Science.gov

Sample records for detect relay attacks

  1. Detecting relay attacks on RFID communication systems using quantum bits

    NASA Astrophysics Data System (ADS)

    Jannati, Hoda; Ardeshir-Larijani, Ebrahim

    2016-11-01

    RFID systems became widespread in variety of applications because of their simplicity in manufacturing and usability. In the province of critical infrastructure protection, RFID systems are usually employed to identify and track people, objects and vehicles that enter restricted areas. The most important vulnerability which is prevalent among all protocols employed in RFID systems is against relay attacks. Until now, to protect RFID systems against this kind of attack, the only approach is the utilization of distance-bounding protocols which are not applicable over low-cost devices such as RFID passive tags. This work presents a novel technique using emerging quantum technologies to detect relay attacks on RFID systems. Recently, it is demonstrated that quantum key distribution (QKD) can be implemented in a client-server scheme where client only requires an on-chip polarization rotator that may be integrated into a handheld device. Now we present our technique for a tag-reader scenario which needs similar resources as the mentioned QKD scheme. We argue that our technique requires less resources and provides lower probability of false alarm for the system, compared with distance-bounding protocols, and may pave the way to enhance the security of current RFID systems.

  2. Lightweight Distance Bounding Protocol against Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  3. Spear Phishing Attack Detection

    DTIC Science & Technology

    2011-03-24

    types: Windows Portable Executable and Common Object File Format (PE/ COFF ), Adobe Reader, and Microsoft Excel, Word, and PowerPoint. SPEAD’s malware...in PE/ COFF malware detection with an overall accuracy of 99.68% and an accuracy of 98.2% where new malware is involved. Additionally, SPEAD is...viii 4.2.2 Comparing File Detection Metrics ................................................ 73 4.2.2.1 PE/ COFF Malware Detection Results

  4. Detecting Denial of Service Attacks in Tor

    NASA Astrophysics Data System (ADS)

    Danner, Norman; Krizanc, Danny; Liberatore, Marc

    Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service based attack on Tor (and related systems) that significantly increases the probability of compromising the anonymity provided. In this paper, we propose an algorithm for detecting such attacks and examine the effectiveness of the obvious approach to evading such detection. We implement a simplified version of the detection algorithm and study whether the attack may be in progress on the current Tor network. Our preliminary measurements indicate that the attack was probably not implemented during the period we observed the network.

  5. CPAD: Cyber-Physical Attack Detection

    SciTech Connect

    Ferragut, Erik M; Laska, Jason A

    2016-06-02

    The CPAD technology relates to anomaly detection and more specifically to cyber physical attack detection. It infers underlying physical relationships between components by analyzing the sensor measurements of a system. It then uses these measurements to detect signs of a non-physically realizable state, which is indicative of an integrity attack on the system. CPAD can be used on any highly-instrumented cyber-physical system to detect integrity attacks and identify the component or components compromised. It has applications to power transmission and distribution, nuclear and industrial plants, and complex vehicles.

  6. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  7. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks

    NASA Astrophysics Data System (ADS)

    Kim, Chong Hee; Avoine, Gildas

    RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious since this attack can be mounted without the notice of both the reader and the tag. An adversary performs a kind of man-in-the-middle attack between the reader and the tag. It is very difficult to prevent this attack since the adversary does not change any data between the reader and the tag. Recently distance bounding protocols measuring the round-trip time between the reader and the tag have been researched to prevent this attack.

  8. Attack detection in unattended sensor networks

    NASA Astrophysics Data System (ADS)

    Wu, Curt; Monnier, Camille; Fry, Gerald; Girod, Lewis; Luke, Jahn

    2010-04-01

    Because sensor networks are often deployed in hostile environments where their security and integrity may be compromised, it is essential to maximize the reliability and trustworthiness of existing and envisioned sensor networks. During operations, the sensor network must be robust to deception, node compromise, and various other attacks, while maintaining the operator's situational awareness regarding the health and integrity of the system. To address these needs, we have designed a Framework to Ensure and Assess Trustworthiness in Sensor systems (FEATS) to identify attacks on sensor system integrity and inform the operator of sensor data trustworthiness. We have developed and validated unsupervised anomaly detection algorithms for sensor data captured from an experimental acoustic sensor platform under a number of attack scenarios. The platform, which contains four audio microphones, was exposed to two physical attacks (audio filtering and audio playback) as well as a live replay attack (replaying live audio data that is captured at a remote location), which is analogous to a wormhole attack in the routing layer. With our unsupervised learning algorithms, we were able to successfully identify the presence of various attacks.

  9. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    PubMed

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  10. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    PubMed Central

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate. PMID:26295058

  11. LAN attack detection using Discrete Event Systems.

    PubMed

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    PubMed

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. Detecting Cyber Attacks On Nuclear Power Plants

    NASA Astrophysics Data System (ADS)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  14. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    NASA Astrophysics Data System (ADS)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  15. Maintaining defender's reputation in anomaly detection against insider attacks.

    PubMed

    Zhang, Nan; Yu, Wei; Fu, Xinwen; Das, Sajal K

    2010-06-01

    We address issues related to establishing a defender's reputation in anomaly detection against two types of attackers: 1) smart insiders, who learn from historic attacks and adapt their strategies to avoid detection/punishment, and 2) naïve attackers, who blindly launch their attacks without knowledge of the history. In this paper, we propose two novel algorithms for reputation establishment--one for systems solely consisting of smart insiders and the other for systems in which both smart insiders and naïve attackers are present. The theoretical analysis and performance evaluation show that our reputation-establishment algorithms can significantly improve the performance of anomaly detection against insider attacks in terms of the tradeoff between detection and false positives.

  16. Transmission line relay mis-operation detection based on time-synchronized field data

    DOE PAGES

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such,more » it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.« less

  17. Transmission line relay mis-operation detection based on time-synchronized field data

    SciTech Connect

    Esmaeilian, Ahad; Popovic, Tomo; Kezunovic, Mladen

    2015-05-04

    In this paper, a real-time tool to detect transmission line relay mis-operation is implemented. The tool uses time-synchronized measurements obtained from both ends of the line during disturbances. The proposed fault analysis tool comes into the picture only after the protective device has operated and tripped the line. The proposed methodology is able not only to detect, classify, and locate transmission line faults, but also to accurately confirm whether the line was tripped due to a mis-operation of protective relays. The analysis report includes either detailed description of the fault type and location or detection of relay mis-operation. As such, it can be a source of very useful information to support the system restoration. The focus of the paper is on the implementation requirements that allow practical application of the methodology, which is illustrated using the field data obtained the real power system. Testing and validation is done using the field data recorded by digital fault recorders and protective relays. The test data included several hundreds of event records corresponding to both relay mis-operations and actual faults. The discussion of results addresses various challenges encountered during the implementation and validation of the presented methodology.

  18. DDoS Attack Detection Algorithms Based on Entropy Computing

    NASA Astrophysics Data System (ADS)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  19. Detecting GNSS spoofing attacks using INS coupling

    NASA Astrophysics Data System (ADS)

    Tanil, Cagatay

    Vulnerability of Global Navigation Satellite Systems (GNSS) users to signal spoofing is a critical threat to positioning integrity, especially in aviation applications, where the consequences are potentially catastrophic. In response, this research describes and evaluates a new approach to directly detect spoofing using integrated Inertial Navigation Systems (INS) and fault detection concepts based on integrity monitoring. The monitors developed here can be implemented into positioning systems using INS/GNSS integration via 1) tightly-coupled, 2) loosely-coupled, and 3) uncoupled schemes. New evaluation methods enable the statistical computation of integrity risk resulting from a worst-case spoofing attack - without needing to simulate an unmanageably large number of individual aircraft approaches. Integrity risk is an absolute measure of safety and a well-established metric in aircraft navigation. A novel closed-form solution to the worst-case time sequence of GNSS signals is derived to maximize the integrity risk for each monitor and used in the covariance analyses. This methodology tests the performance of the monitors against the most sophisticated spoofers, capable of tracking the aircraft position - for example, by means of remote tracking or onboard sensing. Another contribution is a comprehensive closed-loop model that encapsulates the vehicle and compensator (estimator and controller) dynamics. A sensitivity analysis uses this model to quantify the leveraging impact of the vehicle's dynamic responses (e.g., to wind gusts, or to autopilot's acceleration commands) on the monitor's detection capability. The performance of the monitors is evaluated for two safety-critical terminal area navigation applications: 1) autonomous shipboard landing and 2) Boeing 747 (B747) landing assisted with Ground Based Augmentation Systems (GBAS). It is demonstrated that for both systems, the monitors are capable of meeting the most stringent precision approach and landing

  20. Detection of DoS attacks using intrusion detection sensors

    NASA Astrophysics Data System (ADS)

    Ramakrishna, Pathmenanthan; Maarof, Mohd A.

    2002-09-01

    Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where they run (sometimes even requiring a dedicated system) and are subject to tampering or disabling by an intruder. Additionally, intrusion detection systems have usually obtained information about host behavior through indirect means, such as audit trails or network packet traces. This potentially allows intruders to modify the information before the intrusion detection system obtains it and slows down the detection and prevention of DoS attacks, making it possible for an intruder to hide his activities. In this paper we propose work that will attempt to show that it is possible to perform intrusion detection mechanism of DoS attacks using small sensors embedded in a computer system. These sensors will look for signs of specific intrusions. They will perform target monitoring by observing the behavior of the through an audit trail or other indirect means in real time while the Snort IDS running. Furthermore, by being built into the computer system it could provide a flexible alert sensor which may not impose a considerable extra load on the host they monitor.

  1. Detection of low salience whisker stimuli requires synergy of tectal and thalamic sensory relays

    PubMed Central

    Cohen, Jeremy D.; Castro-Alamancos, Manuel A.

    2010-01-01

    Detection of a sensory stimulus depends on its psychophysical saliency; the higher the saliency, the easier the detection. But it is not known if sensory relay nuclei differ in their ability to detect low salient whisker stimuli. We found that reversible lesions of either the somatosensory thalamus or superior colliculus blocked detection of a low salience whisker conditioned stimulus (WCS) in an active avoidance task, without affecting detection of a high salience WCS. Thus, thalamic and tectal sensory relays work synergistically to detect low salient stimuli during avoidance behavior, but are redundant during detection of highly salient stimuli. We also recorded electrophysiological responses evoked by high and low salience stimuli in the superior colliculus and barrel cortex of freely behaving animals during active exploration, awake immobility and sensory detection in the active avoidance task. Field potential (FP) responses evoked in barrel cortex and superior colliculus by high intensity stimuli are larger and adapt more to frequency than those evoked by low intensity stimuli. FP responses are also more suppressed and adapt less during active exploration, and become further suppressed in barrel cortex during successful detection of either high or low salient stimuli in the active avoidance task. In addition, unit recordings revealed that firing rate increases in superior colliculus during active exploration, and especially during successful detection of either high or low salient stimuli in the active avoidance task. We conclude that detection of low salient stimuli is achieved by a sparse neural code distributed through multiple sensory relays. PMID:20147551

  2. Windows NT Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    2000-06-01

    Neptune and Smurf. These attacks are fully documented in [10]. In addition, two denial-of-service attacks, CrashIIS and DoSNuke, were developed to...in the Netscape browser. NetBus and NetCat use trojan programs to establish back doors on the victim system. PPMacro inserts malicious macro code...detecting the attack. 51 7.2 Netbus R-s-U Description The attacker uses a trojan program to install and run the Netbus server, version 1.7, on

  3. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    NASA Technical Reports Server (NTRS)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  4. A Cyber-Attack Detection Model Based on Multivariate Analyses

    NASA Astrophysics Data System (ADS)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.

  5. Patrol Detection for Replica Attacks on Wireless Sensor Networks

    PubMed Central

    Wang, Liang-Min; Shi, Yang

    2011-01-01

    Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algorithms for stationary and mobile modes are presented. Then we perform security analysis to discuss the defense strategies against the possible attacks on the proposed detection protocol. Moreover, we show the advantages of the proposed protocol by discussing and comparing the communication cost and detection probability with some existing methods. PMID:22163752

  6. VoIP attacks detection engine based on neural network

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  7. Performance Evaluation and Optimal Detection of Relay-Assisted Diffusion-Based Molecular Communication with Drift.

    PubMed

    Tavakkoli, Nooshin; Azmi, Paeiz; Mokari, Nader

    2016-11-16

    In this paper, we consider a decode-and-forward (DF) relay-assisted diffusion-based molecular communication system inside one of the blood vessels of a human body with positive drift from transmitter to receiver. We use the normal approximation to the distribution of the number of received molecules and derive a closed-form expression for the end-toend bit error probability of the system. We then propose an optimization problem that aims at minimizing the bit error probability of the system and solve it at the receiver nanomachine by an algorithm based on the bisection method to determine the optimal detection threshold. Furthermore, we study the impact of the system parameters, such as drift velocity, position of the relay node and number of allocated molecules on the performance of the system. The numerical results show that with a constant molecular budget, DF relying strategy can considerably improve the system performance.

  8. Sleep Deprivation Attack Detection in Wireless Sensor Network

    NASA Astrophysics Data System (ADS)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  9. Side-attack mine detection via morphological image analysis

    NASA Astrophysics Data System (ADS)

    McElroy, John; Hawkins, Chris; Gader, Paul D.; Keller, James M.; Luke, Robert

    2004-09-01

    Mathematical morphology is a field of knowledge and techniques involving the application of nonlinear image processing operations to perform image enhancement, feature extraction, and segmentation as well as a variety of other tasks. Morphological operations have previously been combined with neural networks to produce detectors that learn features and classification rules simultaneously. The previous networks have been demonstrated to provide the capability for detecting occluded vehicles of specific types using LADAR, SAR, Infrared, and Visible imagery. In this paper, we describe the application of morphological shared weight neural networks to detecting off-route, or "side attack", mines. A pair of image sequences, both of the same scene, with and without a mine are presented to the system. The network then performs detection and decision-making on a per sequence basis.

  10. Integrated situational awareness for cyber attack detection, analysis, and mitigation

    NASA Astrophysics Data System (ADS)

    Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng

    2012-06-01

    Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.

  11. From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time-Critical Traffic

    DTIC Science & Technology

    2011-04-01

    we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and robust jamming detection for...analytical and experimental results, we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and...Based on our theoretical and ex- perimental results, we design and implement the JADE system (Jamming Attack Detection based on Estimation) to achieve

  12. Target-specific NMR detection of protein-ligand interactions with antibody-relayed (15)N-group selective STD.

    PubMed

    Hetényi, Anasztázia; Hegedűs, Zsófia; Fajka-Boja, Roberta; Monostori, Éva; Kövér, Katalin E; Martinek, Tamás A

    2016-12-01

    Fragment-based drug design has been successfully applied to challenging targets where the detection of the weak protein-ligand interactions is a key element. (1)H saturation transfer difference (STD) NMR spectroscopy is a powerful technique for this work but it requires pure homogeneous proteins as targets. Monoclonal antibody (mAb)-relayed (15)N-GS STD spectroscopy has been developed to resolve the problem of protein mixtures and impure proteins. A (15)N-labelled target-specific mAb is selectively irradiated and the saturation is relayed through the target to the ligand. Tests on the anti-Gal-1 mAb/Gal-1/lactose system showed that the approach is experimentally feasible in a reasonable time frame. This method allows detection and identification of binding molecules directly from a protein mixture in a multicomponent system.

  13. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    PubMed Central

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  14. Steganography forensics method for detecting least significant bit replacement attack

    NASA Astrophysics Data System (ADS)

    Wang, Xiaofeng; Wei, Chengcheng; Han, Xiao

    2015-01-01

    We present an image forensics method to detect least significant bit replacement steganography attack. The proposed method provides fine-grained forensics features by using the hierarchical structure that combines pixels correlation and bit-planes correlation. This is achieved via bit-plane decomposition and difference matrices between the least significant bit-plane and each one of the others. Generated forensics features provide the susceptibility (changeability) that will be drastically altered when the cover image is embedded with data to form a stego image. We developed a statistical model based on the forensics features and used least square support vector machine as a classifier to distinguish stego images from cover images. Experimental results show that the proposed method provides the following advantages. (1) The detection rate is noticeably higher than that of some existing methods. (2) It has the expected stability. (3) It is robust for content-preserving manipulations, such as JPEG compression, adding noise, filtering, etc. (4) The proposed method provides satisfactory generalization capability.

  15. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  16. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    PubMed Central

    Alajmi, Naser; Elleithy, Khaled

    2015-01-01

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable. PMID:26610499

  17. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    PubMed

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  18. MULTOPS: A Data-Structure for Bandwidth Attack Detection

    DTIC Science & Technology

    2007-11-02

    Computer Systems, 18(3):263–297, August 2000. [Net00] Netscape . Leading Web sites under attack, February 2000. Available at http: //technews.netscape.com...to crash. This can have serious consequences for Web companies which rely on their online availability to do business. This paper intro- duces a data...packets. Another attack works by generating a huge amount of normal traffic by, for example, running a JavaScript pro- gram in a browser that pops up

  19. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    NASA Astrophysics Data System (ADS)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  20. IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks

    NASA Astrophysics Data System (ADS)

    Du, Ping; Abe, Shunji

    Denial of service (DoS) attacks have become one of the most serious threats to the Internet. Enabling detection of attacks in network traffic is an important and challenging task. However, most existing volume-based schemes can not detect short-term attacks that have a minor effect on traffic volume. On the other hand, feature-based schemes are not suitable for real-time detection because of their complicated calculations. In this paper, we develop an IP packet size entropy (IPSE)-based DoS/DDoS detection scheme in which the entropy is markedly changed when traffic is affected by an attack. Through our analysis, we find that the IPSE-based scheme is capable of detecting not only long-term attacks but also short-term attacks that are beyond the volume-based schemes' ability to detect. Moreover, we test our proposal using two typical Internet traffic data sets from DARPA and SINET, and the test results show that the IPSE-based detection scheme can provide detection of DoS/DDoS attacks not only in a local area network (DARPA) and but also in academic backbone network (SINET).

  1. Method and apparatus for detecting cyber attacks on an alternating current power grid

    DOEpatents

    McEachern, Alexander; Hofmann, Ronald

    2017-04-11

    A method and apparatus for detecting cyber attacks on remotely-operable elements of an alternating current distribution grid. Two state estimates of the distribution grid are prepared, one of which uses micro-synchrophasors. A difference between the two state estimates indicates a possible cyber attack.

  2. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  3. Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

    NASA Astrophysics Data System (ADS)

    Jung, Sungmo; Kim, Jong Hyun; Cagalaban, Giovanni; Lim, Ji-Hoon; Kim, Seoksoo

    More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of 'an executing environment aware attack' by analyzing system behaviors and monitoring memory.

  4. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    NASA Astrophysics Data System (ADS)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  5. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    PubMed

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  6. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    PubMed Central

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting. PMID:26236773

  7. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    PubMed

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  8. Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes

    PubMed Central

    Banković, Zorana; Fraga, David; Moya, José M.; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised. PMID:23112632

  9. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    PubMed

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  10. Multi stage attack Detection system for Network Administrators using Data Mining

    SciTech Connect

    Rajeshwar, Katipally; Gasior, Wade C; Yang, Dr. Li

    2010-04-01

    In this paper, we present a method to discover, visualize, and predict behavior pattern of attackers in a network based system. We proposed a system that is able to discover temporal pattern of intrusion which reveal behaviors of attackers using alerts generated by Intrusion Detection System (IDS). We use data mining techniques to find the patterns of generated alerts by generating Association rules. Our system is able to stream real-time Snort alerts and predict intrusions based on our learned rules. Therefore, we are able to automatically discover patterns in multistage attack, visualize patterns, and predict intrusions.

  11. Autonomous mobile communication relays

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Everett, Hobart R.; Manouk, Narek; Verma, Ambrish

    2002-07-01

    Maintaining a solid radio communication link between a mobile robot entering a building and an external base station is a well-recognized problem. Modern digital radios, while affording high bandwidth and Internet-protocol-based automatic routing capabilities, tend to operate on line-of-sight links. The communication link degrades quickly as a robot penetrates deeper into the interior of a building. This project investigates the use of mobile autonomous communication relay nodes to extend the effective range of a mobile robot exploring a complex interior environment. Each relay node is a small mobile slave robot equipped with sonar, ladar, and 802.11b radio repeater. For demonstration purposes, four Pioneer 2-DX robots are used as autonomous mobile relays, with SSC-San Diego's ROBART III acting as the lead robot. The relay robots follow the lead robot into a building and are automatically deployed at various locations to maintain a networked communication link back to the remote operator. With their on-board external sensors, they also act as rearguards to secure areas already explored by the lead robot. As the lead robot advances and RF shortcuts are detected, relay nodes that become unnecessary will be reclaimed and reused, all transparent to the operator. This project takes advantage of recent research results from several DARPA-funded tasks at various institutions in the areas of robotic simulation, ad hoc wireless networking, route planning, and navigation. This paper describes the progress of the first six months of the project.

  12. Analysis of Intrusion Detection and Attack Proliferation in Computer Networks

    NASA Astrophysics Data System (ADS)

    Rangan, Prahalad; Knuth, Kevin H.

    2007-11-01

    One of the popular models to describe computer worm propagation is the Susceptible-Infected (SI) model [1]. This model of worm propagation has been implemented on the simulation toolkit Network Simulator v2 (ns-2) [2]. The ns-2 toolkit has the capability to simulate networks of different topologies. The topology studied in this work, however, is that of a simple star-topology. This work introduces our initial efforts to learn the relevant quantities describing an infection given synthetic data obtained from running the ns-2 worm model. We aim to use Bayesian methods to gain a predictive understanding of how computer infections spread in real world network topologies. This understanding would greatly reinforce dissemination of targeted immunization strategies, which may prevent real-world epidemics. The data consist of reports of infection from a subset of nodes in a large network during an attack. The infection equation obtained from [1] enables us to derive a likelihood function for the infection reports. This prior information can be used in the Bayesian framework to obtain the posterior probabilities for network properties of interest, such as the rate at which nodes contact one another (also referred to as contact rate or scan rate). Our preliminary analyses indicate an effective spread rate of only 1/5th the actual scan rate used for a star-type of topology. This implies that as the population becomes saturated with infected nodes the actual spread rate will become much less than the scan rate used in the simulation.

  13. Security attack detection algorithm for electric power gis system based on mobile application

    NASA Astrophysics Data System (ADS)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  14. Information Assurance: Detection & Response to Web Spam Attacks

    DTIC Science & Technology

    2010-08-28

    As online social media applications such as blogs, social bookmarking (folksonomies), and wikis continue to gain its popularity, concerns about the...sites. The goal of this research is to investigate novel techniques to detect Web spam in social media web sites. Specifically, we have developed a...co-classification framework that simultaneously detects web spam and the spammers who are responsible for posting them on social media web sites. Using

  15. Methods, media, and systems for detecting attack on a digital processing device

    SciTech Connect

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Methods, media, and systems for detecting attack on a digital processing device

    DOEpatents

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromytis, Angelos D.; Androulaki, Elli

    2017-02-21

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  17. Entropy Based Detection of DDoS Attacks in Packet Switching Network Models

    NASA Astrophysics Data System (ADS)

    Lawniczak, Anna T.; Wu, Hao; di Stefano, Bruno

    Distributed denial-of-service (DDoS) attacks are network-wide attacks that cannot be detected or stopped easily. They affect “natural” spatio-temporal packet traffic patterns, i.e. “natural distributions” of packets passing through the routers. Thus, they affect “natural” information entropy profiles, a sort of “fingerprints”, of normal packet traffic. We study if by monitoring information entropy of packet traffic through selected routers one may detect DDoS attacks or anomalous packet traffic in packet switching network (PSN) models. Our simulations show that the considered DDoS attacks of “ping” type cause shifts in information entropy profiles of packet traffic monitored even at small sets of routers and that it is easier to detect these shifts if static routing is used instead of dynamic routing. Thus, network-wide monitoring of information entropy of packet traffic at properly selected routers may provide means for detecting DDoS attacks and other anomalous packet traffics.

  18. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    PubMed

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  19. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    PubMed Central

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A.

    2016-01-01

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers. PMID:27548169

  20. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks

    SciTech Connect

    Moore, Michael Roy; Bridges, Robert A; Combs, Frank L; Starr, Michael S; Prowell, Stacy J

    2017-01-01

    Modern vehicles rely on hundreds of on-board electronic control units (ECUs) communicating over in-vehicle networks. As external interfaces to the car control networks (such as the on-board diagnostic (OBD) port, auxiliary media ports, etc.) become common, and vehicle-to-vehicle / vehicle-to-infrastructure technology is in the near future, the attack surface for vehicles grows, exposing control networks to potentially life-critical attacks. This paper addresses the need for securing the CAN bus by detecting anomalous traffic patterns via unusual refresh rates of certain commands. While previous works have identified signal frequency as an important feature for CAN bus intrusion detection, this paper provides the first such algorithm with experiments on five attack scenarios. Our data-driven anomaly detection algorithm requires only five seconds of training time (on normal data) and achieves true positive / false discovery rates of 0.9998/0.00298, respectively (micro-averaged across the five experimental tests).

  1. Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Hyoungchun; Lee, Donghoon

    The growing use of web services is increasing web browser attacks exponentially. Most attacks use a technique called heap spraying because of its high success rate. Heap spraying executes a malicious code without indicating the exact address of the code by copying it into many heap objects. For this reason, the attack has a high potential to succeed if only the vulnerability is exploited. Thus, attackers have recently begun using this technique because it is easy to use JavaScript to allocate the heap memory area. This paper proposes a novel technique that detects heap spraying attacks by executing a heap object in a real environment, irrespective of the version and patch status of the web browser. This runtime execution is used to detect various forms of heap spraying attacks, such as encoding and polymorphism. Heap objects are executed after being filtered on the basis of patterns of heap spraying attacks in order to reduce the overhead of the runtime execution. Patterns of heap spraying attacks are based on analysis of how an web browser accesses benign web sites. The heap objects are executed forcibly by changing the instruction register into the address of them after being loaded into memory. Thus, we can execute the malicious code without having to consider the version and patch status of the browser. An object is considered to contain a malicious code if the execution reaches a call instruction and then the instruction accesses the API of system libraries, such as kernel32.dll and ws_32.dll. To change registers and monitor execution flow, we used a debugger engine. A prototype, named HERAD(HEap spRAying Detector), is implemented and evaluated. In experiments, HERAD detects various forms of exploit code that an emulation cannot detect, and some heap spraying attacks that NOZZLE cannot detect. Although it has an execution overhead, HERAD produces a low number of false alarms. The processing time of several minutes is negligible because our research focuses on

  2. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    DTIC Science & Technology

    2014-03-27

    Control System IDS Intrusion Detection System IP Internet Protocol IT Information Technology JTAG Joint Test Action Group LAN Local Area Network PLC...firewalls or Intrusion Detection System (IDS), implementing cryptography, and improving protocol security. There are few vendors, however, that include...Mode Setting Register Values. Mode r0 Value r3 Value PRGM 0x11 0x1 RUN 0x11 0x2 REM PRGM 0x12 0x1 REM RUN 0x12 0x2 cpmode 1 contains two

  3. Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm

    NASA Astrophysics Data System (ADS)

    Song, Jae-Gu; Kim, Jong Hyun; Seo, Dongil; Soh, Wooyoung; Kim, Seoksoo

    Botnet-based cyber attacks cause large-scale damage with increasingly intelligent tools, which has called for varied research on bot detection. In this study, we developed a method of monitoring behaviors of host-based processes from the point that a bot header attempts to make zombie PCs, detecting cyber attack precursor symptoms. We designed an algorithm that figures out characteristics of botnet which attempts to launch malicious behaviors by means of signature registration, which is for process/reputation/network traffic/packet/source analysis and a white list, as a measure to respond to bots from the end point.

  4. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  5. Ethanol accumulation during severe drought may signal tree vulnerability to detection and attack by bark beetles

    Treesearch

    Rick G. Kelsey; D. Gallego; F.J. Sánchez-Garcia; J.A. Pajares

    2014-01-01

    Tree mortality from temperature-driven drought is occurring in forests around the world, often in conjunction with bark beetle outbreaks when carbon allocation to tree defense declines. Physiological metrics for detecting stressed trees with enhanced vulnerability prior to bark beetle attacks remain elusive. Ethanol, water, monoterpene concentrations, and composition...

  6. DETECTION OF TOXICANT(S) ON BUILDING SURFACES FOLLOWING CHEMICAL ATTACK

    EPA Science Inventory

    A critical step prior to reoccupation of any facility following a chemical attack is monitoring for toxic compounds on surfaces within that facility. Low level detection of toxicant(s) is necessary to ensure that these compounds have been eliminated after building decontaminatio...

  7. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    PubMed

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  8. Detection of Denial of QoS Attacks on Diffserv Networks

    DTIC Science & Technology

    2002-01-01

    validated by the simulations, the method is a strong candidate for QoS-intrusion detection for a low -cost commercial deployment. Report Documentation...work describes a real-time, scalable denial of QoS attack detection system with a low false alarm generation rate that can be deployed to protect...way or two-way delays, and jitter. For example, an EF service class SLA typically specifies low latency/delay and low jitter. An EF flow sensor then

  9. PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs

    PubMed Central

    Liu, Anfeng; Dong, Mianxiong; Ota, Kaoru; Long, Jun

    2015-01-01

    In this paper, a Per-Hop Acknowledgement (PHACK)-based scheme is proposed for each packet transmission to detect selective forwarding attacks. In our scheme, the sink and each node along the forwarding path generate an acknowledgement (ACK) message for each received packet to confirm the normal packet transmission. The scheme, in which each ACK is returned to the source node along a different routing path, can significantly increase the resilience against attacks because it prevents an attacker from compromising nodes in the return routing path, which can otherwise interrupt the return of nodes’ ACK packets. For this case, the PHACK scheme also has better potential to detect abnormal packet loss and identify suspect nodes as well as better resilience against attacks. Another pivotal issue is the network lifetime of the PHACK scheme, as it generates more acknowledgements than previous ACK-based schemes. We demonstrate that the network lifetime of the PHACK scheme is not lower than that of other ACK-based schemes because the scheme just increases the energy consumption in non-hotspot areas and does not increase the energy consumption in hotspot areas. Moreover, the PHACK scheme greatly simplifies the protocol and is easy to implement. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high detection probability and the ability to identify suspect nodes. PMID:26690178

  10. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    NASA Astrophysics Data System (ADS)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  11. Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks

    SciTech Connect

    Popovsky, Barbara; Narvaez Suarez, Julia F.; Seifert, Christian; Frincke, Deborah A.; O'Neil, Lori R.; Aval, Chiraag U.

    2009-07-24

    This paper presents the application of deception theory to improve the success of client honeypots at detecting malicious web page attacks from infected servers programmed by online criminals to launch drive-by-download attacks. The design of honeypots faces three main challenges: deception, how to design honeypots that seem real systems; counter-deception, techniques used to identify honeypots and hence defeating their deceiving nature; and counter counter-deception, how to design honeypots that deceive attackers. The authors propose the application of a deception model known as the deception planning loop to identify the current status on honeypot research, development and deployment. The analysis leads to a proposal to formulate a landscape of the honeypot research and planning of steps ahead.

  12. Statistical issues and challenges associated with rapid detection of bio-terrorist attacks.

    PubMed

    Fienberg, Stephen E; Shmueli, Galit

    2005-02-28

    The traditional focus for detecting outbreaks of an epidemic or bio-terrorist attack has been on the collection and analysis of medical and public health data. Although such data are the most direct indicators of symptoms, they tend to be collected, delivered, and analysed days, weeks, and even months after the outbreak. By the time this information reaches decision makers it is often too late to treat the infected population or to react in some other way. In this paper, we explore different sources of data, traditional and non-traditional, that can be used for detecting a bio-terrorist attack in a timely manner. We set our discussion in the context of state-of-the-art syndromic surveillance systems and we focus on statistical issues and challenges associated with non-traditional data sources and the timely integration of multiple data sources for detection purposes. Copyright 2005 John Wiley & Sons, Ltd.

  13. Group Testing Based Detection of Web Service DDoS Attackers

    NASA Astrophysics Data System (ADS)

    Nashat, Dalia; Jiang, Xiaohong; Kameyama, Michitaka

    The Distributed Denial of Service attack (DDoS) is one of the major threats to network security that exhausts network bandwidth and resources. Recently, an efficient approach Live Baiting was proposed for detecting the identities of DDoS attackers in web service using low state overhead without requiring either the models of legitimate requests nor anomalous behavior. However, Live Baiting has two limitations. First, the detection algorithm adopted in Live Baiting starts with a suspects list containing all clients, which leads to a high false positive probability especially for large web service with a huge number of clients. Second, Live Baiting adopts a fixed threshold based on the expected number of requests in each bucket during the detection interval without the consideration of daily and weekly traffic variations. In order to address the above limitations, we first distinguish the clients activities (Active and Non-Active clients during the detection interval) in the detection process and then further propose a new adaptive threshold based on the Change Point Detection method, such that we can improve the false positive probability and avoid the dependence of detection on sites and access patterns. Extensive trace-driven simulation has been conducted on real Web trace to demonstrate the detection efficiency of the proposed scheme in comparison with the Live Baiting detection scheme.

  14. Investigation on iterative multiuser detection physical layer network coding in two-way relay free-space optical links with turbulences and pointing errors.

    PubMed

    Abu-Almaalie, Zina; Ghassemlooy, Zabih; Bhatnagar, Manav R; Le-Minh, Hoa; Aslam, Nauman; Liaw, Shien-Kuei; Lee, It Ee

    2016-11-20

    Physical layer network coding (PNC) improves the throughput in wireless networks by enabling two nodes to exchange information using a minimum number of time slots. The PNC technique is proposed for two-way relay channel free space optical (TWR-FSO) communications with the aim of maximizing the utilization of network resources. The multipair TWR-FSO is considered in this paper, where a single antenna on each pair seeks to communicate via a common receiver aperture at the relay. Therefore, chip interleaving is adopted as a technique to separate the different transmitted signals at the relay node to perform PNC mapping. Accordingly, this scheme relies on the iterative multiuser technique for detection of users at the receiver. The bit error rate (BER) performance of the proposed system is examined under the combined influences of atmospheric loss, turbulence-induced channel fading, and pointing errors (PEs). By adopting the joint PNC mapping with interleaving and multiuser detection techniques, the BER results show that the proposed scheme can achieve a significant performance improvement against the degrading effects of turbulences and PEs. It is also demonstrated that a larger number of simultaneous users can be supported with this new scheme in establishing a communication link between multiple pairs of nodes in two time slots, thereby improving the channel capacity.

  15. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    NASA Astrophysics Data System (ADS)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  16. School absentee data modeling for possible detection of chem-bio attacks

    NASA Astrophysics Data System (ADS)

    Jaenisch, Holger M.; Handley, James W.; Jaenisch, Kristina L.; Faucheux, Jeffrey P.

    2005-05-01

    A baseline mathematical Data Model for rapid detection of events affecting school attendance was established using measured absenteeism. We derived a process model in the form of a differential equation of baseline or nominal behavior of sufficient fidelity to enable predictive what-if excursions to be done. Also, we derived a change detector equation enabling aberrant absenteeism to be flagged on the first day of detection. Used together, both mathematical models provide a powerful tool set for analysis and examining what unusual absenteeism patterns might be like due to chem-bio attack. A convenient single page lookup table is provided to give predictive analysis capability without resorting to cumbersome calculations.

  17. Seismic ruggedness of relays

    SciTech Connect

    Merz, K.L. )

    1991-08-01

    This report complements EPRI report NP-5223 Revision 1, February 1991, and presents additional information and analyses concerning generic seismic ruggedness of power plant relays. Existing and new test data have been used to construct Generic Equipment Ruggedness Spectra (GERS) which can be used in identifying rugged relays during seismic re-evaluation of nuclear power plants. This document is an EPRI tier 1 report. The results of relay fragility tests for both old and new relays are included in an EPRI tier 2 report with the same title. In addition to the presentation of relay GERS, the tier 2 report addresses the applicability of GERS to relays of older vintage, discusses the important identifying nomenclature for each relay type, and examines relay adjustment effects on seismic ruggedness. 9 refs., 3 figs, 1 tab.

  18. Recovering Energy From Relays

    NASA Technical Reports Server (NTRS)

    Mclyman, C. W.

    1985-01-01

    Magnetic energy stored in relay recovered with aid of simple circuit. Circuit recovers more than 20 percent of energy stored in relay winding and returns it to powerline. New three-transistor driver circuit requires no additional winding.

  19. Did NATO attacks in Yugoslavia cause a detectable environmental effect in Hungary?

    PubMed

    Kerekes, A; Capote-Cuellar, A; Köteles, G J

    2001-02-01

    Because of the intensive NATO bombardment of the neighboring region to Hungary, i.e., Vojvodina, North Yugoslavia, air monitoring for detection of depleted uranium particles supposed to be used as a component of bullets was extended to the Southern region of the country. Alpha spectrometry was applied as a sensitive analytical technique able to detect uranium. Though no depleted uranium was detected in air by the sensitive technique of alpha-spectrometry, the increased uranium content in natural ratio as a component of normal soil, natural gas, etc., is suggested to originate from well dispersed dust (2.5 microm size) emitted to the atmosphere by explosions during bombing. This observation is supported by the geographical distribution and the relatively rapid decrease of pollution after the bomb attacks ceased.

  20. Wind generated by an attacking bat: anemometric measurements and detection by the praying mantis cercal system.

    PubMed

    Triblehorn, Jeffrey D; Yager, David D

    2006-04-01

    The wind-sensitive cercal system, well-known for mediating terrestrial escape responses, may also mediate insect aerial bat-avoidance responses triggered by wind generated by the approaching bat. One crucial question is whether enough time exists between detection and capture for the insect to perform a successful evasive maneuver. A previous study estimated this time to be 16 ms, based on cockroach behavioral latencies and a prediction for the detection time derived from a simulated predator moving toward a simulated prey. However, the detection time may be underestimated since both the simulated predator and prey lacked certain characteristics present in the natural situation. In the present study, actual detection times are measured by recording from wind-sensitive interneurons of a tethered praying mantis that serves as the target for a flying, attacking bat. Furthermore, using hot-wire anemometry, we describe and quantify the wind generated by an attacking bat. Anemometer measurements revealed that the velocity of the bat-generated wind consistently peaks early with a high acceleration component (an important parameter for triggering wind-mediated terrestrial responses). The physiological recordings determined that the mantis cercal system detected an approaching bat 74 ms before contact, which would provide the insect with 36 ms to perform a maneuver before capture. This should be sufficient time for the mantis to respond. Although it probably would not have time for a full response that completely evades the bat, even a partial response might alter the mantid's trajectory enough to cause the bat to mishandle the insect, allowing it to escape.

  1. Ultrasensitive cardiac troponin I antibody based nanohybrid sensor for rapid detection of human heart attack.

    PubMed

    Bhatnagar, Deepika; Kaur, Inderpreet; Kumar, Ashok

    2017-02-01

    An ultrasensitive cardiac troponin I antibody conjugated with graphene quantum dots (GQD) and polyamidoamine (PAMAM) nanohybrid modified gold electrode based sensor was developed for the rapid detection of heart attack (myocardial infarction) in human. Screen printed gold (Au) electrode was decorated with 4-aminothiophenol for amine functionalization of the Au surface. These amino groups were further coupled with carboxyl functionalities of GQD with EDC-NHS reaction. In order to enhance the sensitivity of the sensor, PAMAM dendrimer was successively embedded on GQD through carbodiimide coupling to provide ultra-high surface area for antibody immobilization. The activated cardiac troponin I (cTnI) monoclonal antibody was immobilized on PAMAM to form nanoprobe for sensing specific heart attack marker cTnI. Various concentrations of cardiac marker, cTnI were electrochemically measured using cyclic voltammetry (CV) and differential pulse voltammetry (DPV) in human blood serum. The modifications on sensor surface were characterized by FTIR and AFM techniques. The sensor is highly specific to cTnI and showed negligible response to non-specific antigens. The sensitivity of the sensor was 109.23μAcm(-2)μg(-1) and lower limit of detection of cTnI was found 20fgmL(-1). Copyright © 2016 Elsevier B.V. All rights reserved.

  2. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems

    DTIC Science & Technology

    1999-06-01

    Mailbomb R-a-Deny(Administrative) .................................................................44 6.5 SYN Flood ( Neptune ) R-a-Deny(Temporary...a system which is actually a trojan horse containing malicious code that gives the attacker system access. Implementation Bug: Bugs in trusted...including many forms of malicious code such as trojan horses, viruses, attacks that take advantage of race conditions, and attacks that take advantage

  3. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge.

    PubMed

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-15

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  4. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    PubMed Central

    Ding, Chao; Yang, Lijun; Wu, Meng

    2017-01-01

    Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs), adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies. PMID:28098846

  5. Early attack reaction sensor (EARS), a man-wearable gunshot detection system

    NASA Astrophysics Data System (ADS)

    Chang, Jay; Mendyk, William; Thier, Lisa; Yun, Paul; LaRow, Andy; Shaw, Scott; Schoenborn, William

    2006-05-01

    The Early Attack Reaction Sensor (EARS) is a modified passive acoustic system that detects gunshots (muzzle blast and/or shockwave) to provide the user with relative azimuth and range of sniper fire via both audio alert and visual display. The EARS system consists of a microphone array in a small planar configuration and an equivalently sized Digital Signal Processing board, which is interfaced to a PDA via a PCMCIA slot. Hence, configuration easily provides portability. However, the system is being repackaged for man-wearable and vehicle mount applications. The EARS system in a PDA configuration has been tested in open fields at up to 500 meters range and has provided useable bearing and range information against the sniper rounds. This paper will discuss EARS system description, various test results, and EARS system capabilities and limitations.

  6. A configurable-hardware document-similarity classifier to detect web attacks.

    SciTech Connect

    Ulmer, Craig D.; Gokhale, Maya

    2010-04-01

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to reconfigurable hardware. The TFIDF classifier is used to detect web attacks in HTTP data. In our reconfigurable hardware approach, we design a streaming, real-time classifier by simplifying an existing sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. We have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires two orders of magnitude less memory than the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  7. Optimised secure transmission through untrusted AF relays using link adaptation

    NASA Astrophysics Data System (ADS)

    Taki, Mehrdad; Sadeghi, Mohammad

    2016-05-01

    A new transmission scheme is presented for a two-hop relay network including two AF relays, considering physical layer security where relays are not able to detect signal with an acceptable bit error rate (BER) but the combined received signal is detected with an acceptable BER at the final receiver. It is assumed that there is no direct path between the transmitter and the receiver (relay network without diversity). Adaptive modulation and coding is utilised at the transmitter and transmission powers of the transmitter and of the relays are continuously adapted provisioning individual average power constraint for each node. Numerical evaluations show that an acceptable performance degradation is seen by the proposed secure relaying scheme compared to the optimum relay selection scheme without security constraint.

  8. Graphene quantum dots FRET based sensor for early detection of heart attack in human.

    PubMed

    Bhatnagar, Deepika; Kumar, Vanish; Kumar, Ashok; Kaur, Inderpreet

    2016-05-15

    Cardiac immunosensor for early detection of heart attack (myocardial infarction) was developed using amine functionalized graphene quantum dots (afGQDs) conjugated with antibody anti-cardiac Troponin I (anti-cTnI) to detect cardiac marker antigen Troponin I (cTnI) in blood based on fluorescence resonance energy transfer (FRET) between conjugate and graphene (quencher) only in 10 min. The anti-cTnI was covalently conjugated to afGQDs through carbodiimide coupling reaction. The conjugate was characterized by zeta potential UV-vis spectroscopy and field emission scanning electron microscopy (FESEM). The sensing performance of the sensor was studied with respect to changes in the photon count and photoluminescence of GQDs based on interaction of target cTnI with its specific anti-cTnI antibody. The sensor is highly specific and shows negligible response to non-specific antigens. The sensor displayed a linear response to cTnI from 0.001 to 1000 ng mL(-1) with a limit of detection of 0.192 pg mL(-1). Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    PubMed

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.

  10. A Flexible, High Performance Service-Oriented Architecture for Detecting Cyber Attacks

    SciTech Connect

    Wynne, Adam S.; Gorton, Ian; Almquist, Justin P.; Chatterton, Jack; Thurman, David A.

    2008-02-01

    The next generation of intrusion detection and cyber defense technologies must be highly flexible so that deployed solutions can be quickly modified to detect new attack scenarios. They must also be able to provide the performance necessary to monitor traffic from high speed networks, and scale to enterprise wide deployments. In this paper we describe our experiences in creating a production application for cyber situational awareness. The application exploits the capabilities of several independently developed components and integrates them using SIFT (Scalable Information Fusion and Triage), a service-oriented architecture (SOA) designed for creating domain-independent, enterprise scale analytical applications. SIFT exploits a common design pattern for composing analytical components, and extends an existing messaging platform with scaling capabilities. We describe the design of the application, and provide a performance analysis that demonstrates the capabilities of the SIFT platform. The paper concludes by discussing the lessons we have learned from this project, and outlines the architecture of the MeDICI, the next generation of our enterprise analytics platforms.

  11. Efficient live face detection to counter spoof attack in face recognition systems

    NASA Astrophysics Data System (ADS)

    Biswas, Bikram Kumar; Alam, Mohammad S.

    2015-03-01

    Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.

  12. That Article: Frame Relay.

    ERIC Educational Resources Information Center

    Schuyler, Michael

    1994-01-01

    Compares Frame Relay with digital and analog alternatives for connecting sites on a Wide Area Network. Cost considerations, the concepts on which the technology is based, its carrying capacity, the use of CD-ROM and Graphical User Interface (GUI) on Frame Relay, and engineering bandwidth limitations are covered. (KRN)

  13. That Article: Frame Relay.

    ERIC Educational Resources Information Center

    Schuyler, Michael

    1994-01-01

    Compares Frame Relay with digital and analog alternatives for connecting sites on a Wide Area Network. Cost considerations, the concepts on which the technology is based, its carrying capacity, the use of CD-ROM and Graphical User Interface (GUI) on Frame Relay, and engineering bandwidth limitations are covered. (KRN)

  14. MAVEN Relay Operations Concept

    NASA Technical Reports Server (NTRS)

    Chamberlain, Neil; Gladden, Roy; Bruvold, Kris

    2012-01-01

    The Mars Atmosphere and Volatile EvolutioN (MAVEN) mission will launch in late 2013 and following a 10 month cruise to Mars, will study the upper atmosphere of the planet. In addition to the science instruments, the MAVEN spacecraft is equipped with an Electra UHF transceiver to support relay communication with landed assets. This paper describes how UHF relay service is provisioned by MAVEN. The discussion includes a description of the Electra payload, the process by which relay activities are coordinated and accounted for, the process of a typical relay session, including uplink and downlink, as well as special commands to calibrate and verify relay performance. The operational processes for providing these services are inherited largely from prior Mars missions and take advantage of existing infrastructure and lessons learned from those missions. Preliminary data volume return capabilities using adaptive data rates and low-density parity check channel coding are presented.

  15. Relay Sequence Generation Software

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Khanampompan, Teerapat

    2009-01-01

    Due to thermal and electromagnetic interactivity between the UHF (ultrahigh frequency) radio onboard the Mars Reconnaissance Orbiter (MRO), which performs relay sessions with the Martian landers, and the remainder of the MRO payloads, it is required to integrate and de-conflict relay sessions with the MRO science plan. The MRO relay SASF/PTF (spacecraft activity sequence file/ payload target file) generation software facilitates this process by generating a PTF that is needed to integrate the periods of time during which MRO supports relay activities with the rest of the MRO science plans. The software also generates the needed command products that initiate the relay sessions, some features of which are provided by the lander team, some are managed by MRO internally, and some being derived.

  16. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  17. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  18. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  19. Multifunction protective relay

    NASA Astrophysics Data System (ADS)

    Harlow, J.; Yalla, M.; Kantor, J.

    1991-11-01

    Since the enactment of the National Energy Act of 1979, many private energy producers have been planning and building small generation and cogeneration facilities in order to sell power to the local utility. Many of the non-utility generators built after 1979 are connected directly to the closest utility distribution circuit. Aware of the problems associated with connecting generators in this manner, electric utilities across the country developed specifications and standards to allow safe and reliable interconnection. The report describes a malfunction protective relay which uses state-of-the-art digital signal processing procedures to accomplish the objective of providing most of the relay requirements of utility electrical interconnections. The relay has been demonstrated to be suitable for this critical application through extensive laboratory and in-service field testing. The relay, incorporating thirteen distinct protection functions affords the user the savings of the initial capital cost plus simplicity of installation and use.

  20. Fully relayed regenerative amplifier

    DOEpatents

    Glass, Alexander J.

    1981-01-01

    A regenerative laser apparatus and method using the optical relay concept to maintain high fill factors, to suppress diffraction effects, and to minimize phase distortions in a regenerative amplifier.

  1. A TRANSISTORIZED RELAY SERVO.

    DTIC Science & Technology

    DC motor is achieved with standard power transistors and a simple transistorized preamplifier, A permanent magnet, DC motor is used as the test vehicle to illustrate the feasibility of control without an amplidyne or mechanical relay. The ’bang-bang’, capability of the controller to operate as a near-ideal ’relay’ is emphasized. The inherent flexibility allowed in selecting the switching characteristics is also demonstrated. The discussion points toward practical application and stresses the analysis of the switching

  2. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

    PubMed Central

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S. V.

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes. PMID:22319307

  3. Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system.

    PubMed

    Misra, Sudip; Singh, Ranjit; Rohith Mohan, S V

    2010-01-01

    The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

  4. Effect of Wireless Channels on Detection and Classification of Asthma Attacks in Wireless Remote Health Monitoring Systems

    PubMed Central

    Al-Momani, Orobah; Gharaibeh, Khaled M.

    2014-01-01

    This paper aims to study the performance of support vector machine (SVM) classification in detecting asthma attacks in a wireless remote monitoring scenario. The effect of wireless channels on decision making of the SVM classifier is studied in order to determine the channel conditions under which transmission is not recommended from a clinical point of view. The simulation results show that the performance of the SVM classification algorithm in detecting asthma attacks is highly influenced by the mobility of the user where Doppler effects are manifested. The results also show that SVM classifiers outperform other methods used for classification of cough signals such as the hidden markov model (HMM) based classifier specially when wireless channel impairments are considered. PMID:24678318

  5. Effect of wireless channels on detection and classification of asthma attacks in wireless remote health monitoring systems.

    PubMed

    Al-Momani, Orobah; Gharaibeh, Khaled M

    2014-01-01

    This paper aims to study the performance of support vector machine (SVM) classification in detecting asthma attacks in a wireless remote monitoring scenario. The effect of wireless channels on decision making of the SVM classifier is studied in order to determine the channel conditions under which transmission is not recommended from a clinical point of view. The simulation results show that the performance of the SVM classification algorithm in detecting asthma attacks is highly influenced by the mobility of the user where Doppler effects are manifested. The results also show that SVM classifiers outperform other methods used for classification of cough signals such as the hidden markov model (HMM) based classifier specially when wireless channel impairments are considered.

  6. Towards a Video Passive Content Fingerprinting Method for Partial-Copy Detection Robust against Non-Simulated Attacks

    PubMed Central

    2016-01-01

    Passive content fingerprinting is widely used for video content identification and monitoring. However, many challenges remain unsolved especially for partial-copies detection. The main challenge is to find the right balance between the computational cost of fingerprint extraction and fingerprint dimension, without compromising detection performance against various attacks (robustness). Fast video detection performance is desirable in several modern applications, for instance, in those where video detection involves the use of large video databases or in applications requiring real-time video detection of partial copies, a process whose difficulty increases when videos suffer severe transformations. In this context, conventional fingerprinting methods are not fully suitable to cope with the attacks and transformations mentioned before, either because the robustness of these methods is not enough or because their execution time is very high, where the time bottleneck is commonly found in the fingerprint extraction and matching operations. Motivated by these issues, in this work we propose a content fingerprinting method based on the extraction of a set of independent binary global and local fingerprints. Although these features are robust against common video transformations, their combination is more discriminant against severe video transformations such as signal processing attacks, geometric transformations and temporal and spatial desynchronization. Additionally, we use an efficient multilevel filtering system accelerating the processes of fingerprint extraction and matching. This multilevel filtering system helps to rapidly identify potential similar video copies upon which the fingerprint process is carried out only, thus saving computational time. We tested with datasets of real copied videos, and the results show how our method outperforms state-of-the-art methods regarding detection scores. Furthermore, the granularity of our method makes it suitable for

  7. Sensitive DC ground fault relays for coal mines

    SciTech Connect

    Yenchek, M.R.; Trutt, F.C.; Kohler, J.L.; Morley, L.A.; Novak, T.

    1987-07-01

    Recent US Bureau of Mines sponsored research aimed at virtually eliminating electrocutions on dc utilization circuits has resulted in an effective dc circuit protection device, called a sensitive ground fault relay (GFR). This relay can detect and act to interrupt small deadly ground currents that can trigger ventricular fibrillation in humans while ignoring spurious power system signals. Initially relay performance criteria were established to ensure reliability for mine duty as well as effectiveness for shock prevention. Mineworthy prototypes, consisting of a saturable-transformer current sensor and an electronic relay, were constructed. They complied with the performance standards in laboratory tests.

  8. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  9. Multi-Step Attack Detection via Bayesian Modeling under Model Parameter Uncertainty

    ERIC Educational Resources Information Center

    Cole, Robert

    2013-01-01

    Organizations in all sectors of business have become highly dependent upon information systems for the conduct of business operations. Of necessity, these information systems are designed with many points of ingress, points of exposure that can be leveraged by a motivated attacker seeking to compromise the confidentiality, integrity or…

  10. Subgroups of New York City children at high risk of PTSD after the September 11 attacks: a signal detection analysis.

    PubMed

    Rosen, Craig S; Cohen, Michael

    2010-01-01

    Case finding is an important challenge in mental health programs responding to large-scale disasters. Most people who experience psychological symptoms after such events return to normal functioning within a few months. Yet a significant minority continues to experience enduring symptoms. This study demonstrated the use of signal detection analyses of community survey data to identify subgroups of children who were at highest risk of posttraumatic stress disorder (PTSD) after the September 11 attacks. This study reanalyzed results of a needs assessment survey conducted six months after the World Trade Center attacks on September 11, 2001, with a representative sample of 7,832 New York City public school students in grades 4 to 12. Receiver operating characteristic (ROC) analyses conducted on half the sample resulted in a decision tree for classifying children into groups at varying levels of risk of PTSD. These decision rules were subsequently retested on the second half of the sample. We could reliably classify children into groups with varying probabilities of screening positive on a PTSD screen. Nearly two-thirds of children in grades 4 to 12 who screened positive for probable PTSD were concentrated among 4th graders (35%) and among children who had a friend or family member directly exposed to the attacks (28%). Signal detection analysis of community needs assessment surveys can identify community subgroups most likely to screen positive for mental health problems after a disaster or terrorist attack. This information can help target screening and outreach efforts to community segments that have the highest need for services.

  11. Heart attack

    MedlinePlus

    ... infarction; Non-ST - elevation myocardial infarction; NSTEMI; CAD - heart attack; Coronary artery disease - heart attack ... made up of cholesterol and other cells. A heart attack may occur when: A tear in the ...

  12. Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

    NASA Astrophysics Data System (ADS)

    Ali Mayouf, Mabroka; Shukur, Zarina

    Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

  13. 76 FR 24437 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... Video Relay Service Program, Further Notice of Proposed Rulemaking (VRS FNPRM), document FCC 11-54... Commission adopted rules to detect and prevent fraud and abuse in the provision of video relay service. The...

  14. 75 FR 51735 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ...; FCC 10-88] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... ways to amend its rules to detect and prevent fraud and misuse in the provision of Video Relay Service... is a summary of the Commission's Structure and Practices of the Video Relay Service Program, Notice...

  15. Quantum network with trusted and untrusted relays

    NASA Astrophysics Data System (ADS)

    Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen

    2012-02-01

    Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.

  16. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 234.263 Section 234.263 Transportation... Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that.... (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with...

  17. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 234.263 Section 234.263 Transportation... Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that.... (b)(1) Alternating current vane type relays, direct current polar type relays, and relays with...

  18. Latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes at least one permanent magnet and at least one electromagnet. The respective sections are, generally, arranged in separate locations or cavities in the assembly. The switch is latched by a permanent magnet assembly and selectively switched by an overriding electromagnetic assembly.

  19. A Practical Method for Assessing the Effectiveness of Vector Surge Relays for Distributed Generation Applications

    SciTech Connect

    Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun

    2005-01-01

    This paper presents simple and reliable method for predicting the islanding detection performance of vector surge relays. The relay performance is characterized by a tripping-time versus power-imbalance curve. With the curve, one can determine the time taken by a vector surge relay to detect islanding for any generation-load mismatch level. The main contribution of this paper is the development of analytical formulas for directly determining the behavior of vector surge relays. As a result, efforts needed to asses the relay performance for a given distributed generation scheme can be simplified significantly. The accuracy of the formulas has been verified by extensive simulation study results.

  20. Beam Control of Extremely Agile Relaying Laser Source for Bifocal Relay Mirror Spacecraft

    DTIC Science & Technology

    2006-09-01

    imaging, and a laser fence for aircraft detection and underground structure detection. 3 3. Bifocal Relay Mirror Laboratory In 2000, a...deinitialize frame-grabber camera clear - mex ; Set_Iterations = 1200; % Set the number of iterations the tracking sequence will run

  1. Neural methods based on modified reputation rules for detection and identification of intrusion attacks in wireless ad hoc sensor networks

    NASA Astrophysics Data System (ADS)

    Hortos, William S.

    2010-04-01

    Determining methods to secure the process of data fusion against attacks by compromised nodes in wireless sensor networks (WSNs) and to quantify the uncertainty that may exist in the aggregation results is a critical issue in mitigating the effects of intrusion attacks. Published research has introduced the concept of the trustworthiness (reputation) of a single sensor node. Reputation is evaluated using an information-theoretic concept, the Kullback- Leibler (KL) distance. Reputation is added to the set of security features. In data aggregation, an opinion, a metric of the degree of belief, is generated to represent the uncertainty in the aggregation result. As aggregate information is disseminated along routes to the sink node(s), its corresponding opinion is propagated and regulated by Josang's belief model. By applying subjective logic on the opinion to manage trust propagation, the uncertainty inherent in aggregation results can be quantified for use in decision making. The concepts of reputation and opinion are modified to allow their application to a class of dynamic WSNs. Using reputation as a factor in determining interim aggregate information is equivalent to implementation of a reputation-based security filter at each processing stage of data fusion, thereby improving the intrusion detection and identification results based on unsupervised techniques. In particular, the reputation-based version of the probabilistic neural network (PNN) learns the signature of normal network traffic with the random probability weights normally used in the PNN replaced by the trust-based quantified reputations of sensor data or subsequent aggregation results generated by the sequential implementation of a version of Josang's belief model. A two-stage, intrusion detection and identification algorithm is implemented to overcome the problems of large sensor data loads and resource restrictions in WSNs. Performance of the twostage algorithm is assessed in simulations of WSN

  2. Detection of atrial fibrillation with concurrent holter monitoring and continuous cardiac telemetry following ischemic stroke and transient ischemic attack.

    PubMed

    Lazzaro, Marc A; Krishnan, Kousik; Prabhakaran, Shyam

    2012-02-01

    Atrial fibrillation (AF) is a major risk factor for recurrent ischemic stroke. We aimed to compare the detection rate of AF using continuous cardiac telemetry (CCT) versus Holter monitoring in hospitalized patients with ischemic stroke or transient ischemic attack (TIA). Between June 2007 and December 2008, 133 patients were admitted to an academic institution for ischemic stroke or TIA and underwent concurrent inpatient CCT and Holter monitoring. Rates of AF detection by CCT and Holter monitoring were compared using the McNemar paired proportion test. Among the 133 patients, 8 (6.0%) were diagnosed with new-onset AF. On average, Holter monitoring was performed for 29.8 hours, and CCT was performed for 73.6 hours. The overall rate of AF detection was higher for Holter monitoring compared with CCT (6.0%; 95% confidence interval [CI], 2.9-11.6 vs 0; 95% CI, 0-3.4; P = .008). Holter detection of AF was even higher in specific subgroups (those with an embolic infarct pattern, those age >65 years, and those with coronary artery disease). Holter monitoring detected AF in 6% of hospitalized ischemic stroke and TIA patients, with higher proportions in high-risk subgroups. Compared with CCT, Holter monitoring is significantly more likely to detect arrhythmias. Copyright © 2012 National Stroke Association. Published by Elsevier Inc. All rights reserved.

  3. Relaying an optical wavefront

    DOEpatents

    Sweatt, William C.; Vawter, G. Allen

    2007-03-06

    A wavefront rely devices samples an incoming optical wavefront at different locations, optically relays the samples while maintaining the relative position of the samples and the relative phase between the samples. The wavefront is reconstructed due to interference of the samples. Devices can be designed for many different wavelengths, including for example the ultraviolet, visible, infrared and even longer wavelengths such as millimeter waves. In one application, the device function as a telescope but with negligible length.

  4. Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

    NASA Astrophysics Data System (ADS)

    Choi, Younghan; Kim, Taeghyoon; Choi, Seokjin; Lee, Cheolwon

    Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram, Entropy, and Word Size. N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.

  5. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  6. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  7. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  8. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  9. 49 CFR 236.589 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 236.589 Section 236.589 Transportation... Cab Signal Systems Inspection and Tests; Locomotive § 236.589 Relays. (a) Each relay shall be removed... such relay is designed to operate, as follows: (1) Master or primary relays of torque type depending...

  10. Quantum-Dot-Based Telecommunication-Wavelength Quantum Relay

    NASA Astrophysics Data System (ADS)

    Huwer, J.; Stevenson, R. M.; Skiba-Szymanska, J.; Ward, M. B.; Shields, A. J.; Felle, M.; Farrer, I.; Ritchie, D. A.; Penty, R. V.

    2017-08-01

    The development of quantum relays for long-haul and attack-proof quantum communication networks operating with weak coherent laser pulses requires entangled photon sources at telecommunication wavelengths with intrinsic single-photon emission for most practical implementations. Using a semiconductor quantum dot emitting entangled photon pairs in the telecommunication O band, we demonstrate a quantum relay fulfilling both of these conditions. The system achieves a maximum fidelity of 94.5% for implementation of a standard four-state protocol with input states generated by a laser. We further investigate robustness against frequency detuning of the narrow-band input and perform process tomography of the teleporter, revealing operation for arbitrary pure input states, with an average gate fidelity of 83.6%. The results highlight the potential of semiconductor light sources for compact and robust quantum-relay technology that is compatible with existing communication infrastructures.

  11. Detection of the sarin hydrolysis product in formalin-fixed brain tissues of victims of the Tokyo subway terrorist attack.

    PubMed

    Matsuda, Y; Nagao, M; Takatori, T; Niijima, H; Nakajima, M; Iwase, H; Kobayashi, M; Iwadate, K

    1998-06-01

    One of the hydrolysis products of sarin (isopropyl methylphosphonofluoridate) was detected in formalin-fixed brain tissues of victims poisoned in the Tokyo subway terrorist attack. Part of this procedure, used for the detection of sarin hydrolysis products in erythrocytes of sarin victims, has been described previously. The test materials were four individual cerebellums, which had been stored in formalin fixative for about 2 years. Sarin-bound acetylcholinesterase (AChE) was solubilized from these cerebellums, purified by immunoaffinity chromatography, and digested with trypsin. Then the sarin hydrolysis products bound to AChE were released by alkaline phosphatase digestion, subjected to trimethylsilyl derivatization (TMS), and detected by gas chromatography-mass spectrometry. Peaks at m/z 225 and m/z 240, which are indicative of TMS-methylphosphonic acid, were observed within the retention time range of authentic methylphosphonic acid. However, no isopropyl methylphosphonic acid was detected in the formalin-fixed cerebellums of these 4 sarin victims, probably because the isopropoxy group of isopropyl methylphosphonic acid underwent chemical hydrolysis during storage. This procedure will be useful for the forensic diagnosis of poisoning by protein-bound, highly toxic agents, such as sarin, which are easily hydrolysed. This appears to be the first time that intoxication by a nerve agent has been demonstrated by analyzing formalin-fixed brains obtained at autopsy.

  12. Comparison of spatial frequency domain features for the detection of side attack explosive ballistics in synthetic aperture acoustics

    NASA Astrophysics Data System (ADS)

    Dowdy, Josh; Anderson, Derek T.; Luke, Robert H.; Ball, John E.; Keller, James M.; Havens, Timothy C.

    2016-05-01

    Explosive hazards in current and former conflict zones are a threat to both military and civilian personnel. As a result, much effort has been dedicated to identifying automated algorithms and systems to detect these threats. However, robust detection is complicated due to factors like the varied composition and anatomy of such hazards. In order to solve this challenge, a number of platforms (vehicle-based, handheld, etc.) and sensors (infrared, ground penetrating radar, acoustics, etc.) are being explored. In this article, we investigate the detection of side attack explosive ballistics via a vehicle-mounted acoustic sensor. In particular, we explore three acoustic features, one in the time domain and two on synthetic aperture acoustic (SAA) beamformed imagery. The idea is to exploit the varying acoustic frequency profile of a target due to its unique geometry and material composition with respect to different viewing angles. The first two features build their angle specific frequency information using a highly constrained subset of the signal data and the last feature builds its frequency profile using all available signal data for a given region of interest (centered on the candidate target location). Performance is assessed in the context of receiver operating characteristic (ROC) curves on cross-validation experiments for data collected at a U.S. Army test site on different days with multiple target types and clutter. Our preliminary results are encouraging and indicate that the top performing feature is the unrolled two dimensional discrete Fourier transform (DFT) of SAA beamformed imagery.

  13. Detection of paroxysmal atrial fibrillation or flutter in patients with acute ischemic stroke or transient ischemic attack by Holter monitoring.

    PubMed

    Thakkar, Sandeep; Bagarhatta, Rajeev

    2014-01-01

    Paroxysmal atrial fibrillation and flutter are strong risk factors for stroke. Due to high recurrence rate of ischemic events and given the benefit of oral anticoagulation over antiplatelet drugs, it is important to identify this arrhythmia. Unfortunately, paroxysmal AF or flutter is asymptomatic in majority and therefore, difficult to detect. Consecutive patients presenting with symptoms of acute ischemic stroke or transient ischemic attack were included. All patients free of AF or flutter on presentation underwent 24 h Holter monitoring within 7 days of admission. Overall, fifty two (52) patients (mean age 59.51 ± 13.45 years) with acute stroke (80.8%) and TIA (19.8%) underwent 24 h Holter monitoring. Paroxysmal AF was detected in 3 cases (5.8%), all 3 patients had acute stroke and were older than age 60 years. Type of stroke was the only factor which was associated with greater risk of having paroxysmal AF or flutter, AF accounted for 50% cases (2 out of 4) of clinically suspected cardio embolic stroke. Screening consecutive patients with ischemic stroke with routine Holter monitoring will identify new atrial fibrillation/flutter in approximately one in 17 patients. Older age and type of stroke are strongly associated with increased risk. By carefully selecting the patients, the detection rates could be further increased. Copyright © 2014 Cardiological Society of India. Published by Elsevier B.V. All rights reserved.

  14. Heart Attack

    MedlinePlus

    ... test your blood several times during the first 24 hours to 48 hours after yours symptoms start.Other ... do to help prevent heart attack?A healthy lifestyle can help prevent heart attack. This ... your stress.Controlling your blood pressure.Managing your ...

  15. Heart Attack

    MedlinePlus

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  16. Radio Relays Improve Wireless Products

    NASA Technical Reports Server (NTRS)

    2009-01-01

    Signal Hill, California-based XCOM Wireless Inc. developed radio frequency micromachine (RF MEMS) relays with a Phase II Small Business Innovation Research (SBIR) contract through NASA?s Jet Propulsion Laboratory. In order to improve satellite communication systems, XCOM produced wireless RF MEMS relays and tunable capacitors that use metal-to-metal contact and have the potential to outperform most semiconductor technologies while using less power. These relays are used in high-frequency test equipment and instrumentation, where increased speed can mean significant cost savings. Applications now also include mainstream wireless applications and greatly improved tactical radios.

  17. Distributed Quantum Packet Transmission in Non-maximally Entangled Relay System

    NASA Astrophysics Data System (ADS)

    Shi, Jinjing; Shi, Ronghua; Peng, Xiaoqi; Li, Yin; Guo, Ying

    2015-04-01

    A novel distributed quantum packet transmission scheme is proposed with teleportation in the non-maximally entangled relay channel. Quantum signals are encoded as quantum signal packets and transmitted from the source to the destination with assistance of the relay. The TDM (Time Division Multiplexing) technique is applied in order to improve the efficiency of quantum communications. The security depends on the security of signal particles and an upper bound of attackers' intercepting quantum information under their strongest collective attacks is derived. The communication efficiency can be improved to four times of the traditional schemes, and the timesaving percentage may approach to 75 %. It has a wide application in quantum networks as well.

  18. A high-sensitivity optical device for the early monitoring of plant pathogen attack via the in vivo detection of ROS bursts

    PubMed Central

    Zeng, Lizhang; Zhou, Jun; Li, Bo; Xing, Da

    2015-01-01

    Biotic stressors, especially pathogenic microorganisms, are rather difficult to detect. In plants, one of the earliest cellular responses following pathogen infection is the production of reactive oxygen species (ROS). In this study, a novel optical device for the early monitoring of Pseudomonas attack was developed; this device measures the ROS level via oxidation-sensitive 2′, 7′-dichlorodihydrofluorescein diacetate (H2DCFDA)-mediated fluorescence, which could provide early monitoring of attacks by a range of plant pathogen; ROS bursts were detected in vivo in Arabidopsis thaliana with higher sensitivity and accuracy than those of a commercial luminescence spectrophotometer. Additionally, the DCF fluorescence truly reflected early changes in the ROS level, as indicated by an evaluation of the H2O2 content and the tight association between the ROS and Pseudomonas concentration. Moreover, compared with traditional methods for detecting plant pathogen attacks based on physiological and biochemical measurements, our proposed technique also offers significant advantages, such as low cost, simplicity, convenient operation and quick turnaround. These results therefore suggest that the proposed optical device could be useful for the rapid monitoring of attacks by plant pathogen and yield results considerably earlier than the appearance of visual changes in plant morphology or growth. PMID:25767474

  19. An overview of relay channels - Information theory of satellite data relay link

    NASA Astrophysics Data System (ADS)

    Iida, Takashi

    1987-03-01

    This paper gives an overview of the theory of the relay channel, the communication channel having a relay encoder between transmitter and receiver. The relay channel corresponds to a satellite data relay link. The basic problem of this theory is to find the channel capacity. The theory of the relay channel was introduced by Van der Meulen (1971) and was expanded by Cover and El Gamal (1979). This paper reviews the meaning of relay in communication, and discusses the general, degraded, Gaussian degraded, and feedback relay channels. Furthermore, the satellite data relay link is discussed in comparison with the relay channel theory.

  20. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  1. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  2. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  3. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  4. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  5. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  6. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  7. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  8. 49 CFR 236.789 - Relay, timing.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relay, timing. 236.789 Section 236.789... Relay, timing. A relay which will not close its front contacts or open its back contacts, or both, until the expiration of a definite time intervals after the relay has been energized....

  9. 49 CFR 236.106 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 236.106 Section 236.106 Transportation... Inspections and Tests; All Systems § 236.106 Relays. Each relay, the functioning of which affects the safety... centrifugal type relay shall be tested at least once every 12 months; (b) Alternating current vane type...

  10. New sensitivity analysis attack

    NASA Astrophysics Data System (ADS)

    El Choubassi, Maha; Moulin, Pierre

    2005-03-01

    The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

  11. Heart Attack Recovery FAQs

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  12. About Heart Attacks

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  13. Laser Relay: Improving Space Communications

    NASA Image and Video Library

    The Laser Communications Relay Demonstration mission proposes to revolutionize the way we send and receive data, video and other information, using lasers to encode and transmit data at rates 10 to...

  14. The power relay satellite

    NASA Astrophysics Data System (ADS)

    Glaser, Peter E.

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  15. The power relay satellite

    SciTech Connect

    Glaser, P.E.

    1994-12-31

    The availability and use of renewable energy sources compatible with reducing risks to the global environment are key to sustainable development. Large-scale, renewable energy resources at undeveloped or underutilized sites are potentially available on several continents. The Power Relay Satellite (PRS) concept has the potential to access these remote energy resources by coupling primary electricity generation from terrestrial transmission lines. A global PRS network can be envisioned to provide a high degree of flexibility for supplying energy demands worldwide with wireless power transmitted from sites on Earth to geosynchronous orbit and then reflected to receivers interfacing with terrestrial power transmision networks. Past developments in wireless power transmission (WPT) are reviewed and recent successful results are noted. The origins of the PRS concept, and a possible configuration are discussed, principles of WPT at microwave frequencies, functional requirements, and system design contraints are outlined, and space transportation concepts presented. PRS assessments including applicable technologies, economic projections, and societal issues are highlighted. It is concluded that the PRS provides a promising option to access renewable resources at great distances from major markets, and represents an important stage in the future development in the future of solar power satellites.

  16. PHOTOSENSITIVE RELAY CONTROL CIRCUIT

    DOEpatents

    Martin, C.F.

    1958-01-14

    adapted for the measurement of the time required for an oscillating member to pass through a preselected number of oscillations, after being damped to a certain maximum amplitude of oscillation. A mirror is attached to the moving member and directs light successively to a photocell which is part of a trigger unit and to first and second photocells which are part of a starter unit, as the member swings to its maximum amplitude. The starter and trigger units comprise thyratrons and relays so interconnected that the trigger circuit, although generating a counter pulse, does not register a count in the counter when the light traverses both photocells of the starter unit. When the amplitude of oscillation of the member decreases to where the second photocell is not transversed, the triggei pulse is received by the counter. The counter taen operates to register the desired number of oscillations and initiates and terminates a timer for measuring the time irterval for the preselected number of oscillations.

  17. Heart Attack

    MedlinePlus

    ... it as instructed while awaiting emergency help. Take aspirin, if recommended . Taking aspirin during a heart attack could reduce heart damage by helping to keep your blood from clotting. Aspirin can interact with other medications, however, so don' ...

  18. Underutilization of Ambulatory ECG Monitoring After Stroke and Transient Ischemic Attack: Missed Opportunities for Atrial Fibrillation Detection.

    PubMed

    Edwards, Jodi D; Kapral, Moira K; Fang, Jiming; Saposnik, Gustavo; Gladstone, David J

    2016-08-01

    Detection and treatment of atrial fibrillation is a major goal in secondary stroke prevention. Guidelines recommend at least 24 hours of ECG monitoring after stroke. However, it is unclear how often this is done in routine practice. In this longitudinal cohort study using data from the Ontario Stroke Registry, we analyzed consecutive patients presenting to designated stroke centers in Ontario, Canada (2003-2013) with a first acute ischemic stroke or transient ischemic attack (TIA) in sinus rhythm and without known atrial fibrillation. The primary outcome was the proportion of patients who received at least 24-hour Holter monitoring within 30 days after stroke/TIA. Secondary analyses assessed total duration of ECG monitoring completed within 90 days after stroke/TIA, temporal trends in monitoring use, and use of Holter monitoring relative to echocardiography. Among 17 398 consecutive eligible patients (mean age 68.8±14.3 years), 30.6% had at least 24 hours of Holter monitoring within 30 days after stroke/TIA. Less than 1% of patients received prolonged monitoring beyond 48 hours. The median time to start monitoring was 9 days poststroke (interquartile range 3-25). Stroke/TIA patients were nearly twice as likely to receive an echocardiogram than a Holter monitor within 90 days (odds ratio 1.8, 95% confidence interval 1.67-2.01). Less than one third of patients in our cohort received guideline-recommended 24-hour Holter monitoring, and <1% received prolonged ambulatory ECG monitoring. These findings highlight a modifiable evidence-practice gap that likely contributes to an overdiagnosis of strokes as cryptogenic, an underdiagnosis of atrial fibrillation, and missed anticoagulant treatment opportunities for secondary stroke prevention. © 2016 American Heart Association, Inc.

  19. Differential network coding for two-way relay networks with massive arrays

    NASA Astrophysics Data System (ADS)

    Fang, Zhaoxi; Shao, Pengfei; Zheng, Wen; Pang, Zeping

    2016-10-01

    In this paper, we propose a low-complexity differential transmission scheme for a two-way relay network (TWRN) with two sources and one relay node, where each source is equipped with a single antenna, while the relay node is equipped with a large number of antennas. In the proposed scheme, no channel state information (CSI) is required at each source node for signal detection. It is shown that as the number of relay antennas becomes large, the received signal at each source node includes the desired signal only. Numerical results are presented to demonstrate the bit-to-error rate (BER) performance of the proposed scheme.

  20. Formulas for predicting the dynamic performance of ROCOF relays for embedded generation applications

    SciTech Connect

    Vieira, J.C. M.; Freitas, Walmir; Huang, Zhenyu; Xu, Wilsun; Morelato, A.

    2006-07-13

    A set of formulas directly predict the performance of rate-of-change-of-frequency (ROCOF) relays used to detect islanding of embedded synchronous generators. The formulas are analytically derived from the dynamic model of the generator and relay. Dynamic simulation results obtained using a representative distribution system confirm the validity and accuracy. The formulas presented are a useful tool for protection engineers; they can be used, for example, to assess the effectiveness of anti-islanding schemes based on ROCOF relays, or to assist the selection of relay settings, significantly reducing the number of repeated dynamic simulations necessary to carry out such studies.

  1. Replacement Attack: A New Zero Text Watermarking Attack

    NASA Astrophysics Data System (ADS)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  2. Sealed reed relay limit switches

    NASA Astrophysics Data System (ADS)

    Ivanov, I. P.; Svintsov, G. P.; Yefimova, M. A.; Lebedev, A. V.; Samsonov, Y. P.

    1986-01-01

    Sealed reed relay limit switches are described which overcome the inherent deficiencies traditionally present in these devices: high material, labor consumption, and difficult operation. Series VSG limit switches developed at the All-Union Scientific Research and Technological Planning Institute for Relay Engineering (Cheboksary) for use in buildings are described. The VSG1 has a single switching contact, the VSG2 a single normally open contact, and the VSG3 a single normally closed contact. The VSG1 employs type MKS-27103 sealed reed relays, while the VSG2 and VSG3 employ KEM-1 reed relays. The magnet system, which consists of magnets and a plate, and the sealed reed relay are contained in a nonmagnetic casing with a slit in it. The mathematical expression defining the geometric dimensions of the magnet system is given. The basic parameteres of all three types of switches are tabulated. The VSG series switches can be used to replace VBK and BVK switches, thus saving electricity, labor, and materials, including silver.

  3. EAGLE: relay mirror technology development

    NASA Astrophysics Data System (ADS)

    Hartman, Mary; Restaino, Sergio R.; Baker, Jeffrey T.; Payne, Don M.; Bukley, Jerry W.

    2002-06-01

    EAGLE (Evolutionary Air & Space Global Laser Engagement) is the proposed high power weapon system with a high power laser source, a relay mirror constellation, and the necessary ground and communications links. The relay mirror itself will be a satellite composed of two optically-coupled telescopes/mirrors used to redirect laser energy from ground, air, or space based laser sources to distant points on the earth or space. The receiver telescope captures the incoming energy, relays it through an optical system that cleans up the beam, then a separate transmitter telescope/mirror redirects the laser energy at the desired target. Not only is it a key component in extending the range of DoD's current laser weapon systems, it also enables ancillary missions. Furthermore, if the vacuum of space is utilized, then the atmospheric effects on the laser beam propagation will be greatly attenuated. Finally, several critical technologies are being developed to make the EAGLE/Relay Mirror concept a reality, and the Relay Mirror Technology Development Program was set up to address them. This paper will discuss each critical technology, the current state of the work, and the future implications of this program.

  4. Satellite Relaying of Geophysical Data

    NASA Technical Reports Server (NTRS)

    Allenby, R. J.

    1977-01-01

    Data Collection Platforms (DCPs) for transmitting surface data to an orbiting satellite for relaying to a central data distribution center are being used in a number of geophysical applications. "Off-the-shelf" DCP's, transmitting through Landsat or GOES satellites, are fully capable of relaying data from low-data-rate instruments, such as tiltmeters or tide gauges. In cooperation with the Lamont-Doherty Geological Observatory, Goddard has successfully installed DCP systems on a tide gauge and tiltmeter array on Anegada, British Virgin Islands. Because of the high-data-rate requirements, a practical relay system capable of handling seismic information is not yet available. Such a system could become the basis of an operational hazard prediction system for reducing losses due to major natural catastrophies such as earthquakes, volcanic eruptions, landslides or tsunamis.

  5. Detection and mapping of mountain pine beetle red attack: Matching information needs with appropriate remotely sensed data

    Treesearch

    M. A. Wulder; J. C. White; B. J. Bentz

    2005-01-01

    Estimates of the location and extent of the red attack stage of mountain pine beetle (Dentroctonus ponderosae Hopkins) infestations are critical for forest management. The degree of spatial and temporal precision required for these estimates varies according to the management objectives and the nature of the infestation. This paper outlines a hierarchy of information...

  6. Breaking the Myth That Relay Swimming Is Faster Than Individual Swimming.

    PubMed

    Skorski, Sabrina; Etxebarria, Naroa; Thompson, Kevin G

    2016-04-01

    To investigate if swimming performance is better in a relay race than in the corresponding individual race. The authors analyzed 166 elite male swimmers from 15 nations in the same competition (downloaded from www.swimrankings.net). Of 778 observed races, 144 were Olympic Games performances (2000, 2004, 2012), with the remaining 634 performed in national or international competitions. The races were 100-m (n = 436) and 200-m (n = 342) freestyle events. Relay performance times for the 2nd-4th swimmers were adjusted (+ 0.73 s) to allow for the "flying start." Without any adjustment, mean individual relay performances were significantly faster for the first 50 m and overall time in the 100-m events. Furthermore, the first 100 m of the 200-m relay was significantly faster (P > .001). During relays, swimmers competing in 1st position did not show any difference compared with their corresponding individual performance (P > .16). However, swimmers competing in 2nd-4th relay-team positions demonstrated significantly faster times in the 100-m (P < .001) and first half of the 200-m relays than in their individual events (P < .001, ES: 0.28-1.77). However, when finishing times for 2nd-4th relay team positions were adjusted for the flying start no differences were detected between relay and individual race performance for any event or split time (P > .17). Highly trained swimmers do not swim (or turn) faster in relay events than in their individual races. Relay exchange times account for the difference observed in individual vs relay performance.

  7. Performance limitations of relay neurons.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2012-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. For example, the visual thalamus contains relay neurons that receive driving inputs from the retina that encode a visual image, and modulating inputs from reticular activating system and layer 6 of visual cortex that control what aspects of the image will be relayed back to visual cortex for perception. What gets relayed depends on several factors such as attentional demands and a subject's goals. In this paper, we analyze a biophysical based model of a relay cell and use systems theoretic tools to construct analytic bounds on how well the cell transmits a driving input as a function of the neuron's electrophysiological properties, the modulating input, and the driving signal parameters. We assume that the modulating input belongs to a class of sinusoidal signals and that the driving input is an irregular train of pulses with inter-pulse intervals obeying an exponential distribution. Our analysis applies to any [Formula: see text] order model as long as the neuron does not spike without a driving input pulse and exhibits a refractory period. Our bounds on relay reliability contain performance obtained through simulation of a second and third order model, and suggest, for instance, that if the frequency of the modulating input increases or the DC offset decreases, then relay increases. Our analysis also shows, for the first time, how the biophysical properties of the neuron (e.g. ion channel dynamics) define the oscillatory patterns needed in the modulating input for appropriately timed relay of sensory information. In our discussion, we describe how our bounds predict experimentally observed neural activity in the basal ganglia in (i) health, (ii) in Parkinson's disease (PD), and (iii) in PD during therapeutic deep

  8. Information security threats and an easy-to-implement attack detection framework for wireless sensor network-based smart grid applications

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Örenbaş, H.; Daş, R.; Kogias, D.; Baykara, M.; K, K.

    2016-03-01

    Wireless Sensor Networks (WSNs) when combined with various energy harvesting solutions managing to prolong the overall lifetime of the system and enhanced capabilities of the communication protocols used by modern sensor nodes are efficiently used in are efficiently used in Smart Grid (SG), an evolutionary system for the modernization of existing power grids. However, wireless communication technology brings various types of security threats. In this study, firstly the use of WSNs for SG applications is presented. Second, the security related issues and challenges as well as the security threats are presented. In addition, proposed security mechanisms for WSN-based SG applications are discussed. Finally, an easy- to-implement and simple attack detection framework to prevent attacks directed to sink and gateway nodes with web interfaces is proposed and its efficiency is proved using a case study.

  9. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  10. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  11. 49 CFR 234.263 - Relays.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relays. 234.263 Section 234.263 Transportation... SYSTEMS Maintenance, Inspection, and Testing Inspections and Tests § 234.263 Relays. (a) Except as stated in paragraph (b) of this section, each relay that affects the proper functioning of a...

  12. Relay Writing in an Adolescent Online Community

    ERIC Educational Resources Information Center

    Yi, Youngjoo

    2008-01-01

    "Welcome to Buckeye City" is an adolescent online community that was maintained by 25 Korean students who attended American schools. On the website, the students engaged in "relay writing"--a writing activity in which each person contributed a portion of an evolving story in a relayed manner. Relay writing offers teachers a new and valuable window…

  13. Signal Relay During Cell Migration

    NASA Astrophysics Data System (ADS)

    Guven, Can; Rericha, Erin; Ott, Edward; Losert, Wolfgang

    2012-02-01

    We developed a signal relay model to quantify the effect of intercellular communication in presence of an external signal, during the motion of groups of Dictyostelium discoideum cells. A key parameter is the ratio of amplitude of the cAMP (cyclic adenosine monophosphate) a signaling chemical secreted from individual cells versus the external cAMP field, which defines a time scale. Another time scale is set by the degradation rate of the cAMP. In our simulations, the competition between these two time scales results rich dynamics including uniform motion, as well as streaming and clustering instabilities. The simulations are compared to experiments for a wide range of different external signal strengths for both cells that secrete cAMP and a mutant which cannot relay cAMP. Under different strength of external linear cAMP gradient, the wild type cells form streams and exhibit clustering due to the intercellular signaling through individual cAMP secretion. In contrast, cells lacking signal relay move relatively straight. We find that the model captures both independent motion and the formation of aggregates when cells relay the signal.

  14. STBC AF relay for unmanned aircraft system

    NASA Astrophysics Data System (ADS)

    Adachi, Fumiyuki; Miyazaki, Hiroyuki; Endo, Chikara

    2015-01-01

    If a large scale disaster similar to the Great East Japan Earthquake 2011 happens, some areas may be isolated from the communications network. Recently, unmanned aircraft system (UAS) based wireless relay communication has been attracting much attention since it is able to quickly re-establish the connection between isolated areas and the network. However, the channel between ground station (GS) and unmanned aircraft (UA) is unreliable due to UA's swing motion and as consequence, the relay communication quality degrades. In this paper, we introduce space-time block coded (STBC) amplify-and-forward (AF) relay for UAS based wireless relay communication to improve relay communication quality. A group of UAs forms single frequency network (SFN) to perform STBC-AF cooperative relay. In STBC-AF relay, only conjugate operation, block exchange and amplifying are required at UAs. Therefore, STBC-AF relay improves the relay communication quality while alleviating the complexity problem at UAs. It is shown by computer simulation that STBC-AF relay can achieve better throughput performance than conventional AF relay.

  15. Performance analysis of space shift keying (SSK) modulation with multiple cooperative relays

    NASA Astrophysics Data System (ADS)

    Mesleh, Raed; Ikki, Salama S.; Aggoune, El-Hadi M.; Mansour, Ali

    2012-12-01

    In this article, space shift keying (SSK) modulation is used to study a wireless communication system when multiple relays are placed between the transmitter and the receiver. In SSK, the indices of the transmit antennas form the constellation symbols and no other data symbol are transmitted. The transmitter and the receiver communicate through a direct link and the existing relays. In this study, two types of relays are considered. Conventional amplify and forward relays in which all relays amplify their received signal and forward it to the destination in a round-robin fashion. In addition, decode and forward relays in which the relays that correctly detect the source signal will forward the corresponding fading gain to the destination in pre-determined orthogonal time slots are studied. The optimum decoder for both communication systems is derived and performance analysis are conducted. The exact average bit error probability (ABEP) over Rayleigh fading channels is obtained in closed-form for a source equipped with two transmit antennas and arbitrary number of relays. Furthermore, simple and general asymptotic expression for the ABEP is derived and analyzed. Numerical results are also provided, sustained by simulations which corroborate the exactness of the theoretical analysis. It is shown that both schemes perform nearly the same and the advantages and disadvantages of each are discussed.

  16. The magic of relay mirrors

    NASA Astrophysics Data System (ADS)

    Duff, Edward A.; Washburn, Donald C.

    2004-09-01

    Laser weapon systems would be significantly enhanced with the addition of high altitude or space-borne relay mirrors. Such mirrors, operating alone with a directed energy source, or many in a series fashion, can be shown to effectively move the laser source to the last, so-called fighting mirror. This "magically" reduces the range to target and offers to enhance the performance of directed energy systems like the Airborne Laser and even ground-based or ship-based lasers. Recent development of high altitude airships will be shown to provide stationary positions for such relay mirrors thereby enabling many new and important applications for laser weapons. The technical challenges to achieve this capability are discussed.

  17. Special Operations Soldier With Cardiac Family History: Use of CCTA and Protein Biomarker Testing to Detect Risk of Heart Attack From Noncalcified Plaque.

    PubMed

    Singh, Millee; Kroman, Anne; Singh, Juile; Tariq, Hassan; Amin, Shetal; Morales-Pablon, Cesar Alberto; Cahill, Kristina Vanessa; Harrison, Eric Edward

    2015-01-01

    We sought to characterize the risk of a heart attack in a 48-year-old asymptomatic US Special Operations Command (SOCOM) Soldier without known coronary artery disease (CAD). CAD continues to be a leading cause of morbidity and mortality among most age groups in the United States. Much research is dedicated to establishing new techniques to predict myocardial infarction (MI). Coronary computed tomography (CT) angiography, also known as CCTA, along with 7-protein serum biomarker risk assessment was performed for risk evaluation. A 48-year-old SOCOM Soldier with a family history of heart disease had skeletal chest pain from war injuries and a 5-fold higher risk of heart attack over the next 5 years on the basis of protein markers. A nonobstructive left anterior descending coronary artery (LAD) plaque with a lipid-rich core and a thin fibrous cap (i.e., vulnerable plaque) was detected by CCTA. The patient was warned about his risk and prescribed four cardiac medications and scheduled for angioplasty even though he fell outside the guidelines by not having a severe obstructive blockage. Four days later, unfortunately, he had a heart attack before starting his medications and before angioplasty. CCTA with biomarker testing may have an important role in predicating acute coronary syndrome (ACS) in Special Operations Forces (SOF) Soldiers with at least one risk factor. Conventional stress testing and nuclear scanning would not detect non-flow-limiting vulnerable plaques in vulnerable patients. In order to collect more data, the PROTECT Registry has been started to evaluate asymptomatic Soldiers with at least one risk factor referred to the clinic by military physicians. 2015.

  18. Energy efficient circuit design using nanoelectromechanical relays

    NASA Astrophysics Data System (ADS)

    Venkatasubramanian, Ramakrishnan

    Nano-electromechanical (NEM) relays are a promising class of emerging devices that offer zero off-state leakage and behave like an ideal switch. Recent advances in planar fabrication technology have demonstrated that microelectromechanical (MEMS) scale miniature relays could be manufactured reliably and could be used to build fully functional, complex integrated circuits. The zero leakage operation of relays has renewed the interest in relay based low power logic design. This dissertation explores circuit architectures using NEM relays and NEMS-CMOS heterogeneous integration. Novel circuit topologies for sequential logic, memory, and power management circuits have been proposed taking into consideration the NEM relay device properties and optimizing for energy efficiency and area. In nanoscale electromechanical devices, dispersion forces like Van der Waals' force (vdW) affect the pull-in stability of the relay devices significantly. Verilog-A electromechanical model of the suspended gate relay operating at 1V with a nominal air gap of 5 - 10nm has been developed taking into account all the electrical, mechanical and dispersion effects. This dissertation explores different relay based latch and flip-flop topologies. It has been shown that as few as 4 relay cells could be used to build flip-flops. An integrated voltage doubler based flip flop that improves the performance by 2X by overdriving Vgb has been proposed. Three NEM relay based parallel readout memory bitcell architectures have been proposed that have faster access time, and remove the reliability issues associated with previously reported serial readout architectures. A paradigm shift in design of power switches using NEM relays is proposed. An interesting property of the relay device is that the ON state resistance (Ron) of the NEM relay switch is constant and is insensitive to the gate slew rate. This coupled with infinite OFF state resistance (Roff ) offers significant area and power advantages over CMOS

  19. Atrial fibrillation detected by external loop recording for seven days or two-day simultaneous Holter recording: A comparison in patients with ischemic stroke or transient ischemic attack.

    PubMed

    Sejr, Michala Herskind; Nielsen, Jens Cosedis; Damgaard, Dorte; Sandal, Birgitte Forsom; May, Ole

    Atrial fibrillation (AF) is the most common cardiac cause of ischemic stroke and transient ischemic attack (IS/TIA). To compare the diagnostic value of seven-day external loop recording (ELR) and two-day Holter recording for detecting AF after IS/TIA. 191 IS/TIA patients without AF history. Endpoint was AF >30s. We started two-day Holter recording and seven-day ELR simultaneously. Seven-day ELR and two-day Holter recording detected the same three AF patients. ELR detected another six patients with AF adjudicated by cardiologists, four detections after Holter (3 vs. 7, p=0.125) and two false-positive detections during Holter. Seven-day ELR automatically classified 50/191 patients (26%) with AF, but only 7/50 (14%) were confirmed as AF by cardiologists. Seven-day ELR did not detect significantly more patients with AF than two-day Holter recording. 86% of patients with ELR-classified AF were false positives, indicating a poor performance of the automatic AF detection algorithm used. Copyright © 2017 Elsevier Inc. All rights reserved.

  20. Colorimetric and fluorescent chemosensor for highly selective and sensitive relay detection of Cu2 + and H2PO4- in aqueous media

    NASA Astrophysics Data System (ADS)

    Su, Jun-Xia; Wang, Xiao-Ting; Chang, Jing; Wu, Gui-Yuan; Wang, Hai-Ming; Yao, Hong; Lin, Qi; Zhang, You-Ming; Wei, Tai-Bao

    2017-07-01

    In this manuscript, a new colorimetric and fluorescent chemosensor (T) was designed and synthesized, it could successively detect Cu2 + and H2PO4- in DMSO/H2O (v/v = 9:1, pH = 7.2) buffer solution with high selectivity and sensitivity. When added Cu2 + ions into the solution of T, it showed a color changes from yellow to colorless, meanwhile, the green fluorescence of sensor T quenched. This recognition behavior was not affected in the presence of other cations, including Hg2 +, Ag+, Ca2 +, Co2 +, Ni2 +, Cd2 +, Pb2 +, Zn2 +, Cr3 +, and Mg2 + ions. More interestingly, the Cu2 + ions contain sensor T solution could recover the color and fluorescence upon the addition of H2PO4- anions in the same medium. And other surveyed anions (including F-, Cl-, Br-, I-, AcO-, HSO4-, ClO4-, CN- and SCN-) had nearly no influence on the recognition behavior. The detection limits of T to Cu2 + and T-Cu2 + to H2PO4- were evaluated to be 1.609 × 10- 8 M and 0.994 × 10- 7 M, respectively. In addition, the sensor T also could be served as a recyclable component and the logic gate output was also defined in sensing materials. The test strips based on sensor T were fabricated, which acted as a convenient and efficient Cu2 + and H2PO4- test kits.

  1. On information flow in relay networks

    NASA Astrophysics Data System (ADS)

    El Gamal, A.

    Preliminary investigations conducted by El Gamal and Cover (1980) have shown that a max-flow min-cut interpretation for the capacity expressions of the classes of degraded and semideterministic relay channels can be found. In this paper it is shown that such an interpretation can also be found for fairly general classes of discrete memoryless relay networks. Cover and El Gamal (1979) have obtained general lower and upper bounds to capacity. However, the capacity of the general relay channel is not known. Past results are here extended to establish the capacity of deterministic relay networks with no interference and degraded relay networks. A general upper bound is given to the capacity of any relay network with this upper bound being a natural generalization of Theorem 4 in the study conducted by Cover and El Gamal (1979).

  2. Fatal crocodile attack.

    PubMed

    Chattopadhyay, Saurabh; Shee, Biplab; Sukul, Biswajit

    2013-11-01

    Attacks on human beings by various animals leading to varied types of injuries and even death in some cases are not uncommon. Crocodile attacks on humans have been reported from a number of countries across the globe. Deaths in such attacks are mostly due to mechanical injuries or drowning. Bites by the crocodiles often cause the limbs to be separated from the body. The present case refers to an incident of a fatal attack by a crocodile on a 35 years old female where only the mutilated head of the female was recovered. Multiple lacerated wounds over the face and scalp along with fracture of the cranial bones was detected on autopsy. Two distinct bite marks in the form of punched in holes were noted over the parietal and frontal bones. Injuries on the head with its traumatic amputation from the body were sufficient to cause death. However, the presence of other fatal injuries on the unrecovered body parts could not be ruled out.

  3. Admittance relay helps wash out system instability

    SciTech Connect

    Sweezy, G.; Swift, G.; Zhang, Z.

    1996-01-01

    This article describes how delta-current admittance relays detect severe power system disturbances and initiate a power reduction signal on the dc transmission system to help stabilize the integrated ac/HVDC transmission system. It is always desirable to transmit as much power as possible over major transmission line interconnections, and the 500 kV line linking Manitoba in Canada to Minnesota in the US is a good example. A static var system (SVS) is part of this strategy. Note the southern end of an HVDC line through which the power is delivered from northern hydro-electric generation. The ability to quickly control dc-delivered power combined with the complication of SVS switching and the installation of series capacitors has led to special circumstances requiring an unusual approach to maintenance of system stability. The availability of a new protection-oriented computing platform has made the required algorithms feasible.

  4. The Laser Communications Relay and the Path to the Next Generation Near Earth Relay

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2015-01-01

    NASA Goddard Space Flight Center is currently developing the Laser Communications Relay Demonstration (LCRD) as a Path to the Next Generation Near Earth Space Communication Network. The current NASA Space Network or Tracking and Data Relay Satellite System is comprised of a constellation of Tracking and Data Relay Satellites (TDRS) in geosynchronous orbit and associated ground stations and operation centers. NASA is currently targeting a next generation of relay capability on orbit in the 2025 timeframe.

  5. Inhomogeneity induces relay synchronization in complex networks

    NASA Astrophysics Data System (ADS)

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  6. Inhomogeneity induces relay synchronization in complex networks.

    PubMed

    Gambuzza, Lucia Valentina; Frasca, Mattia; Fortuna, Luigi; Boccaletti, Stefano

    2016-04-01

    Relay synchronization is a collective state, originally found in chains of interacting oscillators, in which uncoupled dynamical units synchronize through the action of mismatched inner nodes that relay the information but do not synchronize with them. It is demonstrated herein that relay synchronization is not limited to such simple motifs, rather it can emerge in larger and arbitrary network topologies. In particular, we show how this phenomenon can be observed in networks of chaotic systems in the presence of some mismatched units, the relay nodes, and how it is actually responsible for an enhancement of synchronization in the network.

  7. 78 FR 40407 - Structure and Practices of the Video Relay Service Program: Telecommunications Relay Services and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program: Telecommunications... mechanism for research and development, TRS Fund contribution calculations and reporting method, allowing... Commission's Structure and Practices of the Video Relay Service Program; Telecommunications Relay Services...

  8. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... COMMISSION 47 CFR Part 64 Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services... prohibits Internet-Protocol (IP) Relay providers from handling non- emergency calls made by new IP Relay... summary of the Commission's Misuse of Internet Protocol (IP) Relay Service; Telecommunications...

  9. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  10. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  11. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  12. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  13. 49 CFR 236.311 - Signal control circuits, selection through track relays or devices functioning as track relays...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... relays or devices functioning as track relays and through signal mechanism contacts and time releases at... at restricted speed” shall be selected through track relays, or through devices that function...

  14. Automatic Request for Cooperation (ARC) and Relay Selection for Wireless Networks

    NASA Astrophysics Data System (ADS)

    Asaduzzaman; Kong, Hyung-Yun

    Recently, there has been growing interest in the design of wireless cooperative protocol to achieve higher diversity-multiplexing tradeoff among single antenna devices. We propose an automatic request for cooperation (ARC) scheme for wireless networks which can achieve higher order diversity by selecting the best relay. In this scheme, a source transmits a data packet towards a destination and a group of relays. The destination tries to decode the information from the source and if the detection is correct the process will stop. Otherwise, the destination transmits an ARC towards the relays. We utilize this ARC signal for selecting the best relay from the set of relays that have successfully decoded the source packet. The selected relay generates and transmits redundant information for the source packet. The destination combines the two packets received from the source and the best relay to improve the reliability of the packet. We analyze the packet error rate, spectral efficiency and diversity-multiplexing tradeoff of our proposal and compare them with some existing protocols. Analysis shows that our proposal can achieve higher diversity multiplexing tradeoff than conventional cooperative protocols.

  15. White Matter Imaging Correlates of Early Cognitive Impairment Detected by the Montreal Cognitive Assessment After Transient Ischemic Attack and Minor Stroke.

    PubMed

    Zamboni, Giovanna; Griffanti, Ludovica; Jenkinson, Mark; Mazzucco, Sara; Li, Linxin; Küker, Wilhelm; Pendlebury, Sarah T; Rothwell, Peter M

    2017-06-01

    Among screening tools for cognitive impairment in large cohorts, the Montreal Cognitive Assessment (MoCA) seems to be more sensitive to early cognitive impairment than the Mini-Mental State Examination (MMSE), particularly after transient ischemic attack or minor stroke. We reasoned that if MoCA-detected early cognitive impairment is pathologically significant, then it should be specifically associated with the presence of white matter hyperintensities (WMHs) and reduced fractional anisotropy (FA) on magnetic resonance imaging. Consecutive eligible patients with transient ischemic attack or minor stroke (Oxford Vascular Study) underwent magnetic resonance imaging and cognitive assessment. We correlated MoCA and MMSE scores with WMH and FA, then specifically studied patients with low MoCA and normal MMSE. Among 400 patients, MoCA and MMSE scores were significantly correlated (all P<0.001) with WMH volumes (rMoCA=-0.336; rMMSE=-0.297) and FA (rMoCA=0.409; rMMSE=0.369) and-on voxel-wise analyses-with WMH in frontal white matter and reduced FA in almost all white matter tracts. However, only the MoCA was independently correlated with WMH volumes (r=-0.183; P<0.001), average FA values (r=0.218; P<0.001), and voxel-wise reduced FA in anterior tracts after controlling for the MMSE. In addition, patients with low MoCA but normal MMSE (n=57) had higher WMH volumes (t=3.1; P=0.002), lower average FA (t=-4.0; P<0.001), and lower voxel-wise FA in almost all white matter tracts than those with normal MoCA and MMSE (n=238). In patients with transient ischemic attack or minor stroke, early cognitive impairment detected with the MoCA but not with the MMSE was independently associated with white matter damage on magnetic resonance imaging, particularly reduced FA. © 2017 American Heart Association, Inc.

  16. Heart Attack Symptoms in Women

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  17. A model of thalamocortical relay cells.

    PubMed

    Rhodes, Paul A; Llinás, Rodolfo

    2005-06-15

    It is well established that the main intrinsic electrophysiological properties of thalamocortical relay cells, production of a low threshold burst upon release from hyperpolarized potential and production of a train of single spikes following stimulation from depolarized potentials, can be readily modelled using a single compartment. There is, however, another less well explored intrinsic electrophysiological characteristic of relay cells for which models have not yet accounted: at somatic potentials near spike threshold, relay cells produce a fast ragged high threshold oscillation in somatic voltage. Optical [Ca(2+)] imaging and pharmacological tests indicate that this oscillation correlates with a high threshold Ca(2+) current in the dendrites. Here we present the development of a new compartment model of the thalamic relay cell guided by the simultaneous constraints that it must produce the familiar regular spiking relay mode and low threshold rebound bursts which characterize these cells, as well as the less-studied fast oscillation occurring at near-threshold somatic potentials. We arrive at a model cell which is capable of the production of isolated high threshold Ca(2+) spikes in distal branch segments, driven by a rapidly inactivating intermediate threshold Ca(2+) channel. Further, the model produces the low threshold spike behaviour of the relay cell without requiring high T-current density in the distal dendritic segments. The results thus support a new picture of the dendritic tree of relay cells which may have implications for the manner in which thalamic relay cells integrate descending input from the cortex.

  18. An adaptive out-of-step relay

    SciTech Connect

    Centeno, V.; Phadke, A.G.; Edris, A.; Benton, J.; Gaudi, M.; Michel, G.

    1997-01-01

    The paper describes the development of an adaptive out-of-step relay, from the formulation of its concept to its field implementation at the Florida-Georgia interface. Adaptive relaying seeks to make adjustments to the relay characteristics as system conditions change, thereby making the relay more attuned to the prevailing power system conditions. The work described here began as a theoretical examination of the out-of-step relaying application, its possible shortcomings, and the opportunities to make adaptive improvements. It is shown that for a system that behaves primarily as a two-machine power system, the out-of-step relay could be made more secure by applying the principle of equal area criterion. The paper describes the theory of such a relay, its hardware configuration, and the system as it is installed in the field. The newly developed technology of synchronized phasor measurements plays an important role in the realization of this relay. The paper includes a summary of the field experience gathered over a period of one year.

  19. A Novel Cooperative Relaying Network Scheme with Inter-Relay Data Exchange

    NASA Astrophysics Data System (ADS)

    Farès, Salma Ait; Adachi, Fumiyuki; Kudoh, Eisuke

    In this paper, we propose a novel scheme of cooperative relaying network based on data exchange between relays before forwarding their received data to destination. This inter-relay data exchange step is done during an additional middle-slot in order to enhance the transmit signals from relays to the destination under low transmit power condition. To reduce the propagation errors between relays as well as the required transmit power during this data exchange, only the relay possessing the highest SNR is engaged into exchanging data by forwarding its received signal to the other relays. As for the remaining non-selected relays, i.e. with low SNR, the transmitted signal is estimated by using both signals received separately at different time slots (i.e., 1st and 2nd slot) from source and the ‘best’ selected relay, respectively, emulating virtual antenna array where appropriate weights for the antenna array are developed. In addition, we investigate distributed transmit beamforming and maximum ratio combining at the relays and the destination, respectively, to combine coherently the received signals. At the relay optimal location and for low SNR condition, the proposed method has significant better outage behavior and average throughput than conventional methods using one or two time slots for transmission.

  20. Joint Source-Relay Design for Full-Duplex MIMO AF Relay Systems

    NASA Astrophysics Data System (ADS)

    Shi, Qingjiang; Hong, Mingyi; Gao, Xiqi; Song, Enbin; Cai, Yunlong; Xu, Weiqiang

    2016-12-01

    The performance of full-duplex (FD) relay systems can be greatly impacted by the self-interference (SI) at relays. By exploiting multi-antenna in FD relay systems, the spectral efficiency of FD relay systems can be enhanced through spatial SI mitigation. This paper studies joint source transmit beamforming and relay processing to achieve rate maximization for FD MIMO amplify-and-forward (AF) relay systems with consideration of relay processing delay. The problem is difficult to solve due mainly to the SI constraint induced by the relay processing delay. In this paper, we first present a sufficient condition under which the relay amplification matrix has rank one structure. Then, for the case of rank one amplification matrix, the rate maximization problem is equivalently simplified into an unconstrained problem which can be locally solved using gradient ascent method. Next, we propose a penalty-based algorithmic framework, called P-BSUM, for a class of constrained optimization problems which have difficult equality constraints in addition to some convex constraints. By rewriting the rate maximization problem with a set of auxiliary variables, we apply the P-BSUM algorithm to the rate maximization problem in the general case. Finally, numerical results validate the efficiency of the proposed algorithms and show that the joint source-relay design approach under the rank one assumption could be strictly suboptimal as compared to the P-BSUM-based joint source-relay design approach.

  1. Incremental Relaying, Fresh Signal Makes Better Decision

    NASA Astrophysics Data System (ADS)

    Tin, Luu Quoc; Kong, Hyung Yun

    In terms of outage behavior, it has been shown that incremental relaying achieves the best performance among cooperative diversity protocols such as: Amplify-And-Forward (AF), Decode-And-Forward (DF), and Selection Decode-And-Forward (SDF). Exploiting a limited feedback from the destination, incremental relaying lets the relay forward the signal received from the source whenever an error happens at the destination, then, the signals from both the source and the relay are combined to make a decision. Noticing that the signal from the source, indicated by the error, is detrimental, we propose a new scheme not using that signal but only making a decision based on the fresh signal from the relay. Large performance improvement and complexity reduction are attained as we show in the analysis and simulation results. Theoretical results are derived and shown to match with the simulation counterparts.

  2. Semi-automatic software based detection of atrial fibrillation in acute ischaemic stroke and transient ischaemic attack.

    PubMed

    Nickelsen, M N; Snoer, A; Ali, A M; Wienecke, T

    2017-02-01

    Paroxysmal atrial fibrillation (PAF) is often asymptomatic and increases the risk of ischaemic stroke. Detection of PAF is challenging but crucial because a change of treatment decreases the risk of ischaemic stroke. Post-stroke investigations recommend at least 24-h continuous cardiac rhythm monitoring. Extended monitoring detects more PAF but is limited by costs due to manual analysis. Interpretive software might be a reasonable screening tool. The aim was to validate the performance and utility of Pathfinder SL software compared to manual analysis. In all, 135 ischaemic stroke patients with no prior history of PAF or atrial fibrillation and who had done a 7-day continuous electrocardiogram monitoring (Holter) were included. Manual analysis was compared with Pathfinder SL software including a systematic control of registered events. Seventeen (12.6%) patients were diagnosed with PAF (atrial fibrillation > 30 s). Pathfinder SL software including a systematic control of events registered 16 (94.1%) patients with PAF. Manually 15 (88.2%) patients were detected with PAF. Pathfinder SL had a negative predictive value of 99% and sensitivity of 94%. Pathfinder SL software including a systematic evaluation of events is an acceptable alternative compared to manual analysis in PAF detection following ischaemic stroke. It is less time consuming and therefore a reliable, cheaper alternative compared to manual analysis. © 2016 EAN.

  3. G. Marconi: A Data Relay Satellite for Mars Communications

    NASA Astrophysics Data System (ADS)

    Dionisio, C.; Marcozzi, M.; Landriani, C.

    2002-01-01

    Mars has always been a source of intrigue and fascination. Recent scientific discoveries have stimulated this longstanding interest, leading to a renaissance in Mars exploration. Future missions to Mars will be capable of long-distance surface mobility, hyperspectral imaging, subsurface exploration, and even life-detection. Manned missions and, eventually, colonies may follow. No mission to the Red Planet stands alone. New scientific and technological knowledge is passed on from one mission to the next, not only improving the journey into space, but also providing benefits here on Earth. The Mars Relay Network, an international constellation of Mars orbiters with relay radios, directly supports other Mars missions by relaying communications between robotic vehicles at Mars and ground stations on Earth. The ability of robotic visitors from Earth to explore Mars will take a gigantic leap forward in 2007 with the launch of the Guglielmo Marconi Orbiter (GMO), the first spacecraft primarily dedicated to providing communication relay, navigation and timing services at Mars. GMO will be the preeminent node of the Mars Relay Network. GMO will relay communications between Earth and robotic vehicles near Mars. GMO will also provide navigation services to spacecraft approaching Mars. GMO will receive transmissions from ground stations on Earth at X-band and will transmit to ground stations on Earth at X- and Ka-bands. GMO will transmit to robotic vehicles at Mars at UHF and receive from these vehicles at UHF and X-band. GMO's baseline 4450 km circular orbit provides complete coverage of the planet for telecommunication and navigation support. GMO will arrive at Mars in mid-2008, just before the NetLander and Mars Scout missions that will be its first users. GMO is designed for a nominal operating lifetime of 10 years and will support nominal commanding and data acquisition, as well as mission critical events such as Mars Orbit Insertion, Entry, Descent and Landing, and Mars

  4. Improved BDF Relaying Scheme Using Time Diversity over Atmospheric Turbulence and Misalignment Fading Channels

    PubMed Central

    García-Zambrana, Antonio; Castillo-Vázquez, Carmen; Castillo-Vázquez, Beatriz

    2014-01-01

    A novel bit-detect-and-forward (BDF) relaying scheme based on repetition coding with the relay is proposed, significantly improving the robustness to impairments proper to free-space optical (FSO) communications such as unsuitable alignment between transmitter and receiver as well as fluctuations in the irradiance of the transmitted optical beam due to the atmospheric turbulence. Closed-form asymptotic bit-error-rate (BER) expressions are derived for a 3-way FSO communication setup. Fully exploiting the potential time-diversity available in the relay turbulent channel, a relevant better performance is achieved, showing a greater robustness to the relay location since a high diversity gain is provided regardless of the source-destination link distance. PMID:24587711

  5. Evolution of a radio communication relay system

    NASA Astrophysics Data System (ADS)

    Nguyen, Hoa G.; Pezeshkian, Narek; Hart, Abraham; Burmeister, Aaron; Holz, Kevin; Neff, Joseph; Roth, Leif

    2013-05-01

    Providing long-distance non-line-of-sight control for unmanned ground robots has long been recognized as a problem, considering the nature of the required high-bandwidth radio links. In the early 2000s, the DARPA Mobile Autonomous Robot Software (MARS) program funded the Space and Naval Warfare Systems Center (SSC) Pacific to demonstrate a capability for autonomous mobile communication relaying on a number of Pioneer laboratory robots. This effort also resulted in the development of ad hoc networking radios and software that were later leveraged in the development of a more practical and logistically simpler system, the Automatically Deployed Communication Relays (ADCR). Funded by the Joint Ground Robotics Enterprise and internally by SSC Pacific, several generations of ADCR systems introduced increasingly more capable hardware and software for automatic maintenance of communication links through deployment of static relay nodes from mobile robots. This capability was finally tapped in 2010 to fulfill an urgent need from theater. 243 kits of ruggedized, robot-deployable communication relays were produced and sent to Afghanistan to extend the range of EOD and tactical ground robots in 2012. This paper provides a summary of the evolution of the radio relay technology at SSC Pacific, and then focuses on the latest two stages, the Manually-Deployed Communication Relays and the latest effort to automate the deployment of these ruggedized and fielded relay nodes.

  6. [Arranging first aid as voluntary work in Jukola-relay].

    PubMed

    Karhumäki, Lauri; Lommi, Marja-Liisa; Mononen, Sanna; Sippo-Tujunen, Inkeri; Lommi, Jyri

    2013-01-01

    Various aspects must be anticipated in the planning of first aid in the massive orienteering contest Jukola-relay. Spreading of the event to a wide forest terrain area, beyond the reach of roads, poses a challenge for the evacuation of injured persons. The communication chains must be secured. In addition to the competition center, first aid points must be devised at various off-road points. Capable volunteers must be recruited in sufficient numbers. Establishing a temporary, health center standard emergency preparedness for approximately 50 000 people necessitates the acquisition of equipment and medicines for emergency care. Preparations must be made for the treatment of injuries and attacks of illness among the competitors, the audience and the volunteers.

  7. New static relay for transmission line protection

    SciTech Connect

    Andrichak, J.G.; Massey, W.A.; Patterson, R.C.

    1981-01-01

    A new static ac voltage relay is described which meets the requirements of critical applications. This Static Line Voltage (SLV) relay consists of three independently adjustable detectors, each of which can be operated in the undervoltage or overvoltage mode. Each detector has a dropout to pickup ratio of 99 percent, and a high degree of immunity to harmonics (less than 3 percent variation in operating point with a voltage waveform containing 50 percent third harmonic). The outputs of the individual detectors are user programmable in the type SLV relay to provide AND, OR, or other logical combinations of output contact wiring to the external control circuits. 2 refs.

  8. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in deenergized...

  9. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in deenergized...

  10. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in deenergized...

  11. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in deenergized...

  12. 49 CFR 236.52 - Relayed cut-section.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Relayed cut-section. 236.52 Section 236.52...: All Systems Track Circuits § 236.52 Relayed cut-section. Where relayed cut-section is used in... shall be open and the track circuit shunted when the track relay at such cut-section is in deenergized...

  13. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  14. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  15. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Timing relays and timing devices. 234.265 Section....265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least... or marked on the timing relay or timing device. Timing devices which perform internal...

  16. Network Attack Reference Data Set

    DTIC Science & Technology

    2004-12-01

    change without human intervention, while anomaly detection techniques often result in a high degree of false positives and can sometimes be re-trained...change without human intervention and therefore can introduce false negatives in its reports. Anomaly detection techniques, through systems that detect...attacks) to the best of our knowledge. Us- ing TCPUtils, the IP addresses of this traffic were translated to reflect the chosen class B address ranges

  17. Additive attacks on speaker recognition

    NASA Astrophysics Data System (ADS)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  18. Capacity Analysis of Cooperative Relaying Networks with Adaptive Relaying Scheme Selection

    NASA Astrophysics Data System (ADS)

    Teshima, Kunihiko; Yamamoto, Koji; Murata, Hidekazu; Yoshida, Susumu

    In the present paper, the performance of cooperative relaying networks with adaptive relaying scheme selection is analyzed. Cooperative relaying is a new technique to achieve spatial diversity gain by using neighboring stations. However, when multiple stations transmit simultaneously, the number of interference signals increases. Therefore, the introduction of cooperative relaying in radio communication systems does not always increase the network capacity due to the co-channel interference. Therefore, in order to achieve high spectral efficiency, it is necessary to select cooperative relaying or non-cooperative relaying adaptively. Assuming both centralized and decentralized adaptive controls, the spectrum efficiency is evaluated. The performance under decentralized control is evaluated using a game-theoretic approach. Simulation results show that the introduction of cooperative relaying with centralized control always increases the spectral efficiency. On the other hand, Simulation results also show that, when each source selects a relaying scheme independently and selfishly to maximize its own spectral efficiency, the introduction of the cooperative relaying may reduce the spectral efficiency due to the increase in the number of interference signals.

  19. Using Internet Relay Chat in Teaching Chinese.

    ERIC Educational Resources Information Center

    Xie, Tianwei

    2002-01-01

    Explored the feasibility of using Internet Relay Chat (IRC) to facilitate Chinese language teaching and learning. Describes procedures for organizing and conducting chat sessions and discusses the benefits and problems of using IRC. (Author/VWL)

  20. Deployable Overlay Network for Defense against Distributed SYN Flood Attacks

    NASA Astrophysics Data System (ADS)

    Ohsita, Yuichi; Ata, Shingo; Murata, Masayuki

    Distributed denial-of-service attacks on public servers have recently become more serious. Most of them are SYN flood attacks, since the malicious attackers can easily exploit the TCP specification to generate traffic making public servers unavailable. We need a defense method which can protect legitimate traffic so that end users can connect the target servers during such attacks. In this paper, we propose a new framework, in which all of the TCP connections to the victim servers from a domain are maintained at the gateways of the domain (i. e., near the clients). We call the nodes maintaining the TCP connection defense nodes. The defense nodes check whether arriving packets are legitimate or not by maintaining the TCP connection. That is, the defense nodes delegate reply packets to the received connection request packets and identify the legitimate packets by checking whether the clients reply to the reply packets. Then, only identified traffic are relayed via overlay networks. As a result, by deploying the defense nodes at the gateways of a domain, the legitimate packets from the domain are relayed apart from other packets including attack packets and protected. Our simulation results show that our method can protect legitimate traffic from the domain deploying our method. We also describe the deployment scenario of our defense mechanism.

  1. Feature-linked synchronization of thalamic relay cell firing induced by feedback from the visual cortex

    NASA Astrophysics Data System (ADS)

    Sillito, Adam M.; Jones, Helen E.; Gerstein, George L.; West, David C.

    1994-06-01

    THE function of the massive feedback projection from visual cortex to its thalamic relay nucleus1,2 has so far eluded any clear overview. This feedback exerts a range of effects3-6, including an increase in the inhibition elicited by moving contours7,8, but the functional logic of the direct connections to the thalamic cells that relay the retinal input to the cortex9-11 remains largely unknown. In contrast to its thalamic nucleus, the visual cortex is characterized by cells that are strongly sensitive to the orientation of moving contours. Here we report that when driven by moving oriented visual stimuli the cortical feedback induces correlated firing in relay cells. This cortically induced correlation of relay cell activity produces coherent firing in those groups of relay cells with receptive field alignments appropriate to signalling the particular orientation of the moving contour to the cortex. Synchronization of relay cell firing means that they will elicit temporally overlapping excitatory postsynaptic potentials in their cortical target cells, thus increasing the chance that the cortical cells will fire. Effectively this increases the gain of the input for feature-linked events detected by the cortex. We propose that this feedback loop serves to lock or focus the appropriate circuitry onto the stimulus feature.

  2. Airborne Relay-Based Regional Positioning System

    PubMed Central

    Lee, Kyuman; Noh, Hongjun; Lim, Jaesung

    2015-01-01

    Ground-based pseudolite systems have some limitations, such as low vertical accuracy, multipath effects and near-far problems. These problems are not significant in airborne-based pseudolite systems. However, the monitoring of pseudolite positions is required because of the mobility of the platforms on which the pseudolites are mounted, and this causes performance degradation. To address these pseudolite system limitations, we propose an airborne relay-based regional positioning system that consists of a master station, reference stations, airborne relays and a user. In the proposed system, navigation signals are generated from the reference stations located on the ground and are relayed via the airborne relays. Unlike in conventional airborne-based systems, the user in the proposed system sequentially estimates both the locations of airborne relays and his/her own position. Therefore, a delay due to monitoring does not occur, and the accuracy is not affected by the movement of airborne relays. We conducted several simulations to evaluate the performance of the proposed system. Based on the simulation results, we demonstrated that the proposed system guarantees a higher accuracy than airborne-based pseudolite systems, and it is feasible despite the existence of clock offsets among reference stations. PMID:26029953

  3. Physical Layer Security Using Two-Path Successive Relaying.

    PubMed

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-06-09

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes.

  4. Physical Layer Security Using Two-Path Successive Relaying

    PubMed Central

    Liau, Qian Yu; Leow, Chee Yen; Ding, Zhiguo

    2016-01-01

    Relaying is one of the useful techniques to enhance wireless physical-layer security. Existing literature shows that employing full-duplex relay instead of conventional half-duplex relay improves secrecy capacity and secrecy outage probability, but this is at the price of sophisticated implementation. As an alternative, two-path successive relaying has been proposed to emulate operation of full-duplex relay by scheduling a pair of half-duplex relays to assist the source transmission alternately. However, the performance of two-path successive relaying in secrecy communication remains unexplored. This paper proposes a secrecy two-path successive relaying protocol for a scenario with one source, one destination and two half-duplex relays. The relays operate alternately in a time division mode to forward messages continuously from source to destination in the presence of an eavesdropper. Analytical results reveal that the use of two half-duplex relays in the proposed scheme contributes towards a quadratically lower probability of interception compared to full-duplex relaying. Numerical simulations show that the proposed protocol achieves the ergodic achievable secrecy rate of full-duplex relaying while delivering the lowest probability of interception and secrecy outage probability compared to the existing half duplex relaying, full duplex relaying and full duplex jamming schemes. PMID:27294924

  5. Performance analysis of relay subset selection for amplify-and-forward cognitive relay networks.

    PubMed

    Sultan, Kiran; Qureshi, Ijaz Mansoor; Malik, Aqdas Naveed; Zubair, Muhammad

    2014-01-01

    Cooperative communication is regarded as a key technology in wireless networks, including cognitive radio networks (CRNs), which increases the diversity order of the signal to combat the unfavorable effects of the fading channels, by allowing distributed terminals to collaborate through sophisticated signal processing. Underlay CRNs have strict interference constraints towards the secondary users (SUs) active in the frequency band of the primary users (PUs), which limits their transmit power and their coverage area. Relay selection offers a potential solution to the challenges faced by underlay networks, by selecting either single best relay or a subset of potential relay set under different design requirements and assumptions. The best relay selection schemes proposed in the literature for amplify-and-forward (AF) based underlay cognitive relay networks have been very well studied in terms of outage probability (OP) and bit error rate (BER), which is deficient in multiple relay selection schemes. The novelty of this work is to study the outage behavior of multiple relay selection in the underlay CRN and derive the closed-form expressions for the OP and BER through cumulative distribution function (CDF) of the SNR received at the destination. The effectiveness of relay subset selection is shown through simulation results.

  6. Pericarditis - after heart attack

    MedlinePlus

    ... medlineplus.gov/ency/article/000166.htm Pericarditis - after heart attack To use the sharing features on this page, ... occur in the days or weeks following a heart attack . Causes Two types of pericarditis can occur after ...

  7. Heart attack first aid

    MedlinePlus

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  8. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    SciTech Connect

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must be combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian system. We

  9. COMPASS Final Report: Lunar Relay Satellite (LRS)

    NASA Technical Reports Server (NTRS)

    Oleson, Steven R.; McGuire, Melissa L.

    2012-01-01

    The Lunar Relay Satellite (LRS) COllaborative Modeling and Parametric Assessment of Space Systems (COMPASS) session was tasked to design a satellite to orbit in an elliptical lunar polar orbit to provide relay communications between lunar South Pole assets and the Earth. The design included a complete master equipment list, power requirement list, configuration design, and brief risk assessment and cost analysis. The LRS is a half-TDRSS sized box spacecraft, which provides communications and navigation relay between lunar outposts (via Lunar Communications Terminals (LCT)) or Sortie parties (with user radios) and large ground antennas on Earth. The LRS consists of a spacecraft containing all the communications and avionics equipment designed by NASA Jet Propulsion Laboratory s (JPL) Team X to perform the relay between lunar-based assets and the Earth. The satellite design is a standard box truss spacecraft design with a thermal control system, 1.7 m solar arrays for 1 kWe power, a 1 m diameter Ka/S band dish which provides relay communications with the LCT, and a Q-band dish for communications to/from the Earth based assets. While JPL's Team X and Goddard Space Flight Center s (GSFC) I M Design Center (IMDC) have completed two other LRS designs, this NASA Glenn Research Center (GRC) COMPASS LRS design sits between them in terms of physical size and capabilities.

  10. Seven Deadliest Network Attacks

    SciTech Connect

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  11. Optical deep space communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Gagliardi, R. M.; Vilnrotter, V. A.; Dolinar, S. J., Jr.

    1981-01-01

    The possible use of an optical for high rate data transmission from a deep space vehicle to an Earth-orbiting relay satellite while RF links are envisioned for the relay to Earth link was studied. A preliminary link analysis is presented for initial sizing of optical components and power levels, in terms of achievable data rates and feasible range distances. Modulation formats are restricted to pulsed laser operation, involving bot coded and uncoded schemes. The advantage of an optical link over present RF deep space link capabilities is shown. The problems of acquisition, pointing and tracking with narrow optical beams are presented and discussed. Mathematical models of beam trackers are derived, aiding in the design of such systems for minimizing beam pointing errors. The expected orbital geometry between spacecraft and relay satellite, and its impact on beam pointing dynamics are discussed.

  12. Impact of relay placement on diversity order in adaptive selective DF relay-assisted FSO communications.

    PubMed

    Boluda-Ruiz, Rubén; García-Zambrana, Antonio; Castillo-Vázquez, Beatriz; Castillo-Vázquez, Carmen

    2015-02-09

    The impact of relay placement on diversity order in adaptive selective decode-and-forward (DF) cooperative strategies is here investigated in the context of free-space optical (FSO) communications over atmospheric turbulence channels with pointing errors when line of sight is available. The irradiance of the transmitted optical beam here considered is susceptible to moderate-to-strong turbulence conditions, following a gamma-gamma (GG) distribution together with a misalignment fading model where the effect of beam width, detector size and jitter variance is considered. Novel closed-form approximate bit error-rate (BER) expressions are obtained for a cooperative FSO communication setup with N relays, assuming that these relays are located in an area similar to an annulus around source or destination node. An analytical expression is here found that determines the best selection criterion based on the knowledge of the channel state information (CSI) of source-relay or relay-destination links in order to significantly increase the diversity order corresponding to the cooperative strategy under study. It is concluded that the highest diversity order is achieved when the relation β(SR(min)) > β(SD) + β(R(min)D) is satisfied, wherein β(SR(min)), β(R(min)D) and β(SD) are parameters corresponding to the atmospheric turbulence conditions of source-relay and relay-destination link with the greatest scintillation index, and source-destination link, respectively.

  13. Multiantenna relay beamforming design for QoS discrimination in two-way relay networks.

    PubMed

    Xiong, Ke; Zhang, Yu; Li, Dandan; Chang, Chih-Yung; Zhong, Zhangdui

    2013-01-01

    This paper investigates the relay beamforming design for quality of service (QoS) discrimination in two-way relay networks. The purpose is to keep legitimate two-way relay users exchange their information via a helping multiantenna relay with QoS guarantee while avoiding the exchanged information overhearing by unauthorized receiver. To this end, we propose a physical layer method, where the relay beamforming is jointly designed with artificial noise (AN) which is used to interfere in the unauthorized user's reception. We formulate the joint beamforming and AN (BFA) design into an optimization problem such that the received signal-to-interference-ratio (SINR) at the two legitimate users is over a predefined QoS threshold while limiting the received SINR at the unauthorized user which is under a certain secure threshold. The objective of the optimization problem is to seek the optimal AN and beamforming vectors to minimize the total power consumed by the relay node. Since the optimization problem is nonconvex, we solve it by using semidefinite program (SDP) relaxation. For comparison, we also study the optimal relay beamforming without using AN (BFO) under the same QoS discrimination constraints. Simulation results show that both the proposed BFA and BFO can achieve the QoS discrimination of the two-way transmission. However, the proposed BFA yields significant power savings and lower infeasible rates compared with the BFO method.

  14. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  15. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  16. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  17. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  18. 49 CFR 236.206 - Battery or power supply with respect to relay; location.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Battery or power supply with respect to relay... to relay; location. The battery or power supply for each signal control relay circuit, where an open... from the relay....

  19. Deep space optical communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Dolinar, S.; Vilnrotter, V.; Gagliardi, R.

    1981-01-01

    The application of optical communications for a deep space link via an earth-orbiting relay satellite is discussed. The system uses optical frequencies for the free-space channel and RF links for atmospheric transmission. The relay satellite is in geostationary orbit and contains the optics necessary for data processing and formatting. It returns the data to earth through the RF terrestrial link and also transmits an optical beacon to the satellite for spacecraft return pointing and for the alignment of the transmitting optics. Future work will turn to modulation and coding, pointing and tracking, and optical-RF interfacing.

  20. Deep space optical communication via relay satellite

    NASA Technical Reports Server (NTRS)

    Dolinar, S.; Vilnrotter, V.; Gagliardi, R.

    1981-01-01

    The application of optical communications for a deep space link via an earth-orbiting relay satellite is discussed. The system uses optical frequencies for the free-space channel and RF links for atmospheric transmission. The relay satellite is in geostationary orbit and contains the optics necessary for data processing and formatting. It returns the data to earth through the RF terrestrial link and also transmits an optical beacon to the satellite for spacecraft return pointing and for the alignment of the transmitting optics. Future work will turn to modulation and coding, pointing and tracking, and optical-RF interfacing.

  1. Tracking and Data Relay Satellite System (TDRSS)

    NASA Technical Reports Server (NTRS)

    Mckenzie, J.; Vanek, C.

    1991-01-01

    The DSN (Deep Space Network) mission support requirements for the Tracking and Data Relay Satellite System (TDRSS) are summarized. The TDRSS consists of four identical satellites in geosynchronous orbits (35,800 km) and a dedicated ground station. The payload of each satellite is a telecommunications service system that relays communication signals between low earth-orbiting user spacecraft and the TDRSS ground terminal. Mission objectives are outlined and the DSN support requirements are defined through the presentation of tables and narratives describing the spacecraft flight profile; DSN support coverage; frequency assignments; support parameters for telemetry, command and support systems; and tracking support responsibility.

  2. Counterfactual quantum cryptography network with untrusted relay

    NASA Astrophysics Data System (ADS)

    Chen, Yuanyuan; Gu, Xuemei; Jiang, Dong; Xie, Ling; Chen, Lijun

    2015-07-01

    Counterfactual quantum cryptography allows two remote parties to share a secret key even though a physical particle is not in fact transmitted through the quantum channel. In order to extend the scope of counterfactual quantum cryptography, we use an untrusted relay to construct a multi-user network. The implementation issues are discussed to show that the scheme can be realized with current technologies. We also prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untrusted relay can perform false operations.

  3. Do Unexpected Panic Attacks Occur Spontaneously?

    PubMed Central

    Meuret, Alicia E.; Rosenfield, David; Wilhelm, Frank H.; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T.

    2012-01-01

    Background Spontaneous or unexpected panic attacks, per definition, occur out-of-the blue, in absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of or during the attack, but not preceding it. To test this hypothesisweexaminedif points of significant autonomic changes preceded the onset of spontaneous panic attacks. Methods Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen naturally panic attacks were recorded during 1,960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before, and continuing to 10 minutes after, the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization, and compared to time matched control periods within the same person. Results Significant patterns of instability across a numberof autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes prior to onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt PCO2 increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in PCO2. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before and duringthe attacks. Changes in the matched control periods were largely absent. Conclusions Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction betweenuncuedand cued panic attacks. PMID:21783179

  4. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    Mars Relay Network is prepared to support MSL: a) ODY/MRO/MEX will all provide critical event comm support during EDL. b) New Electra/Electra-Lite capabilities on the MSL-MRO link will support >250 Mb/sol MSL data return. 2013 MAVEN orbiter will replenish on-orbit relay infrastructure as prior orbiters approach end-of-life. While NASA has withdrawn from the 2016 EMTGO and 2018 Joint Rover missions, analysis of the potential link shows a path to Gbit/sol relay capability 2012.

  5. Optimum satellite relay positions with application to a TDRS-1 Indian Ocean relay

    NASA Technical Reports Server (NTRS)

    Jackson, A. H.; Christopher, P.

    1994-01-01

    An Indian Ocean satellite relay is examined. The relay satellite position is optimized by minimizing the sum of downlink and satellite to satellite link losses. Osculating orbital elements are used for fast intensive orbital computation. Integrated Van Vleck gaseous attenuation and a Crane rain model are used for downlink attenuation. Circular polarization losses on the satellite to satellite link are found dynamically. Space to ground link antenna pointing losses are included as a function of yaw ans spacecraft limits. Relay satellite positions between 90 to 100 degrees East are found attractive for further study.

  6. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    Mars Relay Network is prepared to support MSL: a) ODY/MRO/MEX will all provide critical event comm support during EDL. b) New Electra/Electra-Lite capabilities on the MSL-MRO link will support >250 Mb/sol MSL data return. 2013 MAVEN orbiter will replenish on-orbit relay infrastructure as prior orbiters approach end-of-life. While NASA has withdrawn from the 2016 EMTGO and 2018 Joint Rover missions, analysis of the potential link shows a path to Gbit/sol relay capability 2012.

  7. Advanced Strategic and Tactical Relay Request Management for the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Wallick, Michael N.; Gladden, Roy E.; Wang, Paul; Hy, Franklin H.

    2013-01-01

    This software provides a new set of capabilities for the Mars Relay Operations Service (MaROS) in support of Strategic and Tactical relay, including a highly interactive relay request Web user interface, mission control over relay planning time periods, and mission management of allowed strategic vs. tactical request parameters. Together, these new capabilities expand the scope of the system to include all elements critical for Tactical relay operations. Planning of replay activities spans a time period that is split into two distinct phases. The first phase is called Strategic, which begins at the time that relay opportunities are identified, and concludes at the point that the orbiter generates the flight sequences for on board execution. Any relay request changes from this point on are called Tactical. Tactical requests, otherwise called Orbit - er Relay State Changes (ORSC), are highly restricted in terms of what types of changes can be made, and the types of parameters that can be changed may differ from one orbiter to the next. For example, one orbiter may be able to delay the start of a relay request, while another may not. The legacy approach to ORSC management involves exchanges of e-mail with "requests for change" and "acknowledgement of approval," with no other tracking of changes outside of e-mail folders. MaROS Phases 1 and 2 provided the infrastructure for strategic relay for all supported missions. This new version, 3.0, introduces several capabilities that fully expand the scope of the system to include tactical relay. One new feature allows orbiter users to manage and "lock" Planning Periods, which allows the orbiter team to formalize the changeover from Strategic to Tactical operations. Another major feature allows users to interactively submit tactical request changes via a Web user interface. A third new feature allows orbiter missions to specify allowed tactical updates, which are automatically incorporated into the tactical change process

  8. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  9. Relay communications strategies for Mars exploration through 2020

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, B.; DePaula, R.; Kazz, G.; Lee, C.; Noreen, G.

    2005-01-01

    In this paper we will examine NASA's strategy for relay communications support of missions planned for this decade, and discuss options for longer-term relay network evolution in support of second-decade missions.

  10. Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel

    PubMed Central

    Li, Jun; Lee, Moon Ho

    2017-01-01

    In this paper, we study the emergence of topological interference alignment and the characterizing features of a multi-user broadcast interference relay channel. We propose an alternative transmission strategy named the relay space-time interference alignment (R-STIA) technique, in which a K-user multiple-input-multiple-output (MIMO) interference channel has massive antennas at the transmitter and relay. Severe interference from unknown transmitters affects the downlink relay network channel and degrades the system performance. An additional (unintended) receiver is introduced in the proposed R-STIA technique to overcome the above problem, since it has the ability to decode the desired signals for the intended receiver by considering cooperation between the receivers. The additional receiver also helps in recovering and reconstructing the interference signals with limited channel state information at the relay (CSIR). The Alamouti space-time transmission technique and minimum mean square error (MMSE) linear precoder are also used in the proposed scheme to detect the presence of interference signals. Numerical results show that the proposed R-STIA technique achieves a better performance in terms of the bit error rate (BER) and sum-rate compared to the existing broadcast channel schemes. PMID:28817071

  11. Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel.

    PubMed

    Selvaprabhu, Poongundran; Chinnadurai, Sunil; Li, Jun; Lee, Moon Ho

    2017-08-17

    In this paper, we study the emergence of topological interference alignment and the characterizing features of a multi-user broadcast interference relay channel. We propose an alternative transmission strategy named the relay space-time interference alignment (R-STIA) technique, in which a K -user multiple-input-multiple-output (MIMO) interference channel has massive antennas at the transmitter and relay. Severe interference from unknown transmitters affects the downlink relay network channel and degrades the system performance. An additional (unintended) receiver is introduced in the proposed R-STIA technique to overcome the above problem, since it has the ability to decode the desired signals for the intended receiver by considering cooperation between the receivers. The additional receiver also helps in recovering and reconstructing the interference signals with limited channel state information at the relay (CSIR). The Alamouti space-time transmission technique and minimum mean square error (MMSE) linear precoder are also used in the proposed scheme to detect the presence of interference signals. Numerical results show that the proposed R-STIA technique achieves a better performance in terms of the bit error rate (BER) and sum-rate compared to the existing broadcast channel schemes.

  12. Pressure and fluid-flow response to production from reservoirs bounded by faults with relay structures

    SciTech Connect

    Matthaei, S.K.; Aydin, A.; Pollard, D.D.

    1996-12-31

    Compartmentatilization of hydrocarbon reservoirs by faults is a widely observed phenomenon in the North Sea and the Niger delta oil fields among others. Faults with significant throw or heave are identifiable in seismic surveys. However, toward their terminations or near relay structures, slip decreases so portions of the faults may be invisible in seismic data. Therefore, we use outcrop analogs to constrain the model geometry and permeability distributions to investigate the influence on fluid flow during production of such relay structures and the apparent terminations of faults in seismic images. We employ field measurements of the geometry, width and permeability of fault terminations and relay structures in the Entrada Sandstone, Arches National Park, Utah, to construct fluid flow models of a fault-bounded analog reservoir. Production from wells drilled into this reservoir is simulated with a novel high-resolution finite element code. Starting with initially uniform reservoir pressure, the results of these simulations based on geologically realistic parameters, comprise pressure differentials that build up during production across seismically detectable faults with associated deformation bands and joints in the relay structure. For a typical relay structure, we explore the implications of these results for fault-seal stability and for changes in reservoir flow patterns if fault permeability changes during production.

  13. Pressure and fluid-flow response to production from reservoirs bounded by faults with relay structures

    SciTech Connect

    Matthaei, S.K.; Aydin, A.; Pollard, D.D. )

    1996-01-01

    Compartmentatilization of hydrocarbon reservoirs by faults is a widely observed phenomenon in the North Sea and the Niger delta oil fields among others. Faults with significant throw or heave are identifiable in seismic surveys. However, toward their terminations or near relay structures, slip decreases so portions of the faults may be invisible in seismic data. Therefore, we use outcrop analogs to constrain the model geometry and permeability distributions to investigate the influence on fluid flow during production of such relay structures and the apparent terminations of faults in seismic images. We employ field measurements of the geometry, width and permeability of fault terminations and relay structures in the Entrada Sandstone, Arches National Park, Utah, to construct fluid flow models of a fault-bounded analog reservoir. Production from wells drilled into this reservoir is simulated with a novel high-resolution finite element code. Starting with initially uniform reservoir pressure, the results of these simulations based on geologically realistic parameters, comprise pressure differentials that build up during production across seismically detectable faults with associated deformation bands and joints in the relay structure. For a typical relay structure, we explore the implications of these results for fault-seal stability and for changes in reservoir flow patterns if fault permeability changes during production.

  14. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the Radiolocation...

  15. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the Radiolocation...

  16. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  17. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  18. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  19. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Timing relays and timing devices. 234.265 Section... Maintenance, Inspection, and Testing Inspections and Tests § 234.265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least once every twelve months. The timing shall...

  20. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  1. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  2. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  3. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  4. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  5. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  6. 47 CFR 90.243 - Mobile relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Mobile relay stations. 90.243 Section 90.243... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.243 Mobile relay stations. (a) Mobile relay operations will be authorized on frequencies below 512 MHz, except in the...

  7. 76 FR 58412 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals...-First Century Communications and Video Accessibility Act of 2010, Section 105, Relay Services for...

  8. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  9. 47 CFR 11.20 - State Relay Network.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false State Relay Network. 11.20 Section 11.20 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL EMERGENCY ALERT SYSTEM (EAS) General § 11.20 State Relay Network. This network is composed of State Relay (SR) sources, leased common carrier...

  10. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  11. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  12. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  13. 76 FR 65965 - Contributions to the Telecommunications Relay Services Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-25

    ... COMMISSION 47 CFR Parts 1 and 64 Contributions to the Telecommunications Relay Services Fund AGENCY: Federal... contributing to the interstate Telecommunications Relay Services (TRS) Fund in a manner prescribed by... to the Telecommunications Relay Service Fund, Report and Order (Order), document FCC 11-150,...

  14. 77 FR 20553 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Relay Services for Deaf-Blind Individuals, Report and Order, document FCC 11-56, published at 76 FR... Commission to allocate up to $10 million annually from the Interstate Telecommunications Relay Services...

  15. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  16. 49 CFR 234.265 - Timing relays and timing devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Timing relays and timing devices. 234.265 Section... Maintenance, Inspection, and Testing Inspections and Tests § 234.265 Timing relays and timing devices. Each timing relay and timing device shall be tested at least once every twelve months. The timing shall...

  17. 47 CFR 90.245 - Fixed relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Fixed relay stations. 90.245 Section 90.245... MOBILE RADIO SERVICES Non-Voice and Other Specialized Operations § 90.245 Fixed relay stations. Except where specifically provided for, fixed relay stations shall be authorized to operate only on...

  18. 49 CFR 236.556 - Adjustment of relay.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Adjustment of relay. 236.556 Section 236.556..., Train Control and Cab Signal Systems Rules and Instructions; Locomotives § 236.556 Adjustment of relay. Change in adjustment of relay shall be made only in a shop equipped for that purpose except when...

  19. Return of ambiguity attacks

    NASA Astrophysics Data System (ADS)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  20. Factors affecting performance during an endurance relay.

    PubMed Central

    Lloyd, E. L.; Henderson, W.; Covell, B.; Bryce, G. R.

    1977-01-01

    A successful attempt by Edinburgh Athletic Club on the world record for the 24-hour 10-man x 1 mile relay is reported. The effects of a variety of factors on the performances of the athletes are assessed, and some physiological changes noted. In the light of these observations recommendations are made to help the planning of future record attempts. PMID:922276

  1. Relay cross metathesis reactions of vinylphosphonates.

    PubMed

    Malla, Raj K; Ridenour, Jeremy N; Spilling, Christopher D

    2014-01-01

    Dimethyl (β-substituted) vinylphosphonates do not readily undergo cross metathesis reactions with Grubbs catalyst and terminal alkenes. However, the corresponding mono- or diallyl vinylphosphonate esters undergo facile cross metathesis reactions. The improved reactivity is attributed to a relay step in the cross metathesis reaction mechanism.

  2. Digital sequential solid-state relay tester

    NASA Astrophysics Data System (ADS)

    Riley, J. L.

    1981-11-01

    The design of the digital sequential solid-state relay tester is described. This equipment is used extensively in simplifying the testing and development of the computer-controlled, motor-driven valve array in the tritium waste treatment section at the Los Alamos National Laboratory.

  3. Cable Television Service; Cable Television Relay Service.

    ERIC Educational Resources Information Center

    Federal Register, 1972

    1972-01-01

    The rules and regulations of the Federal Communications Commission (FCC) concerning cable television service and cable relay service are presented along with the comments of the National Cable Television Association, the National Association of Broadcasters, the Association of Maximum Service Telecasters, and a major group of program suppliers.…

  4. Cable Television Service; Cable Television Relay Service.

    ERIC Educational Resources Information Center

    Federal Register, 1972

    1972-01-01

    The rules and regulations of the Federal Communications Commission (FCC) concerning cable television service and cable relay service are presented along with the comments of the National Cable Television Association, the National Association of Broadcasters, the Association of Maximum Service Telecasters, and a major group of program suppliers.…

  5. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  6. First Things First: Internet Relay Chat Openings.

    ERIC Educational Resources Information Center

    Rintel, E. Sean; Mulholland, Joan; Pittam, Jeffery

    2001-01-01

    Argues that Internet Relay Chat (IRC) research needs to systematically address links between interaction structures, technological mediation and the instantiation and development of interpersonal relationships. Finds that openings that occur directly following user's entries into public IRC channels are often ambiguous, can disrupt relationship…

  7. Traumatic tiger attack.

    PubMed

    Chum, Marvin; Ng, Wai Pui

    2011-11-01

    Attacks on humans by large cats are uncommon occurrences and thus the principles of managing such injuries are not well documented. The authors here report the case of an 11-year-old boy who was mauled by a privately owned tiger. The attack resulted in multiple cranial lacerations and fractures, dissection of the internal carotid artery, and persistent neurological deficits. This case outlines the multiple sources of injury and pathology that can result from such an attack. Discussion is focused on the pattern of injury seen in large feline attacks and the treatment approach.

  8. Depression After Heart Attack

    MedlinePlus

    ... ATVB) Circulation → Circ: Arrhythmia and Electrophysiology → Circ: Cardiovascular Genetics → Circ: Cardiovascular ... Patient Page Depression After Heart Attack Why Should I Be Concerned ...

  9. Using a micromachined magnetostatic relay in commutating a DC motor

    NASA Technical Reports Server (NTRS)

    Tai, Yu-Chong (Inventor); Wright, John A. (Inventor); Lilienthal, Gerald (Inventor)

    2004-01-01

    A DC motor is commutated by rotating a magnetic rotor to induce a magnetic field in at least one magnetostatic relay in the motor. Each relay is activated in response to the magnetic field to deliver power to at least one corresponding winding connected to the relay. In some cases, each relay delivers power first through a corresponding primary winding and then through a corresponding secondary winding to a common node. Specific examples include a four-pole, three-phase motor in which each relay is activated four times during one rotation of the magnetic rotor.

  10. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  11. Spaceborne centrifugal relays for spacecraft propulsion

    NASA Technical Reports Server (NTRS)

    Ouzidane, Malika

    1991-01-01

    Acceleration using centrifugal relays is a recently discovered method for the acceleration of spaceborne payloads to high velocity at high thrust. Centrifugal relays are moving rotors which progressively accelerate reaction mass to higher velocities. One important engineering problem consists of accurately tracking the position of the projectiles and rotors and guiding each projectile exactly onto the appropriate guide tracks on each rotor. The topics of this research are the system kinematics and dynamics and the computerized guidance system which will allow the projectile to approach each rotor with exact timing with respect to the rotor rotation period and with very small errors in lateral positions. Kinematics studies include analysis of rotor and projectile positions versus time and projectile/rotor interactions. Guidance studies include a detailed description of the tracking mechanism (interrupt of optical beams) and the aiming mechanism (electromagnetic focusing) including the design of electromagnetic deflection coils and the switching circuitry.

  12. Solar concentrator with a toroidal relay module.

    PubMed

    Lin, Jhe-Syuan; Liang, Chao-Wen

    2015-10-01

    III-V multijunction solar cells require solar concentrators with a high concentration ratio to reduce per watt cost and to increase solar energy transforming efficiency. This paper discusses a novel solar concentrator design that features a high concentration ratio, high transfer efficiency, thin profile design, and a high solar acceptance angle. The optical design of the concentrator utilizes a toroidal relay module, which includes both the off-axis relay lens and field lens design in a single concentric toroidal lens shape. The optical design concept of the concentrator is discussed and the simulation results are shown. The given exemplary design has an aspect ratio of 0.24, a high averaged optical concentration ratio 1230×, a maximum efficiency of 76.8%, and the solar acceptance angle of ±0.9°.

  13. Can You Recognize a Heart Attack? Quiz

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  14. Non-latching relay switch assembly

    DOEpatents

    Duimstra, Frederick A.

    1991-01-01

    A non-latching relay switch assembly which includes a coil section and a switch or contact section. The coil section includes a permanent magnet and an electromagnet. The respective sections are arranged in separate locations or cavities in the assembly. The switch has a "normal" position and is selectively switched by an overriding electromagnetic assembly. The switch returns to the "normal" position when the overriding electromagnetic assembly is inactive.

  15. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  16. Relay Support for the Mars Science Laboratory and the Coming Decade of Mars Relay Network Evolution

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Arnold, Bradford W.; Bell, David J.; Bruvold, Kristoffer N.; Gladden, Roy E.; Ilott, Peter A.; Lee, Charles H.

    2012-01-01

    In the past decade, an evolving network of Mars relay orbiters has provided telecommunication relay services to the Mars Exploration Rovers, Spirit and Opportunity, and to the Mars Phoenix Lander, enabling high-bandwidth, energy-efficient data transfer and greatly increasing the volume of science data that can be returned from the Martian surface, compared to conventional direct-to-Earth links. The current relay network, consisting of NASA's Odyssey and Mars Reconnaissance Orbiter and augmented by ESA's Mars Express Orbiter, stands ready to support the Mars Science Laboratory, scheduled to arrive at Mars on Aug 6, 2012, with new capabilities enabled by the Electra and Electra-Lite transceivers carried by MRO and MSL, respectively. The MAVEN orbiter, planned for launch in 2013, and the ExoMars/Trace Gas Orbiter, planned for launch in 2016, will replenish the on-orbit relay network as the current orbiter approach their end of life. Currently planned support scenarios for this future relay network include an ESA EDL Demonstrator Module deployed by the 2016 ExoMars/TGO orbiter, and the 2018 NASA/ESA Joint Rover, representing the first step in a multimission Mars Sample Return campaign.

  17. Stroke following rottweiler attack.

    PubMed

    Miller, S J; Copass, M; Johansen, K; Winn, H R

    1993-02-01

    A previously healthy 50-year-old man suffered a major right cerebral infarction shortly after receiving head and neck bites in an attack by two rottweilers. Arteriography revealed occlusion of the right middle cerebral artery, an intimal flap and pseudoaneurysm in the high right internal carotid artery just proximal to the skull base, and an obstructed right vertebral artery. The powerful jaw mechanism of rottweilers and other large mastiff-type dogs makes their bites particularly destructive. The predilection of these animals for attacking the head and upper body makes occult crush injury to the extracranial cerebral vessels an important diagnostic consideration following such attacks.

  18. [Atypical panic attacks].

    PubMed

    Boulenger, Jean-Philippe

    2009-04-20

    Panic attacks are acute episodes of severe anxiety characterized by a brutal onset and a progressive ending. When atypical, this symptomatic picture is often the cause of diagnostic errors sometimes costly in terms of clinical work-up and repeated specialized advices. Each of the classical components of panic attacks (psychological, physical, behavioural) being able to give rise to an atypical presentation, these components must be systematically evaluated. The semiological analysis of these attacks, their clinical background and their occurrence in young adults, mostly women, will contribute to the right diagnosis of these emotional reactions so frequent in general practice.

  19. Supply Chain Attack Framework and Attack Patterns

    DTIC Science & Technology

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  20. High salinity relay as a postharvest processing strategy to reduce vibrio vulnificus levels in Chesapeake Bay oysters (Crassostrea virginica).

    PubMed

    Audemard, Corinne; Kator, Howard I; Rhodes, Martha W; Gallivan, Thomas; Erskine, A J; Leggett, A Thomas; Reece, Kimberly S

    2011-11-01

    In 2009 the U.S. Food and Drug Administration (FDA) announced its intention to implement postharvest processing (PHP) methods to eliminate Vibrio vulnificus from oysters intended for the raw, half-shell market that are harvested from the Gulf of Mexico during warmer months. FDA-approved PHP methods can be expensive and may be associated with unfavorable responses from some consumers. A relatively unexplored PHP method that uses relaying to high salinity waters could be an alternative strategy, considering that high salinities appear to negatively affect the survival of V. vulnificus. During relay, however, oysters may be exposed to rapid and large salinity increases that could cause increased mortality. In this study, the effectiveness of high salinity relay to reduce V. vulnificus to <30 most probable number (MPN) per g and the impact on oyster mortality were assessed in the lower Chesapeake Bay. Two relay experiments were performed during the summer and fall of 2010. Oysters collected from three grow-out sites, a low salinity site (14 to 15 practical salinity units [psu]) and two moderate salinity sites (22 to 25 psu), were relayed directly to a high salinity site (≥30 psu) on Virginia's Eastern Shore. Oysters were assayed for V. vulnificus and Vibrio parahaemolyticus (another Vibrio species of concern) densities at time 0 prior to relay and after 7 and 14 days of relay, using the FDA MPN enrichment method combined with detection by real-time PCR. After 14 days, both V. vulnificus and V. parahaemolyticus densities were ≤0.8 MPN/g, and decreases of 2 to 3 log in V. vulnificus densities were observed. Oyster mortalities were low (≤4%) even for oysters from the low salinity harvest site, which experienced a salinity increase of approximately 15 psu. Results, although preliminary and requiring formal validation and economic analysis, suggest that high salinity relay could be an effective PHP method.

  1. Adjustable electronic load-alarm relay

    DOEpatents

    Mason, Charles H.; Sitton, Roy S.

    1976-01-01

    This invention is an improved electronic alarm relay for monitoring the current drawn by an AC motor or other electrical load. The circuit is designed to measure the load with high accuracy and to have excellent alarm repeatability. Chattering and arcing of the relay contacts are minimal. The operator can adjust the set point easily and can re-set both the high and the low alarm points by means of one simple adjustment. The relay includes means for generating a signal voltage proportional to the motor current. In a preferred form of the invention a first operational amplifier is provided to generate a first constant reference voltage which is higher than a preselected value of the signal voltage. A second operational amplifier is provided to generate a second constant reference voltage which is lower than the aforementioned preselected value of the signal voltage. A circuit comprising a first resistor serially connected to a second resistor is connected across the outputs of the first and second amplifiers, and the junction of the two resistors is connected to the inverting terminal of the second amplifier. Means are provided to compare the aforementioned signal voltage with both the first and second reference voltages and to actuate an alarm if the signal voltage is higher than the first reference voltage or lower than the second reference voltage.

  2. Signs of a Heart Attack

    MedlinePlus

    ... attack Heart Health and Stroke Signs of a heart attack Related information Make the Call. Don't Miss ... to top More information on Signs of a heart attack Read more from womenshealth.gov Make the Call, ...

  3. Quantum relay schemes for continuous-variable quantum key distribution

    NASA Astrophysics Data System (ADS)

    Guo, Ying; Liao, Qin; Huang, Duan; Zeng, Guihua

    2017-04-01

    We propose several concatenated quantum relay continuous-variable quantum key distribution schemes based on the parametric amplifier (PA) and the beam splitter (BS). Instead of using only one BS in the traditional relay scheme, the proposed schemes provide two operations that involve both PA and BS, activating the beam splitting and recombining operations in turn. These schemes would benefit the system performance improvement by providing signal amplification and establishing quantum correlations. We show that the different effects of the relay schemes will cause different system performances because of the varied signal-to-noise ratio (SNR) of output fields. The system's secret key rate will be increased when equipping with the PA-BS relay scheme, because the output fields of the PA are entangled with the correlated quantum noises while input fields of the BS are superimposed, subsequently leading to the quantum noise reduction of the total output fields of relay station, while the reversed BS-PA relay scheme has little advantage over the traditional counterpart that contains only one BS in relay data postprocessing because it will not cause any SNR improvement. Moreover, the reinforced PA-PA relay scheme results in a slight improvement due to the increased SNR. These quantum relay schemes can be performed through the beam splitting, the recombining operations, and the relay data postprocessing, such that it would be suitable for secret information exchange in complex networks with intermediate stations.

  4. A fatal leopard attack.

    PubMed

    Hejna, Petr

    2010-05-01

    A rare case of a big cat fatal attack is presented. A male leopard that had escaped from its unlocked cage attacked a 26-year-old male zoo worker. The man sustained penetrating injuries to the neck with consequent external bleeding. The man died while being transported to the hospital as a result of the injuries sustained. The wounds discovered on the victim's body corresponded with the known methods of leopard attacks and with findings on the carcasses of animals killed by leopards in the wild. The conclusion of the medicolegal investigation was that the underlying cause of death was a bite wound to the neck which lacerated the left internal jugular vein, the two main branches of the left external carotid artery, and the cervical spine. The cause of death was massive external bleeding. Special attention is paid to the general pattern of injuries sustained from big cat attacks.

  5. Transient Ischemic Attack

    MedlinePlus

    A transient ischemic attack (TIA) is a stroke lasts only a few minutes. It happens when the blood supply to part of the brain is briefly blocked. Symptoms of a TIA are like other stroke symptoms, but do not ...

  6. Transient Ischemic Attack

    MedlinePlus Videos and Cool Tools

    ... TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is ...

  7. Cooperating attackers in neural cryptography.

    PubMed

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Situational awareness of a coordinated cyber attack

    NASA Astrophysics Data System (ADS)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  9. Fatal big cat attacks.

    PubMed

    Cohle, S D; Harlan, C W; Harlan, G

    1990-09-01

    Two cases of fatal attacks by large cats are presented. In the first case, a 30-year-old female zoo worker was attacked by a jaguar that had escaped its cage. In the second case, a 2-year-old girl was fatally injured by her father's pet leopard. The pattern of injuries in these cases is nearly identical to those of these cats' prey in the wild.

  10. Laser Communications Relay Demonstration (LCRD) Update and the Path Towards Optical Relay Operations

    NASA Technical Reports Server (NTRS)

    Israel, David J.; Edwards, Bernard L.; Staren, John W.

    2017-01-01

    This paper provides a concept for an evolution of NASA's optical communications near Earth relay architecture. NASA's Laser Communications Relay Demonstration (LCRD), a joint project between NASA's Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory - California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will provide a minimum of two years of high data rate optical communications service experiments in geosynchronous orbit (GEO), following launch in 2019. This paper will provide an update of the LCRD mission status and planned capabilities and experiments, followed by a discussion of the path from LCRD to operational network capabilities.

  11. Laser Communications Relay Demonstration (LCRD) Update and the Path Towards Optical Relay Operations

    NASA Technical Reports Server (NTRS)

    Israel, David J.; Edwards, Bernard L.; Staren, John W.

    2017-01-01

    This Presentation provides a concept for an evolution of NASAs optical communications near Earth relay architecture. NASA's Laser Communications Relay Demonstration (LCRD), a joint project between NASAs Goddard Space Flight Center (GSFC), the Jet Propulsion Laboratory - California Institute of Technology (JPL), and the Massachusetts Institute of Technology Lincoln Laboratory (MIT LL). LCRD will provide a minimum of two years of high data rate optical communications service experiments in geosynchronous orbit (GEO), following launch in 2019. This paper will provide an update of the LCRD mission status and planned capabilities and experiments, followed by a discussion of the path from LCRD to operational network capabilities.

  12. Overview of optical data relay system in JAXA

    NASA Astrophysics Data System (ADS)

    Chishiki, Y.; Yamakawa, S.; Takano, Y.; Miyamoto, Y.; Araki, T.; Kohata, H.

    2016-03-01

    To meet increasing demands of high-speed data transmission, JAXA has started to develop a new optical data relay system. This system provides 1.8Gbit/s data relay service through optical inter-satellite link and Ka-band feeder link using JDRS, a data relay satellite. The first user satellite is the Advanced Optical Satellite, a Japanese optical observation satellite in low earth orbit. As a total data relay system, the data relay satellite, Ka-band ground stations and two optical terminals for JDRS and the Advanced Optical Satellite are developed together. Target launch year of JDRS is 2019 in Japanese fiscal year. This paper describes the development plan and technologies of the optical data relay system.

  13. Automation of servicibility of radio-relay station equipment

    NASA Astrophysics Data System (ADS)

    Uryev, A. G.; Mishkin, Y. I.; Itkis, G. Y.

    1985-03-01

    Automation of the serviceability of radio relay station equipment must ensure central gathering and primary processing of reliable instrument reading with subsequent display on the control panel, detection and recording of failures soon enough, advance enough warning based on analysis of detertioration symptoms, and correct remote measurement of equipment performance parameters. Such an inspection will minimize transmission losses while reducing nonproductive time and labor spent on documentation and measurement. A multichannel automated inspection system for this purpose should operate by a parallel rather than sequential procedure. Digital data processing is more expedient in this case than analog method and, therefore, analog to digital converters are required. Spepcial normal, above limit and below limit test signals provide means of self-inspection, to which must be added adequate interference immunization, stabilization, and standby power supply. Use of a microcomputer permits overall refinement and expansion of the inspection system while it minimizes though not completely eliminates dependence on subjective judgment.

  14. On the HEMP environment for protective relays. [High-altitude electromagnetic pulse

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1994-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength.

  15. Programming A Molecular Relay for Ultrasensitive Biodetection through 129 Xe NMR

    SciTech Connect

    Wang, Yanfei; Roose, Benjamin W.; Philbin, John P.; Doman, Jordan L.; Dmochowski, Ivan J.

    2015-12-21

    We reported a supramolecular strategy for detecting specific proteins in complex media by using hyperpolarized 129Xe NMR. A cucurbit[6]uril (CB[6])-based molecular relay was programmed for three sequential equilibrium conditions by designing a two-faced guest (TFG) that initially binds CB[6] and blocks the CB[6]–Xe interaction. Moreover, the protein analyte recruits the TFG and frees CB[6] for Xe binding. TFGs containing CB[6]- and carbonic anhydrase II (CAII)-binding domains were synthesized in one or two steps. X-ray crystallography confirmed TFG binding to Zn2+ in the deep CAII active-site cleft, which precludes simultaneous CB[6] binding. The molecular relay was reprogrammed to detect avidin by using a different TFG. Finally, Xe binding by CB[6] was detected in buffer and in E. coli cultures expressing CAII through ultrasensitive 129Xe NMR spectroscopy.

  16. Health and Safety Plan, Kalakaket Creek, Radion Relay Station, Alaska

    DTIC Science & Technology

    1994-09-01

    Squadron Elmendorf AFB, Alaska Final Health and Safety Plan Kalakaket Creek Radio Relay Station , Alaska Accesion For NTIS CRA&M DTIC TAB U...Kalakaket Creek Radio Relay Station , Alaska C-F41624-94-D-804"-005 6. AUTHOR(S) Radian Corporation 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8...NUMBER OF PAGES Health and Safety Plan, Kalakaket Creek Radio Relay Station , Alaska 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY

  17. Using agility to combat cyber attacks.

    PubMed

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  18. Do unexpected panic attacks occur spontaneously?

    PubMed

    Meuret, Alicia E; Rosenfield, David; Wilhelm, Frank H; Zhou, Enlu; Conrad, Ansgar; Ritz, Thomas; Roth, Walton T

    2011-11-15

    Spontaneous or unexpected panic attacks, per definition, occur "out of the blue," in the absence of cues or triggers. Accordingly, physiological arousal or instability should occur at the onset of, or during, the attack, but not preceding it. To test this hypothesis, we examined if points of significant autonomic changes preceded the onset of spontaneous panic attacks. Forty-three panic disorder patients underwent repeated 24-hour ambulatory monitoring. Thirteen natural panic attacks were recorded during 1960 hours of monitoring. Minute-by-minute epochs beginning 60 minutes before and continuing to 10 minutes after the onset of individual attacks were examined for respiration, heart rate, and skin conductance level. Measures were controlled for physical activity and vocalization and compared with time matched control periods within the same person. Significant patterns of instability across a number of autonomic and respiratory variables were detected as early as 47 minutes before panic onset. The final minutes before onset were dominated by respiratory changes, with significant decreases in tidal volume followed by abrupt carbon dioxide partial pressure increases. Panic attack onset was characterized by heart rate and tidal volume increases and a drop in carbon dioxide partial pressure. Symptom report was consistent with these changes. Skin conductance levels were generally elevated in the hour before, and during, the attacks. Changes in the matched control periods were largely absent. Significant autonomic irregularities preceded the onset of attacks that were reported as abrupt and unexpected. The findings invite reconsideration of the current diagnostic distinction between uncued and cued panic attacks. Copyright © 2011 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  19. Optimum path selection in automated radio relay link design

    NASA Astrophysics Data System (ADS)

    Danilovich, O. S.; Kichigin, V. N.

    1985-01-01

    This study investigates the selection of the locations of radio relay stations so that the stability of the radio relay link satisfies the corresponding CCIR recommendations, so that the effective station construction and operation costs are minimized. A mathematical model for selecting the optimum radio relay link route is described. The construction of a hypothetical radio relay link 1400 km long with an average repeater section link of 50 km is analyzed as an example. The algorithm is shown to be especially effective for rough terrain where it is often impossible to place the stations close to roads.

  20. The European data relay system - Present concept and future evolution

    NASA Astrophysics Data System (ADS)

    Berretta, Giuliano; de Agostini, Agostino; Dickinson, Antony

    1990-07-01

    After briefly reviewing the users' requirements and the results of traffic scenario simulations needed to size the system, the design of the European data relay system (DRS) (ground and space segment) is presented in detail. The interrelationship with the other data relay systems (NASA tracking and data relay satellite system (TDRSS) and the Japanese data relay and tracking satellite system (DRTSS)) is discussed together with the current status of systems interoperability. The evolution of DRS into a second generation, foreseen for operation at the beginning of next century, is outlined in terms of user scenario, improved spacecraft and system configurations, and technology developments needed.

  1. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  2. Improving control performance across AWGN channels using a relay node†

    NASA Astrophysics Data System (ADS)

    Kumar, Utsaw; Liu, Jie; Gupta, Vijay; Laneman, J. Nicholas

    2014-07-01

    Consider an unstable linear time-invariant system in which the sensor transmits information to a controller across an additive white Gaussian noise channel. The designer can optionally utilise a relay node to assist the controller; however, the total transmission power consumed by the sensor and the relay node is constant. We consider two topologies: (1) a Gaussian relay channel and (2) a cascade of two Gaussian point-to-point channels. We propose coding schemes and present sufficient conditions for the stabilisability of the plant through such schemes. The analysis suggests that it is useful to utilise a relay node, even if the total transmission power remains the same.

  3. Relay Telecommunications for the Coming Decade of Mars Exploration

    NASA Technical Reports Server (NTRS)

    Edwards, C.; DePaula, R.

    2010-01-01

    Over the past decade, an evolving network of relay-equipped orbiters has advanced our capabilities for Mars exploration. NASA's Mars Global Surveyor, 2001 Mars Odyssey, and Mars Reconnaissance Orbiter (MRO), as well as ESA's Mars Express Orbiter, have provided telecommunications relay services to the 2003 Mars Exploration Rovers, Spirit and Opportunity, and to the 2007 Phoenix Lander. Based on these successes, a roadmap for continued Mars relay services is in place for the coming decade. MRO and Odyssey will provide key relay support to the 2011 Mars Science Laboratory (MSL) mission, including capture of critical event telemetry during entry, descent, and landing, as well as support for command and telemetry during surface operations, utilizing new capabilities of the Electra relay payload on MRO and the Electra-Lite payload on MSL to allow significant increase in data return relative to earlier missions. Over the remainder of the decade a number of additional orbiter and lander missions are planned, representing new orbital relay service providers and new landed relay users. In this paper we will outline this Mars relay roadmap, quantifying relay performance over time, illustrating planned support scenarios, and identifying key challenges and technology infusion opportunities.

  4. High-performance inkjet-printed four-terminal microelectromechanical relays and inverters.

    PubMed

    Chung, Seungjun; Ul Karim, Muhammed Ahosan; Kwon, Hyuk-Jun; Subramanian, Vivek

    2015-05-13

    We report the first demonstration of inkjet-printed 4-terminal microelectromechanical (MEM) relays and inverters with hyper-abrupt switching that exhibit excellent electrical and mechanical characteristics. This first implementation of a printed 4-terminal device is critically important, since it allows for the realization of full complementary logic functions. The floated fourth terminal (body electrode), which allows the gate switching voltage to be adjusted, is bonded to movable channel beams via a printed epoxy layer in a planar structure, which can move downward together via the electrostatic force between the gate electrodes and body such that the channel can also actuate downward and touch the drain electrode. Because the body, channel, and drain electrodes are completely electrically separated, no detectable leakage or electrical interference between the electrodes is observed. The printed MEM relay exhibited an on-state resistance of only 3.48 Ω, immeasurable off-state leakage, subthreshold swing <1 mV/dec, and a stable operation over 10(4) cycles with a switching delay of 47 μs, and the relay inverter exhibits abrupt transitions between on/off states. The operation of the printed 4-terminal MEM relay was also verified against the results of a 3-dimensional (3D) finite element simulation.

  5. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond.

    PubMed

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment.

  6. Outage probability of a relay strategy allowing intra-link errors utilizing Slepian-Wolf theorem

    NASA Astrophysics Data System (ADS)

    Cheng, Meng; Anwar, Khoirul; Matsumoto, Tad

    2013-12-01

    order exhibited in the outage curve converges to 1 when the bit streams are not fully correlated. Moreover, the Slepian-Wolf outage probability is proved to be smaller than that of the 2nd order maximum ratio combining (MRC) diversity, if the average SNRs of the two independent links are the same. Exact as well as asymptotic expressions of the outage probability are theoretically derived in the article. In addition, the theoretical outage results are compared with the frame-error-rate (FER) curves, obtained by a series of simulations for the Slepian-Wolf relay system based on bit-interleaved coded modulation with iterative detection (BICM-ID). It is shown that the FER curves exhibit the same tendency as the theoretical results.

  7. Score for atrial fibrillation detection in acute stroke and transient ischemic attack patients in a Brazilian population: The acute stroke atrial fibrillation scoring system

    PubMed Central

    de Figueiredo, Marcelo Marinho; Rodrigues, Ana Clara Tude; Alves, Monique Bueno; Neto, Miguel Cendoroglo; Silva, Gisele Sampaio

    2014-01-01

    OBJECTIVE: Atrial fibrillation is a common arrhythmia that increases the risk of stroke by four- to five-fold. We aimed to establish a profile of patients with atrial fibrillation from a population of patients admitted with acute ischemic stroke or transient ischemic attack using clinical and echocardiographic findings. METHODS: We evaluated patients consecutively admitted to a tertiary hospital with acute ischemic stroke or transient ischemic attack. Subjects were divided into an original set (admissions from May 2009 to October 2010) and a validation set (admissions from November 2010 to April 2013). The study was designed as a cohort, with clinical and echocardiographic findings compared between patients with and without atrial fibrillation. A multivariable model was built, and independent predictive factors were used to produce a predictive grading score for atrial fibrillation (Acute Stroke AF Score-ASAS). RESULTS: A total of 257 patients were evaluated from May 2009 to October 2010 and included in the original set. Atrial fibrillation was diagnosed in 17.5% of these patients. Significant predictors of atrial fibrillation in the multivariate analysis included age, National Institutes of Health Stroke Scores, and the presence of left atrial enlargement. These predictors were used in the final logistic model. For this model, the area under the receiver operating characteristic curve was 0.79. The score derived from the logistic regression analysis was The model developed from the original data set was then applied to the validation data set, showing the preserved discriminatory ability of the model (c statistic = 0.76). CONCLUSIONS: Our risk score suggests that the individual risk for atrial fibrillation in patients with acute ischemic stroke can be assessed using simple data, including age, National Institutes of Health Stroke Scores at admission, and the presence of left atrial enlargement. PMID:24714831

  8. What Causes a Heart Attack?

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. What is a heart attack? 05/22/ ...

  9. Collaborative Attack vs. Collaborative Defense

    NASA Astrophysics Data System (ADS)

    Xu, Shouhuai

    We have witnessed many attacks in the cyberspace. However, most attacks are launched by individual attackers even though an attack may involve many compromised computers. In this paper, we envision what we believe to be the next generation cyber attacks — collaborative attacks. Collaborative attacks can be launched by multiple attackers (i.e., human attackers or criminal organizations), each of which may have some specialized expertise. This is possible because cyber attacks can become very sophisticated and specialization of attack expertise naturally becomes relevant. To counter collaborative attacks, we might need collaborative defense because each “chain” in a collaborative attack may be only adequately dealt with by a different defender. In order to understand collaborative attack and collaborative defense, we present a high-level abstracted framework for evaluating the effectiveness of collaborative defense against collaborative attacks. As a first step towards realizing and instantiating the framework, we explore a characterization of collaborative attacks and collaborative defense from the relevant perspectives.

  10. 76 FR 24442 - Structure and Practices of the Video Relay Service Program; Telecommunications Relay Services and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-02

    ... tentatively concludes that it will extend the current video relay service (VRS) rates for the upcoming fund... proposes to maintain the current rates until new VRS rules are adopted. The intended effect of this action..., 2011, in CG Docket Nos. 10-51 and 03-123, seeking comment on a proposal to extend the current VRS...

  11. Laser Communications Relay Demonstration: Introduction for Experimenters

    NASA Technical Reports Server (NTRS)

    Israel, David J.

    2017-01-01

    This document provides guidance to individuals or groups considering proposing an experiment for the Laser Communications Relay Demonstration (LCRD) Experiment Program. For the purposes of this document, the term experiment refers to both experiments and demonstrations. The documents goals are: (1) to introduce potential experimenters to the LCRD mission, its purpose, and its system architecture; (2) to help them understand the types of experiments that are possible using LCRD; and (3) to provide an overview of the experiment proposal process and explain how and where to obtain further information about making a proposal.

  12. Sparsity-aware multiple relay selection in large multi-hop decode-and-forward relay networks

    NASA Astrophysics Data System (ADS)

    Gouissem, A.; Hamila, R.; Al-Dhahir, N.; Foufou, S.

    2016-12-01

    In this paper, we propose and investigate two novel techniques to perform multiple relay selection in large multi-hop decode-and-forward relay networks. The two proposed techniques exploit sparse signal recovery theory to select multiple relays using the orthogonal matching pursuit algorithm and outperform state-of-the-art techniques in terms of outage probability and computation complexity. To reduce the amount of collected channel state information (CSI), we propose a limited-feedback scheme where only a limited number of relays feedback their CSI. Furthermore, a detailed performance-complexity tradeoff investigation is conducted for the different studied techniques and verified by Monte Carlo simulations.

  13. An economically viable space power relay system

    NASA Astrophysics Data System (ADS)

    Bekey, Ivan; Boudreault, Richard

    1999-09-01

    This paper describes and analyzes the economics of a power relay system that takes advantage of recent technological advances to implement a system that is economically viable. A series of power relay systems are described and analyzed which transport power ranging from 1,250 megawatts to 5,000 megawatts, and distribute it to receiving sites at transcontinental distances. Two classes of systems are discussed—those with a single reflector and delivering all the power to a single rectenna, and a second type which has multiple reflectors and distributes it to 10 rectenna sites, sharing power among them. It is shown that when offering electricity at prices competitive to those prevalent in developed cities in the US that a low IRR is inevitable, and economic feasibility of a business is unlikely. However, when the target market is Japan where the prevalent electricity prices are much greater, that an IRR exceeding 65% is readily attainable. This is extremely attractive to potential investors, making capitalization of a venture likely. The paper shows that the capital investment required for the system can be less than 1 per installed watt, contributing less than 0.02 /KW-hr to the cost of energy provision. Since selling prices in feasible regions range from 0.18 to over 030 $/kW-hr, these costs are but a small fraction of the operating expenses. Thus a very large IRR is possible for such a business.

  14. A Geosynchronous Orbit Optical Communications Relay Architecture

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2014-01-01

    NASA is planning to fly a Next Generation Tracking and Data Relay Satellite (TDRS) next decade. While the requirements and architecture for that satellite are unknown at this time, NASA is investing in communications technologies that could be deployed on the satellite to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in December 2017 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the Next Generation TDRS. While it is obvious that a small to medium sized optical communications terminal could be flown on a GEO satellite to provide support to Near Earth missions, it is also possible to deploy a large terminal on the satellite to support Deep Space missions. Onboard data processing and Delay Tolerant Networking (DTN) are two additional technologies that could be used to optimize optical communications link services and enable additional mission and network operations. This paper provides a possible architecture for the optical communications augmentation of a Next Generation TDRS and touches on the critical technology work currently being done at NASA. It will also describe the impact of clouds on such an architecture and possible mitigation techniques.

  15. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  16. MaROS Strategic Relay Planning and Coordination Interfaces

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    The Mars Relay Operations Service (MaROS) is designed to provide planning and analysis tools in support of ongoing Mars Network relay operations. Strategic relay planning requires coordination between lander and orbiter mission ground data system (GDS) teams to schedule and execute relay communications passes. MaROS centralizes this process, correlating all data relevant to relay coordination to provide a cohesive picture of the relay state. Service users interact with the system through thin-layer command line and web user interface client applications. Users provide and utilize data such as lander view periods of orbiters, Deep Space Network (DSN) antenna tracks, and reports of relay pass performance. Users upload and download relevant relay data via formally defined and documented file structures including some described in Extensible Markup Language (XML). Clients interface with the system via an http-based Representational State Transfer (ReST) pattern using Javascript Object Notation (JSON) formats. This paper will provide a general overview of the service architecture and detail the software interfaces and considerations for interface design.

  17. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  18. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts...

  19. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts...

  20. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts...

  1. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts...

  2. 49 CFR 236.737 - Cut-section, relayed.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Cut-section, relayed. 236.737 Section 236.737..., MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.737 Cut-section, relayed. A cut-section where the energy for one track circuit is supplied through front contacts...

  3. 77 FR 1039 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ... COMMISSION 47 CFR Part 64 Internet-Based Telecommunications Relay Service Numbering AGENCY: Federal... rules that govern access to toll-free numbers by users of Internet- based Telecommunications Relay... an impact on any rules of particular applicability. Subject: Internet-Based Telecommunications...

  4. 76 FR 59551 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ... hearing and speech disabilities to communicate using sign language through video equipment, and IP Relay... rules are targeted to address VRS, which allows individuals with hearing and speech disabilities to... specifically address Video Relay Service (VRS), which allows individuals with hearing and speech disabilities...

  5. Implementation of a Relay Coordination System for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.

    2010-01-01

    Mars network relay operations involve the coordination of lander and orbiter teams through long-term and short-term planning, tactical changes and post-pass analysis. Much of this coordination is managed through email traffic and point-to-point file data exchanges. It is often difficult to construct a complete and accurate picture of the relay situation at any given moment, as there is no centralized store of correlated relay data. The Mars Relay Operations Service (MaROS) is being implemented to address the problem of relay coordination for current and next-generation relay missions. The service is provided for the purpose of coordinating communications sessions between landed spacecraft assets and orbiting spacecraft assets at Mars. The service centralizes a set of functions previously distributed across multiple spacecraft operations teams, and as such greatly improves visibility into the end-to-end strategic coordination process. Most of the process revolves around the scheduling of communications sessions between the spacecraft during periods of time when a landed asset on Mars is geometrically visible by an orbiting spacecraft. These "relay" sessions are used to transfer data both to and from the landed asset via the orbiting asset on behalf of Earth-based spacecraft operators. This paper will discuss the relay coordination problem space, overview the architecture and design selected to meet system requirements, and describe the first phase of system implementation

  6. ASDAR (aircraft to satellite data relay) flight test report

    NASA Technical Reports Server (NTRS)

    Domino, E. J.; Lovell, R. R.; Conroy, M. J.; Culp, D. H.

    1977-01-01

    The aircraft to Satellite Data Relay (ASDAR), an airborne data collection system that gathers meteorological data from existing aircraft instrumentation and relays it to ground user via a geo-synchronous meteorological satellite, is described and the results of the first test flight on a commercial Boeing 747 aircraft are presented. The flight test was successful and verified system performance in the anticipated environment.

  7. Understanding the Design, Function and Testing of Relays

    ERIC Educational Resources Information Center

    Adams, Roger E.; Lindbloom, Trent

    2006-01-01

    The increased use of electronics in today's automobiles has complicated the control of circuits and actuators. Manufacturers use relays to control a variety of complex circuits--for example, those involving actuators and other components like the A/C clutch, electronic cooling fans, and blower motors. Relays allow a switch or processor to control…

  8. Using the 5 P Relay in Task Groups

    ERIC Educational Resources Information Center

    Stanley, Paula Helen

    2006-01-01

    This article describes the 5 P Relay, a group exercise that can increase the effectiveness of task groups. The 5 P Relay is based on the principles and concepts of the Invitational Model, which emphasizes the importance of assessing the effectiveness or health of five aspects of an organization's environment: people, places, programs, processes,…

  9. 77 FR 42187 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-18

    ... COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission... Communications and Video Accessibility Act of 2010, Section 105, Relay Services for Deaf-Blind Individuals, Order... the Twenty-first Century Communications and Video Accessibility Act of 2010, Section 105,...

  10. 76 FR 72124 - Internet-Based Telecommunications Relay Service Numbering

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-22

    ... VRS or IP Relay user's request, facilitate the transfer of the toll free number to a toll free... Office of Management and Budget (OMB) has approved, for a period of three years, the information collection associated with the Commission's Internet- Based Telecommunications Relay Service Numbering...

  11. Non-harmful insertion of data mimicking computer network attacks

    DOEpatents

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  12. Identification of cooling tower wood attack and methods of control

    SciTech Connect

    Song, P.; Trulear, M.G.

    1986-01-01

    Biological and chemical attack can greatly accelerate the deterioration of cooling tower wood. The damage, once inflicted, is irreversible and often results in premature and costly wood replacement. Biological attack is more serious than chemical, and is difficult to detect. Control of both types is essential for good tower maintenance A review of wood structures, types of attack and methods of control are presented. Effects of alkaline cooling water operation on wood deterioration are also discussed.

  13. Word Attack Model.

    ERIC Educational Resources Information Center

    Follettie, Joseph F.

    A limited analysis of alternative approaches to phonemic-level word attack instruction is provided in this document. The instruction segment begins with training in letter-sound correspondences for which mastery of certain skills is assumed. Instruction ends with the decoding of novel items having a consonant-vowel-consonant construction. Contents…

  14. Neural network classifier of attacks in IP telephony

    NASA Astrophysics Data System (ADS)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  15. Relay exchanges in elite short track speed skating.

    PubMed

    Hext, Andrew; Heller, Ben; Kelley, John; Goodwill, Simon

    2017-06-01

    In short track speed skating, the relay exchange provides an additional strategic component to races by allowing a team to change the skater involved in the pack race. Typically executed every 1½ laps, it is the belief of skaters and coaches that during this period of the race, time can be gained or lost due to the execution of the relay exchange. As such, the aim of this study was to examine the influence of the relay exchange on a team's progression through a 5000 m relay race. Using data collected from three World Cup relay events during the 2012-2013 season, the time taken to complete the straight for the scenarios with and without the relay exchange were compared at different skating speeds for the corner exit prior to the straight. Overall, the influence of the relay exchange was found to be dependent on this corner exit speed. At slower corner exit speeds (12.01-13.5 m/s), relay exchange straight times were significantly faster than the free skating scenario (P < 0.01). While at faster corner exit speeds (14.01-15 m/s), straight times were significantly slower (P < 0.001). The findings of this study suggest that the current norm of executing relay exchanges every 1½ laps may not be optimal. Instead, varying the frequency of relay exchange execution throughout the race could allow: (1) time to be gained relative to other teams; and (2) facilitate other race strategies by providing an improved opportunity to overtake.

  16. Generalizing performance limitations of relay neurons: application to Parkinson's disease.

    PubMed

    Agarwal, Rahul; Santaniello, Sabato; Sarma, Sridevi V

    2014-01-01

    Relay cells are prevalent throughout sensory systems and receive two types of inputs: driving and modulating. The driving input contains receptive field properties that must be transmitted while the modulating input alters the specifics of transmission. Relay reliability of a relay cell is defined as the fraction of pulses in the driving input that generate action potentials at the neuron's output, and is in general a complicated function of the driving input, the modulating input and the cell's properties. In a recent study, we computed analytic bounds on the reliability of relay neurons for a class of Poisson driving inputs and sinusoidal modulating inputs. Here, we generalize our analysis and compute bounds on the relay reliability for any modulating input. Furthermore, we show that if the modulating input is generated by a colored Gaussian process, closed form expressions for bounds on relay reliability can be derived. We applied our analysis to investigate relay reliability of thalamic cells in health and in Parkinson's disease (PD). It is hypothesized that in health, neurons in the motor thalamus relay information only when needed and this capability is compromised in PD due to exaggerated beta-band oscillations in the modulating input from the basal ganglia (BG). To test this hypothesis, we used modulating and driving inputs simulated from a detailed computational model of the cortico-BG-thalamo-cortical motor loop and computed our theoretical bounds in both PD and healthy conditions. Our bounds match well with our empirically computed reliability and show that the relay reliability is larger in the healthy condition across the population of thalamic neurons. Furthermore, we show that the increase in power in the beta-band of the modulating input (output of BG) is causally related with the decrease in relay reliability in the PD condition.

  17. Detecting Sirex noctilio grey-attacked and lightning-struck pine trees using airborne hyperspectral data, random forest and support vector machines classifiers

    NASA Astrophysics Data System (ADS)

    Abdel-Rahman, Elfatih M.; Mutanga, Onisimo; Adam, Elhadi; Ismail, Riyad

    2014-02-01

    The visual progression of sirex (Sirex noctilio) infestation symptoms has been categorized into three distinct infestation phases, namely the green, red and grey stages. The grey stage is the final stage which leads to almost complete defoliation resulting in dead standing trees or snags. Dead standing pine trees however, could also be due to the lightning damage. Hence, the objective of the present study was to distinguish amongst healthy, sirex grey-attacked and lightning-damaged pine trees using AISA Eagle hyperspectral data, random forest (RF) and support vector machines (SVM) classifiers. Our study also presents an opportunity to look at the possibility of separating amongst the previously mentioned pine trees damage classes and other landscape classes on the study area. The results of the present study revealed the robustness of the two machine learning classifiers with an overall accuracy of 74.50% (total disagreement = 26%) for RF and 73.50% (total disagreement = 27%) for SVM using all the remaining AISA Eagle spectral bands after removing the noisy ones. When the most useful spectral bands as measured by RF were exploited, the overall accuracy was considerably improved; 78% (total disagreement = 22%) for RF and 76.50% (total disagreement = 24%) for SVM. There was no significant difference between the performances of the two classifiers as demonstrated by the results of McNemar's test (chi-squared; χ2 = 0.14, and 0.03 when all the remaining ASIA Eagle wavebands, after removing the noisy ones and the most important wavebands were used, respectively). This study concludes that AISA Eagle data classified using RF and SVM algorithms provide relatively accurate information that is important to the forest industry for making informed decision regarding pine plantations health protocols.

  18. Categorizing Network Attacks Using Pattern Classification Algorithms

    DTIC Science & Technology

    2002-03-01

    attacks into predefined categories such as Flooding Denial of Service, Distributed Denial of Service, Nukers, and Portscans . Such categorization decreases...Detection of Stealthy Portscans . Tech- nical Report, Silicon Defense, 2000. [Stevens94] Stevens, W. Richard. TCP/IP Illustrated Volume 1 . Reading: Addison

  19. Satellite data-relay activities in Arizona

    USGS Publications Warehouse

    Boner, F.C.; Blee, J.W.; Shope, W.G.

    1985-01-01

    The U.S. Geological Survey (USGS) Arizona District collects data from automated streamflow stations for a wide variety of uses. Data from these stations are provided to Federal, State, and local agencies that have a responsibility to issue flood warnings; to generate forecasts of water availability; to monitor flow to insure compliance with treaties and other legal mandates; and to manage reservoirs for hydropower, flood abatement, and municipal and irrigation water supply. In the mid-1970's, the escalation of data collection costs and a need for more timely data led the Arizona District to examine alternatives for remote data acquisition. On the basis of successful data communications experiments with NASA 's Landsat satellite, an operational system for satellite-data relay was developed in 1976 using the National Oceanic and Atmospheric Administrations 's (NOAA) Geostationary Operational Environmental Satellite (GOES). A total of 62 data collection platforms (DCP's) was operated in 1983. Satellite telemetry operations are controlled at the remote data-collection stations by small battery-operated data collection platforms. The DCP 's periodically collect data from the sensors, store the data in computer memory, and at preset times transmit the data to the GOES satellite. The satellite retransmits the data to Earth where a ground-receive station transmits or transfers the data by land communications to the USGS computer in Reston, Virginia, for processing. The satellite relay transfers the data from sensor to computer in minutes; therefore, the data are available to users on a near real-time basis. (Author 's abstract)

  20. Heart Attack Coronary Artery Disease

    MedlinePlus

    ... our e-newsletter! Aging & Health A to Z Heart Attack Coronary Artery Disease, Angina Basic Facts & Information What ... and oxygen supply; this is what causes a heart attack. If the damaged area is small, however, your ...

  1. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  2. Application of Cellular Automata to Detection of Malicious Network Packets

    ERIC Educational Resources Information Center

    Brown, Robert L.

    2014-01-01

    A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…

  3. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; hide

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  4. Relay Support for the Mars Science Laboratory Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D. Jr,; Bell, David J.; Gladden, Roy E.; Ilott, Peter A.; Jedrey, Thomas C.; Johnston, M. Daniel; Maxwell, Jennifer L.; Mendoza, Ricardo; McSmith, Gaylon W.; Potts, Christopher L.; Schratz, Brian C.; Shihabi, Mazen M.; Srinivasan, Jeffrey M.; Varghese, Phillip; Sanders, Stephen S.; Denis, Michel

    2013-01-01

    The Mars Science Laboratory (MSL) mission landed the Curiosity Rover on the surface of Mars on August 6, 2012, beginning a one-Martian-year primary science mission. An international network of Mars relay orbiters, including NASA's 2001 Mars Odyssey Orbiter (ODY) and Mars Reconnaissance Orbiter (MRO), and ESA's Mars Express Orbiter (MEX), were positioned to provide critical event coverage of MSL's Entry, Descent, and Landing (EDL). The EDL communication plan took advantage of unique and complementary capabilities of each orbiter to provide robust information capture during this critical event while also providing low-latency information during the landing. Once on the surface, ODY and MRO have provided effectively all of Curiosity's data return from the Martian surface. The link from Curiosity to MRO incorporates a number of new features enabled by the Electra and Electra-Lite software-defined radios on MRO and Curiosity, respectively. Specifically, the Curiosity-MRO link has for the first time on Mars relay links utilized frequency-agile operations, data rates up to 2.048 Mb/s, suppressed carrier modulation, and a new Adaptive Data Rate algorithm in which the return link data rate is optimally varied throughout the relay pass based on the actual observed link channel characteristics. In addition to the baseline surface relay support by ODY and MRO, the MEX relay service has been verified in several successful surface relay passes, and MEX now stands ready to provide backup relay support should NASA's orbiters become unavailable for some period of time.

  5. Wireless Information Surveillance via Proactive Eavesdropping with Spoofing Relay

    NASA Astrophysics Data System (ADS)

    Zeng, Yong; Zhang, Rui

    2016-12-01

    Wireless information surveillance, by which suspicious wireless communications are closely monitored by legitimate agencies, is an integral part of national security. To enhance the information surveillance capability, we propose in this paper a new proactive eavesdropping approach via a spoofing relay, where the legitimate monitor operates in a full-duplex manner with simultaneous eavesdropping and spoofing relaying to vary the source transmission rate in favor of the eavesdropping performance. To this end, a power splitting receiver is proposed, where the signal received at each antenna of the legitimate monitor is split into two parts for information eavesdropping and spoofing relaying, respectively. We formulate an optimization problem to maximize the achievable eavesdropping rate by jointly optimizing the power splitting ratios and relay beamforming matrix at the multi-antenna monitor. Depending on the suspicious and eavesdropping channel conditions, the optimal solution corresponds to three possible spoofing relay strategies, namely \\emph{constructive relaying}, \\emph{jamming}, and \\emph{simultaneous jamming and destructive relaying}. Numerical results show that the proposed technique significantly improves the eavesdropping rate of the legitimate monitor as compared to the existing passive eavesdropping and jamming-based eavesdropping schemes.

  6. An Attack Surface Metric

    DTIC Science & Technology

    2005-07-01

    Introduction Measurement of security, both qualitatively and quantitatively, has been a long standing challenge to the research community , and is of...our approach to related work in Section 2. We introduce the entry point and exit point framework in Section 3. We present the definitions of...ignores the specific system configuration that gave rise to the vulnerability, and it does not capture a system’s future attackability. Our approach

  7. Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets

    NASA Astrophysics Data System (ADS)

    Teramura, Ryoichi; Asakura, Yasuo; Ohigashi, Toshihiro; Kuwakado, Hidenori; Morii, Masakatu

    Conventional efficient key recovery attacks against Wired Equivalent Privacy (WEP) require specific initialization vectors or specific packets. Since it takes much time to collect the packets sufficiently, any active attack should be performed. An Intrusion Detection System (IDS), however, will be able to prevent the attack. Since the attack logs are stored at the servers, it is possible to prevent such an attack. This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment. This attack needs about 36, 500 packets with a success probability 0.5, and the complexity of our attack is equivalent to about 220 computations of the RC4 key setups. Since our attack is passive, it is difficult for both WEP users and administrators to detect our attack.

  8. Plants Under Attack

    PubMed Central

    De Vos, Martin; Van Oosten, Vivian R; Jander, Georg; Dicke, Marcel

    2007-01-01

    To defend themselves, plants activate inducible defense mechanisms that are effective against the invader that is encountered. There is partial overlap in the defense signaling pathways that are induced by insect herbivores and microbial pathogens that may result in cross-resistance. We have previously shown that infestation by tissue-chewing Pieris rapae larvae induces resistance in Arabidopsis thaliana against subsequent attack by the microbial pathogens Pseudomonas syringae pv. tomato (Pst), Xanthomonas campestris pv. armoraciae (Xca) and turnip crinkle virus (TCV). Phloem-feeding aphids, such as the generalist Myzus persicae, have a stealthy feeding strategy that is very different from chewing by lepidopteran larvae. Yet, M. persicae feeding results in a large transcriptomic change. Here, we report on the effectiveness of the defense response that is triggered by M. persicae infestation, as well as the sensitivity of M. persicae to microbially-induced resistance. M. persicae reproduction was not affected by prior conspecific feeding, nor was aphid-induced resistance effective against subsequent attack by Pst, Xca or TCV. Moreover, induced systemic resistance (ISR) triggered by beneficial Pseudomonas fluorescens rhizobacteria was not effective against M. persicae. However, systemic acquired resistance (SAR) induced by prior infection with avirulent Pst was associated with reduced aphid reproduction. These data provide insight into the effectiveness of pathogen and insect resistance and highlight the complexity of the defense responses that are triggered during multitrophic plant-attacker interactions. PMID:19704549

  9. When women attack.

    PubMed

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  10. Electrical and chemical synapses between relay neurons in developing thalamus.

    PubMed

    Lee, Seung-Chan; Cruikshank, Scott J; Connors, Barry W

    2010-07-01

    Gap junction-mediated electrical synapses interconnect diverse types of neurons in the mammalian brain, and they may play important roles in the synchronization and development of neural circuits. Thalamic relay neurons are the major source of input to neocortex. Electrical synapses have not been directly observed between relay neurons in either developing or adult animals. We tested for electrical synapses by recording from pairs of relay neurons in acute slices of developing ventrobasal nucleus (VBN) of the thalamus from rats and mice. Electrical synapses were common between VBN relay neurons during the first postnatal week, and then declined sharply during the second week. Electrical coupling was reduced among cells of connexin36 (Cx36) knockout mice; however, some neuron pairs remained coupled. This implies that electrical synapses between the majority of coupled VBN neurons require Cx36 but that other gap junction proteins also contribute. The anatomical distribution of a beta-galactosidase reporter indicated that Cx36 was expressed in some VBN neurons during the first postnatal week and sharply declined over the second week, consistent with our physiological results. VBN relay neurons also communicated via chemical synapses. Rare pairs of relay neurons excited one another monosynaptically. Much more commonly, spikes in one relay neuron evoked disynaptic inhibition (via the thalamic reticular nucleus) in the same or a neighbouring relay neuron. Disynaptic inhibition between VBN cells emerged as electrical coupling was decreasing, during the second postnatal week. Our results demonstrate that thalamic relay neurons communicate primarily via electrical synapses during early postnatal development, and then lose their electrical coupling as a chemical synapse-mediated inhibitory circuit matures.

  11. Life After a Heart Attack

    MedlinePlus

    ... explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, visit www.hearttruth.gov or the Health Topics Heart Attack and Heart Disease in Women articles. All of Our Stories Are Red: Jennifer's ...

  12. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viruses and worm attacks as the most reported security incident according to a report from the US Computer Security Institute (CSI) [20]. The annual...incidents were cited by 59 percent of respondents, while only 52 percent said they had encountered a conventional virus in the previous year. The state...their own legitimate credentials). One possible solution for masquerade detection involves anomaly detection [19]. In this approach, users actions are

  13. Adversarial Feature Selection Against Evasion Attacks.

    PubMed

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  14. Lessons Learned from Coordinating Relay Activities at Mars

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Hwang, Pauline; Waggoner, Bruce; McLaughlin, Bruce; Fieseler, Paul; Thomas, Reid; Bigwood, Maria; Herrera, Paul

    2005-01-01

    The Mission Management Office at the Jet Propulsion Laboratory was tasked with coordinating the relay of data between multiple spacecraft at Mars in support of the Mars Exploration Rover Missions in early 2004. The confluence of three orbiters (Mars Global Surveyor, Mars Odyssey, and Mars Express), two rovers (Spirit and Opportunity), and one lander (Beagle 2) has provided a challenging operational scenario that required careful coordination between missions to provide the necessary support and to avoid potential interference during simultaneous relay sessions. As these coordination efforts progressed, several important lessons were learned that should be applied to future Mars relay activities.

  15. Lessons Learned from Coordinating Relay Activities at Mars

    NASA Technical Reports Server (NTRS)

    Gladden, Roy E.; Hwang, Pauline; Waggoner, Bruce; McLaughlin, Bruce; Fieseler, Paul; Thomas, Reid; Bigwood, Maria; Herrera, Paul

    2005-01-01

    The Mission Management Office at the Jet Propulsion Laboratory was tasked with coordinating the relay of data between multiple spacecraft at Mars in support of the Mars Exploration Rover Missions in early 2004. The confluence of three orbiters (Mars Global Surveyor, Mars Odyssey, and Mars Express), two rovers (Spirit and Opportunity), and one lander (Beagle 2) has provided a challenging operational scenario that required careful coordination between missions to provide the necessary support and to avoid potential interference during simultaneous relay sessions. As these coordination efforts progressed, several important lessons were learned that should be applied to future Mars relay activities.

  16. A monolithically integrated torsional CMOS-MEMS relay

    NASA Astrophysics Data System (ADS)

    Riverola, M.; Sobreviela, G.; Torres, F.; Uranga, A.; Barniol, N.

    2016-11-01

    We report experimental demonstrations of a torsional microelectromechanical (MEM) relay fabricated using the CMOS-MEMS approach (or intra-CMOS) which exploits the full foundry inherent characteristics enabling drastic reduction of the fabrication costs and batch production. In particular, the relay is monolithically integrated in the back end of line of a commercial standard CMOS technology (AMS 0.35 μm) and released by means of a simple one-step mask-less wet etching. The fabricated torsional relay exhibits an extremely steep switching behaviour symmetrical about both contact sides with an on-state contact resistance in the k Ω -range throughout the on-off cycling test.

  17. Sample Entropy and Random Forests: A Methodology for Anomaly-based Intrusion Detection and Classification of Low-bandwidth Malware Attacks

    DTIC Science & Technology

    2006-09-01

    ICASSP 2006, I-1149; I-1152. JIAN YIN , GANG ZHANG, YI-QUN CHEN AND XIAN-LI FAN . 2004. Multi-events analysis for anomaly intrusion detection...are then returned from the procedure.[ Arthur , et al. 2006] 3. Hierarchical Agglomerative Algorithm The hierarchical agglomerative procedure...traffic as a key metric.[Duan, et al. 2005, Hong Han, et al. 2002, Jaroszewicz, et al. 2005, Jian Yin , et al. 2004, Julisch, et al. 2002, Khanna, et

  18. On the HEMP (high-altitude electromagnetic pulse) response of protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Barnes, P.R.; Oak Ridge National Lab., TN )

    1990-01-01

    An assessment of the susceptibility of protective relays to the transients produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms responsible for coupling of HEMP to relay terminals are examined. The predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse. 11 refs., 16 figs.

  19. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 4 2012-10-01 2012-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  20. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 4 2014-10-01 2014-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  1. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 4 2011-10-01 2011-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  2. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 4 2013-10-01 2013-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  3. 49 CFR 236.109 - Time releases, timing relays and timing devices.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Time releases, timing relays and timing devices... releases, timing relays and timing devices. Time releases, timing relays and timing devices shall be tested... predetermined time interval, which shall be shown on the plans or marked on the time release, timing relay,...

  4. Modeling Partial Attacks with Alloy

    NASA Astrophysics Data System (ADS)

    Lin, Amerson; Bond, Mike; Clulow, Jolyon

    The automated and formal analysis of cryptographic primitives, security protocols and Application Programming Interfaces (APIs) up to date has been focused on discovering attacks that completely break the security of a system. However, there are attacks that do not immediately break a system but weaken the security sufficiently for the adversary. We term these attacks partial attacks and present the first methodology for the modeling and automated analysis of this genre of attacks by describing two approaches. The first approach reasons about entropy and was used to simulate and verify an attack on the ECB|ECB|OFB triple-mode DES block-cipher. The second approach reasons about possibility sets and was used to simulate and verify an attack on the personal identification number (PIN) derivation algorithm used in the IBM 4758 Common Cryptographic Architecture.

  5. Improving Attack Graph Visualization through Data Reduction and Attack Grouping

    SciTech Connect

    John Homer; Ashok Varikuti; Xinming Ou; Miles A. McQueen

    2008-09-01

    Various tools exist to analyze enterprise network systems and to produce attack graphs detailing how attackers might penetrate into the system. These attack graphs, however, are often complex and difficult to comprehend fully, and a human user may find it problematic to reach appropriate configuration decisions. This paper presents methodologies that can 1) automatically identify portions of an attack graph that do not help a user to understand the core security problems and so can be trimmed, and 2) automatically group similar attack steps as virtual nodes in a model of the network topology, to immediately increase the understandability of the data. We believe both methods are important steps toward improving visualization of attack graphs to make them more useful in configuration management for large enterprise networks. We implemented our methods using one of the existing attack-graph toolkits. Initial experimentation shows that the proposed approaches can 1) significantly reduce the complexity of attack graphs by trimming a large portion of the graph that is not needed for a user to understand the security problem, and 2) significantly increase the accessibility and understandability of the data presented in the attack graph by clearly showing, within a generated visualization of the network topology, the number and type of potential attacks to which each host is exposed.

  6. Reliable quantum communication over a quantum relay channel

    SciTech Connect

    Gyongyosi, Laszlo; Imre, Sandor

    2014-12-04

    We show that reliable quantum communication over an unreliable quantum relay channels is possible. The coding scheme combines the results on the superadditivity of quantum channels and the efficient quantum coding approaches.

  7. The sequence relay selection strategy based on stochastic dynamic programming

    NASA Astrophysics Data System (ADS)

    Zhu, Rui; Chen, Xihao; Huang, Yangchao

    2017-07-01

    Relay-assisted (RA) network with relay node selection is a kind of effective method to improve the channel capacity and convergence performance. However, most of the existing researches about the relay selection did not consider the statically channel state information and the selection cost. This shortage limited the performance and application of RA network in practical scenarios. In order to overcome this drawback, a sequence relay selection strategy (SRSS) was proposed. And the performance upper bound of SRSS was also analyzed in this paper. Furthermore, in order to make SRSS more practical, a novel threshold determination algorithm based on the stochastic dynamic program (SDP) was given to work with SRSS. Numerical results are also presented to exhibit the performance of SRSS with SDP.

  8. Orbiting deep space relay station. Volume 3: Implementation plan

    NASA Technical Reports Server (NTRS)

    Hunter, J. A.

    1979-01-01

    An implementation plan for the Orbiting Deep Space Relay Station (ODSRS) is described. A comparison of ODSRS life cycle costs to other configuration options meeting future communication requirements is presented.

  9. Multifunction protective relay. Final report, October 1988-November 1991

    SciTech Connect

    Harlow, J.; Yalla, M.; Kantor, J.

    1991-11-01

    Since the enactment of the National Energy Act of 1979, many private energy producers have been planning and building small generation and cogeneration facilities in order to sell power to the local utility. Many of the non-utility generators built after 1979 are connected directly to the closest utility distribution circuit. Aware of the problems associated with connecting generators in this manner, electric utilities across the country developed specifications and standards to allow safe and reliable interconnections. The report describes a multifunction protective relay which uses state-of-the-art digital signal processing procedures to accomplish the objective of providing most of the relaying requirements of utility electrical interconnections. The relay has been demonstrated to be suitable for this critical application through extensive laboratory and in-service field testing. The relay, incorporating thirteen distinct protection functions affords the user the savings of the initial capital cost plus simplicity of installation and use.

  10. 8. North elevation of electric relay station showing electrical cable ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    8. North elevation of electric relay station showing electrical cable connection to tower. - New York, New Haven, & Hartford Railroad, Shell Interlocking Tower, New Haven Milepost 16, approximately 100 feel east of New Rochelle Junction, New Rochelle, Westchester County, NY

  11. Laser communication applied for EDRS, the European data relay system

    NASA Astrophysics Data System (ADS)

    Heine, F.; Kämpfner, H.; Lange, R.; Czichy, R.; Lutzer, M.; Meyer, R.

    2011-12-01

    Future earth observation satellites call for GEO relay links to make their data immediately available to the user. While RF communication limits the GEO relay's data rate to roughly 1 Gbps (Gigabit per second) laser communication will extend its capacity into the 10 Gbps range as is required for the future systems. Laser communication will be applied for EDRS, the European data GEO relay system. At first, it is foreseen to provide the RF LEO-to-GEO link with an additional laser communication channel, still limiting, of course, the GEO relay's performance to the RF bottleneck. However besides the operational service, the EDRS laser terminals shall also demonstrate the performance of high data rate links for both, the inter-satellite link and the GEO-to-ground link.

  12. Relay Mirror Experiment overview: a GBL pointing and tracking demonstration

    NASA Astrophysics Data System (ADS)

    Dierks, Jeffrey S.; Ross, Susan E.; Brodsky, Aaron; Kervin, Paul W.; Holm, Richard W.

    1991-08-01

    The Relay Mirror Experiment (RME) has successfully demonstrated long-range, low-jitter tracking and pointing capabilities appropriate for ground-based laser (GBL) propagation. The RME program includes (1) a passively maneuverable, free-flying low-orbit spacecraft with a laser diode beacon and spoiled retroreflectors as acquisition aids; (2) a payload experiment package (PEP) consisting of sensors, optics, steerable mirrors, and control electronics. This subsystem accomplishes GBL tracking and pointing and the associated positioning of a space-based relay mirror sufficiently to relay an infrared beam between two ground sites. Design considerations for the control system included base motion disturbance and calibration; (3) two GBL sites each a tracking and pointing exercise in itself, using a combination of sensors and acquisition and tracking capabilities. One site includes a beam relay scoring capability.

  13. 14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    14. CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  14. 15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    15. FRONT VIEW, DETAIL, CENTRIFUGAL FREQUENCY RELAY IN WAYSIDE CABINET, NEW HAVEN YARD - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  15. Signal relay during the life cycle of Dictyostelium.

    PubMed

    Mahadeo, Dana C; Parent, Carole A

    2006-01-01

    A fundamental property of multicellular organisms is signal relay, the process by which information is transmitted from one cell to another. The integration of external information, such as nutritional status or developmental cues, is critical to the function of organisms. In addition, the spatial organizations of multicellular organisms require intricate signal relay mechanisms. Signal relay is remarkably exhibited during the life cycle of the social amoebae Dictyostelium discoideum, a eukaryote that retains a simple way of life, yet it has greatly contributed to our knowledge of the mechanisms cells use to communicate and integrate information. This chapter focuses on the molecules and mechanisms that Dictyostelium employs during its life cycle to relay temporal and spatial cues that are required for survival.

  16. 129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    129. INTERIOR OF RELAY BOX FOR HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  17. 111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    111. RELAY BOX AND SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL, UMBILICAL MAST PUMP ROOM (109), LSB (BLDG. 770) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 West, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  18. 20. OBLIQUE VIEW, VANE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    20. OBLIQUE VIEW, VANE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  19. 34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    34. ELEVATION OF RELAY AND CONTROL SWITCHBOARD, SANTA ANA RIVER P.H. #3, JUNE 23, 1943. SCE drawing no. 413187-1. - Santa Ana River Hydroelectric System, SAR-3 Powerhouse, San Bernardino National Forest, Redlands, San Bernardino County, CA

  20. 18. VIEW OF URBAN DISPATCH RELAY ROOM, FIRST FLOOR ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. VIEW OF URBAN DISPATCH - RELAY ROOM, FIRST FLOOR (THIS IS THE CONTROL CENTER FOR TRACK SWITCHES) - Pennsylvania Railroad, Harrisburg Station & Trainshed, Market & South Fourth Streets, Harrisburg, Dauphin County, PA

  1. 130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    130. RELAY SWITCHES AT SOUTH END OF HYDRAULIC CONTROL PANEL IN UMBILICAL MAST PUMP ROOM (209), LSB (BLDG. 751) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 East, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  2. 132. INTERIOR OF HYDRAULIC PUMPING UNIT RELAY BOX ON SOUTH ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    132. INTERIOR OF HYDRAULIC PUMPING UNIT RELAY BOX ON SOUTH WALL OF CONTROL ROOM (114), LSB (BLDG. 770) - Vandenberg Air Force Base, Space Launch Complex 3, Launch Pad 3 West, Napa & Alden Roads, Lompoc, Santa Barbara County, CA

  3. 16. FRONT VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    16. FRONT VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  4. 51. Electrical contacts and relays in the south machinery room ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    51. Electrical contacts and relays in the south machinery room (interior of both machinery rooms is identical). Facing south. - Henry Ford Bridge, Spanning Cerritos Channel, Los Angeles-Long Beach Harbor, Los Angeles, Los Angeles County, CA

  5. INTERIOR, FIRST FLOOR, SHOWING BANKS OF ELECTROMECHANICAL RELAYS, CAMERA FACING ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    INTERIOR, FIRST FLOOR, SHOWING BANKS OF ELECTRO-MECHANICAL RELAYS, CAMERA FACING SOUTHEAST. - New Haven Rail Yard, Interlocking Control Building, Vicinity of Union Avenue, New Haven, New Haven County, CT

  6. 19. FRONT VIEW, VALVE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    19. FRONT VIEW, VALVE LINE RELAY, CYLINDRICAL HOUSING, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  7. 10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS Baltimore ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    10. INTERIOR DETAIL, FIRST STORY, SHOWING RELAY RACKS - Baltimore & Potomac Interlocking Tower, Adjacent to AMTRAK railroad tracks in block bounded by Howard Street, Jones Falls Expressway, Maryland Avenue & Falls Road, Baltimore, Independent City, MD

  8. 17. SIDE VIEW, DETAIL, MODEL 15 VANE RELAY, NEW HAVEN ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    17. SIDE VIEW, DETAIL, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  9. 18. SIDE VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    18. SIDE VIEW, MODEL 15 VANE RELAY, NEW HAVEN SIGNAL SHOP - New York, New Haven & Hartford Railroad, Automatic Signalization System, Long Island Sound shoreline between Stamford & New Haven, Stamford, Fairfield County, CT

  10. 76 FR 31261 - Relay Services for Deaf-Blind Individuals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-31

    ... From the Federal Register Online via the Government Publishing Office ] FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 64 Relay Services for Deaf-Blind Individuals AGENCY: Federal Communications Commission. ACTION: Final rule; correction. SUMMARY: The Federal Communications Commission (FCC) is correcting...

  11. DNS Rebinding Attacks

    DTIC Science & Technology

    2009-09-01

    action [From 2] The same origin policy is also called Single Origin or Same Site Policy. It was originally released with Netscape Navigator 2.0 and...success Netscape 8.2.1 Windows XP / SP2 success Opera 9.0.2 Windows 2000 / SP4 success Table 6. Satoh’s attack results using Adobe Flash Player...dns/dns-rebinding.pdf. Retrieved May 2009. [4] D. Dean, E. W. Felten, and D. S. Wallach “Java Security: From HotJava to Netscape and Beyond

  12. On the HEMP (high-altitude electromagnetic pulse) environment for protective relays

    SciTech Connect

    Thomas, D.E.; Wiggins, C.M.; Salas, T.M. ); Barnes, P.R. )

    1990-01-01

    An assessment of the transient environment for protective relays produced by high-altitude electromagnetic pulse (HEMP) events is presented in this paper. Several mechanisms for coupling of HEMP to relay terminals are used to develop estimates of possible HEMP threats to relays. These predicted relay responses to HEMP events are compared to measured data on a solid state based relay's impulse strength. 12 refs., 13 figs., 3 tabs.

  13. Enhancing Propriospinal Relays to Improve Functional Recovery after SCI

    DTIC Science & Technology

    2016-10-01

    AWARD NUMBER: W81XWH-15-1-0595 TITLE: Enhancing Propriospinal Relays to Improve Functional Recovery after SCI PRINCIPAL INVESTIGATOR...TITLE AND SUBTITLE 5a. CONTRACT NUMBER Enhancing Propriospinal Relays to Improve Functional Recovery after SCI 5b. GRANT NUMBER W81XWH-15-1-0595...Despite the clinical impact of traumatic spinal cord injury ( SCI ), there is no effective treatment for SCI . As a consequence, there are approximately

  14. Modality interfacing: the impact of a relay station.

    PubMed

    Carrino, J A; Khorasani, R; Hanlon, W B; Seltzer, S E

    2000-05-01

    We evaluated the effect of a deploying a relay station on demographic discrepancies, image segmentation for routing, quality control (QC), and technologist workflow in a distributed architecture type picture archiving and communication system (PACS) environment. A currently existing PACS environment for computed tomography (CT) was evaluated before and after the implementation of a relay station for demographic error-rate and correct study routing to the workstations. Assessment of the technologists' perceptions with respect to numerous workflow factors was performed with a questionnaire. Statistical analysis was performed using a chi-square test. The demographic error rate for CT examinations was nearly abolished with relay station deployment (14.0% pre-Relay v 0.55% post-Relay, P < .001, chi2). The technologists' perception was favorable, with a substantial majority indicating that a positive impact is made on correcting demographic errors (90%), facilitating QC (67%), and ensuring proper routing (77%). A majority also felt the user interface was intuitive (93.3%) and preferred relay (90%) over film handling but that training should be provided both by didactic sessions and "hands on" time with a trainer. The times to perform tasks were favorable for the relay station (1 to 5 minutes) versus film production and handling (2 to 15 minutes). In conclusion, the relay station prospectively eliminates demographic errors, effectively segments images from the same study routing them to different workstations, and can be seamlessly integrated into the technologists' current workflow. This can be scalable and a lower cost solution as opposed to deploying dedicated PACS QC workstations.

  15. The importance of upgrading power stations with numerical protection relays

    NASA Astrophysics Data System (ADS)

    Vilceanu, Radu-Constantin; Surianu, Flavius-Dan

    2016-06-01

    In this paper we present the importance of upgrading power stations with numerical protection relays. We will study the gravity and the economic impact of a power system fault when it appears and it is not cleared by old protection devices. Also we will compare how an old protection scheme works when it clears a power fault with how modern numerical protection relays work. The trip decision and the actual circuit breaker open times will be compared and analyzed.

  16. Quantum relays and noise suppression using linear optics

    SciTech Connect

    Jacobs, B.C.; Pittman, T.B.; Franson, J.D.

    2002-11-01

    Probabilistic quantum nondemolition (QND) measurements can be performed using linear optics and postselection. Here we show how QND devices of this kind can be used in a straightforward way to implement a quantum relay, which is capable of extending the range of a quantum cryptography system by suppressing the effects of detector noise. Unlike a quantum repeater, a quantum relay system does not require entanglement purification or the ability to store photons.

  17. Preamble-based channel estimation in single-relay networks using FBMC/OQAM

    NASA Astrophysics Data System (ADS)

    Mavrokefalidis, Christos; Kofidis, Eleftherios; Rontogiannis, Athanasios A.; Theodoridis, Sergios

    2014-12-01

    Preamble-based channel estimation in filter bank-based multicarrier (FBMC) systems using offset quadrature amplitude modulation (OQAM) has been extensively studied in the last few years, due to the many advantages this modulation scheme can offer over cyclic prefix (CP)-based orthogonal frequency division multiplexing (OFDM) and in view of the interesting challenges posed on the channel estimator by the interference effect inherent in such an FBMC system. In particular, preambles of short duration and of both the block ( full) and comb ( sparse) types were designed so as to minimize the channel estimation mean squared error (MSE) subject to a given transmit energy. In the light of the important role that relay-based cooperative networks are expected to play in future wireless communication systems, it is of interest to consider FBMC/OQAM, and in particular questions associated to preamble-based channel estimation, in such a context as well. The goal of this paper is to address these problems and come up with optimal solutions that extend existing results in a single relay-based cooperative network. Both low and medium frequency selective channels are considered. In addition to optimal preamble and estimator design, the equalization/detection task is studied, shedding light to a relay-generated interference effect and proposing a simple way to come over it. The reported simulation results corroborate the analysis and reveal interesting behavior with respect to channel frequency selectivity and signal-to-noise ratio.

  18. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  19. Techniques for Judging Intent Behind Network Based Cyber Attacks

    SciTech Connect

    Allen, J M

    2004-01-28

    This project developed a prototype system that can rapidly differentiate between undirected cyber attacks, and those that have a more specific and concerning intent behind them. The system responds to important cyber attacks in a tactically significant way as the attack is proceeding. It is also creates a prioritized list for the human analysts allowing them to focus on the threats mostly likely to be of interest. In the recent years the volume of attacks over the internet has increased exponentially, as they have become more and more automated. The result of this is that real threats are harder and harder to distinguish from the general threat. It is possible with our current systems to identify network packets that originated from thousands of IP addresses as probing a site like LLNL in a single day. Human analysis of these threats does not result in information that can be used for tactical response because most of the attacks are short and over before the human starts the analysis. Only a very small percentage of attacks can even be evaluated manually due to the volume. This project developed methods, and prototyped tools, that can identify attacks, slow the attack down and aid in the process of prioritizing detections. The project demonstrated that such methods exist, and that practical implementations exist for modern computers and networks. We call the tools created D.I.A.G. or Determining Internet Attackers Goals.

  20. Feasible attack on detector-device-independent quantum key distribution.

    PubMed

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  1. Controllability Analysis for Operation Margin of Zone 3 Impedance Relay

    NASA Astrophysics Data System (ADS)

    Li, Shenghu; Yorino, Naoto; Zoka, Yoshifumi

    Undesirable operation of zone 3 impedance relay (mho relays) is a possible factor for causing cascading failure as seen in several previous large scale blackouts, where power flow redistribution and power swing caused by outage or switching operations satisfy the condition for the relay operation. So far, the condition itself has not fully been investigated, and therefore, there has been little attempt to avoid the relay operation by means of direct power flow control. This paper analyzes the condition for zone 3 relay operation from the viewpoint of its sensitivity to power flow. An operating margin for security is defined for each relay to carry out effective monitoring. It is newly pointed out that undesirable operation can be effectively avoided by reactive power controls as well as real power controls. The method to compute the operation margin is also given through the analysis of the optimal Var location to control the operation margin. Effectiveness of the proposed method is demonstrated using the IEEE test systems.

  2. Cerberus Fossae: In the Relay Zone

    NASA Image and Video Library

    2015-02-18

    The trenches or fossae are found in Athabasca Valles as seen by NASA Mars Reconnaissance Orbiter. These trenches or "fossae" are about a kilometer (0.62 miles) across. This area shows where two segments have joined up and are close to a third section. The fossae are probably areas where the surface has collapsed down into voids made from faults (huge cracks with movement on either side) that don't extend up to the surface. In structural geology, when multiple faults are closely spaced, we call that a relay zone. These zones have much higher stress built up in the crust and consequently tend to be more fractured. These fractures can serve as "pipes" for fluids (water, lava, gases) to flow through. This area corresponds with the youngest of Mars' giant outflow channels, Athabasca Valles, that is only 2 to 20 million years old and shows geologic evidence of having been formed and modified jointly by water and lava. http://photojournal.jpl.nasa.gov/catalog/PIA19300

  3. Novel mechanism of network protection against the new generation of cyber attacks

    NASA Astrophysics Data System (ADS)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  4. Modified Dynamic Decode-and-Forward Relaying Protocol for Type II Relay in LTE-Advanced and Beyond

    PubMed Central

    Nam, Sung Sik; Alouini, Mohamed-Slim; Choi, Seyeong

    2016-01-01

    In this paper, we propose a modified dynamic decode-and-forward (MoDDF) relaying protocol to meet the critical requirements for user equipment (UE) relays in next-generation cellular systems (e.g., LTE-Advanced and beyond). The proposed MoDDF realizes the fast jump-in relaying and the sequential decoding with an application of random codeset to encoding and re-encoding process at the source and the multiple UE relays, respectively. A subframe-by-subframe decoding based on the accumulated (or buffered) messages is employed to achieve energy, information, or mixed combining. Finally, possible early termination of decoding at the end user can lead to the higher spectral efficiency and more energy saving by reducing the frequency of redundant subframe transmission and decoding. These attractive features eliminate the need of directly exchanging control messages between multiple UE relays and the end user, which is an important prerequisite for the practical UE relay deployment. PMID:27898712

  5. Identifying and tracking attacks on networks: C3I displays and related technologies

    NASA Astrophysics Data System (ADS)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  6. Reducing Communication Detection and Eavesdropping using Mobile Agent Relay Networks

    DTIC Science & Technology

    2010-12-01

    to maintain a wireless network to support the users. This type of solution is often used in Mobile Ad Hoc Networking (MANET) ( Corson 1999). MANET...USA: IEEE Computer Society. Corson , S. 1999. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC

  7. Dog pack attack: hunting humans.

    PubMed

    Avis, S P

    1999-09-01

    Dog bite-related fatalities, although unusual, accounted for 304 deaths in the United States between 1979 and 1996 and 6 fatalities in Canada between 1994 and 1996. Fatal dog pack attacks and attacks involving human predation are less common. The following describes a dog pack attack on a family of four involving 2 fatalities with predation of the victims. Factors previously identified that contribute to pack attacks and predation, including prior group hunting, social feeding, territorial defense, lack of human interaction, and prey stimuli, are discussed.

  8. Sulfate attack expansion mechanisms

    SciTech Connect

    Müllauer, Wolfram Beddoe, Robin E.; Heinz, Detlef

    2013-10-15

    A specially constructed stress cell was used to measure the stress generated in thin-walled Portland cement mortar cylinders caused by external sulfate attack. The effects of sulfate concentration of the storage solution and C{sub 3}A content of the cement were studied. Changes in mineralogical composition and pore size distribution were investigated by X-ray diffraction and mercury intrusion porosimetry, respectively. Damage is due to the formation of ettringite in small pores (10–50 nm) which generates stresses up to 8 MPa exceeding the tensile strength of the binder matrix. Higher sulfate concentrations and C{sub 3}A contents result in higher stresses. The results can be understood in terms of the effect of crystal surface energy and size on supersaturation and crystal growth pressure.

  9. Relays from Mars demonstrate international interplanetary networking

    NASA Astrophysics Data System (ADS)

    2004-08-01

    On 4 August at 14:24 CEST, as Mars Express flew over one of NASA’s Mars exploration rovers, Opportunity, it successfully received data previously collected and stored by the rover. The data, including 15 science images from the rover's nine cameras, were then downlinked to ESA’s European Space Operations Centre in Darmstadt (Germany) and immediately relayed to the Mars Exploration Rovers team based at the Jet Propulsion Laboratory in Pasadena, USA. NASA orbiters Mars Odyssey and Mars Global Surveyor have so far relayed most of the data produced by the rovers since they landed in January. Communication compatibility between Mars Express and the rovers had already been demonstrated in February, although at a low rate that did not convey much data. The 4 August session, at a transmit rate of 42.6 megabits in about six minutes, set a new mark for international networking around another planet. The success of this demonstration is the result of years of groundwork and was made possible because both Mars Express and the Mars rovers use the same communication protocol. This protocol, called Proximity-1, was developed by the international Consultative Committee for Space Data Systems, an international partnership for standardising techniques for handling space data. Mars Express was 1400 kilometres above the Martian surface during the 4 August session with Opportunity, with the goal of a reliable transfer of lots of data. Engineers for both agencies plan to repeat this display of international cooperation today, 10 August, with another set of Opportunity images. “We're delighted how well this has been working, and thankful to have Mars Express in orbit,” said Richard Horttor of NASA's Jet Propulsion Laboratory, Pasadena, California, project manager for NASA's role in Mars Express. JPL engineer Gary Noreen of the Mars Network Office said: “the capabilities that our international teamwork is advancing this month could be important in future exploration of Mars

  10. 75 FR 54040 - Telecommunications Relay Services and Speech-to-Speech Services for Individuals With Hearing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-03

    ... No. 03-123; DA 10-1235] Telecommunications Relay Services and Speech-to-Speech Services for... waivers of certain Telecommunications Relay Services (TRS) mandatory minimum standards for Video Relay Service (VRS) and Internet Protocol Relay (IP Relay). The waived TRS mandatory minimum standards are:...

  11. Analysis on Soft-Decision-and-Forward Cooperative Networks with Multiple Relays

    NASA Astrophysics Data System (ADS)

    Song, Kyoung-Young; Kim, Jaehong; No, Jong-Seon; Chung, Habong

    In this paper, we analyze the best relay selection scheme for the soft-decision-and-forward (SDF) cooperative networks with multiple relays. The term ‘best relay selection’ implies that the relay having the largest end-to-end signal-to-noise ratio is selected to transmit in the second phase transmission. The approximate performances in terms of pairwise error probability (PEP) and bit error rate (BER) are analyzed and compared with the conventional multiple-relay transmission scheme where all the relays participate in the second phase transmission. Using the asymptotics of the Fox's H-function, the diversity orders of the best relay selection and conventional relay scheme for the SDF cooperative networks are derived. It is shown that both have the same full diversity order. The numerical results show that the best relay selection scheme outperforms the conventional one in terms of bit error rate.

  12. Securing iris recognition systems against masquerade attacks

    NASA Astrophysics Data System (ADS)

    Galbally, Javier; Gomez-Barrero, Marta; Ross, Arun; Fierrez, Julian; Ortega-Garcia, Javier

    2013-05-01

    A novel two-stage protection scheme for automatic iris recognition systems against masquerade attacks carried out with synthetically reconstructed iris images is presented. The method uses different characteristics of real iris images to differentiate them from the synthetic ones, thereby addressing important security flaws detected in state-of-the-art commercial systems. Experiments are carried out on the publicly available Biosecure Database and demonstrate the efficacy of the proposed security enhancing approach.

  13. Correlated Attack Modeling (CAM)

    DTIC Science & Technology

    2003-10-01

    eywell’s Scyllarus correlation framework [18], and a simulated-annealing-based approach for detecting stealthy portscans [35]. For detecting multistep...California, May 12–15, 2002. [35] S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans . Journal of

  14. Attack Classification Schema for Smart City WSNs

    PubMed Central

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-01-01

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN. PMID:28379192

  15. Attack Classification Schema for Smart City WSNs.

    PubMed

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  16. Relay Selection Based Double-Differential Transmission for Cooperative Networks with Multiple Carrier Frequency Offsets: Model, Analysis, and Optimization

    NASA Astrophysics Data System (ADS)

    Zhao, Kun; Zhang, Bangning; Pan, Kegang; Liu, Aijun; Guo, Daoxing

    2014-07-01

    Due to the distributed nature, cooperative networks are generally subject to multiple carrier frequency offsets (MCFOs), which make the channels time-varying and drastically degrade the system performance. In this paper, to address the MCFOs problem in detect-andforward (DetF) multi-relay cooperative networks, a robust relay selection (RS) based double-differential (DD) transmission scheme, termed RSDDT, is proposed, where the best relay is selected to forward the source's double-differentially modulated signals to the destination with the DetF protocol. The proposed RSDDT scheme can achieve excellent performance over fading channels in the presence of unknown MCFOs. Considering double-differential multiple phase-shift keying (DDMPSK) is applied, we first derive exact expressions for the outage probability and average bit error rate (BER) of the RSDDT scheme. Then, we look into the high signal-to-noise ratio (SNR) regime and present simple and informative asymptotic outage probability and average BER expressions, which reveal that the proposed scheme can achieve full diversity. Moreover, to further improve the BER performance of the RSDDT scheme, we investigate the optimum power allocation strategy among the source and the relay nodes, and simple analytical solutions are obtained. Numerical results are provided to corroborate the derived analytical expressions and it is demonstrated that the proposed optimum power allocation strategy offers substantial BER performance improvement over the equal power allocation strategy.

  17. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  18. Associative Covalent Relay: An Oxadiazolone Strategy for Rhodium(III)-Catalyzed Synthesis of Primary Pyridinylamines.

    PubMed

    Yu, Xiaolong; Chen, Kehao; Wang, Qi; Guo, Shan; Zha, Shanke; Zhu, Jin

    2017-04-05

    A relay formalism is proposed herein for categorizing the interplay among reactants, target product, and catalytic center in transition-metal catalysis, an important factor that can dictate overall catalysis viability and efficiency. In this formalism, transition-metal catalysis can proceed by dissociative relay, associative covalent relay, and associative dative relay modes. An intriguing associative covalent relay process operates in rhodium(III)-catalyzed oxadiazolone-directed alkenyl C-H coupling with alkynes and allows efficient access to primary pyridinylamines. Although the primary pyridinylamine synthesis mechanism is posteriori rationalized, the relay formalism formulated herein can provide an important mechanistic conceptual framework for future catalyst design and reaction development.

  19. Energy efficiency analysis of relay-assisted cellular networks

    NASA Astrophysics Data System (ADS)

    Yu, Huan; Li, Yunzhou; Kountouris, Marios; Xu, Xibin; Wang, Jing

    2014-12-01

    To meet the demand for higher throughput, improved coverage and enhanced reliability, future wireless cellular networks face significant technical challenges. One promising solution is to place relay stations between transmitters and receivers in the cellular network. Meanwhile, as energy consumption reduction has been an important concern for the wireless industry, energy-efficient communications is of prime interest for future networks. In this paper, we study whether and how relays can improve the energy efficiency of cellular networks. Specifically, the energy efficiency of relay-assisted cellular networks is analyzed using tools of stochastic geometry. We first derive the coverage probability for the macro base station (MBS) to user (UE), the MBS to relay station (RS), and the RS to UE links, and then we model the power consumption at the MBS and RS. Based on the analytical model and expressions, the energy efficiency of relay-assisted cellular networks is then evaluated and is shown to be strictly quasi-concave on the transmit power for MBS to UE link or the RS to UE link. Numerical results show that the energy efficiency first improves while it hits a ceiling as the MBS density increases.

  20. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  1. Implementing Strategic Planning Capabilities Within the Mars Relay Operations Service

    NASA Technical Reports Server (NTRS)

    Hy, Franklin; Gladden, Roy; Allard, Dan; Wallick, Michael

    2011-01-01

    Since the Mars Exploration Rovers (MER), Spirit and Opportunity, began their travels across the Martian surface in January of 2004, orbiting spacecraft such as the Mars 2001 Odyssey orbiter have relayed the majority of their collected scientific and operational data to and from Earth. From the beginning of those missions, it was evident that using orbiters to relay data to and from the surface of Mars was a vastly more efficient communications strategy in terms of power consumption and bandwidth compared to direct-to-Earth means. However, the coordination between the various spacecraft, which are largely managed independently and on differing commanding timelines, has always proven to be a challenge. Until recently, the ground operators of all these spacecraft have coordinated the movement of data through this network using a collection of ad hoc human interfaces and various, independent software tools. The Mars Relay Operations Service (MaROS) has been developed to manage the evolving needs of the Mars relay network, and specifically to standardize and integrate the relay planning and coordination data into a centralized infrastructure. This paper explores the journey of developing the MaROS system, from inception to delivery and acceptance by the Mars mission users.

  2. Laser communication terminals for the European Data Relay System

    NASA Astrophysics Data System (ADS)

    Böhmer, Knut; Gregory, Mark; Heine, Frank; Kämpfner, Hartmut; Lange, Robert; Lutzer, Michael; Meyer, Rolf

    2012-02-01

    For the first time, laser communication terminals will be operational in a commercial service, EDRS, the European Data Relay System. Future earth observation satellites call for satellite-to-ground links with high availability to make their data immediately available to the user. High availability is only achieved by GEO relay links, i.e. communication links from LEO satellites to a geostationary relay satellite which transmits the data to the ground. While RF communication limits the GEO relay's data rate to roughly 1 Gbps optical communication will extend its capacity into the 10 Gbps range. Today, laser communication terminals operated in LEO-LEO, LEO-to ground and ground-to-LEO links, all at a data rate of 5.625 Gbps, are applied in campaigns with scientific objectives and for technology demonstrating purposes. Adapted to the larger link distance of the LEO-to-GEO link the laser communication terminals will be applied in the GEO relay EDRS operated for the time being at 1.8 Gbps. Terminals will be delivered for the accommodation on Alphabus, EDRS-A and EDRS-C, European GEO-satellites, and on Sentinel-1a and Sentinel-2a, European LEO satellites.

  3. Commercialization and Standardization Progress Towards an Optical Communications Earth Relay

    NASA Technical Reports Server (NTRS)

    Edwards, Bernard L.; Israel, David J.

    2015-01-01

    NASA is planning to launch the next generation of a space based Earth relay in 2025 to join the current Space Network, consisting of Tracking and Data Relay Satellites in space and the corresponding infrastructure on Earth. While the requirements and architecture for that relay satellite are unknown at this time, NASA is investing in communications technologies that could be deployed to provide new communications services. One of those new technologies is optical communications. The Laser Communications Relay Demonstration (LCRD) project, scheduled for launch in 2018 as a hosted payload on a commercial communications satellite, is a critical pathfinder towards NASA providing optical communications services on the next generation space based relay. This paper will describe NASA efforts in the on-going commercialization of optical communications and the development of inter-operability standards. Both are seen as critical to making optical communications a reality on future NASA science and exploration missions. Commercialization is important because NASA would like to eventually be able to simply purchase an entire optical communications terminal from a commercial provider. Inter-operability standards are needed to ensure that optical communications terminals developed by one vendor are compatible with the terminals of another. International standards in optical communications would also allow the space missions of one nation to use the infrastructure of another.

  4. Learning relay start strategies in swimming: What feedback is best?

    PubMed

    Fischer, Sebastian; Braun, Claudia; Kibele, Armin

    2017-04-01

    In the past, studies and book recommendations on relay starts in swimming have been predominantly focused on the change-over time (COT) as a performance criterion. Aside from the circular backswing start with parallel foot placement, few studies have analysed differences in the take-off movement including step approaches as well. Although trends could be identified, the results remained still somewhat inconclusive. In contrast, no study has examined as has examined whether a reduction of COT in between wall contact of the income swimmer and the take-off of the outgoing swimmer is an optimal relay start strategy, as advocated by various swimming experts. Therefore, the purpose of this study was to compare two different relay start strategies: offensive strategy minimizing COT and conservative strategy to maximize horizontal peak force (HPF). In this regard, a learning intervention with 24 elite-level swimmers (12 females, 12 male) was conducted to compare both strategies regarding relay start time, HPF and COT. Subjects were randomly assigned to two feedback groups: COT versus HPF at take-off. The results of this study showed a clear advantage for HPF feedback for relay start performance measured by wall contact of the incoming swimmer and head passage at 7.5 m of the outgoing swimmer. In addition, similar reductions in COTs were found in both training groups. In conclusion, swimmers should focus on force production rather than minimizing COT. For the latter, deteriorating consequences for force production must be considered.

  5. A novel relay method for determining low-clearance values.

    PubMed

    Di, Li; Trapa, Patrick; Obach, R Scott; Atkinson, Karen; Bi, Yi-An; Wolford, Angela C; Tan, Beijing; McDonald, Thomas S; Lai, Yurong; Tremaine, Larry M

    2012-09-01

    A novel relay method has been developed using cryopreserved human hepatocytes to measure intrinsic clearance of low-clearance compounds. The relay method involved transferring the supernatant from hepatocyte incubations to freshly thawed hepatocytes at the end of the 4-h incubation to prolong the exposure time to active enzymes in hepatocytes. An accumulative incubation time of 20 h or longer in hepatoctyes can be achieved using the method. The relay method was validated using seven commercial drugs (diazepam, disopyramide, theophylline, timolol, tolbutamide, S-warfarin, and zolmitriptan) that were metabolized by various cytochrome P450s with low human in vivo intrinsic clearance at approximately 2 to 15 ml · min⁻¹ · kg⁻¹. The results showed that the relay method produced excellent predictions of human in vivo clearance. The difference between in vitro and in vivo intrinsic clearance was within 2-fold for most compounds, which is similar to the standard prediction accuracy for moderate to high clearance compounds using hepatocytes. The relay method is a straightforward, relatively low cost, and easy-to-use new tool to address the challenges of low clearance in drug discovery and development.

  6. Scenario Graphs and Attack Graphs

    DTIC Science & Technology

    2004-04-14

    46 6.1 Vulnerability Analysis of a Network . . . . . . . . . . . . . . . . . . . . . . . . . 53 6.2 Sandia Red Team Attack Graph...asymptotic bound. The test machine was a 1Ghz Pentium III with 1GB of RAM, running Red Hat Linux 7.3. Figure 4.1(a) plots running time of the implemen...host scanning tools network information vulnerability Attack Graph network Red

  7. [Heart-attack in pregnancy].

    PubMed

    Výtisková, T; Suchá, D; Fučíková, Z

    To describe hear-attack on crystal meth addicted pregnant woman. Case report. Acute heart-attack during pregnancy means unexpected obstetric complication. The consequences could be fatal for the mother and the fetus. Although good delivery management and treatment could reduce morbidity and mortality to a minimum.

  8. A Survey of Insider Attack Detection Research

    DTIC Science & Technology

    2008-08-25

    tion for research purposes. Because of the scarcity of real data, Chinchani et. al. created RACOON [Error! Reference source not found.], a system for...Mathematical Foundations. MITRE Cor- poration, 1973. [2] Chinchani R, Muthukrishnan A, Chandrasekaran M, Upadhyaya S, RACOON : Rapidly Gen- erating User

  9. Gout attacks and lunar cycle.

    PubMed

    Mikulecký, M; Rovenský, J

    2000-07-01

    The aim was to search for periodical fluctuations in daily occurrence of gout attacks during the synodic lunar cycle. 126 gout attacks were recorded between 1972 and 1994 at known calendar dates. The synodic plexogram, displaying the number of attacks for each day of the cycle, was processed by cosinor regression. A pronounced cycling was found, with highest peaks under the new and full moon (syzygigies). Thus, the maximal occurrence of attacks coincides with the peaking lunisolar tidal effect. Similar relation of attacks to synodic moon was seen in bronchial asthma of children, and a reciprocal one in paroxysmal tachyarrhythmia. Differing pathogenetic backgrounds of these diseases substantiate the observed differences in their putative reactions on the changing cosmogeophysical environment.

  10. Invisible Trojan-horse attack.

    PubMed

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  11. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    SciTech Connect

    Nichols, Jeff A. {Cyber Sciences}; Curtis, Laura

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  12. Bilayer Protograph Codes for Half-Duplex Relay Channels

    NASA Technical Reports Server (NTRS)

    Divsalar, Dariush; VanNguyen, Thuy; Nosratinia, Aria

    2013-01-01

    Direct to Earth return links are limited by the size and power of lander devices. A standard alternative is provided by a two-hops return link: a proximity link (from lander to orbiter relay) and a deep-space link (from orbiter relay to Earth). Although direct to Earth return links are limited by the size and power of lander devices, using an additional link and a proposed coding for relay channels, one can obtain a more reliable signal. Although significant progress has been made in the relay coding problem, existing codes must be painstakingly optimized to match to a single set of channel conditions, many of them do not offer easy encoding, and most of them do not have structured design. A high-performing LDPC (low-density parity-check) code for the relay channel addresses simultaneously two important issues: a code structure that allows low encoding complexity, and a flexible rate-compatible code that allows matching to various channel conditions. Most of the previous high-performance LDPC codes for the relay channel are tightly optimized for a given channel quality, and are not easily adapted without extensive re-optimization for various channel conditions. This code for the relay channel combines structured design and easy encoding with rate compatibility to allow adaptation to the three links involved in the relay channel, and furthermore offers very good performance. The proposed code is constructed by synthesizing a bilayer structure with a pro to graph. In addition to the contribution to relay encoding, an improved family of protograph codes was produced for the point-to-point AWGN (additive white Gaussian noise) channel whose high-rate members enjoy thresholds that are within 0.07 dB of capacity. These LDPC relay codes address three important issues in an integrative manner: low encoding complexity, modular structure allowing for easy design, and rate compatibility so that the code can be easily matched to a variety of channel conditions without extensive

  13. Multistability and hidden attractors in a relay system with hysteresis

    NASA Astrophysics Data System (ADS)

    Zhusubaliyev, Zhanybai T.; Mosekilde, Erik; Rubanov, Vasily G.; Nabokov, Roman A.

    2015-06-01

    For nonlinear dynamic systems with switching control, the concept of a "hidden attractor" naturally applies to a stable dynamic state that either (1) coexists with the stable switching cycle or (2), if the switching cycle is unstable, has a basin of attraction that does not intersect with the neighborhood of that cycle. We show how the equilibrium point of a relay system disappears in a boundary-equilibrium bifurcation as the system enters the region of autonomous switching dynamics and demonstrate experimentally how a relay system can exhibit large amplitude chaotic oscillations at high values of the supply voltage. By investigating a four-dimensional model of the experimental relay system we finally show how a variety of hidden periodic, quasiperiodic and chaotic attractors arise, transform and disappear through different bifurcations.

  14. Evolution of Multi-Component Anion Relay Chemistry (ARC)

    PubMed Central

    Smith, Amos B.; Wuest, William M.

    2009-01-01

    Efficient construction of architecturally complex natural and unnatural products is the hallmark of organic chemistry. Anion Relay Chemistry (ARC) - a multi-component coupling protocol - has the potential to provide the chemist with a powerful synthetic tactic, enabling efficient, rapid elaboration of structurally complex scaffolds in a single operation with precise stereochemical control. The ARC tactic can be subdivided into two main classes, comprising the relay of negative charge either through bonds or through space, the latter with aid of a transfer agent. This review will present the current state of through-space anion relay, in conjunction with examples of natural and unnatural product syntheses that illustrate the utility of this synthetic method PMID:19030533

  15. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; hide

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  16. VoiceRelay: voice key operation using visual basic.

    PubMed

    Abrams, Lise; Jennings, David T

    2004-11-01

    Using a voice key is a popular method for recording vocal response times in a variety of language production tasks. This article describes a class module called VoiceRelay that can be easily utilized in Visual Basic programs for voice key operation. This software-based voice key offers the precision of traditional voice keys (although accuracy is system dependent), as well as the flexibility of volume and sensitivity control. However, VoiceRelay is a considerably less expensive alternative for recording vocal response times because it operates with existing PC hardware and does not require the purchase of external response boxes or additional experiment-generation software. A sample project demonstrating implementation of the VoiceRelay class module may be downloaded from the Psychonomic Society Web archive, www.psychonomic.org/archive.

  17. Telecommunications Relay Support of the Mars Phoenix Lander Mission

    NASA Technical Reports Server (NTRS)

    Edwards, Charles D., Jr.; Erickson, James K.; Gladden, Roy E.; Guinn, Joseph R.; Ilott, Peter A.; Jai, Benhan; Johnston, Martin D.; Kornfeld, Richard P.; Martin-Mur, Tomas J.; McSmith, Gaylon W.; Thomas, Reid C.; Varghese, Phil; Signori, Gina; Schmitz, Peter

    2010-01-01

    The Phoenix Lander, first of NASA's Mars Scout missions, arrived at the Red Planet on May 25, 2008. From the moment the lander separated from its interplanetary cruise stage shortly before entry, the spacecraft could no longer communicate directly with Earth, and was instead entirely dependent on UHF relay communications via an international network of orbiting Mars spacecraft, including NASA's 2001 Mars Odyssey (ODY) and Mars Reconnaissance Orbiter (MRO) spacecraft, as well as ESA's Mars Express (MEX) spacecraft. All three orbiters captured critical event telemetry and/or tracking data during Phoenix Entry, Descent and Landing. During the Phoenix surface mission, ODY and MRO provided command and telemetry services, far surpassing the original data return requirements. The availability of MEX as a backup relay asset enhanced the robustness of the surface relay plan. In addition to telecommunications services, Doppler tracking observables acquired on the UHF link yielded an accurate position for the Phoenix landing site.

  18. Recent results in Mars Relay Network planning and scheduing

    NASA Technical Reports Server (NTRS)

    Lee, C. H.; Cheung, K. M.

    2003-01-01

    At different time periods in the future, Mars missions will overlap and previous studies indicate that during such periods existing deep space communication infrastructure will not be able to handle all Mars communication needs. A plausible solution is to perform optimal resource allocation for the Mars relay communication network; a network consisting of multiple surface units and orbiters on Mars and the Deep Space Stations. Unlike direct-to-earth, a relay communication, either in real-time or store-and-forward, can increase network science data return, reduce surface unit's direct-to-earth communication demands, and enable communication even when the surface unit is not facing Earth. It is the objective of this paper to take advantage of the relay operation to efficiently plan and schedule the network communications.

  19. After-gate attack on a quantum cryptosystem

    NASA Astrophysics Data System (ADS)

    Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, Ch; Makarov, V.; Leuchs, G.

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  20. Finding Effective Responses Against Cyber Attacks for Divided Nations

    DTIC Science & Technology

    2015-12-01

    against South Korean government sites from 2008 to 2012 (Chae, 2013). Among these, significant attacks such as a malware infection on government...symptoms in domestic cyberspace and malware interdiction. For cyber security in the public sector, each central agency operates segmental security...out the detection of malware , implementing responses against DDoS attacks by establishing cyber shelters and zombie PC treatment systems, and

  1. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    DTIC Science & Technology

    2001-10-01

    capacity • Reducing the amount of resources consumed • Monitoring traffic volume • Tracing attack packets though the Internet Detecting subverted...attempt to reduce the amount of resources consumed during a DDoS attack. NetBSD will accelerate its timeouts of partially opened TCP connections at times...should be nearly comparable to a system that does not use the payment mechanisms. There is prior work on how pricing can be used to influence consumer

  2. COLORS: a communication link with an optical relay satellite

    NASA Astrophysics Data System (ADS)

    Ragazzoni, Roberto; Tordi, Massimiliano; Bartolozzi, M.; Martin, Armando; La Camera, S.; Turolla, A.; Turri, M.

    2002-01-01

    We present a new concept to link two ground-based optical stations through a satellite. In our approach the optical relay in orbit is a completely passive one, with no requirements in terms of active control attitude and with a more simple opto-mechanical design. The relay acts as a reference source for the ground stations, equipped with an adaptive optics system to enlarge the photon return and the bandwidth of the transmitted signal. The technological requirements are mainly on the ground side, then technological up-grades are easily obtainable and less cost- demanding.

  3. Wind generator system for microwave radio relay station

    SciTech Connect

    Yamamura, H.; Eguchi, N.

    1983-10-01

    NTT has introduced a wind generator system at microwave relay stations. It consists of a wind turbine generator as main power source and three diesel driven generators as back up. The wind turbine generator adopts a Darrieus unit as the wind driven blades and generates 8 kW maximum power with strong winds blowing over 15 m/s. Before this introduction, NTT manufactured two different wind turbine generator prototypes, one using a propeller and the other a Darrieus unit, and field tests have been carried out since 1978. This paper describes the field tests and the wind generator system for microwave relay stations.

  4. Overview and status of the laser communication relay demonstration

    NASA Astrophysics Data System (ADS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-03-01

    NASA is presently developing the first all-optical high data rate satellite relay system, LCRD. To be flown on a geosynchronous satellite, it will communicate with DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory, and another on a Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments.

  5. User's manual for the Functional Relay Operation Monitor (FROM)

    SciTech Connect

    Gustke, F.R.

    1981-02-01

    Sandia's Digital Systems Development Division 1521 has developed a new functional relay tester. Capabilities of this tester include the measurement of coil and contact resistance, hipot, operate current, and contact operation and bounce times. The heart of the tester is a Hewlett-Packard 21MX minicomputer that uses BASIC or FORTRAN programming languages. All measurements are made by means of simple program calls, and all measurement standards are traceable to the National Bureau of Standards. Functional relay test data are stored on a disc drive and can be output as hard copy, manipulated in the computer, or sent over a distributed-system link to other Sandia computers. 17 figures, 4 tables.

  6. Overview and Status of the Laser Communication Relay Demonstration

    NASA Technical Reports Server (NTRS)

    Luzhanskiy, E.; Edwards, B.; Israel, D.; Cornwell, D.; Staren, J.; Cummings, N.; Roberts, T.; Patschke, R.

    2016-01-01

    NASA is presently developing first all optical high data rate satellite relay system, LCRD. To be flown on commercial geosynchronous satellite, it will communicate at DPSK and PPM modulation formats up to 1.244 Gbps. LCRD flight payload is being developed by NASA's Goddard Space Flight Center. The two ground stations, one on Table Mountain in CA, developed by NASA's Jet Propulsion Laboratory and another on Hawaiian island will enable bi-directional relay operation and ground sites diversity experiments. In this paper we will report on the current state of LCRD system development, planned operational scenarios and expected system performance.

  7. Satellite Threat Warning and Attack Reporting

    SciTech Connect

    Hilland, D.; Phipps, G.; Jingle, C.; Newton, G.

    1997-12-31

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  8. Coronary Artery Dissection: Not Just a Heart Attack

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  9. Heart Attack or Sudden Cardiac Arrest: How Are They Different?

    MedlinePlus

    ... a Heart Attack Treatment of a Heart Attack Life After a Heart Attack Heart Failure About Heart Failure ... a Heart Attack • Treatment of a Heart Attack • Life After a Heart Attack Lifestyle Changes Recovery FAQs • Heart ...

  10. 75 FR 39945 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-13

    ... From the Federal Register Online via the Government Publishing Office FEDERAL COMMUNICATIONS COMMISSION Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... summary of the Commission's Structure and Practices of the Video Relay Service Program, Declaratory Ruling...

  11. An analytical study of relay neuron's reliability: dependence on input and model parameters.

    PubMed

    Agarwal, Rahul; Sarma, Sridevi V

    2011-01-01

    Relay neurons are widely found in our nervous system, including the Thalamus, spinal cord and lateral geniculate body. They receive a modulating input (background activity) and a reference input. The modulating input modulates relay of the reference input. This modulation is critical for correct functioning of relay neurons, but is poorly understood. In this paper, we use a biophysical-based model and systems theoretic tools to calculate how well a single relay neuron relays a reference input signal as a function of the neuron's electro physiological properties (i.e. model parameters), the modulating signal, and the reference signal parameters. Our analysis is more rigorous than previous related works and is generalizable to all relay cells in the body. Our analytical expression matches relay performance obtained in simulation and suggest that increasing the frequency of a sinusoidal modulating input or decreasing its DC offset increases the relay cell reliability.

  12. WILD PIG ATTACKS ON HUMANS

    SciTech Connect

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. Allergens might trigger migraine attacks.

    PubMed

    Bektas, Hesna; Karabulut, Hayriye; Doganay, Beyza; Acar, Baran

    2017-03-01

    Migraine is a common primary headache disorder. The mechanisms underlying the onset of a migraine attack are not completely understood. Environmental changes and a number of other factors could induce migraine attacks. The aim of this study was to investigate the relationship between the frequency of migraine attacks and allergens. Migraine patients without aura, and healthy individuals similar in age and gender without a history of headache and allergy were prospectively included in the study. The duration of migraine, the frequency of migraine attacks, the medication history, and the symptoms during attacks were questioned. Migraine disability assessment score (MIDAS) and visual analog scale (VAS) scores were obtained. Allergen extracts including dust, fungi, insect, animal epithelium, pollens, and food allergens were applied for allergy tests. 49 migraine patients and 49 healthy individuals were enrolled in the study. There was no significant difference in terms of age and gender. The median migraine disease duration, the number of attacks in a month, and the duration of attacks were, respectively, 5.5 years (1-44), 4 (1-10) day/month, and 24 (4-72) h. The mean MIDAS grade was 2.45 ± 0.14 (1-4), and mean VAS score was 7.89 ± 0.27 (4-10). The positivity of allergy tests was 55.1 % (27/49) in the migraine group and 32.7 % (16/49) in the control group (p < 0.05). The allergy tests were positive for house dust, red birch, hazel tree, olive tree, nettle, and wheat. The frequency of migraine attacks was higher in allergy-test-positive patients than in negative ones in the migraine group (p = 0.001). The migraine patients who had frequent attacks should be examined for allergies.

  14. Understand Your Risk of Heart Attack

    MedlinePlus

    ... the lowdown on: Total Cholesterol: Your total cholesterol score is calculated using the following equation: HDL + LDL + ... Coronary Artery Dissection: Not Just a Heart Attack • Warning Signs of a Heart Attack Heart Attack Symptoms ...

  15. Development of a Relay Performance Web Tool for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.

  16. Development of a Relay Performance Web Tool for the Mars Network

    NASA Technical Reports Server (NTRS)

    Allard, Daniel A.; Edwards, Charles D.

    2009-01-01

    Modern Mars surface missions rely upon orbiting spacecraft to relay communications to and from Earth systems. An important component of this multi-mission relay process is the collection of relay performance statistics supporting strategic trend analysis and tactical anomaly identification and tracking.

  17. Estimation of the scattering characteristics of a passive relay station in a radio line

    NASA Astrophysics Data System (ADS)

    Tishchenko, A. M.; Fedorov, N. N.

    1990-03-01

    The possibility of estimating the scattering characteristics of a moving relay station in a radio line is evaluated. Conditions are established under which the modulating effect of the antenna directivity characteristics on the relayed signal can be neglected. It is shown that normalized values of matched-filter responses describe the scattering characteristics of the relay station with a high degree of accuracy.

  18. Performance Analysis of MIMO Relay Network via Propagation Measurement in L-Shaped Corridor Environment

    NASA Astrophysics Data System (ADS)

    Lertwiram, Namzilp; Tran, Gia Khanh; Mizutani, Keiichi; Sakaguchi, Kei; Araki, Kiyomichi

    Setting relays can address the shadowing problem between a transmitter (Tx) and a receiver (Rx). Moreover, the Multiple-Input Multiple-Output (MIMO) technique has been introduced to improve wireless link capacity. The MIMO technique can be applied in relay network to enhance system performance. However, the efficiency of relaying schemes and relay placement have not been well investigated with experiment-based study. This paper provides a propagation measurement campaign of a MIMO two-hop relay network in 5GHz band in an L-shaped corridor environment with various relay locations. Furthermore, this paper proposes a Relay Placement Estimation (RPE) scheme to identify the optimum relay location, i.e. the point at which the network performance is highest. Analysis results of channel capacity show that relaying technique is beneficial over direct transmission in strong shadowing environment while it is ineffective in non-shadowing environment. In addition, the optimum relay location estimated with the RPE scheme also agrees with the location where the network achieves the highest performance as identified by network capacity. Finally, the capacity analysis shows that two-way MIMO relay employing network coding has the best performance while cooperative relaying scheme is not effective due to shadowing effect weakening the signal strength of the direct link.

  19. 76 FR 68642 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-07

    ...; FCC 11-155] Structure and Practices of the Video Relay Service Program AGENCY: Federal Communications... information collection associated with the Commission's Structure and Practices of the Video Relay Service... Practices of the Video Relay Service Program; Sprint Nextel Corporation Expedited Petition for Clarification...

  20. 76 FR 68116 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... No. 10-51; FCC 11-118] Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Practices of the Video Relay Service Program, CG Docket No. 10-51, FCC 11-118, published at 76 FR 47476...

  1. 76 FR 8659 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Date: January 31, 2014. Title: Structure and Practices of the Video Relay Service Program, CG Docket No...

  2. 76 FR 59269 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-26

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... effective date of these rule sections. See, In the Matter of Structure and Practices of the Video Relay...

  3. 76 FR 68328 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal..., the information collection associated with the Commission's Structure and Practices of the Video Relay... Structure and Practices of the Video Relay Service Program, CG Docket No. 10-51; FCC 11-118, published at 76...

  4. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  5. 76 FR 67118 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... . SUPPLEMENTARY INFORMATION: This is a summary of the Commission's Structure and Practices of the Video Relay..., 254(k), 616 and 620, unless otherwise noted. Subpart F--Telecommunications Relay Services and...

  6. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 4 2011-10-01 2011-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  7. 76 FR 59557 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-27

    ... COMMISSION 47 CFR Part 64 Structure and Practices of the Video Relay Service Program AGENCY: Federal... proceeding concerning Structure and Practices of the Video Relay Service Program, Second Report and Order and... oppositions and replies. In light of impending deadlines for initial and ] recertification Video Relay...

  8. 76 FR 47469 - Structure and Practices of the Video Relay Service Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-05

    ... COMMISSION 47 CFR Part 64 CG Docket No. 10-51; FCC 11-118] Structure and Practices of the Video Relay Service... Commission adopts modifications to its certification process for all Internet-based telecommunications relay... Commission's Structure and Practices of the Video Relay Service Program, Second Report and Order...

  9. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  10. 78 FR 55249 - Transmission Relay Loadability Reliability Standard; Notice of Compliance Filing

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-10

    ... Energy Regulatory Commission Transmission Relay Loadability Reliability Standard; Notice of Compliance... Interconnections. \\1\\ Transmission Relay Loadability Reliability Standard, Order No. 733, 130 FERC ] 61, 221 (2010..., Order No. 733-B, 136 FERC ] 61,185 (2011). \\2\\ Transmission Relay Loadability Reliability Standard,...

  11. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  12. 47 CFR 74.436 - Special requirements for automatic relay stations.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Special requirements for automatic relay... SERVICES Remote Pickup Broadcast Stations § 74.436 Special requirements for automatic relay stations. (a) An automatic relay station must be designed, installed, and protected so that the transmitter...

  13. Genetic attack on neural cryptography

    SciTech Connect

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-15

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  14. Genetic attack on neural cryptography.

    PubMed

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Sleep apnea and panic attacks.

    PubMed

    Edlund, M J; McNamara, M E; Millman, R P

    1991-01-01

    A survey of 301 sleep apnea patients demonstrated that obstructive sleep apnea may cause nocturnal panic attack symptoms. Sleep apnea should be considered in the differential diagnosis of nocturnal panic disorder.

  16. Joint Direct Attack Munition (JDAM)

    DTIC Science & Technology

    2013-12-01

    2005 FEB 2005 Selective Availability Anti- Spoofing Module (SAASM)/ GPS Anti-Jam Production Award N/A MAR 2005 SEP 2005 MAR 2005 Change Explanations...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-503 Joint Direct Attack Munition (JDAM) As of FY 2015 President’s Budget...2013 to 00-00-2013 4. TITLE AND SUBTITLE Joint Direct Attack Munition (JDAM) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  17. Global Mapping of Cyber Attacks

    DTIC Science & Technology

    2014-01-01

    use Symantec’s World Intelligence Network Environment ( WINE ) Intrusion Prevention System 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13...Symantec’s World Intelligence Network Environment ( WINE ) Intrusion Prevention System (IPS) telemetry data which contain attack reports from more than 10...government. The authors would like to thank Symantec for granting us access to the WINE IPS telemetry data. The cyber-attack data used in the paper is

  18. Protection Relaying Scheme Based on Fault Reactance Operation Type

    NASA Astrophysics Data System (ADS)

    Tsuji, Kouichi

    The theories of operation of existing relays are roughly divided into two types: one is the current differential types based on Kirchhoff's first law and the other is impedance types based on second law. We can apply the Kirchhoff's laws to strictly formulate fault phenomena, so the circuit equations are represented non linear simultaneous equations with variables fault point k and fault resistance Rf. This method has next two defect. 1) heavy computational burden for the iterative calculation on N-R method, 2) relay operator can not easily understand principle of numerical matrix operation. The new protection relay principles we proposed this paper focuses on the fact that the reactance component on fault point is almost zero. Two reactance Xf(S), Xf(R) on branch both ends are calculated by operation of solving linear equations. If signs of Xf(S) and Xf(R) are not same, it can be judged that the fault point exist in the branch. This reactance Xf corresponds to difference of branch reactance between actual fault point and imaginaly fault point. And so relay engineer can to understand fault location by concept of “distance". The simulation results using this new method indicates the highly precise estimation of fault locations compared with the inspected fault locations on operating transmission lines.

  19. 76 FR 58424 - Transmission Relay Loadability Reliability Standard

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... (Transmission Relay Loadability) submitted to the Commission for approval by the North American Electric Reliability Corporation (NERC), the Electric Reliability Organization (ERO) certified by the Commission. The... protect the electric network from fault conditions, but do not limit transmission loadability or interfere...

  20. Spacecraft Orbits for Earth/Mars-Lander Radio Relay

    NASA Technical Reports Server (NTRS)

    Noreen, Gary; Diehl, Roger; Neelon, Joseph

    2004-01-01

    A report discusses a network of spacecraft, in orbit around Mars, used to relay radio communications between Earth stations and mobile exploratory robots (rovers) as well as stationary scientific instruments that have been landed on the Mars surface. The relay spacecraft include two already in orbit plus several others planned to arrive at Mars in the years 2004 through 2008. A major portion of the report is devoted to the orbit of the G. Macroni Orbiter, which is in the midst of an iterative design process and is intended to be the first Mars orbiter designed primarily for radio relay. Candidate orbits are analyzed with a view toward choosing one that maximizes the amount of time available for communication with surface units, taking account of visibility as a function of position, the limit on communication distance at low power, and the fact that surface units can transmit more easily when they are in sunlight. Two promising new orbits for Mars relay satellites are identified: a 1/2-sol apoapsis-at-constant-time-of-day equatorial orbit and a 1/4-sol apoapsis-at-constant-time-of-day, critical-inclination orbit.