using detect-and-forward (DF) over atmospheric turbulence channels with pointing errors is proposed. The adaptive DF cooperative protocol here analyzed is based on the selection of the optical path, source-destination or different source-relay links, with a greater value of fading gain or irradiance, maintaining a high diversity order. Closed-form asymptotic bit error-rate (BER) expressions are obtained for a cooperative free-space optical (FSO) communication system with Nr relays, when the irradiance of the transmitted optical beam is susceptible to either a wide range of turbulence conditions, following a gamma-gamma distribution of parameters α and β, or pointing errors, following a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. A greater robustness for different link distances and pointing errors is corroborated by the obtained results if compared with similar cooperative schemes or equivalent multiple-input multiple-output (MIMO) systems. Simulation results are further demonstrated to confirm the accuracy and usefulness of the derived results. PMID:24977911

  18. Adaptive selective relaying in cooperative free-space optical systems over atmospheric turbulence and misalignment fading channels.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-06-30

    In this paper, a novel adaptive cooperative protocol with multiple relays using detect-and-forward (DF) over atmospheric turbulence channels with pointing errors is proposed. The adaptive DF cooperative protocol here analyzed is based on the selection of the optical path, source-destination or different source-relay links, with a greater value of fading gain or irradiance, maintaining a high diversity order. Closed-form asymptotic bit error-rate (BER) expressions are obtained for a cooperative free-space optical (FSO) communication system with Nr relays, when the irradiance of the transmitted optical beam is susceptible to either a wide range of turbulence conditions, following a gamma-gamma distribution of parameters α and β, or pointing errors, following a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. A greater robustness for different link distances and pointing errors is corroborated by the obtained results if compared with similar cooperative schemes or equivalent multiple-input multiple-output (MIMO) systems. Simulation results are further demonstrated to confirm the accuracy and usefulness of the derived results.

  19. Attack Vulnerability of Network Controllability

    PubMed Central

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  20. Attack Vulnerability of Network Controllability.

    PubMed

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability. PMID:27588941

  1. Commercial grade item (CGI) dedication of MDR relays for nuclear safety related applications

    NASA Astrophysics Data System (ADS)

    Das, Ranjit K.; Julka, Anil; Modi, Govind

    1994-08-01

    MDR relays manufactured by Potter & Brumfield (P&B) have been used in various safety related applications in commercial nuclear power plants. These include emergency safety features (ESF) actuation systems, emergency core cooling systems (ECCS) actuation, and reactor protection systems. The MDR relays manufactured prior to May 1990 showed signs of generic failure due to corrosion and outgassing of coil varnish. P&B has made design changes to correct these problems in relays manufactured after May 1990. However, P&B does not manufacture the relays under any 10CFR50 Appendix B quality assurance (QA) program. They manufacture the relays under their commercial QA program and supply these as commercial grade items. This necessitates CGI Dedication of these relays for use in nuclear-safety-related applications. This paper presents a CGI dedication program that has been used to dedicate the MDR relays manufactured after been used to dedicate the MDR relays manufactured after May 1990. The program is in compliance with current Nuclear Regulatory Commission (NRC) and Electric Power Research Institute (EPRI) guidelines and applicable industry standards; it specifies the critical characteristics of the relays, provides the tests and analysis required to verify the critical characteristics, the acceptance criteria for the test results, performs source verification to quality P&B for its control of the critical characteristics, and provides documentation. The program provides reasonable assurance that the new MDR relays will perform their intended safety functions.

  2. Distributed beamforming designs to improve physical layer security in wireless relay networks

    NASA Astrophysics Data System (ADS)

    Qian, Mujun; Liu, Chen; Fu, Youhua

    2014-12-01

    This paper investigates security-oriented beamforming designs in a relay network composed of a source-destination pair, multiple relays, and a passive eavesdropper. Unlike most of the earlier works, we assume that only statistical information of the relay-eavesdropper channels is known to the relays. We propose beamforming solutions for amplify-and-forward (AF) and decode-and-forward (DF) relay networks to improve secrecy capacity. In an AF network, the beamforming design is obtained by approximating a product of two correlated Rayleigh quotients to a single Rayleigh quotient using the Taylor series expansion. Our study reveals that in an AF network, the secrecy capacity does not always grow as the eavesdropper moves away from the relays or as total relay transmit power increases. Moreover, if the destination is nearer to the relays than the eavesdropper is, a suboptimal power is derived in closed form through monotonicity analysis of secrecy capacity. While in a DF network, secrecy capacity is a single Rayleigh quotient problem which can be easily solved. We also found that if the relay-eavesdropper distances are about the same, it is unnecessary to consider the eavesdropper in a DF network. Numerical results show that for either AF or DF relaying protocol, the proposed beamforming scheme provides higher secrecy capacity than traditional approaches.

  3. Generic attack approaches for industrial control systems.

    SciTech Connect

    Duggan, David P.

    2006-01-01

    This report suggests a generic set of attack approaches that are expected to be used against Industrial Control Systems that have been built according to a specific reference model for control systems. The posed attack approaches are ordered by the most desirable, based upon the goal of an attacker. Each attack approach is then graded by the category of adversary that would be capable of utilizing that attack approach. The goal of this report is to identify necessary levels of security required to prevent certain types of attacks against Industrial Control Systems.

  4. Mars Express Forward Link Capabilities for the Mars Relay Operations Service (MaROS)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul

    2012-01-01

    This software provides a new capability for landed Mars assets to perform forward link relay through the Mars Express (MEX) European Union orbital spacecraft. It solves the problem of standardizing the relay interface between lander missions and MEX. The Mars Operations Relay Service (MaROS) is intended as a central point for relay planning and post-pass analysis for all Mars landed and orbital assets. Through the first two phases of implementation, MaROS supports relay coordination through the Odyssey orbiter and the Mars Reconnaissance Orbiter (MRO). With this new software, MaROS now fully integrates the Mars Express spacecraft into the relay picture. This new software generates and manages a new set of file formats that allows for relay request to MEX for forward and return link relay, including the parameters specific to MEX. Existing MEX relay planning interactions were performed via email exchanges and point-to-point file transfers. By integrating MEX into MaROS, all transactions are managed by a centralized service for tracking and analysis. Additionally, all lander missions have a single, shared interface with MEX and do not have to integrate on a mission-by mission basis. Relay is a critical element of Mars lander data management. Landed assets depend largely upon orbital relay for data delivery, which can be impacted by the availability and health of each orbiter in the network. At any time, an issue may occur to prevent relay. For this reason, it is imperative that all possible orbital assets be integrated into the overall relay picture.

  5. Diabetes Ups Risk of Heart Attack Death

    MedlinePlus

    ... news/fullstory_159557.html Diabetes Ups Risk of Heart Attack Death Study points to need for better coordinated ... are much more likely to die after a heart attack than people without the blood sugar condition, a ...

  6. Being active after a heart attack (image)

    MedlinePlus

    ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ... best activity when you start exercising after a heart attack. Start slowly, and increase the amount of time ...

  7. Analysis of Polygonal Distance Protection Relay of Transmission Line Affected by SMES Device

    NASA Astrophysics Data System (ADS)

    Yang, Jun; Zhang, Wenjia

    Because of unique advantages in rapid response and independent control of act ve and reactive power, Superconducting Magnetic Energy Storage (SMES) device will be widely used in the power system. The SMES exchanges power with power grid in the charging and discharging process, so it may affect the performance of protection relay of transmission line, which will lead to mal-operation. Based on SMES model, the tripping characteristic of polygonal distance relay for single-machine-infinite-bus performance of polygonal distance relay with SMES. The simulation results show the measured impedance of polygonal distance relay is changed by SMES, and polygonal distance relay will make mal-operation when faults occur in the boundary of protection zone. Also an improving distance relay is proposed to solve the problem.

  8. Biomechanics of knife stab attacks.

    PubMed

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  9. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.

    PubMed

    Chen, Yan; Lin, W Sabrina; Liu, K J Ray

    2010-07-01

    Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent's strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector's strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker's strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data. PMID:20227981

  10. Risk-distortion analysis for video collusion attacks: a mouse-and-cat game.

    PubMed

    Chen, Yan; Lin, W Sabrina; Liu, K J Ray

    2010-07-01

    Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. To develop an efficient collusion-resistant fingerprinting scheme, it is very important for the system designer to understand how the behavior dynamics of colluders affect the performance of collusion attack. In the literature, little effort has been made to explicitly study the relationship between risk, e.g., the probability of the colluders to be detected, and the distortion of the colluded signal. In this paper, we investigate the risk-distortion relationship for the linear video collusion attack with Gaussian fingerprint. We formulate the optimal linear collusion attack as an optimization problem of finding the optimal collusion parameters to minimize the distortion subject to a risk constraint. By varying the risk constraint and solving the corresponding optimization problem, we can derive the optimal risk-distortion curve. Moreover, based upon the observation that the detector/attacker can each improve the detection/attack performance with the knowledge of his/her opponent's strategy, we formulate the attack and detection problem as a dynamic mouse and cat game and study the optimal strategies for both the attacker and detector. We show that if the detector uses a fixed detection strategy, the attacker can estimate the detector's strategy and choose the corresponding optimal strategy to attack the fingerprinted video with a small distortion. However, if the detector is powerful, i.e., the detector can always estimate the attacker's strategy, the best strategy for the attacker is the min-max strategy. Finally, we conduct several experiments to verify the proposed risk-distortion model using real video data.

  11. Single-molecule spectroscopy exposes hidden states in an enzymatic electron relay

    NASA Astrophysics Data System (ADS)

    Grossman, Iris; Yuval Aviram, Haim; Armony, Gad; Horovitz, Amnon; Hofmann, Hagen; Haran, Gilad; Fass, Deborah

    2015-10-01

    The ability to query enzyme molecules individually is transforming our view of catalytic mechanisms. Quiescin sulfhydryl oxidase (QSOX) is a multidomain catalyst of disulfide-bond formation that relays electrons from substrate cysteines through two redox-active sites to molecular oxygen. The chemical steps in electron transfer have been delineated, but the conformational changes accompanying these steps are poorly characterized. Here we use single-molecule Förster resonance energy transfer (smFRET) to probe QSOX conformation in resting and cycling enzyme populations. We report the discovery of unanticipated roles for conformational changes in QSOX beyond mediating electron transfer between redox-active sites. In particular, a state of the enzyme not previously postulated or experimentally detected is shown to gate, via a conformational transition, the entrance into a sub-cycle within an expanded QSOX kinetic scheme. By tightly constraining mechanistic models, smFRET data can reveal the coupling between conformational and chemical transitions in complex enzymatic cycles.

  12. On Mitigating Distributed Denial of Service Attacks

    ERIC Educational Resources Information Center

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  13. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    ERIC Educational Resources Information Center

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  14. A Model of Biological Attacks on a Realistic Population

    NASA Astrophysics Data System (ADS)

    Carley, Kathleen M.; Fridsma, Douglas; Casman, Elizabeth; Altman, Neal; Chen, Li-Chiou; Kaminsky, Boris; Nave, Demian; Yahja, Alex

    The capability to assess the impacts of large-scale biological attacks and the efficacy of containment policies is critical and requires knowledge-intensive reasoning about social response and disease transmission within a complex social system. There is a close linkage among social networks, transportation networks, disease spread, and early detection. Spatial dimensions related to public gathering places such as hospitals, nursing homes, and restaurants, can play a major role in epidemics [Klovdahl et. al. 2001]. Like natural epidemics, bioterrorist attacks unfold within spatially defined, complex social systems, and the societal and networked response can have profound effects on their outcome. This paper focuses on bioterrorist attacks, but the model has been applied to emergent and familiar diseases as well.

  15. A computer package for teaching relay coordination and loop based network solution

    SciTech Connect

    Goswami, S.K.; Basu, S.K. . Electrical Engineering Dept.)

    1994-05-01

    This paper reports the development of a relay coordination package specially designed as a teaching aid. Fault studies required for relay coordination has been performed by using a newly developed loop impedance matrix. This new method of forming loop impedance matrix is particularly suitable for multiple fault studies environment as required in relay coordination. A simple topology searching technique has been used to find all loops of the network. This package simultaneously serves the purpose of teaching relay coordination, loop analysis technique and the method of topology searching.

  16. Using an ethernet based relay to remotely control lights at CFHT

    NASA Astrophysics Data System (ADS)

    Barrick, Gregory

    2011-03-01

    Prior to observatory automation, all the lights at the summit were controlled using local light switches. Lights that were inadvertently left on during the day that impact observing can previously could be turned off by the night staff. Likewise, the night staff could turn on lights as needed for troubleshooting. Remote observing will make this impossible. The use of WebRelays provided a means for remotely turning on or off critical lights as needed. WebRelays are an Ethernet based relay that can be controlled either using network commands or by supplying voltage to an optically isolated input on the WebRelay.

  17. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL...) An automatic relay station must be designed, installed, and protected so that the transmitter...

  18. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... RADIO SERVICES EXPERIMENTAL RADIO, AUXILIARY, SPECIAL BROADCAST AND OTHER PROGRAM DISTRIBUTIONAL...) An automatic relay station must be designed, installed, and protected so that the transmitter...

  19. Defending networks against denial-of-service attacks

    NASA Astrophysics Data System (ADS)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  20. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    NASA Astrophysics Data System (ADS)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  1. Ballistic Beloniformes attacking through Snell's Window.

    PubMed

    Day, R D; Mueller, F; Carseldine, L; Meyers-Cherry, N; Tibbetts, I R

    2016-02-01

    Needlefishes (Beloniformes) were observed employing a range of stalking and attacking behaviours to attack schools of bait fishes ranging from the use of tactics common to predatory fishes to a novel behaviour: the use of leaping, aerial attacks. These aerial attacks are suggested to serve two purposes: to extend the attack range of the needlefishes and to reduce their prey's potential for evasion. Furthermore, a third purpose is hypothesized that the needlefishes are taking advantage of Snell's Window, an optical effect which may mask their approach to their prey.

  2. Real-Time Multimission Event Notification System for Mars Relay

    NASA Technical Reports Server (NTRS)

    Wallick, Michael N.; Allard, Daniel A.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    As the Mars Relay Network is in constant flux (missions and teams going through their daily workflow), it is imperative that users are aware of such state changes. For example, a change by an orbiter team can affect operations on a lander team. This software provides an ambient view of the real-time status of the Mars network. The Mars Relay Operations Service (MaROS) comprises a number of tools to coordinate, plan, and visualize various aspects of the Mars Relay Network. As part of MaROS, a feature set was developed that operates on several levels of the software architecture. These levels include a Web-based user interface, a back-end "ReSTlet" built in Java, and databases that store the data as it is received from the network. The result is a real-time event notification and management system, so mission teams can track and act upon events on a moment-by-moment basis. This software retrieves events from MaROS and displays them to the end user. Updates happen in real time, i.e., messages are pushed to the user while logged into the system, and queued when the user is not online for later viewing. The software does not do away with the email notifications, but augments them with in-line notifications. Further, this software expands the events that can generate a notification, and allows user-generated notifications. Existing software sends a smaller subset of mission-generated notifications via email. A common complaint of users was that the system-generated e-mails often "get lost" with other e-mail that comes in. This software allows for an expanded set (including user-generated) of notifications displayed in-line of the program. By separating notifications, this can improve a user's workflow.

  3. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  4. Design analysis tracking and data relay satellite simulation system

    NASA Technical Reports Server (NTRS)

    1974-01-01

    The design and development of the equipment necessary to simulate the S-band multiple access link between user spacecraft, the Tracking and Data Relay Satellite, and a ground control terminal are discussed. The core of the S-band multiple access concept is the use of an Adaptive Ground Implemented Phased Array. The array contains thirty channels and provides the multiplexing and demultiplexing equipment required to demonstrate the ground implemented beam forming feature. The system provided will make it possible to demonstrate the performance of a desired user and ten interfering sources attempting to pass data through the multiple access system.

  5. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin

    2011-01-01

    Throughout this development and deployment process we have followed a few guiding principles: (1) Ensure ubiquitous access through ReSTful and web interfaces; (2) Design a system that is mission and even planet agnostic so that future missions may be added with little hassle, and the system itself may be redeployed for other planetary relay networks; (3) Accept constant input and feedback between mission operators and the development team to ensure that there is a useful product that may be used for years to come.

  6. MGS and Odyssey - relay satellites for the MER mission

    NASA Technical Reports Server (NTRS)

    Esposito, Pasquale B.; Bhat, R.; Demeak, S.; Ardalan, S.; Breeden, J.; Helfrich, C.; Jefferson, D.; Stauch, J.

    2004-01-01

    Both Mars Global Surveyor (MGS) and Odyssey are currently in low altitude, nearly circular and highly inclined orbits about Mars. Thus, they are available adn compartible to serve as relay satellites for the Mars Exploration Rovers (MER) mission. Consequently, the MER project developed requirements for MGS to be overhead for MER-A (Spirit) at Gusev crater, at maximum elevation, mudway between lander separation and initial touchdown; in time, this was specified as 01/04/04. 04:24:55 UTC/SCET with a 30 sec tolerance.

  7. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-06-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature.

  8. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay.

    PubMed

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  9. Fabricating and using a micromachined magnetostatic relay or switch

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor)

    2001-01-01

    A micromachined magnetostatic relay or switch includes a springing beam on which a magnetic actuation plate is formed. The springing beam also includes an electrically conductive contact. In the presence of a magnetic field, the magnetic material causes the springing beam to bend, moving the electrically conductive contact either toward or away from another contact, and thus creating either an electrical short-circuit or an electrical open-circuit. The switch is fabricated from silicon substrates and is particularly useful in forming a MEMs commutation and control circuit for a miniaturized DC motor.

  10. Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay

    PubMed Central

    Yang, Wei; Huang, Liusheng; Song, Fang

    2016-01-01

    Anonymous transmission is an interesting and crucial issue in computer communication area, which plays a supplementary role to data privacy. In this paper, we put forward a privacy preserving quantum anonymous transmission protocol based on entanglement relay, which constructs anonymous entanglement from EPR pairs instead of multi-particle entangled state, e.g. GHZ state. Our protocol achieves both sender anonymity and receiver anonymity against an active adversary and tolerates any number of corrupt participants. Meanwhile, our protocol obtains an improvement in efficiency compared to quantum schemes in previous literature. PMID:27247078

  11. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    NASA Astrophysics Data System (ADS)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  12. Database Relation Watermarking Resilient against Secondary Watermarking Attacks

    NASA Astrophysics Data System (ADS)

    Gupta, Gaurav; Pieprzyk, Josef

    There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

  13. National labs focus on tools against terrorism in wake of airliner and anthrax attacks

    NASA Astrophysics Data System (ADS)

    Dawson, Jim

    2002-01-01

    A sophisticated array of devices to detect the potential weapons of terrorism-chemical and biological agents, radioactive material, and explosives-are being developed by scientists working long hours to try to prevent future attacks.

  14. Distributed Relay Selection for MIMO-SDM Cooperative Networks

    NASA Astrophysics Data System (ADS)

    Tran, Xuan Nam; Nguyen, Vinh Hanh; Bui, Thanh Tam; Dinh, The Cuong; Karasawa, Yoshio

    In this paper, we consider an amplify-and-forward cooperative wireless network in which network nodes use multiple input multiple output (MIMO) spatial division multiplexing (SDM) to communicate with one another. We examine the problem of distributed cooperative relay selection and signal combining at the destination. First, we propose three distributed relay selection algorithms based on the maximum channel gains, the maximum harmonic mean of the channel gains, and the minimum mean squared error (MSE) of the signal estimation. Second, we propose a minimum mean square error (MMSE) signal combining scheme which jointly serves as the optimal signal combiner and interference canceler. It is shown that the MSE selection together with the MMSE combining achieves the maximal diversity gain. We also show that in MIMO-SDM cooperative networks increasing the number of candidate nodes does not help to improve the BER performance as opposed to the cooperative networks where each node is equipped with only single antenna. A practical approach to implementation of the combiner based on the current wireless access network protocols will also be presented.

  15. Three Generations of Tracking and Data Relay Satellite (TDRS) Spacecraft

    NASA Technical Reports Server (NTRS)

    Zaleski, Ron

    2016-01-01

    The current Tracking and Data Relay Satellite configuration consists of nine in-orbit satellites (four first generation, three second generation and two third generation satellites) globally distributed in geosynchronous orbit to provide near continuous data relay service to missions like Hubble Space Telescope and the International Space Station. The 1st generation spacecraft were designed by TRW/Northrop Grumman with their launches of the five spacecraft ranging from 1983 through 1995. The 2nd and 3rd generation spacecraft were designed by Boeing with their launches ranging 2000 - 2002 and 2013 - 2017 respectively. TDRS-3 is now 27 years on orbit, continues to be a capable asset for the TDRS constellation. Lack of need for inclination control combined with large fuel reserves and redundancy on critical elements provides spacecraft that operate well past design life, all of which contributes to expanded TDRS constellation support capabilities. All spacecraft generations have issues. Significant issues will be summarized with the focus on the Boeing related problems. Degradations and failures are continually assessed and provide the foundation for yearly updates to spacecraft reliability models, constellation service projections and deorbit plans (in order to meet NASAs mandate of limiting orbital debris). Even when accounting for degradations and failures, the life expectancy for the Boeing delivered 2nd generation TDRS-8, 9 10 TDRS are anticipated to be 25+ years.

  16. Coded Cooperation for Multiway Relaying in Wireless Sensor Networks.

    PubMed

    Si, Zhongwei; Ma, Junyang; Thobaben, Ragnar

    2015-01-01

    Wireless sensor networks have been considered as an enabling technology for constructing smart cities. One important feature of wireless sensor networks is that the sensor nodes collaborate in some manner for communications. In this manuscript, we focus on the model of multiway relaying with full data exchange where each user wants to transmit and receive data to and from all other users in the network. We derive the capacity region for this specific model and propose a coding strategy through coset encoding. To obtain good performance with practical codes, we choose spatially-coupled LDPC (SC-LDPC) codes for the coded cooperation. In particular, for the message broadcasting from the relay, we construct multi-edge-type (MET) SC-LDPC codes by repeatedly applying coset encoding. Due to the capacity-achieving property of the SC-LDPC codes, we prove that the capacity region can theoretically be achieved by the proposed MET SC-LDPC codes. Numerical results with finite node degrees are provided, which show that the achievable rates approach the boundary of the capacity region in both binary erasure channels and additive white Gaussian channels. PMID:26131675

  17. Mars Relay Spacecraft: A Low-Cost Approach

    NASA Technical Reports Server (NTRS)

    SvitekT, .; King, J.; Fulton, R.; McOmber, R.; Hastrup, R.; Miller, A.

    1995-01-01

    The next phase of Mars exploration will utilize numerous globally distributed small low-cost devices including landers penetrators microrovers and balloons. Direct-to-Earth communications links if required for these landers will drive the lander design for two reasons: a) mass and complexity needed for a steerable high-gain antenna and b) power requirements for a high-power amplifier (i.e. solar panel and battery mass). Total mass of the direct link hardware for several recent small-lander designs exceeded the mass of the scientific payload. Alternatively if communications are via a Mars-orbiting relay spacecraft resource requirements for the local UHF communication link are comparatively trivial: a simple whip antenna and less than 1 watt power. Clearly using a Mars relay spacecraft (MRS) is the preferred option if the MRS mission can be accomplished in an affordable and robust way. Our paper describes a point design for such a mission launched in the s001 or 2003 opportunity.

  18. Polar On-Line Acquisition Relay and Transmission System (POLARATS)

    SciTech Connect

    Yuracko, K.

    2004-07-15

    POLARATS (Polar On-Line Acquisition Relay And Transmission System) is being developed by YAHSGS LLC (YAHSGS) and Oak Ridge National Laboratory (ORNL) to provide remote, unattended monitoring of environmental parameters under harsh environmental conditions. In particular, instrumental design and engineering is oriented towards protection of human health in the Arctic, and with the additional goal of advancing Arctic education and research. POLARATS will obtain and transmit environmental data from hardened monitoring devices deployed in locations important to understanding atmospheric and aquatic pollutant migration as it is biomagnified in Arctic food chains. An Internet- and personal computer (PC)-based educational module will provide real time sensor data, on-line educational content, and will be integrated with workbooks and textbooks for use in middle and high school science programs. The educational elements of POLARATS include an Internet-based educational module that will instruct students in the use of the data and how those data fit into changing Arctic environments and food chains. POLARATS will: (1) Enable students, members of the community, and scientific researchers to monitor local environmental conditions in real time over the Internet; and (2) Provide additional educational benefits through integration with middle- and high-school science curricula. Information will be relayed from POLARATS devices to classrooms and libraries along with custom-designed POLARATS teaching materials that will be integrated into existing curricula to enhance the educational benefits realized from the information obtained.

  19. Cardiorespiratory strain of a five day jogging relay.

    PubMed

    Oksa, J; Rissanen, S; Martikkala, V

    1995-09-01

    The heart rates of 14 voluntary subjects (seven male and seven females) participating in a 5 d jogging relay were recorded. The jogging speed was controlled at 3.0 m.s-1 on average. The heart rate measurements were related to cardiorespiratory responses obtained during VO2max test on a treadmill. The mean (s.d.) VO2max values were 53(2) and 48(2) ml.kg-1.min-1 and the anaerobic threshold was 42(1) and 38(2) ml.kg-1.min-1 for male and female subjects respectively. During the relay the mean(s.d) heart rate values of male and female subjects were 150(1), and 167(3) beats.min-1 (P < 0.001), corresponding to 68(1) and 76(2)% VO2max (P < 0.01) as calculated from the individual HR/VO2 regression equations. The jogging time above anaerobic threshold heart rate level was 9(3)% for the males and 43(7)% for the females (P < 0.001) of the total jogging time. The results indicate that even in a leisure oriented jogging event, cardiorespiratory strain can be rather high and that the strain can be significantly higher for female than for male subjects. The determination of the anaerobic threshold as well as VO2max is important when quantifying the level of cardiorespiratory strain of exercise. PMID:8800848

  20. Cardiorespiratory strain of a five day jogging relay.

    PubMed

    Oksa, J; Rissanen, S; Martikkala, V

    1995-09-01

    The heart rates of 14 voluntary subjects (seven male and seven females) participating in a 5 d jogging relay were recorded. The jogging speed was controlled at 3.0 m.s-1 on average. The heart rate measurements were related to cardiorespiratory responses obtained during VO2max test on a treadmill. The mean (s.d.) VO2max values were 53(2) and 48(2) ml.kg-1.min-1 and the anaerobic threshold was 42(1) and 38(2) ml.kg-1.min-1 for male and female subjects respectively. During the relay the mean(s.d) heart rate values of male and female subjects were 150(1), and 167(3) beats.min-1 (P < 0.001), corresponding to 68(1) and 76(2)% VO2max (P < 0.01) as calculated from the individual HR/VO2 regression equations. The jogging time above anaerobic threshold heart rate level was 9(3)% for the males and 43(7)% for the females (P < 0.001) of the total jogging time. The results indicate that even in a leisure oriented jogging event, cardiorespiratory strain can be rather high and that the strain can be significantly higher for female than for male subjects. The determination of the anaerobic threshold as well as VO2max is important when quantifying the level of cardiorespiratory strain of exercise.

  1. UHF Relay Antenna Measurements on Phoenix Mars Lander Mockup

    NASA Technical Reports Server (NTRS)

    Ilott, Peter; Harrel, Jefferson; Arnold, Bradford; Bliznyuk, Natalia; Nielsen, Rick; Dawson, David; McGee, Jodi

    2006-01-01

    The Phoenix Lander, a NASA Discovery mission which lands on Mars in the spring of 2008, will rely entirely on UHF relay links between it and Mars orbiting assets, (Odyssey and Mars Reconnaissance Orbiter (MRO)), to communicate with the Earth. As with the Mars Exploration Rover (MER) relay system, non directional antennas will be used to provide roughly emispherical coverage of the Martian sky. Phoenix lander deck object pattern interference and obscuration are significant, and needed to be quantified to answer system level design and operations questions. This paper describes the measurement campaign carried out at the SPAWAR (Space and Naval Warfare Research) Systems Center San Diego (SSC-SD) hemispherical antenna range, using a Phoenix deck mockup and engineering model antennas. One goal of the measurements was to evaluate two analysis tools, the time domain CST, and the moment method WIPL-D software packages. These would subsequently be used to provide pattern analysis for configurations that would be difficult and expensive to model and test on Earth.

  2. Solar radiation pressure model for the relay satellite of SELENE

    NASA Astrophysics Data System (ADS)

    Kubo-Oka, T.; Sengoku, A.

    1999-09-01

    A new radiation pressure model of the relay satellite of SELENE has been developed. The shape of the satellite was assumed to be a combination of a regular octagonal pillar and a column. Radiation forces acting on each part of the spacecraft were calculated independently and summed vectorially to obtain the mean acceleration of the satellite center of mass. We incorporated this new radiation pressure model into the orbit analysis software GEODYN-II and simulated the tracking data reduction process of the relay satellite. We compared two models: one is the new radiation pressure model developed in this work and the other a so-called "cannonball model" where the shape of the satellite is assumed to be a sphere. By the analysis of simulated two-way Doppler tracking data, we found that the new radiation pressure model reduces the observation residuals compared to the cannonball model. Moreover, we can decrease errors in the estimated lunar gravity field coefficients significantly by use of the new radiation pressure model.

  3. Shoulder injuries from attacking motion

    NASA Astrophysics Data System (ADS)

    Yanagi, Shigeru; Nishimura, Tetsu; Itoh, Masaru; Wada, Yuhei; Watanabe, Naoki

    1997-03-01

    Sports injuries have bothered professional players. Although many medical doctors try to treat injured players, to prevent sports injuries is more important. Hence, it is required to clear a kinematic mechanism of the sport injuries. A shoulder of volleyball attacker or baseball pitcher is often inured by playing motion. The injuries are mainly caused at the end of long head tendon, which is located in the upper side of scapula. Generally, a muscle and tendon have enough strength against tensile force, however, it seems that they are sometimes defeated by the lateral force. It is imagined that the effect of the lateral force has a possibility of injuring the tendon. If we find the influence of the lateral force on the injured portion, the mechanism of injuries must be cleared. In our research, volleyball attacking motion is taken by high speed video cameras. We analyze the motion as links system and obtain an acceleration of an arm and a shoulder from video image data. The generated force at a shoulder joint is calculated and resolved into the lateral and longitudinal forces. Our final goal is to discuss a possibility that the lateral force causes the injuries.

  4. Migraine attacks the Basal Ganglia

    PubMed Central

    2011-01-01

    Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month). The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human) brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF) to a matched (gender, age, age of onset and type of medication) group of patients whose migraine episodes progressed (HF). Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine. PMID:21936901

  5. Considerations for an Earth Relay Satellite with RF and Optical Trunklines

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2016-01-01

    Support for user platforms through the use of optical links to geosynchronous relay spacecraft are expected to be part of the future space communications architecture. The European Data Relay Satellite System (EDRS) has its first node, EDRS-A, in orbit. The EDRS architecture includes space-to-space optical links with a Ka-Band feeder link or trunkline. NASA's Laser Communications Relay Demonstration (LCRD) mission, originally baselined to support a space-to-space optical link relayed with an optical trunkline, has added an Radio Frequency (RF) trunkline. The use of an RF trunkline avoids the outages suffered by an optical trunkline due to clouds, but an RF trunkline will be bandwidth limited. A space relay architecture with both RF and optical trunklines could relay critical realtime data, while also providing a high data volume capacity. This paper considers the relay user scenarios that could be supported, and the implications to the space relay system and operations. System trades such as the amount of onboard processing and storage required, the use of link layer switching vs. network layer routing, and the use of Delay/Disruption Tolerant Networking (DTN) are discussed.

  6. The Baton Problem: Physics and the 4 x 100 M Relay

    ERIC Educational Resources Information Center

    Harris, Frank

    2012-01-01

    Success in any relay race depends on the speeds achieved by the individual runners and the successful handover of the baton from each runner to the next. Choosing top sprinters is the easy part but there are many ways for the passing of the baton to go wrong. In this article, the knowledge and judgement required by the coach for a relay team are…

  7. 75 FR 39859 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... the Video Relay Service Program, Order, document FCC 10-88, adopted May 24, 2010, and released May...

  8. Tracking and data relay satellite system configuration and tradeoff study, part 1. Volume 3: Telecommunications service system

    NASA Technical Reports Server (NTRS)

    1972-01-01

    The results of the telecommunications subsystem analysis are presented. The relay system requirements and constraints, interference analysis, frequency selection, modulation and coding analysis, and the performance analysis of the relay system are included.

  9. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Qin, Hao; Kumar, Rupesh; Alléaume, Romain

    2016-07-01

    We identify and study a security loophole in continuous-variable quantum key distribution (CVQKD) implementations, related to the imperfect linearity of the homodyne detector. By exploiting this loophole, we propose an active side-channel attack on the Gaussian-modulated coherent-state CVQKD protocol combining an intercept-resend attack with an induced saturation of the homodyne detection on the receiver side (Bob). We show that an attacker can bias the excess noise estimation by displacing the quadratures of the coherent states received by Bob. We propose a saturation model that matches experimental measurements on the homodyne detection and use this model to study the impact of the saturation attack on parameter estimation in CVQKD. We demonstrate that this attack can bias the excess noise estimation beyond the null key threshold for any system parameter, thus leading to a full security break. If we consider an additional criterion imposing that the channel transmission estimation should not be affected by the attack, then the saturation attack can only be launched if the attenuation on the quantum channel is sufficient, corresponding to attenuations larger than approximately 6 dB. We moreover discuss the possible countermeasures against the saturation attack and propose a countermeasure based on Gaussian postselection that can be implemented by classical postprocessing and may allow one to distill the secret key when the raw measurement data are partly saturated.

  10. Joint iterative decoding for pragmatic irregular LDPC-coded multi-relay cooperations

    NASA Astrophysics Data System (ADS)

    Yang, Fengfan; Chen, Jingwen; Zong, Peng; Zhang, Shunwai; Zhang, Qiuxia

    2011-10-01

    In this article, a new kind of pragmatic simple-encoding irregular systematic low-density parity-check (LDPC) code for multi-relay coded cooperation is designed, where the introduced joint iterative decoding is performed in the destination based on a proposed joint Tanner graph for all the constituent LDPC codes used by the source and relays in multi-relay cooperation. The theoretical analysis and numerical results show that the coded cooperations outperform the coded non-cooperation under the same code rate, and also achieve a good trade-off between the performance and the decoding complexity associated with the number of relays. This performance gain can be credited to the additional exchange of extrinsic information from the LDPC codes used by the source and the relays in both ideal and non-ideal cooperations.

  11. Sum-Rate Evaluation of Multi-User MIMO-Relay Channel

    NASA Astrophysics Data System (ADS)

    Sun, Huan; Meng, Sheng; Wang, Yan; You, Xiaohu

    In this paper, the multi-user multiple-input multiple-output (MU-MIMO) relay channel is investigated, where the source node provides multi-beams to multi-users via a multi-antenna relay node. In this scenario, linear processing matrix at the relay node is designed around block diagonal (BD) scheme to improve the system sum-rate. Compared with the traditional linear processing matrix with zero-forcing (ZF) scheme at the relay node, the proposed matrix based on BD scheme can not only eliminate the multi-user interference to the same extent as the ZF scheme, but also realize optimal power allocation at the relay node. Numerical simulations demonstrate the BD scheme outperforms the ZF scheme and can significantly improve the sum-rate performance.

  12. Percolation of localized attack on complex networks

    NASA Astrophysics Data System (ADS)

    Shao, Shuai; Huang, Xuqing; Stanley, H. Eugene; Havlin, Shlomo

    2015-02-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erdős-Rényi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  13. 75 FR 26701 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-12

    ...-123, FCC 09-39, published at 74 FR 23815, May 21, 2009 (2009 PN and NPRM). In the past, the Commission... Services (STS), Captioned Telephone Services (CTS), Internet Protocol (IP) CTS, IP Relay, and Video Relay... comment on NECA's proposed compensation rates for TRS, STS, CTS, IP CTS, IP Relay, and VRS, for the...

  14. "Homicide by heart attack" revisited.

    PubMed

    Turner, Staci A; Barnard, Jeffrey J; Spotswood, Sheila D; Prahlow, Joseph A

    2004-05-01

    The sudden death of a person caused by an arrhythmia that is induced by physical and/or emotional stress provoked by the criminal activity of another person is sometimes referred to as "homicide by heart attack." Published criteria for such an event relate to situations where no physical contact occurs between the perpetrator and the victim. Situations involving physical contact, but with absence of lethal injuries, are frequently treated is a similar fashion by forensic pathologists. Herein, we propose a set of modified criteria, which include cases where physical contact has occurred. Five examples of so-called "homicide by heart attack" are presented, including a 40-year-old man who was struck in the head with a wooden statue, a 74-year-old man who was punched in the jaw by a robber, a 66-year-old woman who was started awake by a home-intruder, a 67-year-old woman who struggled with a would-be purse-snatcher in a parking lot, and a 52-year-old man who was in a physical altercation with a younger man. In each instance, autopsy revealed the presence of severe, underlying heart disease, as well as absence of lethal injuries. In each case, investigative information was such that the emotional and/or physical stress associated with the criminal activity of another individual was deemed contributory to the death. The presumed mechanism of death in each case was a cardiac dysrhythmia related to underlying heart disease, but initiated by the emotional and/or physical stress.

  15. Optimal space-time attacks on system state estimation under a sparsity constraint

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  16. Exomars orbiter science and data-relay mission / looking for trace gases on Mars

    NASA Astrophysics Data System (ADS)

    Fratacci, Olivier

    EXOMARS Orbiter Module: looking for trace gas on Mars and providing data relay support for future Mars Surface assets O.Fratacci, M.Mesrine, H.Renault, Thales Alenia Space France B.Musetti, M.Montagna, Thales Alenia Space Italy M.Kesselmann, M.Barczewski OHB P.Mitschdoerfer, D.Dellantonio Euro-pean Space Agency / ESTEC The European Space Agency (ESA) in a joint cooperation with NASA, will launch in 2016 the EXOMARS spacecraft composite to develop European landing technologies and provide a science orbiter with data-relay capability around Mars until end 2022. The spacecraft composite is composed of the Orbitr Module (OM), provided by TAS-France, an entry descent and landing demonstrator module (EDM) provided by TAS-Italy, and a set of six scientific payloads to be selected by the JPL during 2010. Recent observations of the planet Mars have indicated detection of methane as well as temporal, perhaps spatial variability in the detected signal while current photochemical models cannot explain the presence of methane in the atmosphere of Mars nor its reported rapid variations in space and time. The triple scientific objectives that drive the selection of these six instruments for the Exomars 2016 mission is to detect trace gases in Mars atmosphere, to characterise their spatial and temporal variation and to explore the source of the key trace gases (e.g. methane) on the surface. The launch is scheduled in January 2016 from Kennedy Space Center (KSC) using an ATLAS V 421 launcher with a total launch mass of 4.4 tons. After release of the EDM on Mars, the OM will perform the Mars Orbit Insertion manoeuvre and then reduce its elliptic orbit by implementing the first European Aerobraking around Mars for about 6 to 9 months, to finally end on a circular 400x400km orbit with an altitude in the range of 350km to 420km. From this orbit, a science phase will follow lasting 2 years in which the Mars atmosphere and surface is continuously observed. Science instruments composed of

  17. Use of outcomes to evaluate surveillance systems for bioterrorist attacks

    PubMed Central

    2010-01-01

    Background Syndromic surveillance systems can potentially be used to detect a bioterrorist attack earlier than traditional surveillance, by virtue of their near real-time analysis of relevant data. Receiver operator characteristic (ROC) curve analysis using the area under the curve (AUC) as a comparison metric has been recommended as a practical evaluation tool for syndromic surveillance systems, yet traditional ROC curves do not account for timeliness of detection or subsequent time-dependent health outcomes. Methods Using a decision-analytic approach, we predicted outcomes, measured in lives, quality adjusted life years (QALYs), and costs, for a series of simulated bioterrorist attacks. We then evaluated seven detection algorithms applied to syndromic surveillance data using outcomes-weighted ROC curves compared to simple ROC curves and timeliness-weighted ROC curves. We performed sensitivity analyses by varying the model inputs between best and worst case scenarios and by applying different methods of AUC calculation. Results The decision analytic model results indicate that if a surveillance system was successful in detecting an attack, and measures were immediately taken to deliver treatment to the population, the lives, QALYs and dollars lost could be reduced considerably. The ROC curve analysis shows that the incorporation of outcomes into the evaluation metric has an important effect on the apparent performance of the surveillance systems. The relative order of performance is also heavily dependent on the choice of AUC calculation method. Conclusions This study demonstrates the importance of accounting for mortality, morbidity and costs in the evaluation of syndromic surveillance systems. Incorporating these outcomes into the ROC curve analysis allows for more accurate identification of the optimal method for signaling a possible bioterrorist attack. In addition, the parameters used to construct an ROC curve should be given careful consideration. PMID

  18. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  19. Optical design of the Post Focal Relay of MAORY

    NASA Astrophysics Data System (ADS)

    Lombini, M.; Diolaiti, E.

    The Multi Conjugate Adaptive Optics Relay (MAORY) for the European Extremely Large Telescope shall re-image the telescope focal plane for the client instruments installed on two exit ports. By means of natural and artificial (laser) reference sources for wavefront sensing, and of deformable mirrors for wavefront correction, MAORY shall be able to compensate the wavefront disturbances affecting the scientific observations, achieving high Strehl ratio and high sky coverage. The optical interfaces to the client instruments must replicate the telescope one while the volume allocation on the Nasmyth platform is under definition at the moment of this writing. We show the latest version of the optical design that matches the current requests and its optical performance. The laser guide stars channel, separated from the science path by means of a dichroic beam-splitter, is also presented.

  20. GSFC network operations with Tracking and Data Relay Satellites

    NASA Technical Reports Server (NTRS)

    Spearing, R.; Perreten, D. E.

    1984-01-01

    The Tracking and Data Relay Satellite System (TDRSS) Network (TN) has been developed to provide services to all NASA User spacecraft in near-earth orbits. Three inter-relating entities will provide these services. The TN has been transformed from a network continuously changing to meet User specific requirements to a network which is flexible to meet future needs without significant changes in operational concepts. Attention is given to the evolution of the TN network, the TN capabilities-space segment, forward link services, tracking services, return link services, the three basic capabilities, single access services, multiple access services, simulation services, the White Sands Ground Terminal, the NASA communications network, and the network control center.

  1. An airborne meteorological data collection system using satellite relay (ASDAR)

    NASA Technical Reports Server (NTRS)

    Bagwell, J. W.; Lindow, B. G.

    1978-01-01

    The National Aeronautics and Space Administration (NASA) has developed an airborne data acquisition and communication system for the National Oceanic and Atmospheric Administration (NOAA). This system known as ASDAR, the Aircraft to Satellite Data Relay, consists of a microprocessor based controller, time clock, transmitter and antenna. Together they acquire meteorological and position information from existing aircraft systems on B-747 aircraft, convert and format these, and transmit them to the ground via the GOES meteorological satellite series. The development and application of the ASDAR system is described with emphasis on unique features. Performance to date is exceptional, providing horizon-to-horizon coverage of aircraft flights. The data collected is of high quality and is considered a valuable addition to the data base from which NOAA generates its weather forecasts.

  2. Experimental service of 3DTV broadcasting relay in Korea

    NASA Astrophysics Data System (ADS)

    Hur, Namho; Ahn, Chung-Hyun; Ahn, Chieteuk

    2002-11-01

    This paper introduces 3D HDTV relay broadcasting experiments of 2002 FIFA World Cup Korea/Japan using a terrestrial and satellite network. We have developed 3D HDTV cameras, 3D HDTV video multiplexer/demultiplexer, a 3D HDTV receiver, and a 3D HDTV OB van for field productions. By using a terrestrial and satellite network, we distributed a compressed 3D HDTV signal to predetermined demonstration venues which are approved by host broadcast services (HBS), KirchMedia, and FIFA. In this case, we transmitted a 40Mbps MPEG-2 transport stream (DVB-ASI) over a DS-3 network specified in ITU-T Rec. G.703. The video/audio compression formats are MPEG-2 main-profile, high-level and Dolby Digital AC-3 respectively. Then at venues, the recovered left and right images by the 3D HDTV receiver are displayed on a screen with polarized beam projectors.

  3. The mammillary bodies and memory: more than a hippocampal relay

    PubMed Central

    Vann, Seralynne D.; Nelson, Andrew J.D.

    2015-01-01

    Although the mammillary bodies were one of the first neural structures to be implicated in memory, it has long been assumed that their main function was to act primarily as a hippocampal relay, passing information on to the anterior thalamic nuclei and from there to the cingulate cortex. This view not only afforded the mammillary bodies no independent role in memory, it also neglected the potential significance of other, nonhippocampal, inputs to the mammillary bodies. Recent advances have transformed the picture, revealing that projections from the tegmental nuclei of Gudden, and not the hippocampal formation, are critical for sustaining mammillary body function. By uncovering a role for the mammillary bodies that is independent of its subicular inputs, this work signals the need to consider a wider network of structures that form the neural bases of episodic memory. PMID:26072239

  4. The design and evaluation of grazing incidence relay optics

    NASA Technical Reports Server (NTRS)

    Davis, John M.; Chase, R. C.; Silk, J. K.; Krieger, A. S.

    1989-01-01

    X-ray astronomy, both solar and celestial, has many needs for high spatial resolution observations which have to be performed with electronic detectors. If the resolution is not to be detector limited, plate scales in excess of 25 microns arc/sec, corresponding to focal lengths greater than 5 m, are required. In situations where the physical size is restricted, the problem can be solved by the use of grazing incidence relay optics. A system was developed which employs externally polished hyperboloid-hyperboloid surfaces to be used in conjunction with a Wolter-Schwarzschild primary. The secondary is located in front of the primary focus and provides a magnification of 4, while the system has a plate scale of 28 microns arc/sec and a length of 1.9 m. The design, tolerance specification, fabrication and performance at visible and X-ray wavelengths of this optical system are described.

  5. Tensile-stressed microelectromechanical apparatus and microelectromechanical relay formed therefrom

    DOEpatents

    Fleming, James G.

    2008-03-04

    A microelectromechanical (MEM) apparatus is disclosed which includes a shuttle suspended above a substrate by two or more sets of tensile-stressed beams which are operatively connected to the shuttle and which can comprise tungsten or a silicon nitride/polysilicon composite structure. Initially, the tensile stress in each set of beams is balanced. However, the tensile stress can be unbalanced by heating one or more of the sets of beams; and this can be used to move the shuttle over a distance of up to several tens of microns. The MEM apparatus can be used to form a MEM relay having relatively high contact and opening forces, and with or without a latching capability.

  6. Quinones as Reversible Electron Relays in Artificial Photosynthesis.

    PubMed

    Rodenberg, Alexander; Orazietti, Margherita; Mosberger, Mathias; Bachmann, Cyril; Probst, Benjamin; Alberto, Roger; Hamm, Peter

    2016-05-01

    We explore the potential of various hydroquinone/quinone redox couples as electron relays in a homogenous water reduction system between a Re-based photosensitizer and a sacrificial electron donor [tris-(2-carboxyethyl)-phosphine, TCEP]. By using transient IR spectroscopy, flash photolysis as well as stopped-flow techniques covering timescales from picoseconds to 100 ms, we determine quenching rates and cage escape yields, the kinetics of the follow-up chemistry of the semiquinone, the recombination rates, as well as the re-reduction rates by TCEP. The overall quantum yield of hydrogen production is low, and we show that the limiting factors are the small cage escape yields and, more importantly, the slow regeneration rate by TCEP in comparison to the undesired charge recombination with the reduced water reduction catalyst.

  7. Long distance quantum teleportation in a quantum relay configuration.

    PubMed

    de Riedmatten, H; Marcikic, I; Tittel, W; Zbinden, H; Collins, D; Gisin, N

    2004-01-30

    A long distance quantum teleportation experiment with a fiber-delayed Bell state measurement (BSM) is reported. The source creating the qubits to be teleported and the source creating the necessary entangled state are connected to the beam splitter realizing the BSM by two 2 km long optical fibers. In addition, the teleported qubits are analyzed after 2.2 km of optical fiber, in another laboratory separated by 55 m. Time-bin qubits carried by photons at 1310 nm are teleported onto photons at 1550 nm. The fidelity is of 77%, above the maximal value obtainable without entanglement. This is the first realization of an elementary quantum relay over significant distances, which will allow an increase in the range of quantum communication and quantum key distribution.

  8. Relay telescope for high power laser alignment system

    DOEpatents

    Dane, C. Brent; Hackel, Lloyd; Harris, Fritz B.

    2006-09-19

    A laser system includes an optical path having an intracavity relay telescope with a telescope focal point for imaging an output of the gain medium between an image location at or near the gain medium and an image location at or near an output coupler for the laser system. A kinematic mount is provided within a vacuum chamber, and adapted to secure beam baffles near the telescope focal point. An access port on the vacuum chamber is adapted for allowing insertion and removal of the beam baffles. A first baffle formed using an alignment pinhole aperture is used during alignment of the laser system. A second tapered baffle replaces the alignment aperture during operation and acts as a far-field baffle in which off angle beams strike the baffle a grazing angle of incidence, reducing fluence levels at the impact areas.

  9. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  10. Second-generation watermarking scheme against geometric attacks

    NASA Astrophysics Data System (ADS)

    Ji, Zhen; Xiao, Weiwei; Zhang, Jihong

    2003-01-01

    In this paper, a scheme which following the second generation watermarking paradigm is proposed. The goal of this proposed scheme is basically to increase the robustness against geometric attacks. The host image is decomposed with the wavelet packet. The bit stream of binary watermark is coded into several patterns with salient feature. The circular feature is used in this paper, because: (a) the computational complexity of the method grows rapidly with more complex shapes. (b) circle is rotation-invariant and partially scale-invariant. (c) circular feature can be detected by Hough transform effectively. These patterns are embedded into wavelet packet coefficients according to human perceptual characteristics. A new HVS mask based on wavelet transform is proposed with consideration of local texture characteristics. The introduction of HVS characteristics boosts the performance of the whole scheme. For the detection of watermark, the geometric distortion is calibrated for the contaminated watermarked image. Hough transform is used to detect the circular features in the WP Coefficients. This scheme has the following characteristics: (a) robustness against the common geometric attacks(rotation, scaling, cropping, and etc) is improved significantly. (b) human perceptual characteristics is taken into consideration, so the tradeoff between invisibility and robustness is improved. Results of extensive experiments indicate that this proposed scheme is significantly effective in resisting various geometric attacks such as rotation, scaling, JPEG compression, adding noise, etc.

  11. Cued Panic Attacks in Body Dysmorphic Disorder

    PubMed Central

    Phillips, Katharine A.; Menard, William; Bjornsson, Andri S.

    2013-01-01

    Background Body dysmorphic disorder (BDD) is a common and often severe disorder. Clinical observations suggest that panic attacks triggered by BDD symptoms may be common. However, to our knowledge, no study has examined such panic attacks in BDD. We investigated the prevalence, clinical features, and correlates of BDD-triggered panic attacks in individuals with this disorder. Methods Panic attacks and other variables were assessed using reliable and valid measures in 76 individuals with lifetime DSM-IV BDD. Results 28.9% (95% CI, 18.5%–39.4%) of participants reported lifetime panic attacks triggered by BDD symptoms. The most common triggers of such attacks were feeling that others were looking at or scrutinizing the perceived appearance defects (61.9%), looking in the mirror at perceived defects (38.1%), and being in bright light where perceived defects would be more visible (23.8%). The most common panic attack symptoms were palpitations (86.4%), sweating (66.7%), shortness of breath (63.6%), trembling or shaking (63.6%), and fear of losing control or going crazy (63.6%). Compared to participants without such panic attacks, those with BDD-triggered panic attacks had more severe lifetime BDD, social anxiety, and depressive symptoms, as well as poorer functioning and quality of life on a number of measures. They were also less likely to be employed and more likely to have been psychiatrically hospitalized and to have had suicidal ideation due to BDD. Conclusions Panic attacks triggered by BDD-related situations appear common in individuals with this disorder. BDD-triggered panic attacks were associated with greater symptom severity and morbidity. PMID:23653076

  12. Attack Coverage in High-Level Men’s Volleyball: Organization on the Edge of Chaos?

    PubMed Central

    Laporta, Lorenzo; Nikolaidis, Pantelis; Thomas, Luke; Afonso, José

    2015-01-01

    Change is pervasive, but emerging patterns are occasionally detectable through analysis of systemic behaviors. Match analysis uses these patterns in order to reduce the degree of improvisation and to optimize the training process. However, it is possible that certain game phases elude systematic patterning. In this vein, our aim was to analyze the case of attack coverage in men’s volleyball, as we suspected it would elude systematic patterning and has received negligible attention in scientific research. We analyzed the occurrence of attack coverage in 4544 plays of the 2011 Volleyball World League. A Chi-square test with residual adjusted values was applied to explore significant associations between variables. A Monte Carlo correction was applied, as some cells had n<5. Effect sizes were determined using Cramer’s V. Overall, attack coverage occurred in 3.89% of ball possessions, and 23 distinct structures emerged. These structures lacked significant associations with the game complex, setting zone, and effect of attack coverage. Conversely, attack coverage structures showed significant associations with the attack zone and tempo, with very strong effect sizes (V=0.472 and V=0.521, respectively). As certain attack zones are deeply associated with attack tempo, it is apparent that quicker attack plays affect attack coverage structuring, promoting the formation of less complex structures. Ultimately, attack coverage structures seem to depend on momentary constraints, thereby rendering rigid systematization impracticable. Still, we contended that a principle-based approach might be suitable. This invites researchers to rethink how to interpret game regularities. PMID:26557208

  13. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility.

    PubMed

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-01

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination's home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination's home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609

  14. The Relay/Converter Interface Influences Hydrolysis of ATP by Skeletal Muscle Myosin II.

    PubMed

    Bloemink, Marieke J; Melkani, Girish C; Bernstein, Sanford I; Geeves, Michael A

    2016-01-22

    The interface between relay and converter domain of muscle myosin is critical for optimal myosin performance. Using Drosophila melanogaster indirect flight muscle S1, we performed a kinetic analysis of the effect of mutations in the converter and relay domain. Introduction of a mutation (R759E) in the converter domain inhibits the steady-state ATPase of myosin S1, whereas an additional mutation in the relay domain (N509K) is able to restore the ATPase toward wild-type values. The R759E S1 construct showed little effect on most steps of the actomyosin ATPase cycle. The exception was a 25-30% reduction in the rate constant of the hydrolysis step, the step coupled to the cross-bridge recovery stroke that involves a change in conformation at the relay/converter domain interface. Significantly, the double mutant restored the hydrolysis step to values similar to the wild-type myosin. Modeling the relay/converter interface suggests a possible interaction between converter residue 759 and relay residue 509 in the actin-detached conformation, which is lost in R759E but is restored in N509K/R759E. This detailed kinetic analysis of Drosophila myosin carrying the R759E mutation shows that the interface between the relay loop and converter domain is important for fine-tuning myosin kinetics, in particular ATP binding and hydrolysis.

  15. Cell speed, persistence and information transmission during signal relay and collective migration.

    PubMed

    McCann, Colin P; Kriebel, Paul W; Parent, Carole A; Losert, Wolfgang

    2010-05-15

    Collective migration is a key feature of the social amoebae Dictyostelium discoideum, where the binding of chemoattractants leads to the production and secretion of additional chemoattractant and the relay of the signal to neighboring cells. This then guides cells to migrate collectively in a head-to-tail fashion. We used mutants that were defective in signal relay to elucidate which quantitative metrics of cell migration are most strongly affected by signal relay and collective motion. We show that neither signal relay nor collective motion markedly impact the speed of cell migration. Cells maintained a preferred overall direction of motion for several minutes with similar persistence, regardless of whether or not they were attracted to moving neighbors, moving collectively in contact with their neighbors, or simply following a fixed exogenous signal. We quantitatively establish that signal relay not only increases the number of cells that respond to a chemotactic signal, but most remarkably, also transmits information about the location of the source accurately over large distances, independently of the strength of the exogenous signal. We envision that signal relay has a similar key role in the migration of a variety of chemotaxing mammalian cells that can relay chemoattractant signals. PMID:20427323

  16. Wireless Relay Selection in Pocket Switched Networks Based on Spatial Regularity of Human Mobility †

    PubMed Central

    Huang, Jianhui; Cheng, Xiuzhen; Bi, Jingping; Chen, Biao

    2016-01-01

    Pocket switched networks (PSNs) take advantage of human mobility to deliver data. Investigations on real-world trace data indicate that human mobility shows an obvious spatial regularity: a human being usually visits a few places at high frequencies. These most frequently visited places form the home of a node, which is exploited in this paper to design two HomE based Relay selectiOn (HERO) algorithms. Both algorithms input single data copy into the network at any time. In the basic HERO, only the first node encountered by the source and whose home overlaps a destination’s home is selected as a relay while the enhanced HERO keeps finding more optimal relay that visits the destination’s home with higher probability. The two proposed algorithms only require the relays to exchange the information of their home and/or the visiting frequencies to their home when two nodes meet. As a result, the information update is reduced and there is no global status information that needs to be maintained. This causes light loads on relays because of the low communication cost and storage requirements. Additionally, only simple operations are needed in the two proposed algorithms, resulting in little computation overhead at relays. At last, a theoretical analysis is performed on some key metrics and then the real-world based simulations indicate that the two HERO algorithms are efficient and effective through employing only one or a few relays. PMID:26797609

  17. On the Performance of Multiple Relay Zero-Forcing Precoding Based on Limited Feedback

    NASA Astrophysics Data System (ADS)

    Zeng, Erlin; Zhu, Shihua; Xu, Ming; Feng, Zhenjie

    Recently, it has been shown in the literature that in a relaying network utilizing multiple relay precoding techniques, the signal-to-noise ratio (SNR) at each destination node will scale linearly with the number of relays K, which is referred to as the distributed array gain (DAG) K. In this paper, we focus on the performance of multiple relay precoding based on limited channel state information (CSI) feedback, which is different from the prior studies that assume perfect CSI at each of the relay nodes. Our analysis shows that the conventional limited feedback scheme fails to obtain the DAG K, which is a consequence of the phase ambiguity introduced by the channel quantization function. Based on the theoretical analysis, we propose a novel feedback and precoding procedure, and prove that the proposed procedure can obtain the DAG K with only one additional feedback bit for quantizing each relay-destination channel compared with the conventional scheme. Simulation results verify that with the proposed procedure, the SNR performance is effectively improved when the number of relays K is small, and scales linearly with K in relatively large K regime.

  18. Summary of Static power converters of 500 kW or less serving as the relay interface package for non-conventional generators''

    SciTech Connect

    Ball, G.J.; Blackburn, D.C. Jr.; Gish, W.

    1994-07-01

    The special publication was prepared by the Power System Relaying Committee of the IEEE to assist people involved in the installation, application, and operation of utility-interconnected dispersed storage and generation (DSG) systems of 500 kW or less. The energy sources considered are batteries, fuel cells, windmills and photovoltaic arrays. In most cases, the electrical energy produced is direct current, dc, which must be converted to alternating current, ac, for connection to the electric utility network. The interface between the dc source and the utility ac is often a static power converter (SPC). The purpose of the publication is to illustrate those SPC characteristics that can obviate the need for the interface relay protection package normally required by a utility. A qualifying SPC can detect utility system disturbances or other conditions that would require generator separation in addition to its normal function of protection and control of the DSG.

  19. The cost of attack in competing networks.

    PubMed

    Podobnik, B; Horvatic, D; Lipic, T; Perc, M; Buldú, J M; Stanley, H E

    2015-11-01

    Real-world attacks can be interpreted as the result of competitive interactions between networks, ranging from predator-prey networks to networks of countries under economic sanctions. Although the purpose of an attack is to damage a target network, it also curtails the ability of the attacker, which must choose the duration and magnitude of an attack to avoid negative impacts on its own functioning. Nevertheless, despite the large number of studies on interconnected networks, the consequences of initiating an attack have never been studied. Here, we address this issue by introducing a model of network competition where a resilient network is willing to partially weaken its own resilience in order to more severely damage a less resilient competitor. The attacking network can take over the competitor's nodes after their long inactivity. However, owing to a feedback mechanism the takeovers weaken the resilience of the attacking network. We define a conservation law that relates the feedback mechanism to the resilience dynamics for two competing networks. Within this formalism, we determine the cost and optimal duration of an attack, allowing a network to evaluate the risk of initiating hostilities. PMID:26490628

  20. 47 CFR 76.1612 - Personal attack.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting...

  1. A relay strategy for the mercury (II) chemodosimeter with ultra-sensitivity as test strips

    PubMed Central

    Ruan, Zhijun; Li, Conggang; Li, Jian-Rong; Qin, Jingui; Li, Zhen

    2015-01-01

    A relay strategy has been proposed to design a new Hg2+ chemodosimeter (TPE-S), by coupling Hg2+-promoted deprotection reaction with ketone-enol isomerization, realizing the multistage amplifying effect. Changes in both of color and fluorescence could occur immediately, and TPE-S displayed high selectivity for Hg2+, other metal ions (Ag+, Fe3+, Cu2+, Pb2+, Co2+, Cr3+, Al3+, Cd2+, Mg2+, Mn2+, Ba2+, Fe2+, Ca2+, Ni2+, Zn2+, Li+, K+ and Na+) gave nearly no disturbance to the sensing process. When fabricated as test strips similar to pH-indicator papers, immediate color change from colorless to purple could be visually observed by naked-eyes without the aid of any additional equipment, with the detection limit as low as 1 × 10−7 M (Hg2+ in aqueous solution). Due to its easy synthesis, high selectivity and sensitivity, combined with the portable test strips, TPE-S could be developed as a convenient and cost-effective tool for the detection of Hg2+ in on-site inspections. PMID:26541941

  2. A relay strategy for the mercury (II) chemodosimeter with ultra-sensitivity as test strips

    NASA Astrophysics Data System (ADS)

    Ruan, Zhijun; Li, Conggang; Li, Jian-Rong; Qin, Jingui; Li, Zhen

    2015-11-01

    A relay strategy has been proposed to design a new Hg2+ chemodosimeter (TPE-S), by coupling Hg2+-promoted deprotection reaction with ketone-enol isomerization, realizing the multistage amplifying effect. Changes in both of color and fluorescence could occur immediately, and TPE-S displayed high selectivity for Hg2+, other metal ions (Ag+, Fe3+, Cu2+, Pb2+, Co2+, Cr3+, Al3+, Cd2+, Mg2+, Mn2+, Ba2+, Fe2+, Ca2+, Ni2+, Zn2+, Li+, K+ and Na+) gave nearly no disturbance to the sensing process. When fabricated as test strips similar to pH-indicator papers, immediate color change from colorless to purple could be visually observed by naked-eyes without the aid of any additional equipment, with the detection limit as low as 1 × 10-7 M (Hg2+ in aqueous solution). Due to its easy synthesis, high selectivity and sensitivity, combined with the portable test strips, TPE-S could be developed as a convenient and cost-effective tool for the detection of Hg2+ in on-site inspections.

  3. Combating Memory Corruption Attacks On Scada Devices

    NASA Astrophysics Data System (ADS)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Innovation Relay: Empowering School Nurses to Find New Solutions for Old Problems.

    PubMed

    Maughan, Erin D; Galemore, Cynthia; Mattey, Beth

    2016-09-01

    NASN's 48th Annual School Nurse Conference-Learning, Linking, Leading-included the first ever innovation relay contest. The relay was based on a design developed by the Institute of Healthcare Improvement's Innovation Relay. Participation included 43 contestants from 16 states and one foreign country. Teams were given 24 hours to develop a solution. This article describes the process utilized, the problem introduced, and a brief synopsis of each team's solution. The ongoing purpose of the exercise is to encourage innovation by school nurses as they experience student health-related barriers in the academic setting.

  5. Counter-Measures for Relay Failures due to Dynamic Welding: A Robust Engineering Design

    NASA Astrophysics Data System (ADS)

    Schoepf, Thomas J.

    In prior work, contact welding phenomena were observed in automotive relays during break of motor inrush current. The switching performance of the type of relay investigated could be correlated with the parameters: over-travel, coil suppression, and the break current. In the present work the author further explores the impact of both the contact material (silver tin oxide versus fine grain silver) and the contact surface topography (brand new and pre-aged contacts). He further assesses the robustness of the system “relay” with those parameters using the Taguchi methods for robust design. Furthermore, the robustness of two alternative automotive relay types will be discussed.

  6. Polarization shift keying based relay-assisted free space optical communication over strong turbulence with misalignment

    NASA Astrophysics Data System (ADS)

    Prabu, K.; Sriram Kumar, D.

    2016-01-01

    This paper investigates the outage performance of polarization shift keying (PolSK) based multihop parallel relay assisted free space optics (FSO) system over a strong atmospheric turbulence channel with misalignment fading. An exact closed form expression is derived for the end-to-end outage probability of the system. The results are compared with the direct transmission and on-off keying (OOK) based FSO systems. The results indicate that the performance of the PolSK based relay-assisted FSO system is much better than the direct transmission and OOK systems. The outage performance is enhanced by increasing the number of relay path between the transmitter and receiver.

  7. Evaluation of vacuum relays for multi-hundred volt switching applications

    NASA Astrophysics Data System (ADS)

    Larose, A. R.; Dowlet, B. A.

    Twenty-one ITT Jennings RF 4B-26S latching vacuum relays were repetitively operated both with and without arc suppression circuitry in tests simulating high voltage power distribution applications and regulator applications in spacecraft. The simulations covered the 110-170V, 11-15A range for power distribution and the 180-400V, 5-12A range for regulator applications. One relay failed during unsnubbered operation after 45,000 regulator application switching events. The remaining twenty vacuum relays completed the testing schedule successfully.

  8. Innovation Relay: Empowering School Nurses to Find New Solutions for Old Problems.

    PubMed

    Maughan, Erin D; Galemore, Cynthia; Mattey, Beth

    2016-09-01

    NASN's 48th Annual School Nurse Conference-Learning, Linking, Leading-included the first ever innovation relay contest. The relay was based on a design developed by the Institute of Healthcare Improvement's Innovation Relay. Participation included 43 contestants from 16 states and one foreign country. Teams were given 24 hours to develop a solution. This article describes the process utilized, the problem introduced, and a brief synopsis of each team's solution. The ongoing purpose of the exercise is to encourage innovation by school nurses as they experience student health-related barriers in the academic setting. PMID:27520983

  9. An Network Attack Modeling Method Based on MLL-AT

    NASA Astrophysics Data System (ADS)

    Fen, Yan; Xinchun, Yin; Hao, Huang

    In this paper, the method of modeling attack using attack tree is researched. The main goal is effectively using attack tree to model and express multi-stage network attacks. We expand and improve the traditional attack tree. The attack nodes in traditional attack tree are redefined, and the attack risk of leaf node is quantified. On those basis, the mentality and method of building MLL-AT (Multi-Level & Layer Attack Tree) are proposed. The improved attack tree can model attack more accurately, in particular to multi-stage network attacks. And the new model can also be used to evaluate system's risk, to distinguish between varying system security threat degrees caused by different attack sequences.

  10. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    PubMed Central

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  11. Hill-Climbing Attacks and Robust Online Signature Verification Algorithm against Hill-Climbing Attacks

    NASA Astrophysics Data System (ADS)

    Muramatsu, Daigo

    Attacks using hill-climbing methods have been reported as a vulnerability of biometric authentication systems. In this paper, we propose a robust online signature verification algorithm against such attacks. Specifically, the attack considered in this paper is a hill-climbing forged data attack. Artificial forgeries are generated offline by using the hill-climbing method, and the forgeries are input to a target system to be attacked. In this paper, we analyze the menace of hill-climbing forged data attacks using six types of hill-climbing forged data and propose a robust algorithm by incorporating the hill-climbing method into an online signature verification algorithm. Experiments to evaluate the proposed system were performed using a public online signature database. The proposed algorithm showed improved performance against this kind of attack.

  12. Adaptive cyber-attack modeling system

    NASA Astrophysics Data System (ADS)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  13. Protecting complex infrastructures against multiple strategic attackers

    NASA Astrophysics Data System (ADS)

    Hausken, Kjell

    2011-01-01

    Infrastructures are analysed subject to defence by a strategic defender and attack by multiple strategic attackers. A framework is developed where each agent determines how much to invest in defending versus attacking each of multiple targets. A target can have economic, human and symbolic values, which generally vary across agents. Investment expenditure functions for each agent can be linear in the investment effort, concave, convex, logistic, can increase incrementally, or can be subject to budget constraints. Contest success functions (e.g., ratio and difference forms) determine the probability of a successful attack on each target, dependent on the relative investments of the defender and attackers on each target, and on characteristics of the contest. Targets can be in parallel, in series, interlinked, interdependent or independent. The defender minimises the expected damage plus the defence expenditures. Each attacker maximises the expected damage minus the attack expenditures. The number of free choice variables equals the number of agents times the number of targets, or lower if there are budget constraints. Each agent is interested in how his investments vary across the targets, and the impact on his utilities. Alternative optimisation programmes are discussed, together with repeated games, dynamic games and incomplete information. An example is provided for illustration.

  14. Double- and relay-cropping oilseed and biomass crops for sustainable energy production

    Technology Transfer Automated Retrieval System (TEKTRAN)

    Economically and environmentally sustainable bioenergy production requires strategic integration of biofuel crops into modern cropping systems. Double- and relay-cropping can offer a means of increasing production efficiency to boost profits and provide environmental benefits through crop diversific...

  15. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... THE INSTALLATION, INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  16. The Role of Remotely Sensed and Relayed Data in the Delaware River Basin

    NASA Technical Reports Server (NTRS)

    Paulson, R. W.

    1971-01-01

    The planned integration of the existing water quality monitoring and data processing systems in the Delaware River Basin with a data relay experiment proposed for the ERTS-1 is discussed. The experiment is designed to use ERTS-1 as a data relay link for a maximum of 20 hydrologic stations in the basin, including stream gaging, reservoir level, ground water level, and water quality monitoring stations. This experiment has the potential for reducing the time lag between data collection and dissemination to less than 12 hours. The experiment will also provide impetus to develop an operational system of real time data processing and dissemination to handle the large quantity of data that will be obtained from the stations in the basin. The results of this experiment will demonstrate the relative merits of satellite relay of data versus conventional means of data telemetry and will provide a basis for the development of operational satellite relay of hydrologic data.

  17. Scheduler software for tracking and data relay satellite system loading analysis: User manual and programmer guide

    NASA Technical Reports Server (NTRS)

    Craft, R.; Dunn, C.; Mccord, J.; Simeone, L.

    1980-01-01

    A user guide and programmer documentation is provided for a system of PRIME 400 minicomputer programs. The system was designed to support loading analyses on the Tracking Data Relay Satellite System (TDRSS). The system is a scheduler for various types of data relays (including tape recorder dumps and real time relays) from orbiting payloads to the TDRSS. Several model options are available to statistically generate data relay requirements. TDRSS time lines (representing resources available for scheduling) and payload/TDRSS acquisition and loss of sight time lines are input to the scheduler from disk. Tabulated output from the interactive system includes a summary of the scheduler activities over time intervals specified by the user and overall summary of scheduler input and output information. A history file, which records every event generated by the scheduler, is written to disk to allow further scheduling on remaining resources and to provide data for graphic displays or additional statistical analysis.

  18. G.E. SLATE SWITCHBOARD WITH RELAYS IN GLINES POWERHOUSE. ALSO NOTE ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    G.E. SLATE SWITCHBOARD WITH RELAYS IN GLINES POWERHOUSE. ALSO NOTE 1926 PHONE BOOTH (STILL IN OPERATION). PHOTO BY JET LOWE, HAER, 1995. - Elwha River Hydroelectric System, Glines Hydroelectric Dam & Plant, Port Angeles, Clallam County, WA

  19. Multi-Path Relay Selection Algorithm Based on the Broadcast TV

    NASA Astrophysics Data System (ADS)

    Zhang, Chaoyi; Luan, Linlin; Wu, Muqing

    This paper presents a relay selection method for Broadcast TV services. This method get through the node's time-delay and power information, obtain the value of the system interrupt as to be a decision threshold, then chose the relay node. At the same time this paper proposes an optimal relay selection strategy which can minimize the system interrupt probability combination with power distribution--Multi-Path Relay Routing Protocol. This protocol can dynamically change the appropriate route according to the shifty network. Simulation results show that the protocol can extend the coverage area, reducing time-delay and increase system throughput, improve system spectral efficiency, and enhance the Qos of the Broadcast TV service.

  20. All-optical time-delay relay based on a bacteriorhodopsin film.

    PubMed

    Chen, Guiying; Yuan, Yizhe; Zhang, Chunping; Yang, Guan; Tian, Jian Guo; Xu, Tang; Song, Q W

    2006-05-15

    Using the property of dynamic complementary suppression modulated transmission of bacteriorhodopsin film, we propose and demonstrate an all-optical time-delay relay in an incoherent light system. The relay can last for a certain amount of time after the switch function of turn off (or turn on) is activated. Furthermore, the delay time can be adjusted by changing the lifetime of the M state and the intensities of blue and yellow beams.

  1. Performance Analysis of Amplify-and-Forward Systems with Single Relay Selection in Correlated Environments

    PubMed Central

    Nguyen, Binh Van; Kim, Kiseon

    2016-01-01

    In this paper, we consider amplify-and-forward (AnF) cooperative systems under correlated fading environments. We first present a brief overview of existing works on the effect of channel correlations on the system performance. We then focus on our main contribution which is analyzing the outage probability of a multi-AnF-relay system with the best relay selection (BRS) scheme under a condition that two channels of each relay, source-relay and relay-destination channels, are correlated. Using lower and upper bounds on the end-to-end received signal-to-noise ratio (SNR) at the destination, we derive corresponding upper and lower bounds on the system outage probability. We prove that the system can achieve a diversity order (DO) equal to the number of relays. In addition, and importantly, we show that the considered correlation form has a constructive effect on the system performance. In other words, the larger the correlation coefficient, the better system performance. Our analytic results are corroborated by extensive Monte-Carlo simulations. PMID:27626426

  2. Mars Relay Operations Service (MaROS): A Present Service Preparing for the Future

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.

    2014-01-01

    The Mars Relay Operations Service (MaROS) has been deployed by NASA's Mars Program Office and the Multimission Ground Systems and Services (MGSS) Project into mission operations to aid in the coordination of relay activities at Mars. This live system presents standardized interfaces and a centralized infrastructure to current and future participants in the Mars Relay Network for the purpose of reliably and securely exchanging and storing all relay-related planning and operations data. The initial development of this system leveraged over eight years of experience performing relay operations between the various spacecraft at Mars. Now, four years after its initial deployment, MaROS continues to undergo further refinement to better meet the needs of the Mars Relay Network. The most substantial, recent update was focused on providing capabilities needed by the Mars Science Laboratory project, which landed on Mars in August of 2012. This paper will describe the nature of that update and describe additional features being added to the system to better serve the needs of current and future Mars missions.

  3. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks

    PubMed Central

    Nasir, Hina; Javaid, Nadeem; Sher, Muhammad; Qasim, Umar; Khan, Zahoor Ali; Alrajeh, Nabil; Niaz, Iftikhar Azim

    2016-01-01

    This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs); performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE) efficient depth based routing and Enhanced-ACE (E-ACE) are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ). E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment. PMID:27420061

  4. Performance Analysis of Amplify-and-Forward Systems with Single Relay Selection in Correlated Environments.

    PubMed

    Van Nguyen, Binh; Kim, Kiseon

    2016-01-01

    In this paper, we consider amplify-and-forward (AnF) cooperative systems under correlated fading environments. We first present a brief overview of existing works on the effect of channel correlations on the system performance. We then focus on our main contribution which is analyzing the outage probability of a multi-AnF-relay system with the best relay selection (BRS) scheme under a condition that two channels of each relay, source-relay and relay-destination channels, are correlated. Using lower and upper bounds on the end-to-end received signal-to-noise ratio (SNR) at the destination, we derive corresponding upper and lower bounds on the system outage probability. We prove that the system can achieve a diversity order (DO) equal to the number of relays. In addition, and importantly, we show that the considered correlation form has a constructive effect on the system performance. In other words, the larger the correlation coefficient, the better system performance. Our analytic results are corroborated by extensive Monte-Carlo simulations. PMID:27626426

  5. Structural dynamics of the myosin relay helix by time-resolved EPR and FRET

    PubMed Central

    Agafonov, Roman V.; Negrashov, Igor V.; Tkachev, Yaroslav V.; Blakely, Sarah E.; Titus, Margaret A.; Thomas, David D.; Nesmelov, Yuri E.

    2009-01-01

    We have used two complementary time-resolved spectroscopic techniques, dipolar electron–electron resonance and fluorescence resonance energy transfer to determine conformational changes in a single structural element of the myosin motor domain, the relay helix, before and after the recovery stroke. Two double-Cys mutants were labeled with optical probes or spin labels, and interprobe distances were determined. Both methods resolved two distinct structural states of myosin, corresponding to straight and bent conformations of the relay helix. The bent state was occupied only upon nucleotide addition, indicating that relay helix, like the entire myosin head, bends in the recovery stroke. However, saturation of myosin with nucleotide, producing a single biochemical state, did not produce a single structural state. Both straight and bent structural states of the relay helix were occupied when either ATP (ADP.BeFx) or ADP.Pi (ADP.AlF4) analogs were bound at the active site. A greater population was found in the bent structural state when the posthydrolysis analog ADP.AlF4 was bound. We conclude that the bending of the relay helix in the recovery stroke does not require ATP hydrolysis but is favored by it. A narrower interprobe distance distribution shows ordering of the relay helix, despite its bending, during the recovery stroke, providing further insight into the dynamics of this energy-transducing structural transition. PMID:19966224

  6. Exploiting Outage and Error Probability of Cooperative Incremental Relaying in Underwater Wireless Sensor Networks.

    PubMed

    Nasir, Hina; Javaid, Nadeem; Sher, Muhammad; Qasim, Umar; Khan, Zahoor Ali; Alrajeh, Nabil; Niaz, Iftikhar Azim

    2016-01-01

    This paper embeds a bi-fold contribution for Underwater Wireless Sensor Networks (UWSNs); performance analysis of incremental relaying in terms of outage and error probability, and based on the analysis proposition of two new cooperative routing protocols. Subject to the first contribution, a three step procedure is carried out; a system model is presented, the number of available relays are determined, and based on cooperative incremental retransmission methodology, closed-form expressions for outage and error probability are derived. Subject to the second contribution, Adaptive Cooperation in Energy (ACE) efficient depth based routing and Enhanced-ACE (E-ACE) are presented. In the proposed model, feedback mechanism indicates success or failure of data transmission. If direct transmission is successful, there is no need for relaying by cooperative relay nodes. In case of failure, all the available relays retransmit the data one by one till the desired signal quality is achieved at destination. Simulation results show that the ACE and E-ACE significantly improves network performance, i.e., throughput, when compared with other incremental relaying protocols like Cooperative Automatic Repeat reQuest (CARQ). E-ACE and ACE achieve 69% and 63% more throughput respectively as compared to CARQ in hard underwater environment. PMID:27420061

  7. a Distance Protection Strategic Spare Relay for 132/66 kv Overhead Lines

    NASA Astrophysics Data System (ADS)

    Harris, R. T.; Roberts, A. G.; Marks, A.; Phipps, W.

    2010-06-01

    The South African electrical supply utility (Eskom) has been experiencing problems in the field of protection, maintenance and in-service breakdowns which influence the quality of electrical supply to the consumer, an important and integral component of the utility business. As a result, further development of the generic relay, implemented as a strategic spare relay for the replacement of several schemes operating within Eskom's southern region has been initiated. These include the electromechanical, solid state and numerical distance protection relays and scheme failures on the 132/66 kV feeder network. The research considers the development, testing and configuration of the strategic spare relay in terms of software and peripheral hardware for the input and output terminal connections, generic equations and settings, for the purpose of scheme replacements. The various schemes are assessed for stepped distance and permissive intertripping for three and single pole operation. This is done in conjunction with the internal and external circuit diagrams to understand the detailed operation of the scheme and to ensure the effective implementation of the strategic spare relay. The generic relay is configured for the emergency replacement of the various schemes during in-service breakdowns. This constitutes a temporary installation and therefore the downtime of all the distance protection schemes that require replacement, is limited to a minimum.

  8. Enzyme structure captures four cysteines aligned for disulfide relay

    PubMed Central

    Gat, Yair; Vardi-Kilshtain, Alexandra; Grossman, Iris; Major, Dan Thomas; Fass, Deborah

    2014-01-01

    Thioredoxin superfamily proteins introduce disulfide bonds into substrates, catalyze the removal of disulfides, and operate in electron relays. These functions rely on one or more dithiol/disulfide exchange reactions. The flavoenzyme quiescin sulfhydryl oxidase (QSOX), a catalyst of disulfide bond formation with an interdomain electron transfer step in its catalytic cycle, provides a unique opportunity for exploring the structural environment of enzymatic dithiol/disulfide exchange. Wild-type Rattus norvegicus QSOX1 (RnQSOX1) was crystallized in a conformation that juxtaposes the two redox-active di-cysteine motifs in the enzyme, presenting the entire electron-transfer pathway and proton-transfer participants in their native configurations. As such a state cannot generally be enriched and stabilized for analysis, RnQSOX1 gives unprecedented insight into the functional group environments of the four cysteines involved in dithiol/disulfide exchange and provides the framework for analysis of the energetics of electron transfer in the presence of the bound flavin adenine dinucleotide cofactor. Hybrid quantum mechanics/molecular mechanics (QM/MM) free energy simulations based on the X-ray crystal structure suggest that formation of the interdomain disulfide intermediate is highly favorable and secures the flexible enzyme in a state from which further electron transfer via the flavin can occur. PMID:24888638

  9. Single-molecule spectroscopy exposes hidden states in an enzymatic electron relay

    PubMed Central

    Grossman, Iris; Yuval Aviram, Haim; Armony, Gad; Horovitz, Amnon; Hofmann, Hagen; Haran, Gilad; Fass, Deborah

    2015-01-01

    The ability to query enzyme molecules individually is transforming our view of catalytic mechanisms. Quiescin sulfhydryl oxidase (QSOX) is a multidomain catalyst of disulfide-bond formation that relays electrons from substrate cysteines through two redox-active sites to molecular oxygen. The chemical steps in electron transfer have been delineated, but the conformational changes accompanying these steps are poorly characterized. Here we use single-molecule Förster resonance energy transfer (smFRET) to probe QSOX conformation in resting and cycling enzyme populations. We report the discovery of unanticipated roles for conformational changes in QSOX beyond mediating electron transfer between redox-active sites. In particular, a state of the enzyme not previously postulated or experimentally detected is shown to gate, via a conformational transition, the entrance into a sub-cycle within an expanded QSOX kinetic scheme. By tightly constraining mechanistic models, smFRET data can reveal the coupling between conformational and chemical transitions in complex enzymatic cycles. PMID:26468675

  10. Thatcher condemns attacks on abortion mp.

    PubMed

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  11. Recovery of infrastructure networks after localised attacks

    NASA Astrophysics Data System (ADS)

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  12. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  13. Diabetes - preventing heart attack and stroke

    MedlinePlus

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  14. Identifying and Analyzing Web Server Attacks

    SciTech Connect

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  15. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  16. On localization attacks against cloud infrastructure

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  17. Correlations in complex networks under attack.

    PubMed

    Srivastava, Animesh; Mitra, Bivas; Ganguly, Niloy; Peruani, Fernando

    2012-09-01

    For any initially correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initially assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initially uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations. PMID:23030979

  18. Death by attack from a domestic buffalo.

    PubMed

    Bakkannavar, Shankar M; Monteiro, Francis N P; Bhagavath, Prashantha; Pradeep Kumar, G

    2010-02-01

    Attacks on humans by domestic animals causing fatal injuries are not uncommon in rural areas of India. But injuries due to buffalo gore are rarely observed in villages and are different from other casualties like stab injuries, road fatalities, etc. As the victims of buffalo attack are usually recovered from the fields or forest, the investigating officer could be mislead as to the nature of infliction of fatal injuries to a possible homicide. The injuries caused by the horns of buffaloes are of various shapes, sizes and directions. They are violent and goring in nature. The wound sustained may be contusions, lacerations, criss-cross wounds, penetration of body cavities, and sometimes fractures. In the absence of any eye witness, it becomes very difficult to believe the unsuspecting domestic water buffalo as attacker. This case is reported for its rarity, for the awareness of the possible injuries in such unnatural deaths, and factors predisposing to a buffalo attack.

  19. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  20. Heart Attack - Multiple Languages: MedlinePlus

    MedlinePlus

    ... Arabic) النوبة القلبية - العربية Bilingual PDF Health Information Translations Bosnian (Bosanski) Heart Attack Srčani udar - Bosanski (Bosnian) Bilingual PDF Health Information Translations Chinese - Simplified (简体中文) Heart Attack 心脏病发作 - 简体中文 (Chinese - ...

  1. Practical quantum private query with better performance in resisting joint-measurement attack

    NASA Astrophysics Data System (ADS)

    Wei, Chun-Yan; Wang, Tian-Yin; Gao, Fei

    2016-04-01

    As a kind of practical protocol, quantum-key-distribution (QKD)-based quantum private queries (QPQs) have drawn lots of attention. However, joint-measurement (JM) attack poses a noticeable threat to the database security in such protocols. That is, by JM attack a malicious user can illegally elicit many more items from the database than the average amount an honest one can obtain. Taking Jacobi et al.'s protocol as an example, by JM attack a malicious user can obtain as many as 500 bits, instead of the expected 2.44 bits, from a 104-bit database in one query. It is a noticeable security flaw in theory, and would also arise in application with the development of quantum memories. To solve this problem, we propose a QPQ protocol based on a two-way QKD scheme, which behaves much better in resisting JM attack. Concretely, the user Alice cannot get more database items by conducting JM attack on the qubits because she has to send them back to Bob (the database holder) before knowing which of them should be jointly measured. Furthermore, JM attack by both Alice and Bob would be detected with certain probability, which is quite different from previous protocols. Moreover, our protocol retains the good characters of QKD-based QPQs, e.g., it is loss tolerant and robust against quantum memory attack.

  2. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    NASA Astrophysics Data System (ADS)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  3. Generation of plasmin during acute attacks of hereditary angioedema.

    PubMed

    Cugno, M; Hack, C E; de Boer, J P; Eerenberg, A J; Agostoni, A; Cicardi, M

    1993-01-01

    Hereditary angioedema is caused by a genetic deficiency of C1-inhibitor, a serine protease inhibitor that regulates activation of complement, contact, and fibrinolytic systems. Symptoms (bouts of subcutaneous and mucous swelling) depend on the release of a vasoactive mediator, probably through activation of these three systems. We studied the interrelationship among complement, contact, and fibrinolytic activation in 23 patients with hereditary angiodema, 18 during remission and five during an attack, by measuring plasma levels of C1-C1 inhibitor, factor XIIa-C1 inhibitor, kallikrein-C1 inhibitor, and plasmin-alpha 2-antiplasmin complexes, tissue plasminogen activator, and urokinase plasminogen activator. In addition, cleavage of high-molecular weight kininogen was detected by sodium dodecyl sulfate polyacrylamide gel electrophoresis analysis and quantified by densitometry. During remission, plasma levels of C1-C1 inhibitor complexes were elevated (p = 0.0002), whereas the other parameters were within the normal range. During acute attacks, not only plasma levels of C1-C1 inhibitor complexes but also those of plasmin-alpha 2-antiplasmin complexes (P = 0.0009) and cleaved high-molecular weight kininogen were elevated. A positive correlation between plasmin-alpha 2-antiplasmin complexes and cleaved high-molecular weight kininogen was observed (r = 0.75, p < 0.001). This article presents the first in vivo evidence that supports the concept that release of vasoactive mediators in hereditary angiodema attacks is associated with the activation of the fibrinolytic system.

  4. Moth tails divert bat attack: evolution of acoustic deflection.

    PubMed

    Barber, Jesse R; Leavell, Brian C; Keener, Adam L; Breinholt, Jesse W; Chadwell, Brad A; McClure, Christopher J W; Hill, Geena M; Kawahara, Akito Y

    2015-03-01

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼ 47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator-prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey.

  5. Moth tails divert bat attack: Evolution of acoustic deflection

    PubMed Central

    Barber, Jesse R.; Leavell, Brian C.; Keener, Adam L.; Breinholt, Jesse W.; Chadwell, Brad A.; McClure, Christopher J. W.; Hill, Geena M.; Kawahara, Akito Y.

    2015-01-01

    Adaptations to divert the attacks of visually guided predators have evolved repeatedly in animals. Using high-speed infrared videography, we show that luna moths (Actias luna) generate an acoustic diversion with spinning hindwing tails to deflect echolocating bat attacks away from their body and toward these nonessential appendages. We pit luna moths against big brown bats (Eptesicus fuscus) and demonstrate a survival advantage of ∼47% for moths with tails versus those that had their tails removed. The benefit of hindwing tails is equivalent to the advantage conferred to moths by bat-detecting ears. Moth tails lured bat attacks to these wing regions during 55% of interactions between bats and intact luna moths. We analyzed flight kinematics of moths with and without hindwing tails and suggest that tails have a minimal role in flight performance. Using a robust phylogeny, we find that long spatulate tails have independently evolved four times in saturniid moths, further supporting the selective advantage of this anti-bat strategy. Diversionary tactics are perhaps more common than appreciated in predator–prey interactions. Our finding suggests that focusing on the sensory ecologies of key predators will reveal such countermeasures in prey. PMID:25730869

  6. An Improved Wavelet Packet-Chaos Model for Life Prediction of Space Relays Based on Volterra Series.

    PubMed

    Li, Lingling; Han, Ye; Chen, Wenyuan; Lv, Congmin; Sun, Dongwang

    2016-01-01

    In this paper, an improved algorithm of wavelet packet-chaos model for life prediction of space relays based on volterra series is proposed. In the proposed method, the high and low frequency time sequence components of performance parameters are obtained by employing the improved wavelet packet transform to decompose the performance parameters of the relay into multiple scales. Then the optimization algorithm of parameters in volterra series is improved, and is used to construct a chaotic forecasting model for the high and low frequency time sequence components gained by the wavelet packet transform. At last, the chaotic forecasting results of the high and low frequency components are combined by taking the wavelet packet reconstruction approach, so as to predict the lifetime of the studied space relay. The algorithm can predict the life curve of the relay accurately and reflect the characteristics of the relay performance with sufficient accuracy. The proposed method is validated via a case study of a space relay.

  7. Anti-spoofing for display and print attacks on palmprint verification systems

    NASA Astrophysics Data System (ADS)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  8. Transient ischemic attack as a medical emergency.

    PubMed

    Okada, Yasushi

    2014-01-01

    Since transient ischemic attack (TIA) is regarded as a medical emergency with high risk for early stroke recurrence, the underlying mechanisms should be immediately clarified to conclude a definitive diagnosis and provide early treatment. Early risk stratification using ABCD(2) scores can predict the risk of ischemic stroke occurring after TIA. Carotid ultrasonography (US) can evaluate the degree of stenosis, plaque properties and flow velocity of ICA lesions. High-risk mobile plaques can be classified by carotid US, and aortogenic sources of emboli can be detected by transesophageal echocardiography. Cardiac monitoring and blood findings are thought to play a key role in a diagnosis of cardioembolic TIA. Diffusion-weighted imaging (DWI)-MRI and MR angiography are also indispensable to understand the mechanism of TIA and cerebral circulation. To prevent subsequent stroke arising from TIA, antiplatelet and anticoagulant therapies should be started immediately along with comprehensive management of life-style, hypertension, diabetes mellitus, dyslipidemia and other atherosclerotic diseases. Carotid endarterectomy and endovascular intervention are critical for treating symptomatic patients with significant stenosis of ICA. A novel concept of acute cerebrovascular syndrome (ACVS) has recently been advocated to increase awareness of TIA among citizens, patients and medical professionals. TIA should be recognized as the last opportunity to avoid irreversible ischemic stroke and its sequelae. The clinical relevance of the new concept of ACVS is advocated by early recurrence after TIA, analysis of high-risk TIA, treatment strategies and the optimal management of TIA. Raising TIA awareness should also proceed across many population sectors. PMID:24157554

  9. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    PubMed

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  10. IEEE 802.16J-Relay Fortified Aeromacs Networks; Benefits and Challenges

    NASA Technical Reports Server (NTRS)

    Kamali, Behnam; Apaza, Rafael D.

    2014-01-01

    Aeronautical Mobile Airport Communications System (AeroMACS) is an IEEE 802.16 standard-based (WiMAX) broadband aviation transmission technology, developed to provide safety critical communications coverage for airport surface in support of fixed and mobile ground to ground applications and services. We have previously demonstrated that IEEE 802.16j-amendment-based WiMAX is most feasible for AeroMACS applications. The principal argument in favor of application of IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified WiMAX networks, with virtually no increase in the power requirements. In this article, following introductory remarks on airport surface communications, WiMAX and AeroMACS; the IEEE 802.16j-based WiMAX technology and multihop relay systems are briefly described. The two modes of relay operation supported by IEEE 802.16j amendment; i.e., transparent (TRS) and non-transparent (NTRS) modes, are discussed in some detail. Advantages and disadvantages of using TRS and NTRS in AeroMACS networks are summarized in a table. Practical issues vis--vis the inclusion of relays in AeroMACS networks are addressed. It is argued that the selection of relay type may affect a number of network parameters. A discussion on specific benefits and challenges of inclusion of relays in AeroMACS networks is provided. The article concludes that in case it is desired or necessary to exclusively employ one type of relay mode for all applications throughout an AeroMACS network, the proper selection would be the non-transparent mode.

  11. Rumor Has It…: Relay Communication of Stress Cues in Plants

    PubMed Central

    Falik, Omer; Mordoch, Yonat; Quansah, Lydia; Fait, Aaron; Novoplansky, Ariel

    2011-01-01

    Recent evidence demonstrates that plants are able not only to perceive and adaptively respond to external information but also to anticipate forthcoming hazards and stresses. Here, we tested the hypothesis that unstressed plants are able to respond to stress cues emitted from their abiotically-stressed neighbors and in turn induce stress responses in additional unstressed plants located further away from the stressed plants. Pisum sativum plants were subjected to drought while neighboring rows of five unstressed plants on both sides, with which they could exchange different cue combinations. On one side, the stressed plant and its unstressed neighbors did not share their rooting volumes (UNSHARED) and thus were limited to shoot communication. On its other side, the stressed plant shared one of its rooting volumes with its nearest unstressed neighbor and all plants shared their rooting volumes with their immediate neighbors (SHARED), allowing both root and shoot communication. Fifteen minutes following drought induction, significant stomatal closure was observed in both the stressed plants and their nearest unstressed SHARED neighbors, and within one hour, all SHARED neighbors closed their stomata. Stomatal closure was not observed in the UNSHARED neighbors. The results demonstrate that unstressed plants are able to perceive and respond to stress cues emitted by the roots of their drought-stressed neighbors and, via ‘relay cuing’, elicit stress responses in further unstressed plants. Further work is underway to study the underlying mechanisms of this new mode of plant communication and its possible adaptive implications for the anticipation of forthcoming abiotic stresses by plants. PMID:22073135

  12. Relay cropping for improved air and water quality.

    PubMed

    Schepers, James S; Francis, Dennis D; Shanahan, John F

    2005-01-01

    Using plants to extract excess nitrate from soil is important in protecting against eutrophication of standing water, hypoxic conditions in lakes and oceans, or elevated nitrate concentrations in domestic water supplies Global climate change issues have raised new concerns about nitrogen (N) management as it relates to crop production even though there may not be an immediate threat to water quality. Carbon dioxide (CO2) emissions are frequently considered the primary cause of global climate change, but under anaerobic conditions, animals can contribute by expelling methane (CH4) as do soil microbes. In terms of the potential for global climate change, CH4 is approximately 25 times more harmful than CO2. This differential effect is minuscule compared to when nitrous oxide (N2O) is released into the atmosphere because it is approximately 300 times more harmful than CO2. N2O losses from soil have been positively correlated with residual N (nitrate, NO3-) concentrations in soil. It stands to reason that phytoremediation via nitrate scavenger crops is one approach to help protect air quality, as well as soil and water quality. Winter wheat was inserted into a seed corn/soybean rotation to utilize soil nitrate and thereby reduce the potential for nitrate leaching and N2O emissions. The net effect of the 2001-2003 relay cropping sequence was to produce three crops in two years, scavenge 130 kg N/ha from the root zone, produce an extra 2 Mg residue/ha, and increase producer profitability by approximately 250 dollars/ha. PMID:15948582

  13. Protecting Web Services against DoS Attacks: A Case-Based Reasoning Approach

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Juan F.; Zato, Carolina; Pérez, Javier

    The real-time detection is a key factor to detect and block DoS attacks within Web services. DoS attacks can be generated for different techniques that take advantage of points vulnerable within Web services. This paper describes a novel proposal based on a real time agent to classify user requests and detect and block malicious SOAP messages. The classification mechanism is based on a Case-Base Reasoning (CBR) model, where the different CBR phases are time bounded. Within the reuse phase of the CBR cycle is incorporated a mixture of experts to choose the most suitable technique of classification depending on the feature of the attack and the available time to solve the classification. A prototype of the architecture was developed and the results obtained are presented in this study.

  14. Pathologic features of fatal shark attacks.

    PubMed

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  15. A Weak Value Based QKD Protocol Robust Against Detector Attacks

    NASA Astrophysics Data System (ADS)

    Troupe, James

    2015-03-01

    We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.

  16. An update on brain imaging in transient ischemic attack.

    PubMed

    Souillard-Scemama, R; Tisserand, M; Calvet, D; Jumadilova, D; Lion, S; Turc, G; Edjlali, M; Mellerio, C; Lamy, C; Naggara, O; Meder, J-F; Oppenheim, C

    2015-02-01

    Neuroimaging is critical in the evaluation of patients with transient ischemic attack (TIA) and MRI is the recommended modality to image an ischemic lesion. The presence of a diffusion (DWI) lesion in a patient with transient neurological symptoms confirms the vascular origin of the deficit and is predictive of a high risk of stroke. Refinement of MR studies including high resolution DWI and perfusion imaging using either MRI or CT further improve the detection of ischemic lesions. Rapid etiological work-up includes non-invasive imaging of cervical and intracranial arteries to search for symptomatic stenosis/occlusion associated with an increased risk of stroke.

  17. Exact outage analysis of the effect of co-channel interference on secured multi-hop relaying networks

    NASA Astrophysics Data System (ADS)

    Quang Nguyen, Sang; Kong, Hyung Yun

    2016-11-01

    In this article, the presence of multi-hop relaying, eavesdropper and co-channel interference (CCI) in the same system model is investigated. Specifically, the effect of CCI on a secured multi-hop relaying network is studied, in which the source communicates with the destination via multi-relay-hopping under the presence of an eavesdropper and CCI at each node. The optimal relay at each cluster is selected to help forward the message from the source to the destination. We apply two relay selection approaches to such a system model, i.e. the optimal relay is chosen based on (1) the maximum channel gain from the transmitter to all relays in the desired cluster and (2) the minimum channel gain from the eavesdropper to all relays in each cluster. For the performance evaluation and comparison, we derived the exact closed form of the secrecy outage probability of the two approaches. That analysis is verified by Monte Carlo simulation. Finally, the effects of the number of hops, the transmit power at the source, relays and the external sources, the distance between the external sources and each node in the system, and the location of the eavesdropper are presented and discussed.

  18. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... Stroke More Coronary Artery Dissection: Not Just a Heart Attack Updated:May 24,2016 Sometimes a heart attack ... Disease Go Red For Women Types of aneurysms Heart Attack • Home • About Heart Attacks Acute Coronary Syndrome (ACS) • ...

  19. A Game Theoretic Approach to Cyber Attack Prediction

    SciTech Connect

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  20. Performance Evaluation of AODV with Blackhole Attack

    NASA Astrophysics Data System (ADS)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  1. Lightning Detection

    NASA Technical Reports Server (NTRS)

    1988-01-01

    Lightning causes an estimated $50 million annually in damages to power lines, transformers and other electric utility equipment. Lightning strikes are not yet predictable, but U.S. East Coast Lightning Detection Network (LDN) is providing utilities and other clients data on lightning characteristics, flash frequency and location, and the general direction in which lightning associated storms are heading. Monitoring stations are equipped with direction finding antennas that detect lightning strikes reaching the ground by measuring fluctuations in the magnetic field. Stations relay strike information to SUNY-Albany-LDN operations center which is manned around the clock. Computers process data, count strikes, spot their locations, and note other characteristics of lightning, LDN's data is beamed to a satellite for broadcast to client's receiving stations. By utilizing real-time lightning strike information, managers are now more able to effectively manage their resources. This reduces outage time for utility customers.

  2. Mapping interactions between myosin relay and converter domains that power muscle function.

    PubMed

    Kronert, William A; Melkani, Girish C; Melkani, Anju; Bernstein, Sanford I

    2014-05-01

    Intramolecular communication within myosin is essential for its function as motor, but the specific amino acid residue interactions required are unexplored within muscle cells. Using Drosophila melanogaster skeletal muscle myosin, we performed a novel in vivo molecular suppression analysis to define the importance of three relay loop amino acid residues (Ile(508), Asn(509), and Asp(511)) in communicating with converter domain residue Arg(759). We found that the N509K relay mutation suppressed defects in myosin ATPase, in vitro motility, myofibril stability, and muscle function associated with the R759E converter mutation. Through molecular modeling, we define a mechanism for this interaction and suggest why the I508K and D511K relay mutations fail to suppress R759E. Interestingly, I508K disabled motor function and myofibril assembly, suggesting that productive relay-converter interaction is essential for both processes. We conclude that the putative relay-converter interaction mediated by myosin residues 509 and 759 is critical for the biochemical and biophysical function of skeletal muscle myosin and the normal ultrastructural and mechanical properties of muscle.

  3. RoCoMAR: Robots' Controllable Mobility Aided Routing and Relay Architecture for Mobile Sensor Networks

    PubMed Central

    Van Le, Duc; Oh, Hoon; Yoon, Seokhoon

    2013-01-01

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay. PMID:23881134

  4. Asymptotic Analysis of Large Cooperative Relay Networks Using Random Matrix Theory

    NASA Astrophysics Data System (ADS)

    Li, Husheng; Han, Z.; Poor, H.

    2008-12-01

    Cooperative transmission is an emerging communication technology that takes advantage of the broadcast nature of wireless channels. In cooperative transmission, the use of relays can create a virtual antenna array so that multiple-input/multiple-output (MIMO) techniques can be employed. Most existing work in this area has focused on the situation in which there are a small number of sources and relays and a destination. In this paper, cooperative relay networks with large numbers of nodes are analyzed, and in particular the asymptotic performance improvement of cooperative transmission over direction transmission and relay transmission is analyzed using random matrix theory. The key idea is to investigate the eigenvalue distributions related to channel capacity and to analyze the moments of this distribution in large wireless networks. A performance upper bound is derived, the performance in the low signal-to-noise-ratio regime is analyzed, and two approximations are obtained for high and low relay-to-destination link qualities, respectively. Finally, simulations are provided to validate the accuracy of the analytical results. The analysis in this paper provides important tools for the understanding and the design of large cooperative wireless networks.

  5. Implementation of Pass Through PPTP Relay System with Authentication at Each Gateway and Its Performance Evaluations

    NASA Astrophysics Data System (ADS)

    Saito, Shoichi; Uehara, Tetsutaro; Izumi, Yutaka; Kunieda, Yoshitoshi

    The VPN (Virtual Private Network) technique becomes more and more popular to protect contents of messages and to achieve secure communication from incidents, such as tapping. However, it grow in usage that a VPN server is used on a sub-network in part of an office-wide network. But, a PPTP system included in Windows operating systems cannot establish nested VPN links. Moreover encrypted communication by VPN hides a user of the VPN connection. Consequently, any administrators of network systems can’t find out the users of the VPN connection via firewall, moreover can’t decide whether if the user is legal or not. In order to solve this problem, we developed a multi step PPTP relay system on a firewall. This system solves all the problems of our previously developed PPTP relay system(1). The new relay system improves security by encrypting through the whole end-to-end communication and abolishing of prior registration of passwords for the next step. Furthermore, transport speed is accelerated, and the restriction of the number of steps on relay is also abolished. By these features the multi step PPTP relay system expands usability.

  6. RoCoMAR: robots' controllable mobility aided routing and relay architecture for mobile sensor networks.

    PubMed

    Le, Duc Van; Oh, Hoon; Yoon, Seokhoon

    2013-07-05

    In a practical deployment, mobile sensor network (MSN) suffers from a low performance due to high node mobility, time-varying wireless channel properties, and obstacles between communicating nodes. In order to tackle the problem of low network performance and provide a desired end-to-end data transfer quality, in this paper we propose a novel ad hoc routing and relaying architecture, namely RoCoMAR (Robots' Controllable Mobility Aided Routing) that uses robotic nodes' controllable mobility. RoCoMAR repeatedly performs link reinforcement process with the objective of maximizing the network throughput, in which the link with the lowest quality on the path is identified and replaced with high quality links by placing a robotic node as a relay at an optimal position. The robotic node resigns as a relay if the objective is achieved or no more gain can be obtained with a new relay. Once placed as a relay, the robotic node performs adaptive link maintenance by adjusting its position according to the movements of regular nodes. The simulation results show that RoCoMAR outperforms existing ad hoc routing protocols for MSN in terms of network throughput and end-to-end delay.

  7. Characterization of attacks on public telephone networks

    NASA Astrophysics Data System (ADS)

    Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet

    2001-02-01

    The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.

  8. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  9. A Traceability Attack against e-Passports

    NASA Astrophysics Data System (ADS)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  10. Ventral premammillary nucleus as a critical sensory relay to the maternal aggression network

    PubMed Central

    Motta, Simone C.; Guimarães, Cibele Carla; Furigo, Isadora Clivatti; Sukikara, Marcia Harumi; Baldo, Marcus V. C.; Lonstein, Joseph S.; Canteras, Newton S.

    2013-01-01

    Maternal aggression is under the control of a wide variety of factors that prime the females for aggression or trigger the aggressive event. Maternal attacks are triggered by the perception of sensory cues from the intruder, and here we have identified a site in the hypothalamus of lactating rats that is highly responsive to the male intruder—the ventral premammillary nucleus (PMv). The PMv is heavily targeted by the medial amygdalar nucleus, and we used lesion and immediate-early gene studies to test our working hypothesis that the PMv signals the presence of a male intruder and transfers this information to the network organizing maternal aggression. PMv-lesioned dams exhibit significantly reduced maternal aggression, without affecting maternal care. The Fos analysis revealed that PMv influences the activation of hypothalamic and septal sites shown to be mobilized during maternal aggression, including the medial preoptic nucleus (likely to represent an important locus to integrate priming stimuli critical for maternal aggression), the caudal two-thirds of the hypothalamic attack area (comprising the ventrolateral part of the ventromedial hypothalamic nucleus and the adjacent tuberal region of the lateral hypothalamic area, critical for the expression of maternal aggression), and the ventral part of the anterior bed nuclei of the stria terminalis (presently discussed as being involved in controlling neuroendocrine and autonomic responses accompanying maternal aggression). These findings reveal an important role for the PMv in detecting the male intruder and how this nucleus modulates the network controlling maternal aggression. PMID:23918394

  11. Resistance of the double random phase encryption against various attacks.

    PubMed

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-01

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  12. Discovering Collaborative Cyber Attack Patterns Using Social Network Analysis

    NASA Astrophysics Data System (ADS)

    Du, Haitao; Yang, Shanchieh Jay

    This paper investigates collaborative cyber attacks based on social network analysis. An Attack Social Graph (ASG) is defined to represent cyber attacks on the Internet. Features are extracted from ASGs to analyze collaborative patterns. We use principle component analysis to reduce the feature space, and hierarchical clustering to group attack sources that exhibit similar behavior. Experiments with real world data illustrate that our framework can effectively reduce from large dataset to clusters of attack sources exhibiting critical collaborative patterns.

  13. Counterfactual attack on counterfactual quantum key distribution

    NASA Astrophysics Data System (ADS)

    Zhang, Sheng; Wnang, Jian; Tang, Chao Jing

    2012-05-01

    It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.

  14. Identifying inference attacks against healthcare data repositories

    PubMed Central

    Vaidya, Jaideep; Shafiq, Basit; Jiang, Xiaoqian; Ohno-Machado, Lucila

    Health care data repositories play an important role in driving progress in medical research. Finding new pathways to discovery requires having adequate data and relevant analysis. However, it is critical to ensure the privacy and security of the stored data. In this paper, we identify a dangerous inference attack against naive suppression based approaches that are used to protect sensitive information. We base our attack on the querying system provided by the Healthcare Cost and Utilization Project, though it applies in general to any medical database providing a query capability. We also discuss potential solutions to this problem. PMID:24303279

  15. Differential attack on mini-AES

    NASA Astrophysics Data System (ADS)

    Ajeng Gemellia, Asadini Dwi; Indarjani, Santi

    2012-05-01

    This paper presents the results of differential attack on Mini-AES algorithm. The differential trails are constructed using all combinations of propagation ratio without repetition. To give practical results, we implement the key extraction for differential characteristics which have the highest and lowest probability as a comparison. Based on total propagation ratio and complexity resulted, Mini-AES algorithms are vulnerable to differential attack. The best differential characteristic is the differential characteristic using a single active s-box with the propagation ratio of 8 / 16.

  16. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks

    PubMed Central

    Xu, Lingwei; Zhang, Hao; Gulliver, T. Aaron

    2016-01-01

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance. PMID:26907282

  17. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    PubMed

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-02-19

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance.

  18. Performance of the main instrument structure and the optical relay system of MUSE

    NASA Astrophysics Data System (ADS)

    Nicklas, Harald E.; Anwand, Heiko; Fleischmann, Andreas; Köhler, Christof; Xu, Wenli; Seifert, Walter; Laurent, Florence

    2012-09-01

    The foundation of the MUSE instrument with its high multiplexing factor of twenty-four spectrographs is formed through its central main structure that accommodates all instrumental subsystems and links them with the telescope. Due to instrument's dimension and complexity, the requirements on structural performance are demanding. How its performance was tested and optimized through reverse engineering is addressed. Intimately mated with this central structure is an optical relay system that splits the single telescopic field into twenty-four subfields. Each of those is individually directed along three dimensions across the structure through a folding and imaging setup of an optical relay system that at the end feeds one of the twenty-four spectrographs. This opto-mechanical relay system was tested when mounted onto the main structure. The results obtained so far are given here.

  19. The effects of biological environments on the electron-relay functionality of tryptophan residues in proteins.

    PubMed

    Chen, Xiaohua; Dai, Hongjing; Li, Jilai; Huang, Xuri; Wei, Zidong

    2012-01-16

    Clarifying the contribution of tryptophan (Trp) to electron-transfer (ET) processes in different protein surroundings can help to understand the effective pathway of ET in proteins. Interactions between Trp residues and protein microsurroundings involve intermolecular H-bonds, cation and π-electron clouds of aromatic rings, the secondary structure and π orbital of aromatic rings, and so on. Detailed analyses reveal that the microsurroundings play an important role in modulating the electron-relay function of Trp in proteins. Generally, microsurroundings with strong Lewis acidity inhibit electron hole transport through Trp residues. Systems with weak Lewis acidity finely tune the electron-relay ability of Trp in proteins, while those with strong Lewis basicity strongly enhance the electron-relay ability of Trp residues.

  20. Video Relay Service for Signing Deaf - Lessons Learnt from a Pilot Study

    NASA Astrophysics Data System (ADS)

    Ponsard, Christophe; Sutera, Joelle; Henin, Michael

    The generalization of high speed Internet, efficient compression techniques and low cost hardware have resulted in low cost video communication since the year 2000. For the Deaf community, this enables native communication in sign language and a better communication with hearing people over the phone. This implies that Video Relay Service can take over the old Text Relay Service which is less natural and requires mastering written language. A number of such services have developed throughout the world. The objectives of this paper are to present the experience gained in the Walloon Region of Belgium, to share a number of lessons learnt, and to provide recommendations at the technical, user adoption and political levels. A survey of video relay services around the world is presented together with the feedback from users both before and after using the pilot service.

  1. Joint Transmit Antenna Selection and Power Allocation for ISDF Relaying Mobile-to-Mobile Sensor Networks.

    PubMed

    Xu, Lingwei; Zhang, Hao; Gulliver, T Aaron

    2016-01-01

    The outage probability (OP) performance of multiple-relay incremental-selective decode-and-forward (ISDF) relaying mobile-to-mobile (M2M) sensor networks with transmit antenna selection (TAS) over N-Nakagami fading channels is investigated. Exact closed-form OP expressions for both optimal and suboptimal TAS schemes are derived. The power allocation problem is formulated to determine the optimal division of transmit power between the broadcast and relay phases. The OP performance under different conditions is evaluated via numerical simulation to verify the analysis. These results show that the optimal TAS scheme has better OP performance than the suboptimal scheme. Further, the power allocation parameter has a significant influence on the OP performance. PMID:26907282

  2. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel.

    PubMed

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes.

  3. Improved Iterative Decoding of Network-Channel Codes for Multiple-Access Relay Channel

    PubMed Central

    Majumder, Saikat; Verma, Shrish

    2015-01-01

    Cooperative communication using relay nodes is one of the most effective means of exploiting space diversity for low cost nodes in wireless network. In cooperative communication, users, besides communicating their own information, also relay the information of other users. In this paper we investigate a scheme where cooperation is achieved using a common relay node which performs network coding to provide space diversity for two information nodes transmitting to a base station. We propose a scheme which uses Reed-Solomon error correcting code for encoding the information bit at the user nodes and convolutional code as network code, instead of XOR based network coding. Based on this encoder, we propose iterative soft decoding of joint network-channel code by treating it as a concatenated Reed-Solomon convolutional code. Simulation results show significant improvement in performance compared to existing scheme based on compound codes. PMID:27347526

  4. Develop a solution for protecting and securing enterprise networks from malicious attacks

    NASA Astrophysics Data System (ADS)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    as they are configured on a per-zone basis. Depending on the type of screen being configured, there may be additional settings beyond simply blocking the traffic. Attack prevention is also a native function of any firewall. Juniper Firewall handles traffic on a per-flow basis. We can use flows or sessions as a way to determine whether traffic attempting to traverse the firewall is legitimate. We control the state-checking components resident in Juniper Firewall by configuring "flow" settings. These settings allow you to configure state checking for various conditions on the device. You can use flow settings to protect against TCP hijacking, and to generally ensure that the fire-wall is performing full state processing when desired. We take a case study of attack on a network and perform study of the detection of the malicious packets on a Net screen Firewall. A new solution for securing enterprise networks will be developed here.

  5. Data Relay Board with Protocol for High-Speed, Free-Space Optical Communications

    NASA Technical Reports Server (NTRS)

    Wright, Malcolm; Clare, Loren; Gould, Gary; Pedyash, Maxim

    2004-01-01

    In a free-space optical communication system, the mitigation of transient outages through the incorporation of error-control methods is of particular concern, the outages being caused by scintillation fades and obscurants. The focus of this innovative technology is the development of a data relay system for a reliable high-data-rate free-spacebased optical-transport network. The data relay boards will establish the link, maintain synchronous connection, group the data into frames, and provide for automatic retransmission (ARQ) of lost or erred frames. A certain Quality of Service (QoS) can then be ensured, compatible with the required data rate. The protocol to be used by the data relay system is based on the draft CCSDS standard data-link protocol Proximity-1, selected by orbiters to multiple lander assets in the Mars network, for example. In addition to providing data-link protocol capabilities for the free-space optical link and buffering the data, the data relay system will interface directly with user applications over Gigabit Ethernet and/or with highspeed storage resources via Fibre Channel. The hardware implementation is built on a network-processor-based architecture. This technology combines the power of a hardware switch capable of data switching and packet routing at Gbps rates, with the flexibility of a software- driven processor that can host highly adaptive and reconfigurable protocols used, for example, in wireless local-area networks (LANs). The system will be implemented in a modular multi-board fashion. The main hardware elements of the data relay system are the new data relay board developed by Rockwell Scientific, a COTS Gigabit Ethernet board for user interface, and a COTS Fibre Channel board that connects to local storage. The boards reside in a cPCI back plane, and can be housed in a VME-type enclosure.

  6. A Systematic Approach to Setting Underfrequency Relays in Electric Power Systems

    NASA Astrophysics Data System (ADS)

    Qadri, Syed Saadat

    Generation loss contingencies in electric power systems result in a deviation of system frequency from nominal, a condition which must be corrected promptly in order to prevent further degradation of the power system. Automatic load-shedding using underfrequency relays is one of the techniques used to correct abnormal frequency deviations and prevent the risk of uncontrolled outages. If sufficient load is shed following a contingency to preserve interconnections and keep generators on-line, the system can be restored with relative speed and ease. On the other hand, if a declining frequency condition is not dealt with adequately, a cascading disconnection of generating units may develop, leading to a possible total system blackout. This thesis develops and tests a new systematic method for setting underfrequency relays offering a number of advantages over conventional methods. A discretized swing equation model is used to evaluate the system frequency following a contingency, and the operational logic of an underfrequency relay is modeled using mixed integer linear programming (MILP) techniques. The proposed approach computes relay settings with respect to a subset of all plausible contingencies for a given system. A method for selecting the subset of contingencies for inclusion in the MILP is presented. The goal of this thesis is to demonstrate that given certain types of degrees of freedom in the relay setting problem, it is possible to obtain a set of relay settings that limits damage or disconnection of generating units for each and every possible generation loss outage in a given system, while attempting to shed the least amount of load for each contingency.

  7. On Proper Selection of Multihop Relays for Future Enhancement of AeroMACS Networks

    NASA Technical Reports Server (NTRS)

    Kamali, Behnam; Kerczewski, Robert J.; Apaza, Rafael D.

    2015-01-01

    As the Aeronautical Mobile Airport Communications System (AeroMACS) has evolved from a technology concept to a deployed communications network over major US airports, it is now time to contemplate whether the existing capacity of AeroMACS is sufficient to meet the demands set forth by all fixed and mobile applications over the airport surface given the AeroMACS constraints regarding bandwidth and transmit power. The underlying idea in this article is to present IEEE 802.16j-based WiMAX as a technology that can address future capacity enhancements and therefore is most feasible for AeroMACS applications. The principal argument in favor IEEE 802.16j technology is the flexible and cost effective extension of radio coverage that is afforded by relay fortified networks, with virtually no increase in the power requirements and virtually no rise in interference levels to co-allocated applications. The IEEE 802.16j-based multihop relay systems are briefly described. The focus is on key features of this technology, frame structure, and its architecture. Next, AeroMACS is described as a WiMAX-based wireless network. The two major relay modes supported by IEEE 802.16j amendment, i.e., transparent and non-transparent are described. The benefits of employing multihop relays are listed. Some key challenges related to incorporating relays into AeroMACS networks are discussed. The selection of relay type in a broadband wireless network affects a number of network parameters such as latency, signal overhead, PHY (Scalable Physical Layer) and MAC (Media Access Layer) layer protocols, consequently it can alter key network quantities of throughput and QoS (Quality of Service).

  8. Quantum hacking of a continuous-variable quantum-key-distribution system using a wavelength attack

    NASA Astrophysics Data System (ADS)

    Huang, Jing-Zheng; Weedbrook, Christian; Yin, Zhen-Qiang; Wang, Shuang; Li, Hong-Wei; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu

    2013-06-01

    The security proofs of continuous-variable quantum key distribution are based on the assumptions that the eavesdropper can neither act on the local oscillator nor control Bob's beam splitter. These assumptions may be invalid in practice due to potential imperfections in the implementations of such protocols. In this paper, we consider the problem of transmitting the local oscillator in a public channel and propose a wavelength attack which allows the eavesdropper to control the intensity transmission of Bob's beam splitter by switching the wavelength of the input light. Specifically we target continuous-variable quantum key distribution systems that use the heterodyne detection protocol using either direct or reverse reconciliation. Our attack is proved to be feasible and renders all of the final keys shared between the legitimate parties insecure, even if they have monitored the intensity of the local oscillator. To prevent our attack on commercial systems, a simple wavelength filter should be randomly added before performing monitoring detection.

  9. Investigations of the contact bounce behaviors and relative dynamic welding phenomena for electromechanical relay

    NASA Astrophysics Data System (ADS)

    Ren, Wanbin; He, Yuan; Jin, Jianbing; Man, Sida

    2016-06-01

    Dynamic welding, being the principal mechanism of sticking failure, correlates closely with the contact bounce of electromechanical relay. The typical waveforms of dynamic contact force and contact voltage at making and breaking process are obtained with the use of a new designed test rig. The variations in bounce time, bounce numbers, last bounce duration, and relevant welding force are investigated in the electrical endurance test. It is determined that the welding strength and the welding probability are increased with the reduced stationary force. The degradation physical mechanism is present to better understand the relationship between dynamic welding and operation characteristics of electromechanical relay.

  10. Relay Protection and Automation Systems Based on Programmable Logic Integrated Circuits

    SciTech Connect

    Lashin, A. V. Kozyrev, A. V.

    2015-09-15

    One of the most promising forms of developing the apparatus part of relay protection and automation devices is considered. The advantages of choosing programmable logic integrated circuits to obtain adaptive technological algorithms in power system protection and control systems are pointed out. The technical difficulties in the problems which today stand in the way of using relay protection and automation systems are indicated and a new technology for solving these problems is presented. Particular attention is devoted to the possibility of reconfiguring the logic of these devices, using programmable logic integrated circuits.

  11. Joint TAS and power allocation for DF relaying M2M cooperative system

    NASA Astrophysics Data System (ADS)

    Xu, Lingwei; Zhang, Hao; Gulliver, T. Aaron

    2016-09-01

    The outage probability (OP) performance of transmit antenna selection (TAS) in a decode-and-forward relaying mobile-to-mobile system with relay selection over N-Nakagami fading channels is investigated. Exact closed-form expressions for the OP of two TAS schemes are derived, and the optimal power allocation optimisation problem is formulated. The OP performance is evaluated via Monte Carlo simulation to verify the analysis. The results obtained show that the optimal TAS scheme has better performance than the suboptimal TAS scheme, but the performance gap between these techniques decreases as the number of source antennas increases.

  12. Satellite relay telemetry of seismic data in earthquake prediction and control

    USGS Publications Warehouse

    Jackson, Wayne H.; Eaton, Jerry P.

    1971-01-01

    The Satellite Telemetry Earthquake Monitoring Program was started in FY 1968 to evaluate the applicability of satellite relay telemetry in the collection of seismic data from a large number of dense seismograph clusters laid out along the major fault systems of western North America. Prototype clusters utilizing phone-line telemetry were then being installed by the National Center for Earthquake Research (NCER) in 3 regions along the San Andreas fault in central California; and the experience of installing and operating the clusters and in reducing and analyzing the seismic data from them was to provide the raw materials for evaluation in the satellite relay telemetry project.

  13. Investigations of the contact bounce behaviors and relative dynamic welding phenomena for electromechanical relay.

    PubMed

    Ren, Wanbin; He, Yuan; Jin, Jianbing; Man, Sida

    2016-06-01

    Dynamic welding, being the principal mechanism of sticking failure, correlates closely with the contact bounce of electromechanical relay. The typical waveforms of dynamic contact force and contact voltage at making and breaking process are obtained with the use of a new designed test rig. The variations in bounce time, bounce numbers, last bounce duration, and relevant welding force are investigated in the electrical endurance test. It is determined that the welding strength and the welding probability are increased with the reduced stationary force. The degradation physical mechanism is present to better understand the relationship between dynamic welding and operation characteristics of electromechanical relay. PMID:27370500

  14. Relay Forward-Link File Management Services (MaROS Phase 2)

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Hy, Franklin H.; Gladden, Roy E.

    2013-01-01

    This software provides the service-level functionality to manage the delivery of files from a lander mission repository to an orbiter mission repository for eventual spacelink relay by the orbiter asset on a specific communications pass. It provides further functions to deliver and track a set of mission-defined messages detailing lander authorization instructions and orbiter data delivery state. All of the information concerning these transactions is persisted in a database providing a high level of accountability of the forward-link relay process.

  15. Mitochondrial Disulfide Relay: Redox-regulated Protein Import into the Intermembrane Space*

    PubMed Central

    Herrmann, Johannes M.; Riemer, Jan

    2012-01-01

    99% of all mitochondrial proteins are synthesized in the cytosol, from where they are imported into mitochondria. In contrast to matrix proteins, many proteins of the intermembrane space (IMS) lack presequences and are imported in an oxidation-driven reaction by the mitochondrial disulfide relay. Incoming polypeptides are recognized and oxidized by the IMS-located receptor Mia40. Reoxidation of Mia40 is facilitated by the sulfhydryl oxidase Erv1 and the respiratory chain. Although structurally unrelated, the mitochondrial disulfide relay functionally resembles the Dsb (disufide bond) system of the bacterial periplasm, the compartment from which the IMS was derived 2 billion years ago. PMID:22157015

  16. Mars Reconnaissance Orbiter Navigation Strategy for Mars Science Laboratory Entry, Descent and Landing Telecommunication Relay Support

    NASA Technical Reports Server (NTRS)

    Williams, Jessica L.; Menon, Premkumar R.; Demcak, Stuart W.

    2012-01-01

    The Mars Reconnaissance Orbiter (MRO) is an orbiting asset that performs remote sensing observations in order to characterize the surface, subsurface and atmosphere of Mars. To support upcoming NASA Mars Exploration Program Office objectives, MRO will be used as a relay communication link for the Mars Science Laboratory (MSL) mission during the MSL Entry, Descent and Landing sequence. To do so, MRO Navigation must synchronize the MRO Primary Science Orbit (PSO) with a set of target conditions requested by the MSL Navigation Team; this may be accomplished via propulsive maneuvers. This paper describes the MRO Navigation strategy for and operational performance of MSL EDL relay telecommunication support.

  17. Effect of mixed coupling on relay-coupled Rössler and Lorenz oscillators.

    PubMed

    Sharma, Amit; Shrimali, Manish Dev; Aihara, K

    2014-12-01

    The complete synchronization between the outermost oscillators using the mixed coupling in relay coupled systems is studied. Mixed coupling has two types of coupling functions: coupling between similar or dissimilar variables. We examine the complete synchronization in relay-coupled systems by the largest transverse Lyapunov exponent and synchronization error. We show numerically for Rössler and Lorenz oscillators that the combination of these two types of coupling functions is able to decrease the critical coupling strength for complete synchronization as well as it also suppress oscillations for larger coupling strength.

  18. Arc fault detection system

    DOEpatents

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  19. Arc fault detection system

    DOEpatents

    Jha, Kamal N.

    1999-01-01

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard.

  20. Novel controller design for plants with relay nonlinearity to reduce amplitude of sustained oscillations: Illustration with a fractional controller.

    PubMed

    Kesarkar, Ameya Anil; Selvaganesan, N; Priyadarshan, H

    2015-07-01

    This paper proposes a novel constrained optimization problem to design a controller for plants containing relay nonlinearity to reduce the amplitude of sustained oscillations. The controller is additionally constrained to satisfy desirable loop specifications. The proposed formulation is validated by designing a fractional PI controller for a plant with relay.