Science.gov

Sample records for efficiency measures securing

  1. Efficiency measurement for hospitals owned by the Iranian social security organisation.

    PubMed

    Hajialiafzali, Hossein; Moss, J R; Mahmood, M A

    2007-06-01

    This study used Data Envelopment Analysis (DEA) to examine the relative efficiency of hospitals owned by the Iranian Social Security Organization, which is the second largest institutional source of hospital care in that country. Using data for the year 2002, 26 of the 53 hospitals were deemed to be efficient. Inefficient hospitals had an average score of 90%, implying a potential reduction in all inputs on average by about 10% with no impact on output levels. In addition to the conventional DEA measurement, efficient hospitals were ranked by calculating super-efficiency scores, by identifying weak efficient hospitals, and by determining the frequency of peers. The study provides useful information for improving hospital management, rationalizing resource allocation, and improving services provided by hospitals.

  2. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  3. Measuring Job Security.

    ERIC Educational Resources Information Center

    Nardone, Thomas; And Others

    1997-01-01

    Discusses issues in measuring job security and presents a comparison of data from the National Longitudinal Survey of Youth and the Current Population Survey on job tenure and contingent employment. (SK)

  4. Measuring Job Security.

    ERIC Educational Resources Information Center

    Nardone, Thomas; And Others

    1997-01-01

    Discusses issues in measuring job security and presents a comparison of data from the National Longitudinal Survey of Youth and the Current Population Survey on job tenure and contingent employment. (SK)

  5. Sustainable Food Security Measurement: A Systemic Methodology

    NASA Astrophysics Data System (ADS)

    Findiastuti, W.; Singgih, M. L.; Anityasari, M.

    2017-04-01

    Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.

  6. Efficient deterministic secure quantum communication protocols using multipartite entangled states

    NASA Astrophysics Data System (ADS)

    Joy, Dintomon; Surendran, Supin P.; Sabir, M.

    2017-06-01

    We propose two deterministic secure quantum communication protocols employing three-qubit GHZ-like states and five-qubit Brown states as quantum channels for secure transmission of information in units of two bits and three bits using multipartite teleportation schemes developed here. In these schemes, the sender's capability in selecting quantum channels and the measuring bases leads to improved qubit efficiency of the protocols.

  7. Towards Efficient Collaboration in Cyber Security

    SciTech Connect

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  8. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  9. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  10. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  11. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.265 Security measures for restricted areas. (a)...

  12. 33 CFR 106.260 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.260 Security measures for access control. (a)...

  13. Photoreceiver efficiency measurements

    NASA Technical Reports Server (NTRS)

    Lehr, C. G.

    1975-01-01

    The efficiency and other related parameters of Smithsonian Astrophysical Observatory's four laser receivers were measured at the observing stations by oscilloscope photography. If the efficiency is defined as the number of photoelectrons generated by the photomultiplier tube divided by the number of photons entering the aperture of the receiver, its measured value is about 1% for the laser wavelength of 694 nm. This value is consistent with the efficiency computed from the specified characteristics of the photoreceiver's optical components.

  14. 49 CFR 1554.101 - Security Measures.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... history. The repair station obtains the employee's employment history for the most recent five year period... station verifies the employee's employment history for the most recent 5-year period via telephone, email...

  15. Centrifugal Contactor Efficiency Measurements

    SciTech Connect

    Mincher, Bruce Jay; Tillotson, Richard Dean; Grimes, Travis Shane

    2017-01-01

    The contactor efficiency of a 2-cm acrylic centrifugal contactor, fabricated by ANL using 3D printer technology was measured by comparing a contactor test run to 5-min batch contacts. The aqueous phase was ~ 3 ppm depleted uranium in 3 M HNO3, and the organic phase was 1 M DAAP/dodecane. Sampling during the contactor run showed that equilibrium was achieved within < 3 minutes. The contactor efficiency at equilibrium was 95% to 100 %, depending on flowrate.

  16. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  17. Economic Aspects of Airport Security Measures

    DTIC Science & Technology

    1999-06-01

    Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines...can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft...associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the

  18. A New Method for Creating Efficient Security Policies in Virtual Private Network

    NASA Astrophysics Data System (ADS)

    Sadeghi, Mohammad Mehdi Gilanian; Mohd Ali, Borhanuddin; Pedram, Hossein; Deghan, Mehdi; Sabaei, Masoud

    One of the most important protocols for implementing tunnels in order to take action of secure virtual private network is IPsec protocol. IPsec policies are used widely in order to limit access to information in security gateways or firewalls. The security treatment, namely (Deny, Allow or Encrypt) is done for outbound as well as inbound traffic by security policies. It is so important that they adjust properly. The current methods for security policies creation as seen in given security requirements are not efficient enough i.e. there are much more created policies than requirements. In this paper, we define a new method to decrease adopted security policies for a specific set of security requirements without any undesirable effect. Our measurement shows that security policies creation will be improved efficiently, and their updating time will be decreased.

  19. Social Security income measurement in two surveys.

    PubMed

    Iams, Howard M; Purcell, Patrick J

    2013-01-01

    As a major source of income for retired persons in the United States, Social Security benefits directly influence economic well-being. That fact underscores the importance of measuring Social Security income accurately in household surveys. Using Social Security Administration (SSA) records, we examine Social Security income as reported in two Census Bureau surveys, the Survey of Income and Program Participation (SIPP) and the Current Population Survey (CPS). Although SSA usually deducts Medicare premiums from benefit payments, both the CPS and the SIPP aim to collect and record gross Social Security benefit amounts (before Medicare premium deductions). We find that the Social Security benefit recorded in the CPS closely approximates the gross benefit recorded for CPS respondents in SSA's records, but the Social Security benefit recorded in the SIPP more closely approximates SSA's record of net benefit payments (after deducting Medicare premiums).

  20. Secure and Efficient Network Fault Localization

    DTIC Science & Technology

    2012-02-27

    at the data plane and in turn produce a provable lower bound on the forwarding correctness. We also attempt to see if the philosophy of limiting the...accepts a packet (probe or ack) iff it contains a data packet identifier already stored at fi. Stage 2: probe S sends out a probe c = H [m] towards the...reliable measure of packet content so that routers only need to store space-efficient counters. To this end, the integrity of the source’s data packets

  1. Secure and Efficient Routable Control Systems

    SciTech Connect

    Edgar, Thomas W.; Hadley, Mark D.; Manz, David O.; Winn, Jennifer D.

    2010-05-01

    This document provides the methods to secure routable control system communication in the electric sector. The approach of this document yields a long-term vision for a future of secure communication, while also providing near term steps and a roadmap. The requirements for the future secure control system environment were spelled out to provide a final target. Additionally a survey and evaluation of current protocols was used to determine if any existing technology could achieve this goal. In the end a four-step path was described that brought about increasing requirement completion and culminates in the realization of the long term vision.

  2. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.270 Security... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for restricted... on board; (3) Protect the vessel; (4) Protect sensitive security areas within the vessel; (5)...

  3. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  4. Validity and reliability of food security measures.

    PubMed

    Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W

    2014-12-01

    This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. © 2014 New York Academy of Sciences.

  5. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... cooperation with the facility. (h) MARSEC Level 3. In addition to the security measures required for MARSEC... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265...

  6. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... cooperation with the facility. (h) MARSEC Level 3. In addition to the security measures required for MARSEC... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for access... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.265...

  7. [The concept and measurement of food security].

    PubMed

    Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon

    2008-11-01

    During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

  8. Efficient quantum key distribution secure against no-signalling eavesdroppers

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Massar, Serge; Pironio, Stefano

    2006-08-01

    By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical 'post-quantum' eavesdroppers limited by the no-signalling principle only. We introduce a family of quantum key distribution protocols of this type, which are more efficient than previous ones, both in terms of key rate and noise resistance. Interestingly, the best protocols involve large number of measurements. We show that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rates in usual quantum key distribution.

  9. Computationally Efficient Neural Network Intrusion Security Awareness

    SciTech Connect

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  10. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of lighting...

  11. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of lighting...

  12. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of lighting...

  13. 33 CFR 105.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring... MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.275 Security measures... measures in this section and have the capability to continuously monitor, through a combination of lighting...

  14. Performance measures, efficiency, productivity.

    PubMed

    Mukundan, Govind; Seidenwurm, David

    2012-08-01

    The paradox of the increased use of imaging without obvious evidence of improved health outcomes has led to calls for payment based on value rather than volume. Measurement of radiologists' performance is a key component of the measurement of value. The paradigm shift occurring in radiology and health care as a whole may seem daunting to the radiologist with the clamor for increasing accountability from payers and patients alike. However, it is through powerful tools such as performance measures in radiology and their accompanying incentive-based payment systems that practices can be improved and confidence of patients restored. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  16. A Secure and Efficient Handover Authentication Protocol for Wireless Networks

    PubMed Central

    Wang, Weijia; Hu, Lei

    2014-01-01

    Handover authentication protocol is a promising access control technology in the fields of WLANs and mobile wireless sensor networks. In this paper, we firstly review an efficient handover authentication protocol, named PairHand, and its existing security attacks and improvements. Then, we present an improved key recovery attack by using the linearly combining method and reanalyze its feasibility on the improved PairHand protocol. Finally, we present a new handover authentication protocol, which not only achieves the same desirable efficiency features of PairHand, but enjoys the provable security in the random oracle model. PMID:24971471

  17. Energy efficient lighting and security; Are they compatible

    SciTech Connect

    Tucker, R.A. )

    1992-01-01

    This paper reports that properly applied, light sources and lighting systems not only enhance a building's attractiveness and usability, they also create a secure environment. An effectively lighted area can minimize pedestrian hazards and auto accidents. Good security lighting also eliminates the darkness that vandals, thieves, and felons thrive on. Unfortunately, lighting quality has sometimes been sacrificed for the sake of energy efficiency, and resulting savings offset by poor aesthetics and user dissatisfaction. However, trade-offs in quality and efficiency are not necessary, thanks to recent developments in light source technology.

  18. A secure and efficient entropy coding based on arithmetic coding

    NASA Astrophysics Data System (ADS)

    Li, Hengjian; Zhang, Jiashu

    2009-12-01

    A novel security arithmetic coding scheme based on nonlinear dynamic filter (NDF) with changeable coefficients is proposed in this paper. The NDF is employed to generate the pseudorandom number generator (NDF-PRNG) and its coefficients are derived from the plaintext for higher security. During the encryption process, the mapping interval in each iteration of arithmetic coding (AC) is decided by both the plaintext and the initial values of NDF, and the data compression is also achieved with entropy optimality simultaneously. And this modification of arithmetic coding methodology which also provides security is easy to be expanded into the most international image and video standards as the last entropy coding stage without changing the existing framework. Theoretic analysis and numerical simulations both on static and adaptive model show that the proposed encryption algorithm satisfies highly security without loss of compression efficiency respect to a standard AC or computation burden.

  19. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an...

  20. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an...

  1. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an...

  2. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an...

  3. 33 CFR 101.130 - Equivalent security measures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Equivalent security measures. 101... MARITIME SECURITY MARITIME SECURITY: GENERAL General § 101.130 Equivalent security measures. (a) For any measure required by part 104, 105, or 106 of this subchapter, the owner or operator may substitute an...

  4. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  5. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  6. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  7. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  8. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  9. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.270 Security measures for delivery...

  10. National Residential Efficiency Measures Database

    DOE Data Explorer

    The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

  11. A flexible framework for secure and efficient program obfuscation.

    SciTech Connect

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  12. Measuring perception as a component of a security assessment.

    PubMed

    Waudby, Michael H

    2004-01-01

    Although there are many excellent ways available to conduct a security assessment of a hospital, measurement of the perception of security--a key ingredient in any security plan--is often lacking. In this article, the author describes and illustrates a survey instrument for measuring perception of security.

  13. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for handling... measures for handling cargo. (a) General. The facility owner or operator must ensure that security measures... operations with the same shipper, coordinate security measures with the shipper or other responsible party in...

  14. Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    PubMed Central

    Chin, Ji-Jian; Tan, Syh-Yuan; Heng, Swee-Huay; Phan, Raphael C.-W.

    2014-01-01

    Security-mediated cryptography was first introduced by Boneh et al. in 2001. The main motivation behind security-mediated cryptography was the capability to allow instant revocation of a user's secret key by necessitating the cooperation of a security mediator in any given transaction. Subsequently in 2003, Boneh et al. showed how to convert a RSA-based security-mediated encryption scheme from a traditional public key setting to an identity-based one, where certificates would no longer be required. Following these two pioneering papers, other cryptographic primitives that utilize a security-mediated approach began to surface. However, the security-mediated identity-based identification scheme (SM-IBI) was not introduced until Chin et al. in 2013 with a scheme built on bilinear pairings. In this paper, we improve on the efficiency results for SM-IBI schemes by proposing two schemes that are pairing-free and are based on well-studied complexity assumptions: the RSA and discrete logarithm assumptions. PMID:25207333

  15. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  16. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  17. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  18. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  19. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  20. 33 CFR 106.275 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for monitoring. 106.275 Section 106.275 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf...

  1. Secure and Efficient Reactive Video Surveillance for Patient Monitoring

    PubMed Central

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-01

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient’s side. PMID:26729130

  2. Secure and Efficient Reactive Video Surveillance for Patient Monitoring.

    PubMed

    Braeken, An; Porambage, Pawani; Gurtov, Andrei; Ylianttila, Mika

    2016-01-02

    Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber of patient monitoring applications. In this paper, we propose a symmetric key-based security framework for the reactive video surveillance of patients based on the inputs coming from data measured by a wireless body area network attached to the human body. Only authenticated patients are able to activate the video cameras, whereas the patient and authorized people can consult the video data. User and location privacy are at each moment guaranteed for the patient. A tradeoff between security and quality of service is defined in order to ensure that the surveillance system gets activated even in emergency situations. In addition, the solution includes resistance against tampering with the device on the patient's side.

  3. Are large farms more efficient? Tenure security, farm size and farm efficiency: evidence from northeast China

    NASA Astrophysics Data System (ADS)

    Zhou, Yuepeng; Ma, Xianlei; Shi, Xiaoping

    2017-04-01

    How to increase production efficiency, guarantee grain security, and increase farmers' income using the limited farmland is a great challenge that China is facing. Although theory predicts that secure property rights and moderate scale management of farmland can increase land productivity, reduce farm-related costs, and raise farmer's income, empirical studies on the size and magnitude of these effects are scarce. A number of studies have examined the impacts of land tenure or farm size on productivity or efficiency, respectively. There are also a few studies linking farm size, land tenure and efficiency together. However, to our best knowledge, there are no studies considering tenure security and farm efficiency together for different farm scales in China. In addition, there is little study analyzing the profit frontier. In this study, we particularly focus on the impacts of land tenure security and farm size on farm profit efficiency, using farm level data collected from 23 villages, 811 households in Liaoning in 2015. 7 different farm scales have been identified to further represent small farms, median farms, moderate-scale farms, and large farms. Technical efficiency is analyzed with stochastic frontier production function. The profit efficiency is regressed on a set of explanatory variables which includes farm size dummies, land tenure security indexes, and household characteristics. We found that: 1) The technical efficiency scores for production efficiency (average score = 0.998) indicate that it is already very close to the production frontier, and thus there is little room to improve production efficiency. However, there is larger space to raise profit efficiency (average score = 0.768) by investing more on farm size expansion, seed, hired labor, pesticide, and irrigation. 2) Farms between 50-80 mu are most efficient from the viewpoint of profit efficiency. The so-called moderate-scale farms (100-150 mu) according to the governmental guideline show no

  4. An efficient and provably secure proxy signature scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Jianhong; Liu, Xue; Gao, Shengnan

    2010-08-01

    Proxy signature is a special signature, it allows an original signer to delegate her signing capability to a proxy signer and the proxy signer can produce a signature on behalf of the original signer. At present, most of proxy signature in essence consists of two signatures. To overcome the problem, we propose a short efficient proxy signature scheme based on a certificateless signature scheme. And we show that the proposed scheme is secure in the random oracle model. The security of the scheme is related to Inverse Computational Diffie-Hellman Problem and the k-CCA problem. Comparison with Huang et.al scheme, our scheme has an advantage over Huang et.al's scheme in terms of the size of proxy signature. Since the length of proxy signature in our scheme is 160bit, it is very suitable for mobile devices.

  5. Enhancing QKD security with weak measurements

    NASA Astrophysics Data System (ADS)

    Farinholt, Jacob M.; Troupe, James E.

    2016-10-01

    Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.

  6. Muon Fluence Measurements for Homeland Security Applications

    SciTech Connect

    Ankney, Austin S.; Berguson, Timothy J.; Borgardt, James D.; Kouzes, Richard T.

    2010-08-10

    This report focuses on work conducted at Pacific Northwest National Laboratory to better characterize aspects of backgrounds in RPMs deployed for homeland security purposes. Two polyvinyl toluene scintillators were utilized with supporting NIM electronics to measure the muon coincidence rate. Muon spallation is one mechanism by which background neutrons are produced. The measurements performed concentrated on a broad investigation of the dependence of the muon flux on a) variations in solid angle subtended by the detector; b) the detector inclination with the horizontal; c) depth underground; and d) diurnal effects. These tests were conducted inside at Building 318/133, outdoors at Building 331G, and underground at Building 3425 at Pacific Northwest National Laboratory.

  7. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... each Maritime Security (MARSEC) Level, including those points where TWIC access control provisions will... control, particularly if these security measures are applied on a random or occasional basis. (f) MARSEC... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access...

  8. 33 CFR 104.265 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... each Maritime Security (MARSEC) Level, including those points where TWIC access control provisions will... control, particularly if these security measures are applied on a random or occasional basis. (f) MARSEC... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access...

  9. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  10. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.

    PubMed

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A; Al-Muhtadi, Jalal; Rodrigues, Joel J P C; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-03-31

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks.

  11. Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks

    PubMed Central

    Saleem, Kashif; Derhab, Abdelouahid; Orgun, Mehmet A.; Al-Muhtadi, Jalal; Rodrigues, Joel J. P. C.; Khalil, Mohammed Sayim; Ali Ahmed, Adel

    2016-01-01

    The deployment of intelligent remote surveillance systems depends on wireless sensor networks (WSNs) composed of various miniature resource-constrained wireless sensor nodes. The development of routing protocols for WSNs is a major challenge because of their severe resource constraints, ad hoc topology and dynamic nature. Among those proposed routing protocols, the biology-inspired self-organized secure autonomous routing protocol (BIOSARP) involves an artificial immune system (AIS) that requires a certain amount of time to build up knowledge of neighboring nodes. The AIS algorithm uses this knowledge to distinguish between self and non-self neighboring nodes. The knowledge-building phase is a critical period in the WSN lifespan and requires active security measures. This paper proposes an enhanced BIOSARP (E-BIOSARP) that incorporates a random key encryption mechanism in a cost-effective manner to provide active security measures in WSNs. A detailed description of E-BIOSARP is presented, followed by an extensive security and performance analysis to demonstrate its efficiency. A scenario with E-BIOSARP is implemented in network simulator 2 (ns-2) and is populated with malicious nodes for analysis. Furthermore, E-BIOSARP is compared with state-of-the-art secure routing protocols in terms of processing time, delivery ratio, energy consumption, and packet overhead. The findings show that the proposed mechanism can efficiently protect WSNs from selective forwarding, brute-force or exhaustive key search, spoofing, eavesdropping, replaying or altering of routing information, cloning, acknowledgment spoofing, HELLO flood attacks, and Sybil attacks. PMID:27043572

  12. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-09-01

    authorized level.32 The organization consists of a National Headquarters, the Intelligence and Military Security School ( IMSS ), 18 Provincial...results. IMSS continues to expand course curricula: over 2,700 personnel have graduated from the academy, 500 of whom graduated between January and...Rustamiyah IMD Imagery and Mapping Directorate IMF International Monetary Fund IMINT Imagery Intelligence IMSS Intelligence and Military Security

  13. Planned Efficiency Measurements of STIRAP

    NASA Astrophysics Data System (ADS)

    Zakharov, Vladislav; McKenna, Casey; Yuan, Deqian; Gasparik, Jessica; Metcalf, Harold

    2015-05-01

    Our measurements of the absolute efficiency of using STIRAP to populate Rydberg states of He have been limited by the Doppler detuning associated with the divergence of the atomic beam that crosses perpendicular to our laser beams. The limitation is exacerbated when both laser beams co-propagate, compounding these Doppler shifts. We plan to have them counter-propagate and thereby ameliorate this effect. He 23S atoms in a LN2 temperature thermal beam are coupled to the 33P state by λ = 389 nm light (blue), and that state is coupled to Rydberg states by ~ 800 nm (red) light. The anti-parallel laser beams are arranged so that the atoms encounter the red light first (counter-intuitive order for STIRAP) partially overlapping with the blue. We have observed interference among the atomic transitions by varying the light polarization, and are planning further studies concerning these internal atomic interferometry phenomena. Supported by ONR and Dept. of Education GAANN.

  14. Food security: increasing yield and improving resource use efficiency.

    PubMed

    Parry, Martin A J; Hawkesford, Malcolm J

    2010-11-01

    Food production and security will be a major issue for supplying an increasing world population. The problem will almost certainly be exacerbated by climate change. There is a projected need to double food production by 2050. In recent times, the trend has been for incremental modest yield increases for most crops. There is an urgent need to develop integrated and sustainable approaches that will significantly increase both production per unit land area and the resource use efficiency of crops. This review considers some key processes involved in plant growth and development with some examples of ways in which molecular technology, plant breeding and genetics may increase the yield and resource use efficiency of wheat. The successful application of biotechnology to breeding is essential to provide the major increases in production required. However, each crop and each specific agricultural situation presents specific requirements and targets for optimisation. Some increases in production will come about as new varieties are developed which are able to produce satisfactory crops on marginal land presently not considered appropriate for arable crops. Other new varieties will be developed to increase both yield and resource use efficiency on the best land.

  15. Efficient and secure outsourcing of genomic data storage.

    PubMed

    Sousa, João Sá; Lefebvre, Cédric; Huang, Zhicong; Raisaro, Jean Louis; Aguilar-Melchor, Carlos; Killijian, Marc-Olivier; Hubaux, Jean-Pierre

    2017-07-26

    Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes with important concerns related to privacy and security. This calls for new sophisticated techniques that ensure data protection from untrusted cloud providers and that still enable researchers to obtain useful information. We present a novel privacy-preserving algorithm for fully outsourcing the storage of large genomic data files to a public cloud and enabling researchers to efficiently search for variants of interest. In order to protect data and query confidentiality from possible leakage, our solution exploits optimal encoding for genomic variants and combines it with homomorphic encryption and private information retrieval. Our proposed algorithm is implemented in C++ and was evaluated on real data as part of the 2016 iDash Genome Privacy-Protection Challenge. Results show that our solution outperforms the state-of-the-art solutions and enables researchers to search over millions of encrypted variants in a few seconds. As opposed to prior beliefs that sophisticated privacy-enhancing technologies (PETs) are unpractical for real operational settings, our solution demonstrates that, in the case of genomic data, PETs are very efficient enablers.

  16. Challenges in measuring feed efficiency

    USDA-ARS?s Scientific Manuscript database

    The term feed efficiency is vague, and is defined differently by people. Historically, feed efficiency has been defined as the feed:gain (F:G) ratio or the inverse (G:F). Indexes have been developed to rank animals for feed efficiency. These indexes include residual feed intake (RFI) and residual...

  17. Defining and Computing a Value Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In past work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities\\; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper we discuss the specification and design of a system that collects, updates and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  18. Defining and Computing a Valued Based Cyber-Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2012-01-01

    In earlier work, we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  19. Martime Security: Ferry Security Measures Have Been Implemented, but Evaluating Existing Studies Could Further Enhance Security

    DTIC Science & Technology

    2010-12-01

    where they provided security for ferries and their facilities. We made these visits to a nonprobability sample of five domestic locations. Ferry...these plans. • Transportation Security Administration (TSA) • Test technologies, practices, and techniques for passenger screening systems in...persons; inspection, control, and monitoring techniques ; recognition of characteristics and behavioral patterns of persons who are likely to threaten

  20. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  1. Measuring and Modeling Security and Privacy Laws

    ERIC Educational Resources Information Center

    Romanosky, Sasha

    2012-01-01

    This manuscript presents empirical and analytical analysis and discussion of security and privacy laws. The introduction, together with the three substantive chapters each represent separate research papers written as partial fulfillment of my PhD dissertation in the Heinz College, Carnegie Mellon University. Chapter 2 is an abbreviated version of…

  2. Measuring treatment motivation in secure juvenile facilities.

    PubMed

    Van der Helm, G H P; Wissink, I B; De Jongh, T; Stams, G J J M

    2013-08-01

    The present study examined the validity and reliability of the Adolescent Treatment Motivation Questionnaire (ATMQ) in a sample of 264 adolescents in Dutch secure juvenile facilities. Confirmatory factor analysis of a single-factor model of "treatment motivation" showed a close fit to the data, indicating construct validity of the ATMQ. Concurrent validity was supported by significant relations between treatment motivation and living group climate. Internal consistency reliability in terms of Cronbach's alpha was good (.84). The ATMQ proved to be insensitive to the tendency to provide socially acceptable or desirable answers, which supports discriminant validity, and was unrelated to sex, age, and self-reported aggression of the adolescents. The ATMQ is a parsimonious instrument (11 items) enabling future research on treatment motivation in secure juvenile facilities.

  3. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... restricted area and maintain security control during transfers between the facility and a vessel. (g) MARSEC... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for access control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  4. 33 CFR 105.255 - Security measures for access control.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... restricted area and maintain security control during transfers between the facility and a vessel. (g) MARSEC... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for access control. 105.255 Section 105.255 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  5. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-03-01

    TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Department of Defense,Report to Congress,529 14th Street NW...Washington,DC,20004 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S...29 2. Iraqi Security Forces Training and Performance

  6. Measuring Human Performance within Computer Security Incident Response Teams

    SciTech Connect

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel; Forsythe, James C.

    2015-09-01

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. These events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.

  7. Spectral measurements of photosynthetic efficiency

    USDA-ARS?s Scientific Manuscript database

    The photosynthetic efficiency of plants was examined for plants in two very different canopies, a USDA cornfield having an instrumented flux tower in Beltsville, MD, USA and a coniferous forest in British Columbia, Canada, included in the tower network of the Canadian Carbon Program. Basic field st...

  8. Nanothermometry Measure of Muscle Efficiency.

    PubMed

    Laha, Suvra S; Naik, Akshata R; Kuhn, Eric R; Alvarez, Maysen; Sujkowski, Alyson; Wessells, Robert J; Jena, Bhanu P

    2017-02-08

    Despite recent advances in thermometry, determination of temperature at the nanometer scale in single molecules to live cells remains a challenge that holds great promise in disease detection among others. In the present study, we use a new approach to nanometer scale thermometry with a spatial and thermal resolution of 80 nm and 1 mK respectively, by directly associating 2 nm cadmium telluride quantum dots (CdTe QDs) to the subject under study. The 2 nm CdTe QDs physically adhered to bovine cardiac and rabbit skeletal muscle myosin, enabling the determination of heat released when ATP is hydrolyzed by both myosin motors. Greater heat loss reflects less work performed by the motor, hence decreased efficiency. Surprisingly, we found rabbit skeletal myosin to be more efficient than bovine cardiac. We have further extended this approach to demonstrate the gain in efficiency of Drosophila melanogaster skeletal muscle overexpressing the PGC-1α homologue spargel, a known mediator of improved exercise performance in humans. Our results establish a novel approach to determine muscle efficiency with promise for early diagnosis and treatment of various metabolic disorders including cancer.

  9. Necessary detection efficiencies for secure quantum key distribution and bound randomness

    NASA Astrophysics Data System (ADS)

    Acín, Antonio; Cavalcanti, Daniel; Passaro, Elsa; Pironio, Stefano; Skrzypczyk, Paul

    2016-01-01

    In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum key distribution, which show that the implementation of most partly device-independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely nonlocal correlations in which a nonsignalling eavesdropper can find out a posteriori the result of any implemented measurement.

  10. Energy efficient link layer security solution for wireless LANs

    NASA Astrophysics Data System (ADS)

    Ozdemir, Suat

    2006-04-01

    For the last couple of years people have become too reliant on Wireless LAN (WLAN) for information exchange. As wireless technology has no inherent physical protection, WLANs introduce new serious security threats to the personal information of individuals and organizations. Unfortunately, much of the growth has not been accompanied with an appropriate level of security for most corporate networks. The broadcast nature of wireless networks promote casual eavesdropping of data traffic with possible security threats including unauthorized use of networks, and denial of service attacks etc. Therefore, as in any environment where data is transmitted over untreated media, in order to protect the data, certain safeguards must be in place and effectively managed. To this end, this paper introduces a wireless link layer security protocol for WLANs that provides the users of IEEE 802.11 WLAN a security level close to the security level of wired networks. The proposed security protocol consists of three components: WLAN clients (STAs), WLAN Access Points (APs), and Authentication and Accounting Server (AAS). Before an STA can access the network, the user who uses the STA must be authenticated to the AP. AP must be authenticated to the STA as well, so that there is no rogue AP in the network. Finally, the communication between STAs and APs, as well as between APs and AAS are protected and defended from any kind of interception, modification and fabrication. We performed extensive simulations to evaluate the security and energy consumption performance of the proposed security protocol. The cryptographic primitives are selected based on their security and power consumption to make proposed protocol scalable and a manageable solution for low power wireless clients, such as PDAs.

  11. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  12. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    Senate - 07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Transportation Security Administration Efficiency and Flexibility Act of 2011

    THOMAS, 112th Congress

    Sen. Wicker, Roger F. [R-MS

    2011-07-13

    07/13/2011 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a...

  15. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees. (a...

  16. 33 CFR 106.262 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES Outer Continental Shelf (OCS) Facility Security Requirements § 106.262 Security measures for newly-hired employees....

  17. Efficient Algorithms for Computing Stackelberg Strategies in Security Games

    DTIC Science & Technology

    2012-05-30

    Korzhyk, Ondrej Vanek , Vincent Conitzer, Michal Pechoucek, Milind Tambe. A double oracle algorithm for zero-sum security games on graphs, Proceedings...average over many randomly drawn games, the benefits from commitment tend to be much less extreme. In another AAMAS󈧏 paper (Jain, Korzhyk, Vanek ...Korzhyk, Ondrej Vanek , Vincent Conitzer, Michal Pe- choucek, and Milind Tambe. A double oracle algorithm for zero-sum security games on graphs. In

  18. Measuring Transmission Efficiencies Of Mass Spectrometers

    NASA Technical Reports Server (NTRS)

    Srivastava, Santosh K.

    1989-01-01

    Coincidence counts yield absolute efficiencies. System measures mass-dependent transmission efficiencies of mass spectrometers, using coincidence-counting techniques reminiscent of those used for many years in calibration of detectors for subatomic particles. Coincidences between detected ions and electrons producing them counted during operation of mass spectrometer. Under certain assumptions regarding inelastic scattering of electrons, electron/ion-coincidence count is direct measure of transmission efficiency of spectrometer. When fully developed, system compact, portable, and used routinely to calibrate mass spectrometers.

  19. A Secure LFSR Based Random Measurement Matrix for Compressive Sensing

    NASA Astrophysics Data System (ADS)

    George, Sudhish N.; Pattathil, Deepthi P.

    2014-11-01

    In this paper, a novel approach for generating the secure measurement matrix for compressive sensing (CS) based on linear feedback shift register (LFSR) is presented. The basic idea is to select the different states of LFSR as the random entries of the measurement matrix and normalize these values to get independent and identically distributed (i.i.d.) random variables with zero mean and variance , where N is the number of input samples. The initial seed for the LFSR system act as the key to the user to provide security. Since the measurement matrix is generated from the LFSR system, and memory overload to store the measurement matrix is avoided in the proposed system. Moreover, the proposed system can provide security maintaining the robustness to noise of the CS system. The proposed system is validated through different block-based CS techniques of images. To enhance security, the different blocks of images are measured with different measurement matrices so that the proposed encryption system can withstand known plaintext attack. A modulo division circuit is used to reseed the LFSR system to generate multiple random measurement matrices, whereby after each fundamental period of LFSR, the feedback polynomial of the modulo circuit is modified in terms of a chaotic value. The proposed secure robust CS paradigm for images is subjected to several forms of attacks and is proven to be resistant against the same. From experimental analysis, it is proven that the proposed system provides better performance than its counterparts.

  20. Unconditionally secure bit commitment by transmitting measurement outcomes.

    PubMed

    Kent, Adrian

    2012-09-28

    We propose a new unconditionally secure bit commitment scheme based on Minkowski causality and the properties of quantum information. The receiving party sends a number of randomly chosen Bennett-Brassard 1984 (BB84) qubits to the committer at a given point in space-time. The committer carries out measurements in one of the two BB84 bases, depending on the committed bit value, and transmits the outcomes securely at (or near) light speed in opposite directions to remote agents. These agents unveil the bit by returning the outcomes to adjacent agents of the receiver. The protocol's security relies only on simple properties of quantum information and the impossibility of superluminal signalling.

  1. Defining and Computing a Valued Based Cyber Security Measure

    SciTech Connect

    Aissa, Anis Ben; Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2011-01-01

    In earlier works (Ben-Aissa et al. 2010; Abercrombie et al. 2008; Sheldon et al. 2009), we presented a value based measure of cybersecurity that quantifies the security of a system in concrete terms, specifically, in terms of how much each system stakeholder stands to lose (in dollars per hour of operation) as a result of security threats and system vulnerabilities; our metric varies according to the stakes that each stakeholder has in meeting each security requirement. In this paper, we discuss the specification and design of a system that collects, updates, and maintains all the information that pertains to estimating our cybersecurity measure, and offers stakeholders quantitative means to make security-related decisions.

  2. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based

  3. Radiated microwave power transmission system efficiency measurements

    NASA Technical Reports Server (NTRS)

    Dickinson, R. M.; Brown, W. C.

    1975-01-01

    The measured and calculated results from determining the operating efficiencies of a laboratory version of a system for transporting electric power from one point to another via a wireless free space radiated microwave beam are reported. The system's overall end-to-end efficiency as well as intermediated conversion efficiencies were measured. The maximum achieved end-to-end dc-to-ac system efficiency was 54.18% with a probable error of + or - 0.94%. The dc-to-RF conversion efficiency was measured to be 68.87% + or - 1.0% and the RF-to-dc conversion efficiency was 78.67 + or - 1.1%. Under these conditions a dc power of 495.62 + or - 3.57 W was received with a free space transmitter antenna receiver antenna separation of 170.2 cm (67 in).

  4. Detection of Total Knee Arthroplasties at Airport Security Checkpoints: How Do Updated Security Measures Affect Patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Goljan, Peter; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-07-01

    Airport security measures continue to be updated with the incorporation of the new body scanners and automatic target recognition software. The purpose of this study was analyze the incidence of: (1) triggering the security alarm; (2) extra security searches; (3) perceived inconvenience; and (4) presence of other surgical hardware in those who underwent total knee arthroplasty (TKA) and passed through airport security. A questionnaire was given to 125 consecutive patients with a TKA. Those who passed through airport security after January 2014 were considered for inclusion. A questionnaire was administered that addressed the number of encounters with airport security, metal detector activation, additional screening procedures, and perceived inconvenience. Out of the 125 patients, 53 met inclusion criteria. Out of the 53 patients, 20 (38%) reported that their prosthesis triggered a metal detector. Out of the 20 patients, 8 (40%) who reported triggering of metal detectors also reported the presence of surgical hardware elsewhere in the body. Eighteen of the 53 patients (34%) believed having a TKA was inconvenient for airplane travel. Compared with the historical cohort, alarms were triggered in 70 of 97 patients (p = 0.0001) and 50 of 97 reported inconvenience when traveling (n = 50 of 97 patients; p = 0.04). The incidences of those who underwent TKA triggering alarms and perceiving inconvenience when passing through airport security have decreased from previously published studies. This is most likely due to the recent updates and modifications to screening. As these security measures are modified and implant designs continue to evolve, this is an area of investigation that should continue. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  5. Collection efficiency measurements for solar cell research

    NASA Technical Reports Server (NTRS)

    Hampton, H. L.; Olsen, L. C.

    1976-01-01

    A system was established for measuring absolute, spectral collection efficiency that is well suited to solar cell research and development. Determination of spectral collection efficiency involves measurements of the incident photon intensity, the device reflection coefficient, and the cell short circuit current. A monochromatic photon flux is obtained with a high intensity Bausch and Lomb monochromator, and an Epply thermopile detector is used to measure incident intensity. Normal incidence reflectivity measurements are achieved with a prism type beam splitter. The experimental approach is discussed, measurements of the reflectivity of evaporated silver films are considered. Collection efficiency measurements of silicon solar cells are presented, and collection efficiency studies of Cu20 solar cells are discussed.

  6. Collection efficiency measurements for solar cell research

    NASA Technical Reports Server (NTRS)

    Hampton, H. L.; Olsen, L. C.

    1976-01-01

    A system was established for measuring absolute, spectral collection efficiency that is well suited to solar cell research and development. Determination of spectral collection efficiency involves measurements of the incident photon intensity, the device reflection coefficient, and the cell short circuit current. A monochromatic photon flux is obtained with a high intensity Bausch and Lomb monochromator, and an Epply thermopile detector is used to measure incident intensity. Normal incidence reflectivity measurements are achieved with a prism type beam splitter. The experimental approach is discussed, measurements of the reflectivity of evaporated silver films are considered. Collection efficiency measurements of silicon solar cells are presented, and collection efficiency studies of Cu20 solar cells are discussed.

  7. Efficient Cryptography for the Next Generation Secure Cloud

    ERIC Educational Resources Information Center

    Kupcu, Alptekin

    2010-01-01

    Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…

  8. Efficient Cryptography for the Next Generation Secure Cloud

    ERIC Educational Resources Information Center

    Kupcu, Alptekin

    2010-01-01

    Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…

  9. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    much as expected is by increasing the probability of insider threats ( Sagan , 2004). As security resources (e.g., the number of security guards at a...adding additional layers actually decreases overall system perfor- mance relative to a nonredundant system ( Sagan , 2004). While such extreme negative...Monica, Calif.: RAND Corporation, MR-607-A, 1996. As of May 3, 2012: http://www.rand.org/pubs/monograph_reports/MR607.html Dewar, James A., Carl H

  10. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  11. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  12. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  13. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.257 Security... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Security measures for newly-hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  14. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.267 Security... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Security measures for newly hired... the requirements in paragraph (b) of this section are met, and provided that the new hire...

  15. Low-Cost Security Measures for School Facilities

    ERIC Educational Resources Information Center

    National Clearinghouse for Educational Facilities, 2008

    2008-01-01

    This paper discusses a variety of school safety and security measures that may be implemented at little or no cost and without the use of complex technology. Measures are presented according to these categories: (1) General; (2) Outside the Building; and (3) Inside the Building.

  16. Secure quantum weak oblivious transfer against individual measurements

    NASA Astrophysics Data System (ADS)

    He, Guang Ping

    2015-06-01

    In quantum weak oblivious transfer, Alice sends Bob two bits and Bob can learn one of the bits at his choice. It was found that the security of such a protocol is bounded by , where is the probability with which Alice can guess Bob's choice, and is the probability with which Bob can guess both of Alice's bits given that he learns one of the bits with certainty. Here we propose a protocol and show that as long as Alice is restricted to individual measurements, then both and can be made arbitrarily close to , so that maximal violation of the security bound can be reached. Even with some limited collective attacks, the security bound can still be violated. Therefore, although our protocol still cannot break the bound in principle when Alice has unlimited cheating power, it is sufficient for achieving secure quantum weak oblivious transfer in practice.

  17. Development of Security Measures: Implementation Instructions for MIL-STD on Physical Security for DCS Facilities.

    DTIC Science & Technology

    1981-07-01

    Closed circuit television. e. Comunication cables. f. Fuel storage. g. Fuel lines. h. Air conditioning. The primary benefits of security measures...site charged with alarm assessment and response force dispatch. Once a intrusion is verified, the response force shall be dispatched and a verbal

  18. Gamification for Measuring Cyber Security Situational Awareness

    SciTech Connect

    Fink, Glenn A.; Best, Daniel M.; Manz, David O.; Popovsky, V. M.; Endicott-Popovsky, Barbara E.

    2013-03-01

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge could lead to better preparation of cyber defenders in both military and civilian settings. This paper describes how one regional competition, the PRCCDC, a participant in the national CCDC program, conducted proof of concept experimentation to collect data during the annual competition for later analysis. The intent is to create an ongoing research agenda that expands on this current work and incorporates augmented cognition and gamification methods for measuring cybersecurity situational awareness under the stress of cyber attack.

  19. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...

  20. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Pt. 105, App. A Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025)...

  1. Chapter 20: Data Center IT Efficiency Measures

    SciTech Connect

    Huang, Robert; Masanet, Eric

    2015-01-01

    Data centers use about 2% of the electricity in the United States; a typical data center has 100 to 200 times the energy use intensity of a commercial building. Data centers present tremendous opportunities--energy use can be reduced as much as 80% between inefficient and efficient data centers. Data center efficiency measures generally fall into the following categories: power infrastructure (e.g., more efficient uninterruptible power supplies, power distribution units); cooling (e.g., free cooling, variable-speed drives, temperature and humidity set points); airflow management (e.g., hot aisle/cold aisle, containment, grommets); and information technology efficiency (e.g., server virtualization, efficient servers, efficient data storage).

  2. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    PubMed

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  3. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    SciTech Connect

    Greene, David L; Leiby, Paul Newsome

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described in this report has been specifically developed to

  4. Validation of the "Security Needs Assessment Profile" for measuring the profiles of security needs of Chinese forensic psychiatric inpatients.

    PubMed

    Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M

    2017-05-17

    Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. A secure and efficiently searchable health information architecture.

    PubMed

    Yasnoff, William A

    2016-06-01

    Patient-centric repositories of health records are an important component of health information infrastructure. However, patient information in a single repository is potentially vulnerable to loss of the entire dataset from a single unauthorized intrusion. A new health record storage architecture, the personal grid, eliminates this risk by separately storing and encrypting each person's record. The tradeoff for this improved security is that a personal grid repository must be sequentially searched since each record must be individually accessed and decrypted. To allow reasonable search times for large numbers of records, parallel processing with hundreds (or even thousands) of on-demand virtual servers (now available in cloud computing environments) is used. Estimated search times for a 10 million record personal grid using 500 servers vary from 7 to 33min depending on the complexity of the query. Since extremely rapid searching is not a critical requirement of health information infrastructure, the personal grid may provide a practical and useful alternative architecture that eliminates the large-scale security vulnerabilities of traditional databases by sacrificing unnecessary searching speed.

  6. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Assigning additional personnel as security lookouts; (5) Coordinating with boat patrols, when provided; and...) Preparing for underwater inspection of the hull; and (7) Initiating measures, including the slow revolution of the vessel's propellers, if practicable, to deter underwater access to the hull of the vessel. ...

  7. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) Assigning additional personnel as security lookouts; (5) Coordinating with boat patrols, when provided; and...) Preparing for underwater inspection of the hull; and (7) Initiating measures, including the slow revolution of the vessel's propellers, if practicable, to deter underwater access to the hull of the vessel. ...

  8. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Assigning additional personnel as security lookouts; (5) Coordinating with boat patrols, when provided; and...) Preparing for underwater inspection of the hull; and (7) Initiating measures, including the slow revolution of the vessel's propellers, if practicable, to deter underwater access to the hull of the vessel. ...

  9. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Assigning additional personnel as security lookouts; (5) Coordinating with boat patrols, when provided; and...) Preparing for underwater inspection of the hull; and (7) Initiating measures, including the slow revolution of the vessel's propellers, if practicable, to deter underwater access to the hull of the vessel. ...

  10. 33 CFR 104.285 - Security measures for monitoring.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Assigning additional personnel as security lookouts; (5) Coordinating with boat patrols, when provided; and...) Preparing for underwater inspection of the hull; and (7) Initiating measures, including the slow revolution of the vessel's propellers, if practicable, to deter underwater access to the hull of the vessel. ...

  11. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... vessel, are specified in order to: (1) Deter tampering; (2) Prevent cargo that is not meant for carriage... additional security measures may include: (1) Increasing the frequency and detail of checking cargo and cargo... car-carriers, RO-RO, and passenger vessels; (4) In liaison with the facility, increasing frequency and...

  12. Punishment in School: The Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2014-01-01

    Although investigation of school security measures and their relationships to various outcomes including school crime rates (Gottfredson, 2001), perpetuation of social inequality (Ferguson, 2001; Nolan, 2011; Welch & Payne, 2010), and the impact on childhood experiences has seen significant growth within the last 20 years (Newman, 2004;…

  13. An Efficient Signature Matching Scheme for Mobile Security

    NASA Astrophysics Data System (ADS)

    Zhang, Ruhui; Iwata, Makoto

    The development of network technology reveals the clear trend that mobile devices will soon be equipped with more and more network-based functions and services. This increase also results in more intrusions and attacks on mobile devices; therefore, mobile security mechanisms are becoming indispensable. In this paper, we propose a novel signature matching scheme for mobile security. This scheme not only emphasizes a small resource requirement and an optimal scan speed, which are both important for resource-limited mobile devices, but also focuses on practical features such as stable performance, fast signature set updates and hardware implementation. This scheme is based on the finite state machine (FSM) approach widely used for string matching. An SRAM-based two-level finite state machine (TFSM) solution is introduced to utilize the unbalanced transition distribution in the original FSM to decrease the memory requirement, and to shorten the critical path of the single-FSM solution. By adjusting the boundary of the two FSMs, optimum memory usage and throughput are obtainable. The hardware circuit of our scheme is designed and evaluated by both FPGA and ASIC technology. The result of FPGA evaluation shows that 2,168 unique patterns with a total of 32,776 characters are stored in 177.75KB SelectRAM blocks of Xilinx XC4VLX40 FPGA and a 3.0Gbps throughput is achieved. The result of ASIC evaluation with 180nm-CMOS library shows a throughput of over 4.5Gbps with 132KB of SRAM. Because of the small amount of memory and logic cell requirements, as well as the scalability of our scheme, higher performance is achieved by instantiating several signature matching engines when more resources are provided.

  14. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  15. Securely measuring the overlap between private datasets with cryptosets.

    PubMed

    Swamidass, S Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data--collected by different groups or across large collaborative networks--into a combined analysis. Unfortunately, some of the most interesting and powerful datasets--like health records, genetic data, and drug discovery data--cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset's contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach "information-theoretic" security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure.

  16. Managing Complex IT Security Processes with Value Based Measures

    SciTech Connect

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2009-01-01

    Current trends indicate that IT security measures will need to greatly expand to counter the ever increasingly sophisticated, well-funded and/or economically motivated threat space. Traditional risk management approaches provide an effective method for guiding courses of action for assessment, and mitigation investments. However, such approaches no matter how popular demand very detailed knowledge about the IT security domain and the enterprise/cyber architectural context. Typically, the critical nature and/or high stakes require careful consideration and adaptation of a balanced approach that provides reliable and consistent methods for rating vulnerabilities. As reported in earlier works, the Cyberspace Security Econometrics System provides a comprehensive measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. This paper advocates a dependability measure that acknowledges the aggregate structure of complex system specifications, and accounts for variations by stakeholder, by specification components, and by verification and validation impact.

  17. Measure Guideline. High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This measure guideline covers installation of high-efficiency gas furnaces, including: when to install a high-efficiency gas furnace as a retrofit measure; how to identify and address risks; and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  18. Measure Guideline: High Efficiency Natural Gas Furnaces

    SciTech Connect

    Brand, L.; Rose, W.

    2012-10-01

    This Measure Guideline covers installation of high-efficiency gas furnaces. Topics covered include when to install a high-efficiency gas furnace as a retrofit measure, how to identify and address risks, and the steps to be used in the selection and installation process. The guideline is written for Building America practitioners and HVAC contractors and installers. It includes a compilation of information provided by manufacturers, researchers, and the Department of Energy as well as recent research results from the Partnership for Advanced Residential Retrofit (PARR) Building America team.

  19. Efficiency in the transmission of information through digital imaging and communications in medicine using security mechanisms: tests with DISCUS.

    PubMed

    Pérez, Juan L; Servia, Francisco; Mato, Virginia; Vázquez, José Manuel; Pereira, Javier; Dorado, Julian; Díaz, Juan; Novoa, Francisco J; Pazos, Alejandro

    2010-06-01

    This article describes our experience in using a Picture Archiving and Communications System, known as Secure Medical Image Information System, based on the Digital Imaging and Communications in Medicine standard that supports the use of secure transmissions, from the point of view of how the use of secure sending methods has an effect on the efficiency in the transmission according to the network employed, to quantify productivity loss due to the encryption, the secure transmission, and the subsequent decryption. To test the Secure Medical Image Information System, a series of medical data transmission were conducted from A Coruña (Spain) to the Virgen de las Nieves Hospital, situated 1,000 km away, in Granada (Spain). Once we studied the networking infrastructure of the hospital and its available image generation devices, we subsequently carried out a series of measurements during the transmissions, which allowed us to analyze the behavior of the system with different network schemes and connection speeds. The results obtained from these investigations demonstrate that the impact of secure data-sending methods on the productivity of the system is higher in networks whose capacities are higher and it is not affected by sending data during different periods in the day. In this regard, the presented approach may serve as a model for other small, and possibly mid-sized, medical centers.

  20. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded on...

  1. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded on...

  2. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded on...

  3. 33 CFR 104.275 - Security measures for handling cargo.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Requirements § 104.275 Security...) Maritime Security (MARSEC) Level 1. At MARSEC Level 1, the vessel owner or operator must ensure the..., container, or other cargo transport units are loaded; (3) Intensifying screening of vehicles to be loaded on...

  4. A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets

    DTIC Science & Technology

    2008-06-19

    novel security framework architecture to provide efficient and scalable secure multicasting in the low earth orbit satellite network environment...Codes MANET Mobile ad hoc network MAODV Multicast extension to Ad hoc On demand Distance Vector routing protocol MBone Multicast Backbone MEF...The GIG Surface Layer Bridging the Aerospace layer and the Surface layer is a new communication system called Joint Tactical Radio System (JTRS

  5. Power Measurement Methods for Energy Efficient Applications

    PubMed Central

    Calandrini, Guilherme; Gardel, Alfredo; Bravo, Ignacio; Revenga, Pedro; Lázaro, José L.; Toledo-Moreo, F. Javier

    2013-01-01

    Energy consumption constraints on computing systems are more important than ever. Maintenance costs for high performance systems are limiting the applicability of processing devices with large dissipation power. New solutions are needed to increase both the computation capability and the power efficiency. Moreover, energy efficient applications should balance performance vs. consumption. Therefore power data of components are important. This work presents the most remarkable alternatives to measure the power consumption of different types of computing systems, describing the advantages and limitations of available power measurement systems. Finally, a methodology is proposed to select the right power consumption measurement system taking into account precision of the measure, scalability and controllability of the acquisition system. PMID:23778191

  6. Statistics of Measurements of Automobile Fuel Efficiency

    NASA Astrophysics Data System (ADS)

    Bartlett, Albert A.

    2003-11-01

    In these days, with the growing need to worry about petroleum and the efficiency of our automobiles, there should be an increased interest, especially among physics students, in the miles per gallon (MPG) of cars. There should also be interest in the accuracy of single and multiple measurements of the MPG of a car. These topics are covered here in this report of a series of measurements that span 16 years.

  7. Measurement of heat and moisture exchanger efficiency.

    PubMed

    Chandler, M

    2013-09-01

    Deciding between a passive heat and moisture exchanger or active humidification depends upon the level of humidification that either will deliver. Published international standards dictate that active humidifiers should deliver a minimum humidity of 33 mg.l(-1); however, no such requirement exists, for heat and moisture exchangers. Anaesthetists instead have to rely on information provided by manufacturers, which may not allow comparison of different devices and their clinical effectiveness. I suggest that measurement of humidification efficiency, being the percentage moisture returned and determined by measuring the temperature of the respired gases, should be mandated, and report a modification of the standard method that will allow this to be easily measured. In this study, different types of heat and moisture exchangers for adults, children and patients with a tracheostomy were tested. Adult and paediatric models lost between 6.5 mg.l(-1) and 8.5 mg.l(-1) moisture (corresponding to an efficiency of around 80%); however, the models designed for patients with a tracheostomy lost between 16 mg.l(-1) and 18 mg.l(-1) (60% efficiency). I propose that all heat and moisture exchangers should be tested in this manner and percentage efficiency reported to allow an informed choice between different types and models.

  8. An efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map

    NASA Astrophysics Data System (ADS)

    Yoon, Eun-Jun; Jeon, Il-Soo

    2011-06-01

    This paper proposes a new efficient and secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map. The proposed key agreement protocol uses the semi-group property of Chebyshev polynomials to agree Diffie-Hellman based session key. The proposed protocol provides strong security compared with the previous related protocols. In addition, the proposed protocol does not require any timestamp information and greatly reduces computational costs between communication parties. As a result, the proposed protocol is more practical and provides computational/communicational efficiency compare with several previously proposed key agreement protocols based on Chebyshev chaotic map.

  9. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security... to do so, routinely check cargo, cargo transport units, and cargo storage areas within the facility..., containers, or other cargo transport units entering the facility match the delivery note or equivalent cargo...

  10. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Requirements § 105.265 Security... to do so, routinely check cargo, cargo transport units, and cargo storage areas within the facility..., containers, or other cargo transport units entering the facility match the delivery note or equivalent cargo...

  11. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    PubMed

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  12. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks

    PubMed Central

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-01-01

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al’s method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration. PMID:28335572

  13. Efficient load measurements using singular value decomposition

    NASA Technical Reports Server (NTRS)

    Yao, Kung; Balakrishnan, A. V.

    1988-01-01

    Various basic research was performed on efficient load measurement estimation techniques for aircraft structure analysis. An overview is presented of the load measurement problem. Two basic equivalent approaches to load measurement evaluations were considered. Under approach 1, the load values are modeled as depending linearly on the measured values. Under approach 2, the measured values depend linearly on the load values. By using the modern Singular Value Decomposition method, it was shown that under all conditions of the number of loads and number of gages, approach 1 is equivalent to approach 2. By using the conventional normal equation (linear regression) approach, approach 1 is only valid when the number of loads is equal to or greater than the number of gages, while approach 2 is the reverse. Furthermore, except for the case of the number of loads equals the number of gages, the load prediction formulas under the two approaches are not equivalent.

  14. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    PubMed Central

    Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature. PMID:24959606

  15. An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme

    PubMed Central

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters’ identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters. PMID:25238418

  16. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    PubMed

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  17. An efficient and provable secure revocable identity-based encryption scheme.

    PubMed

    Wang, Changji; Li, Yuan; Xia, Xiaonan; Zheng, Kangjia

    2014-01-01

    Revocation functionality is necessary and crucial to identity-based cryptosystems. Revocable identity-based encryption (RIBE) has attracted a lot of attention in recent years, many RIBE schemes have been proposed in the literature but shown to be either insecure or inefficient. In this paper, we propose a new scalable RIBE scheme with decryption key exposure resilience by combining Lewko and Waters' identity-based encryption scheme and complete subtree method, and prove our RIBE scheme to be semantically secure using dual system encryption methodology. Compared to existing scalable and semantically secure RIBE schemes, our proposed RIBE scheme is more efficient in term of ciphertext size, public parameters size and decryption cost at price of a little looser security reduction. To the best of our knowledge, this is the first construction of scalable and semantically secure RIBE scheme with constant size public system parameters.

  18. Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics.

    PubMed

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-10-01

    While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  19. Implementation and evaluation of an efficient secure computation system using ‘R’ for healthcare statistics

    PubMed Central

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-01-01

    Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677

  20. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    PubMed

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  1. A Secure and Efficient Audit Mechanism for Dynamic Shared Data in Cloud Storage

    PubMed Central

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data. PMID:24959630

  2. A new measure for assessment of architectural speech security

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2003-10-01

    A new measure has been developed to indicate the audibility and intelligibility of speech transmitted through walls from adjacent rooms. The new measure is a frequency-weighted signal-to-noise ratio. It is shown to be a more accurate predictor of subjective ratings than the Articulation Index, the Speech Intelligibility Index, and simple A-weighted signal-to-noise ratios. Listening tests using English sentences were conducted to measure the fraction of words intelligible to acute-hearing, native-English-speaking listeners under a range of acoustical conditions. Each subject listened to 500 sentences, each of which had been filtered to represent passage through some type of wall construction. The level of the speech, as well as the level and spectrum of background ventilation-type noise was varied. The conditions in the test ranged from those where all subjects were able to correctly identify all the words in a sentence (i.e., very poor security), through to those where all subjects were unable to even recognize the presence of a speaking voice (i.e., excellent security). The tests, analysis, and derivation of the measure will be discussed, as will the directions of ongoing work in the area.

  3. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  4. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations

    ERIC Educational Resources Information Center

    Tanner-Smith, Emily E.; Fisher, Benjamin W.

    2015-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…

  5. Efficient 41Ca measurements for biomedical applications

    NASA Astrophysics Data System (ADS)

    Vockenhuber, C.; Schulze-König, T.; Synal, H.-A.; Aeberli, I.; Zimmermann, M. B.

    2015-10-01

    We present the performance of 41Ca measurements using low-energy Accelerator Mass Spectrometry (AMS) at the 500 kV facility TANDY at ETH Zurich. We optimized the measurement procedure for biomedical applications where reliability and high sample throughput is required. The main challenge for AMS measurements of 41Ca is the interfering stable isobar 41K. We use a simplified sample preparation procedure to produce calcium fluoride (CaF2) and extract calcium tri-fluoride ions (CaF3-) ions to suppress the stable isobar 41K. Although 41K is not completely suppressed we reach 41Ca/40Ca background level in the 10-12 range which is adequate for biomedical studies. With helium as a stripper gas we can use charge state 2+ at high transmission (∼50%). The new measurement procedure with the approximately 10 × improved efficiency and the higher accuracy due to 41K correction allowed us to measure more than 600 samples for a large biomedical study within only a few weeks of measurement time.

  6. An efficient and secure attribute based signcryption scheme with LSSS access structure.

    PubMed

    Hong, Hanshu; Sun, Zhixin

    2016-01-01

    Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible access control with authentication for data sharing between users, but realizing both functions will bring about too much computation burden. In this paper, we combine the advantages of CP-ABE with ABS and propose a ciphertext policy attribute based signcryption scheme. In our scheme, only legal receivers can decrypt the ciphertext and verify the signature signed by data owner. Furthermore, we use linear secret sharing scheme instead of tree structure to avoid the frequent calls of recursive algorithm. By security and performance analysis, we prove that our scheme is secure as well as gains higher efficiency.

  7. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.

    PubMed

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-02-20

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)-a privacy and integrity preserving range query protocol-is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols.

  8. An efficient controlled quantum secure direct communication and authentication by using four particle cluster states

    NASA Astrophysics Data System (ADS)

    Nanvakenari, Milad; Houshmand, Monireh

    In this paper, a three-party controlled quantum secure direct communication and authentication (QSDCA) protocol is proposed by using four particle cluster states via a quantum one-time pad and local unitary operations. In the present scheme, only under the permission of the controller, the sender and the receiver can implement secure direct communication successfully. But under any circumstances, Charlie cannot obtain the secret message. Eavesdropping detection and identity authentication are achieved with the help of the previously shared reusable base identity strings of users. This protocol is unconditionally secure in both ideal and practical noisy cases. In one transmission, a qubit of each four particle cluster state is used as controller’s permission and the same qubit with another qubit are used to recover two classical bits of information. In the proposed scheme, the efficiency is improved compared with the previous works.

  9. CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks

    PubMed Central

    Dai, Hua; Ye, Qingqun; Yang, Geng; Xu, Jia; He, Ruiliang

    2016-01-01

    In recent years, we have seen many applications of secure query in two-tiered wireless sensor networks. Storage nodes are responsible for storing data from nearby sensor nodes and answering queries from Sink. It is critical to protect data security from a compromised storage node. In this paper, the Communication-efficient Secure Range Query (CSRQ)—a privacy and integrity preserving range query protocol—is proposed to prevent attackers from gaining information of both data collected by sensor nodes and queries issued by Sink. To preserve privacy and integrity, in addition to employing the encoding mechanisms, a novel data structure called encrypted constraint chain is proposed, which embeds the information of integrity verification. Sink can use this encrypted constraint chain to verify the query result. The performance evaluation shows that CSRQ has lower communication cost than the current range query protocols. PMID:26907293

  10. An efficient and secure medical image protection scheme based on chaotic maps.

    PubMed

    Fu, Chong; Meng, Wei-hong; Zhan, Yong-feng; Zhu, Zhi-liang; Lau, Francis C M; Tse, Chi K; Ma, Hong-feng

    2013-09-01

    Recently, the increasing demand for telemedicine services has raised interest in the use of medical image protection technology. Conventional block ciphers are poorly suited to image protection due to the size of image data and increasing demand for real-time teleradiology and other online telehealth applications. To meet this challenge, this paper presents a novel chaos-based medical image encryption scheme. To address the efficiency problem encountered by many existing permutation-substitution type image ciphers, the proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm. As the pixel value mixing effect is contributed by both the improved permutation process and the original substitution process, the same level of security can be achieved in a fewer number of overall rounds. The results indicate that the proposed approach provides an efficient method for real-time secure medical image transmission over public networks. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices (Preprint)

    DTIC Science & Technology

    2012-11-01

    constrained mobile devices. In this work, we develop Efficient Mobile Oblivious Computation ( EMOC ), a set of two SFE protocols customized for the mobile...Mobile Oblivious Computation ( EMOC ), a set of two SFE protocols customized for the mobile platform. Using partially homomorphic cryptosystems, we develop...Computation ( EMOC ) techniques use partially homo- morphic cryptosystems to restate secure computation as a series of simple arithmetic operations

  12. Efficient Anonymous Authentication Protocol Using Key-Insulated Signature Scheme for Secure VANET

    NASA Astrophysics Data System (ADS)

    Park, Youngho; Sur, Chul; Jung, Chae Duk; Rhee, Kyung-Hyune

    In this paper, we propose an efficient authentication protocol with conditional privacy preservation for secure vehicular communications. The proposed protocol follows the system model to issue on-the-fly anonymous public key certificates to vehicles by road-side units. In order to design an efficient message authentication protocol, we consider a key-insulated signature scheme for certifying anonymous public keys of vehicles to such a system model. We demonstrate experimental results to confirm that the proposed protocol has better performance than other protocols based on group signature schemes.

  13. Cost-Efficient and Multi-Functional Secure Aggregation in Large Scale Distributed Application

    PubMed Central

    Zhang, Ping; Li, Wenjun; Sun, Hua

    2016-01-01

    Secure aggregation is an essential component of modern distributed applications and data mining platforms. Aggregated statistical results are typically adopted in constructing a data cube for data analysis at multiple abstraction levels in data warehouse platforms. Generating different types of statistical results efficiently at the same time (or referred to as enabling multi-functional support) is a fundamental requirement in practice. However, most of the existing schemes support a very limited number of statistics. Securely obtaining typical statistical results simultaneously in the distribution system, without recovering the original data, is still an open problem. In this paper, we present SEDAR, which is a SEcure Data Aggregation scheme under the Range segmentation model. Range segmentation model is proposed to reduce the communication cost by capturing the data characteristics, and different range uses different aggregation strategy. For raw data in the dominant range, SEDAR encodes them into well defined vectors to provide value-preservation and order-preservation, and thus provides the basis for multi-functional aggregation. A homomorphic encryption scheme is used to achieve data privacy. We also present two enhanced versions. The first one is a Random based SEDAR (REDAR), and the second is a Compression based SEDAR (CEDAR). Both of them can significantly reduce communication cost with the trade-off lower security and lower accuracy, respectively. Experimental evaluations, based on six different scenes of real data, show that all of them have an excellent performance on cost and accuracy. PMID:27551747

  14. Energy-Efficient and Secure S-Box circuit using Symmetric Pass Gate Adiabatic Logic

    SciTech Connect

    Kumar, Dinesh; Thapliyal, Himanshu; Mohammad, Azhar; Singh, Vijay; Perumalla, Kalyan S

    2016-01-01

    Differential Power Analysis (DPA) attack is considered to be a main threat while designing cryptographic processors. In cryptographic algorithms like DES and AES, S-Box is used to indeterminate the relationship between the keys and the cipher texts. However, S-box is prone to DPA attack due to its high power consumption. In this paper, we are implementing an energy-efficient 8-bit S-Box circuit using our proposed Symmetric Pass Gate Adiabatic Logic (SPGAL). SPGAL is energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. SPGAL is energy-efficient due to reduction of non-adiabatic loss during the evaluate phase of the outputs. Further, the S-Box circuit implemented using SPGAL is resistant to DPA attacks. The results are verified through SPICE simulations in 180nm technology. SPICE simulations show that the SPGAL based S-Box circuit saves upto 92% and 67% of energy as compared to the conventional CMOS and Secured Quasi-Adiabatic Logic (SQAL) based S-Box circuit. From the simulation results, it is evident that the SPGAL based circuits are energy-efficient as compared to the existing DPAresistant adiabatic and non-adiabatic logic families. In nutshell, SPGAL based gates can be used to build secure hardware for lowpower portable electronic devices and Internet-of-Things (IoT) based electronic devices.

  15. Measuring efficiency among US federal hospitals.

    PubMed

    Harrison, Jeffrey P; Meyer, Sean

    2014-01-01

    This study evaluates the efficiency of federal hospitals, specifically those hospitals administered by the US Department of Veterans Affairs and the US Department of Defense. Hospital executives, health care policymakers, taxpayers, and federal hospital beneficiaries benefit from studies that improve hospital efficiency. This study uses data envelopment analysis to evaluate a panel of 165 federal hospitals in 2007 and 157 of the same hospitals again in 2011. Results indicate that overall efficiency in federal hospitals improved from 81% in 2007 to 86% in 2011. The number of federal hospitals operating on the efficiency frontier decreased slightly from 25 in 2007 to 21 in 2011. The higher efficiency score clearly documents that federal hospitals are becoming more efficient in the management of resources. From a policy perspective, this study highlights the economic importance of encouraging increased efficiency throughout the health care industry. This research examines benchmarking strategies to improve the efficiency of hospital services to federal beneficiaries. Through the use of strategies such as integrated information systems, consolidation of services, transaction-cost economics, and focusing on preventative health care, these organizations have been able to provide quality service while maintaining fiscal responsibility. In addition, the research documented the characteristics of those federal hospitals that were found to be on the Efficiency Frontier. These hospitals serve as benchmarks for less efficient federal hospitals as they develop strategies for improvement.

  16. An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; Mukhopadhyay, Subhas Chandra; Li, Chunyue; Wang, Yumei; Li, Guanglin; Wu, Wanqing; Zhang, Yuan-Ting

    2015-01-01

    Body Sensor Network (BSN) is a network of several associated sensor nodes on, inside or around the human body to monitor vital signals, such as, Electroencephalogram (EEG), Photoplethysmography (PPG), Electrocardiogram (ECG), etc. Each sensor node in BSN delivers major information; therefore, it is very significant to provide data confidentiality and security. All existing approaches to secure BSN are based on complex cryptographic key generation procedures, which not only demands high resource utilization and computation time, but also consumes large amount of energy, power and memory during data transmission. However, it is indispensable to put forward energy efficient and computationally less complex authentication technique for BSN. In this paper, a novel biometric-based algorithm is proposed, which utilizes Heart Rate Variability (HRV) for simple key generation process to secure BSN. Our proposed algorithm is compared with three data authentication techniques, namely Physiological Signal based Key Agreement (PSKA), Data Encryption Standard (DES) and Rivest Shamir Adleman (RSA). Simulation is performed in Matlab and results suggest that proposed algorithm is quite efficient in terms of transmission time utilization, average remaining energy and total power consumption. PMID:26131666

  17. Novel efficient and secure medical data transmission on WiMAX.

    PubMed

    Kumar, Basant; Singh, Harsh Vikram; Singh, S P; Mohan, Anand

    2008-12-01

    This paper discusses an improved technique for bandwidth-efficient and secure transmission of medical records over simulated orthogonal frequency division multiplexing (OFDM)-based Worldwide Interoperability for Microwave Access (WiMAX)/IEEE 802.16 physical layer. Medical data compaction along with security has been achieved by embedding electrocardiogram (ECG) data into Haar wavelet coefficients of an x-ray image that is transmitted over the channel. The compaction ratio and peak signal-to-noise ratio (PSNR) between the transmitted and received x-ray images for visual clinical performance have been evaluated. It is shown that 12.5% data compaction along with true reception of ECG signal can be achieved for channel signal-to-noise ratio (SNR) >or= 9.6 dB while the achieved PSNR was 55.97 dB. The PSNR value is well above the minimum acceptable 35 dB level, making it potentially useful for secure and bandwidth-efficient transmission of clinical records.

  18. Efficient Video Similarity Measurement and Search

    SciTech Connect

    Cheung, Sen-ching S.

    2002-12-19

    The amount of information on the world wide web has grown enormously since its creation in 1990. Duplication of content is inevitable because there is no central management on the web. Studies have shown that many similar versions of the same text documents can be found throughout the web. This redundancy problem is more severe for multimedia content such as web video sequences, as they are often stored in multiple locations and different formats to facilitate downloading and streaming. Similar versions of the same video can also be found, unknown to content creators, when web users modify and republish original content using video editing tools. Identifying similar content can benefit many web applications and content owners. For example, it will reduce the number of similar answers to a web search and identify inappropriate use of copyright content. In this dissertation, they present a system architecture and corresponding algorithms to efficiently measure, search, and organize similar video sequences found on any large database such as the web.

  19. A Secure and Efficient Handover Authentication Based on Light-Weight Diffie-Hellman on Mobile Node in FMIPv6

    NASA Astrophysics Data System (ADS)

    Choi, Jaeduck; Jung, Souhwan

    This letter proposes a secure and efficient handover authentication scheme that requires a light-weight Diffie-Hellman operation at mobile nodes. Our scheme provides more enhanced securities like the PFS, PBS, and so on than the existing security-context-transfer schemes. Also, the mobile node delegates the exponent operation for the DH to the access router to reduce computational cost on it.

  20. Detection of total hip arthroplasties at airport security checkpoints - how do updated security measures affect patients?

    PubMed

    Issa, Kimona; Pierce, Todd P; Gwam, Chukwuweieke; Festa, Anthony; Scillia, Anthony J; Mont, Michael A

    2017-09-05

    There have been historical reports on the experiences of patients with total hip arthroplasty (THA) passing through standard metal detectors at airports. The purpose of this study was to analyse those who had recently passed through airport security and the incidence of: (i) triggering of the alarm; (ii) extra security searches; and (iii) perceived inconvenience. A questionnaire was given to 125 patients with a THA during a follow-up appointment. Those who had passed through airport security after January 2014 met inclusion criteria. A survey was administered that addressed the number of encounters with airport security, frequency of metal detector activation, additional screening procedures utilised, whether security officials required prosthesis documentation, and perceived inconvenience. 51 patients met inclusion criteria. 10 patients (20%) reported triggered security scanners. 4 of the 10 patients stated they had surgical hardware elsewhere in the body. 13 of the 51 patients (25%) believed that having their THA increased the inconvenience of traveling. This is different from the historical cohort with standard metal detectors which patients reported a greater incidence of alarm triggering (n = 120 of 143; p = 0.0001) and perceived inconvenience (n = 99 of 143; p = 0.0001). The percentage of patients who have THA triggering security alarms has decreased. Furthermore, the number of patients who feel that their prosthesis caused traveling inconvenience has decreased. We feel that this decrease in alarms triggered and improved perceptions about inconvenience are related to the increased usage of new technology.

  1. An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks

    PubMed Central

    Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua

    2013-01-01

    Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147

  2. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities.

    PubMed

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min; Yoo, Sooyoung

    2012-06-01

    The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another.

  3. Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities

    PubMed Central

    Yeo, Kiho; Lee, Keehyuck; Kim, Jong-Min; Kim, Tae-Hun; Choi, Yong-Hoon; Jeong, Woo-Jin; Hwang, Hee; Baek, Rong Min

    2012-01-01

    Objectives The goal of this paper is to examine the security measures that should be reviewed by medical facilities that are trying to implement mobile Electronic Medical Record (EMR) systems designed for hospitals. Methods The study of the security requirements for a mobile EMR system is divided into legal considerations and sectional security investigations. Legal considerations were examined with regard to remote medical services, patients' personal information and EMR, medical devices, the establishment of mobile systems, and mobile applications. For the 4 sectional security investigations, the mobile security level SL-3 from the Smartphone Security Standards of the National Intelligence Service (NIS) was used. Results From a compliance perspective, legal considerations for various laws and guidelines of mobile EMR were executed according to the model of the legal considerations. To correspond to the SL-3, separation of DMZ and wireless network is needed. Mobile access servers must be located in only the smartphone DMZ. Furthermore, security measures like 24-hour security control, WIPS, VPN, MDM, and ISMS for each section are needed to establish a secure mobile EMR system. Conclusions This paper suggested a direction for applying regulatory measures to strengthen the security of a mobile EMR system in accordance with the standard security requirements presented by the Smartphone Security Guideline of the NIS. A future study on the materialization of these suggestions after their application at actual medical facilities can be used as an illustrative case to determine the degree to which theory and reality correspond with one another. PMID:22844648

  4. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7) Protect stores and industrial supplies from tampering. (b) Designation of restricted areas. The OCS... areas. 106.265 Section 106.265 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  5. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7) Protect stores and industrial supplies from tampering. (b) Designation of restricted areas. The OCS... areas. 106.265 Section 106.265 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  6. 33 CFR 106.265 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security areas within the OCS facility; (6) Protect security and surveillance equipment and systems; and (7) Protect stores and industrial supplies from tampering. (b) Designation of restricted areas. The OCS... areas. 106.265 Section 106.265 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND...

  7. Integrated Measurement and Analysis Framework for Software Security

    DTIC Science & Technology

    2010-09-01

    com/ Open Web Application Security Project ( OWASP ) Software Assurance Maturity Model (SAMM): http://www.owasp.org/index.php...for software security include the following, taken from the OWASP SAMM, version 1.0 [OpenSAMM 2009]: >90 percent applications and data assets

  8. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases

    NASA Astrophysics Data System (ADS)

    Lee, Seungmin; Park, Tae-Jun; Lee, Donghyeok; Nam, Taekyong; Kim, Sehun

    The need for data encryption that protects sensitive data in a database has increased rapidly. However, encrypted data can no longer be efficiently queried because nearly all of the data should be decrypted. Several order-preserving encryption schemes that enable indexes to be built over encrypted data have been suggested to solve this problem. They allow any comparison operation to be directly applied to encrypted data. However, one of the main disadvantages of these schemes is that they expose sensitive data to inference attacks with order information, especially when the data are used together with unencrypted columns in the database. In this study, a new order-preserving encryption scheme that provides secure queries by hiding the order is introduced. Moreover, it provides efficient queries because any user who has the encryption key knows the order. The proposed scheme is designed to be efficient and secure in such an environment. Thus, it is possible to encrypt only sensitive data while leaving other data unencrypted. The encryption is not only robust against order exposure, but also shows high performance for any query over encrypted data. In addition, the proposed scheme provides strong updates without assumptions of the distribution of plaintext. This allows it to be integrated easily with the existing database system.

  9. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    NASA Astrophysics Data System (ADS)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  10. Assurance of energy efficiency and data security for ECG transmission in BASNs.

    PubMed

    Ma, Tao; Shrestha, Pradhumna Lal; Hempel, Michael; Peng, Dongming; Sharif, Hamid; Chen, Hsiao-Hwa

    2012-04-01

    With the technological advancement in body area sensor networks (BASNs), low cost high quality electrocardiographic (ECG) diagnosis systems have become important equipment for healthcare service providers. However, energy consumption and data security with ECG systems in BASNs are still two major challenges to tackle. In this study, we investigate the properties of compressed ECG data for energy saving as an effort to devise a selective encryption mechanism and a two-rate unequal error protection (UEP) scheme. The proposed selective encryption mechanism provides a simple and yet effective security solution for an ECG sensor-based communication platform, where only one percent of data is encrypted without compromising ECG data security. This part of the encrypted data is essential to ECG data quality due to its unequally important contribution to distortion reduction. The two-rate UEP scheme achieves a significant additional energy saving due to its unequal investment of communication energy to the outcomes of the selective encryption, and thus, it maintains a high ECG data transmission quality. Our results show the improvements in communication energy saving of about 40%, and demonstrate a higher transmission quality and security measured in terms of wavelet-based weighted percent root-mean-squared difference.

  11. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  12. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  13. A privacy preserving secure and efficient authentication scheme for telecare medical information systems.

    PubMed

    Mishra, Raghavendra; Barnwal, Amit Kumar

    2015-05-01

    The Telecare medical information system (TMIS) presents effective healthcare delivery services by employing information and communication technologies. The emerging privacy and security are always a matter of great concern in TMIS. Recently, Chen at al. presented a password based authentication schemes to address the privacy and security. Later on, it is proved insecure against various active and passive attacks. To erase the drawbacks of Chen et al.'s anonymous authentication scheme, several password based authentication schemes have been proposed using public key cryptosystem. However, most of them do not present pre-smart card authentication which leads to inefficient login and password change phases. To present an authentication scheme with pre-smart card authentication, we present an improved anonymous smart card based authentication scheme for TMIS. The proposed scheme protects user anonymity and satisfies all the desirable security attributes. Moreover, the proposed scheme presents efficient login and password change phases where incorrect input can be quickly detected and a user can freely change his password without server assistance. Moreover, we demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham) logic. The proposed scheme is also comparable in terms of computational overheads with relevant schemes.

  14. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    Senate - 12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Commission on Measures of Household Economic Security Act of 2010

    THOMAS, 111th Congress

    Sen. Feingold, Russell D. [D-WI

    2009-12-11

    12/11/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... critical facility infrastructure, including: (i) Water supplies; (ii) Telecommunications; (iii) Electrical system; and (iv) Access points for ventilation and air-conditioning systems; (5) Manufacturing or...: (1) Restricting access to only authorized personnel; (2) Securing all access points not actively...

  18. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  19. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  20. An efficient and provably-secure certificateless public key encryption scheme for telecare medicine information systems.

    PubMed

    Guo, Rui; Wen, Qiaoyan; Shi, Huixian; Jin, Zhengping; Zhang, Hua

    2013-10-01

    Telecare Medicine Information Systems (TMIS) promote the traditional medical and healthcare services by information and communication technology. Since the physician and caregiver can monitor the patient's physiological condition remotely in TMIS, the confidentiality of this sensitive data should be protected, which is the key issue in the Health Insurance Portability and Accountability Act. In this paper, we propose an efficient certificateless public key encryption scheme without bilinear pairing for TMIS. Our proposal is proved to be secure in the random oracle model under the hardness assumption of computational Diffie-Hellman problem. Moreover, after modifying the original model of the certificateless encryption, this scheme achieves Girault's trust level 3. Compared with the related protocols, the perform evaluations show that our scheme is more efficient and appropriate to collocate with low power mobile devices for TMIS.

  1. Efficient thermoelectric van der Pauw measurements

    NASA Astrophysics Data System (ADS)

    de Boor, Johannes; Schmidt, Volker

    2011-07-01

    The development of powerful thermoelectric materials requires fast and simple characterization techniques. We combine three measurements to obtain a complete thermoelectric characterization. The electrical conductivity is measured by the van der Pauw method, while ZT is determined directly by means of a Harman measurement. Finally, exploiting the analogy between electrical and thermal physics, a thermal van der Pauw measurement is performed and the sample Seebeck coefficient and thermal conductivity can be determined. No temperature differences need to be measured; all quantities can be deduced from voltage measurements concurrently on the same sample which allows for quick and convenient material screening.

  2. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  3. Measuring Charter School Efficiency: An Early Appraisal

    ERIC Educational Resources Information Center

    Carpenter, Dick M., II; Noller, Scott L.

    2010-01-01

    In an era of increased accountability and challenging times for public finance, charter schools built on decentralization, grassroots accountability, and market forces may provide, in the spirit of "educational laboratories," lessons for increasing student achievement more efficiently through diverse and innovative management,…

  4. Measuring Charter School Efficiency: An Early Appraisal

    ERIC Educational Resources Information Center

    Carpenter, Dick M., II; Noller, Scott L.

    2010-01-01

    In an era of increased accountability and challenging times for public finance, charter schools built on decentralization, grassroots accountability, and market forces may provide, in the spirit of "educational laboratories," lessons for increasing student achievement more efficiently through diverse and innovative management,…

  5. Efficient iris texture analysis method based on Gabor ordinal measures

    NASA Astrophysics Data System (ADS)

    Tajouri, Imen; Aydi, Walid; Ghorbel, Ahmed; Masmoudi, Nouri

    2017-07-01

    With the remarkably increasing interest directed to the security dimension, the iris recognition process is considered to stand as one of the most versatile technique critically useful for the biometric identification and authentication process. This is mainly due to every individual's unique iris texture. A modestly conceived efficient approach relevant to the feature extraction process is proposed. In the first place, iris zigzag "collarette" is extracted from the rest of the image by means of the circular Hough transform, as it includes the most significant regions lying in the iris texture. In the second place, the linear Hough transform is used for the eyelids' detection purpose while the median filter is applied for the eyelashes' removal. Then, a special technique combining the richness of Gabor features and the compactness of ordinal measures is implemented for the feature extraction process, so that a discriminative feature representation for every individual can be achieved. Subsequently, the modified Hamming distance is used for the matching process. Indeed, the advanced procedure turns out to be reliable, as compared to some of the state-of-the-art approaches, with a recognition rate of 99.98%, 98.12%, and 95.02% on CASIAV1.0, CASIAV3.0, and IIT Delhi V1 iris databases, respectively.

  6. Development of a food security measurement tool for New Zealand households.

    PubMed

    Parnell, Winsome R; Gray, Andrew R

    2014-10-28

    To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.

  7. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-01

    ... OMB Review: Aviation Security Customer Satisfaction Performance Measurement Passenger Survey AGENCY... satisfaction of aviation security in an effort to more efficiently manage its security screening performance at.... Information Collection Requirement Title: Aviation Security Customer Satisfaction Performance...

  8. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...

  9. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...

  10. 33 CFR Appendix A to Part 105 - Facility Vulnerability and Security Measures Summary (Form CG-6025)

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Facility Vulnerability and Security Measures Summary (Form CG-6025) A Appendix A to Part 105 Navigation and Navigable Waters COAST... Appendix A to Part 105—Facility Vulnerability and Security Measures Summary (Form CG-6025) ER22OC03.000...

  11. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  12. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  13. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  14. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  15. 33 CFR 104.280 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... vessel stores and bunkers. 104.280 Section 104.280 Navigation and Navigable Waters COAST GUARD... § 104.280 Security measures for delivery of vessel stores and bunkers. (a) General. The vessel owner or operator must ensure that security measures relating to the delivery of vessel stores and bunkers are...

  16. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  17. Parental Involvement in School and the Role of School Security Measures

    ERIC Educational Resources Information Center

    Mowen, Thomas J.

    2015-01-01

    Over the past three decades, the United States has experienced a significant increase in the use of security measures in public and private secondary schools. Measures including police officers, metal detectors, and security cameras are becoming more common in the hallways of American schools. Following this surge, a number of academics have…

  18. Security camera resolution measurements: Horizontal TV lines versus modulation transfer function measurements.

    SciTech Connect

    Birch, Gabriel Carisle; Griffin, John Clark

    2015-01-01

    The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenarios are presented with calculations showing the application of such a metric.

  19. Security Problems of Scan Design and Accompanying Measures

    NASA Astrophysics Data System (ADS)

    Biasizzo, Anton; Novak, Franc

    2016-05-01

    The paper deals with the security problems of scan design and investigates currently proposed solutions. A solution based on data encryption to protect the data in scan chains is discussed and problems related to the block-based encoding are outlined. Next, security extension for IEEE Std. 1149.1 providing a locking mechanism is analysed. The mechanism prevents unauthorised users to interfere via test bus with the system normal operation. Possible attack scenario is considered and the probabilities of successful attack within a given time interval are calculated for different lengths of the Lock register. The paper concludes with the description of current work focused on improvements the security of the locking mechanism, in particular by using simplified public key infrastructure.

  20. Measuring global water security towards sustainable development goals

    NASA Astrophysics Data System (ADS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-12-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  1. Thin film CdTe based neutron detectors with high thermal neutron efficiency and gamma rejection for security applications

    NASA Astrophysics Data System (ADS)

    Smith, L.; Murphy, J. W.; Kim, J.; Rozhdestvenskyy, S.; Mejia, I.; Park, H.; Allee, D. R.; Quevedo-Lopez, M.; Gnade, B.

    2016-12-01

    Solid-state neutron detectors offer an alternative to 3He based detectors, but suffer from limited neutron efficiencies that make their use in security applications impractical. Solid-state neutron detectors based on single crystal silicon also have relatively high gamma-ray efficiencies that lead to false positives. Thin film polycrystalline CdTe based detectors require less complex processing with significantly lower gamma-ray efficiencies. Advanced geometries can also be implemented to achieve high thermal neutron efficiencies competitive with silicon based technology. This study evaluates these strategies by simulation and experimentation and demonstrates an approach to achieve >10% intrinsic efficiency with <10-6 gamma-ray efficiency.

  2. High accuracy radiation efficiency measurement techniques

    NASA Technical Reports Server (NTRS)

    Kozakoff, D. J.; Schuchardt, J. M.

    1981-01-01

    The relatively large antenna subarrays (tens of meters) to be used in the Solar Power Satellite, and the desire to accurately quantify antenna performance, dictate the requirement for specialized measurement techniques. The error contributors associated with both far-field and near-field antenna measurement concepts were quantified. As a result, instrumentation configurations with measurement accuracy potential were identified. In every case, advances in the state of the art of associated electronics were found to be required. Relative cost trade-offs between a candidate far-field elevated antenna range and near-field facility were also performed.

  3. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) Navigation bridge, machinery spaces and other control stations; (2) Spaces containing security and...-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or manifolds; (5) Spaces containing dangerous goods or hazardous substances; (6) Spaces containing cargo pumps...

  4. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance... surrounding restricted areas, by the use of patrols or automatic intrusion detection devices; (3) Reducing the... systems; and (7) Protect cargo and vessel stores from tampering. (b) Designation of Restricted Areas. The...

  5. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) Using security personnel, automatic intrusion detection devices, surveillance equipment, or surveillance... surrounding restricted areas, by the use of patrols or automatic intrusion detection devices; (3) Reducing the... systems; and (7) Protect cargo and vessel stores from tampering. (b) Designation of Restricted Areas. The...

  6. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... security and surveillance equipment and systems; and (6) Protect cargo and vessel stores from tampering. (b... surveillance equipment and systems and their controls and lighting system controls; (3) Ventilation and air-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or...

  7. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... security and surveillance equipment and systems; and (6) Protect cargo and vessel stores from tampering. (b... surveillance equipment and systems and their controls and lighting system controls; (3) Ventilation and air-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or...

  8. 33 CFR 104.270 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security and surveillance equipment and systems; and (6) Protect cargo and vessel stores from tampering. (b... surveillance equipment and systems and their controls and lighting system controls; (3) Ventilation and air-conditioning systems and other similar spaces; (4) Spaces with access to potable water tanks, pumps, or...

  9. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  10. 33 CFR 105.260 - Security measures for restricted areas.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...; (7) Control the entry, parking, loading and unloading of vehicles; (8) Control the movement and... Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of security... persons and all vehicles seeking entry; (5) Patrolling or monitoring the perimeter of restricted areas;...

  11. On the Secure Energy Efficiency of TAS/MRC With Relaying and Jamming Strategies

    NASA Astrophysics Data System (ADS)

    Farhat, Jamil; Brante, Glauber; Souza, Richard Demo

    2017-08-01

    In this paper we investigate the secure energy efficiency (SEE) in a cooperative scenario where all nodes are equipped with multiple antennas. Moreover, we employ secrecy rate and power allocation at Alice and at the relay in order to maximize the SEE, subjected to a constraint in terms of a minimal required secrecy outage probability. Only the channel state information (CSI) with respect to the legitimate nodes is available. Then, we compare the Artificial-Noise (AN) scheme with CSI-Aided Decode-and-Forward (CSI-DF), which exploits the CSI to choose the best communication path (direct or cooperative). Our results show that CSI-DF outperforms AN in terms of SEE in most scenarios, except when Eve is closer to the relay or with the increase of antennas at Eve. Additionally, we also show that the maximization of SEE implies in an optimal number of antennas to be used at each node, which is due to the trade-off between secure throughput and power consumption.

  12. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge.

    PubMed

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-12-03

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  13. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    PubMed Central

    Hung, Le Xuan; Canh, Ngo Trong; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo

    2008-01-01

    For many sensor network applications such as military or homeland security, it is essential for users (sinks) to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1) Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2) The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3) The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4) Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5) No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully. PMID:27873956

  14. Breach Risk Magnitude: A Quantitative Measure of Database Security

    PubMed Central

    Yasnoff, William A.

    2016-01-01

    A quantitative methodology is described that provides objective evaluation of the potential for health record system breaches. It assumes that breach risk increases with the number of potential records that could be exposed, while it decreases when more authentication steps are required for access. The breach risk magnitude (BRM) is the maximum value for any system user of the common logarithm of the number of accessible database records divided by the number of authentication steps needed to achieve such access. For a one million record relational database, the BRM varies from 5.52 to 6 depending on authentication protocols. For an alternative data architecture designed specifically to increase security by separately storing and encrypting each patient record, the BRM ranges from 1.3 to 2.6. While the BRM only provides a limited quantitative assessment of breach risk, it may be useful to objectively evaluate the security implications of alternative database organization approaches. PMID:28269923

  15. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  16. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  17. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2016-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  18. Examining School Security Measures as Moderators of the Association between Homophobic Victimization and School Avoidance

    ERIC Educational Resources Information Center

    Fisher, Benjamin W.; Tanner-Smith, Emily E.

    2015-01-01

    Homophobic victimization is a pervasive problem in U.S. schools that leads to negative outcomes for students. Those who experience homophobic victimization are at greater risk for avoiding particular spaces in school because they feel unsafe or afraid. Visible school security measures (e.g., security guards, metal detectors, and cameras) offer…

  19. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks

    PubMed Central

    Lee, Tian-Fu

    2015-01-01

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses. PMID:26121612

  20. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    PubMed

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  1. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  2. Absolute measurement of detector quantum efficiency using parametric downconversion.

    PubMed

    Rarity, J G; Ridley, K D; Tapster, P R

    1987-11-01

    We show that a parametric downconversion crystal emitting angle resolved coincident photon pairs can be used to measure the absolute quantum efficiency of a photon counting detection system. We have measured the quantum efficiency of a silicon avalanche photodiode, operated in Geiger mode, as a function of operating voltage and compare this to results obtained using a conventional method.

  3. Building America Top Innovations 2012: National Residential Efficiency Measures Database

    SciTech Connect

    none,

    2013-01-01

    This Building America Top Innovations profile describes the DOE-sponsored National Residential Efficiency Measures Database, which contains performance characteristics and cost estimates for nearly 3,000 energy retrofit measures. To date, it is used in four prominent DOE software packages to help optimize energy-efficiency recommendations.

  4. A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.

    PubMed

    Das, Ashok Kumar; Goswami, Adrijit

    2013-06-01

    Connected health care has several applications including telecare medicine information system, personally controlled health records system, and patient monitoring. In such applications, user authentication can ensure the legality of patients. In user authentication for such applications, only the legal user/patient himself/herself is allowed to access the remote server, and no one can trace him/her according to transmitted data. Chang et al. proposed a uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care (Chang et al., J Med Syst 37:9902, 2013). Their scheme uses the user's personal biometrics along with his/her password with the help of the smart card. The user's biometrics is verified using BioHashing. Their scheme is efficient due to usage of one-way hash function and exclusive-or (XOR) operations. In this paper, we show that though their scheme is very efficient, their scheme has several security weaknesses such as (1) it has design flaws in login and authentication phases, (2) it has design flaws in password change phase, (3) it fails to protect privileged insider attack, (4) it fails to protect the man-in-the middle attack, and (5) it fails to provide proper authentication. In order to remedy these security weaknesses in Chang et al.'s scheme, we propose an improvement of their scheme while retaining the original merit of their scheme. We show that our scheme is efficient as compared to Chang et al.'s scheme. Through the security analysis, we show that our scheme is secure against possible attacks. Further, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our scheme is secure against passive and active attacks. In addition, after successful authentication between the user and the server, they establish a secret session key shared between them for future secure communication.

  5. Developing measures of food and nutrition security within an Australian context.

    PubMed

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  6. Measuring capital market efficiency: Global and local correlations structure

    NASA Astrophysics Data System (ADS)

    Kristoufek, Ladislav; Vosvrda, Miloslav

    2013-01-01

    We introduce a new measure for capital market efficiency. The measure takes into consideration the correlation structure of the returns (long-term and short-term memory) and local herding behavior (fractal dimension). The efficiency measure is taken as a distance from an ideal efficient market situation. The proposed methodology is applied to a portfolio of 41 stock indices. We find that the Japanese NIKKEI is the most efficient market. From a geographical point of view, the more efficient markets are dominated by the European stock indices and the less efficient markets cover mainly Latin America, Asia and Oceania. The inefficiency is mainly driven by a local herding, i.e. a low fractal dimension.

  7. EPA/ORD NATIONAL EXPOSURE RESEARCH LABORATORY MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY

    EPA Science Inventory

    This product describes the National Exposure Research Laboratory research and development support for homeland security through the proposed National Exposure Measurements Center (NEMC). Key NEMC functional areas depicted in this poster are: standardized analytical method develo...

  8. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    PubMed

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  9. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System

    PubMed Central

    Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-01-01

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381

  10. 40 CFR Appendix A to Subpart Mmmm... - Alternative Capture Efficiency and Destruction Efficiency Measurement and Monitoring Procedures...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Destruction Efficiency Measurement and Monitoring Procedures for Magnet Wire Coating Operations A Appendix A... Efficiency and Destruction Efficiency Measurement and Monitoring Procedures for Magnet Wire Coating... measurement and monitoring are intended principally for newer magnet wire coating machines where the...

  11. A secure and efficient authentication and key agreement scheme based on ECC for telecare medicine information systems.

    PubMed

    Xu, Xin; Zhu, Ping; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua; He, Lian

    2014-01-01

    In the field of the Telecare Medicine Information System, recent researches have focused on consummating more convenient and secure healthcare delivery services for patients. In order to protect the sensitive information, various attempts such as access control have been proposed to safeguard patients' privacy in this system. However, these schemes suffered from some certain security defects and had costly consumption, which were not suitable for the telecare medicine information system. In this paper, based on the elliptic curve cryptography, we propose a secure and efficient two-factor mutual authentication and key agreement scheme to reduce the computational cost. Such a scheme enables to provide the patient anonymity by employing the dynamic identity. Compared with other related protocols, the security analysis and performance evaluation show that our scheme overcomes some well-known attacks and has a better performance in the telecare medicine information system.

  12. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  13. Measuring energy efficiency in economics: Shadow value approach

    NASA Astrophysics Data System (ADS)

    Khademvatani, Asgar

    For decades, academic scholars and policy makers have commonly applied a simple average measure, energy intensity, for studying energy efficiency. In contrast, we introduce a distinctive marginal measure called energy shadow value (SV) for modeling energy efficiency drawn on economic theory. This thesis demonstrates energy SV advantages, conceptually and empirically, over the average measure recognizing marginal technical energy efficiency and unveiling allocative energy efficiency (energy SV to energy price). Using a dual profit function, the study illustrates how treating energy as quasi-fixed factor called quasi-fixed approach offers modeling advantages and is appropriate in developing an explicit model for energy efficiency. We address fallacies and misleading results using average measure and demonstrate energy SV advantage in inter- and intra-country energy efficiency comparison. Energy efficiency dynamics and determination of efficient allocation of energy use are shown through factors impacting energy SV: capital, technology, and environmental obligations. To validate the energy SV, we applied a dual restricted cost model using KLEM dataset for the 35 US sectors stretching from 1958 to 2000 and selected a sample of the four sectors. Following the empirical results, predicted wedges between energy price and the SV growth indicate a misallocation of energy use in stone, clay and glass (SCG) and communications (Com) sectors with more evidence in the SCG compared to the Com sector, showing overshoot in energy use relative to optimal paths and cost increases from sub-optimal energy use. The results show that energy productivity is a measure of technical efficiency and is void of information on the economic efficiency of energy use. Decomposing energy SV reveals that energy, capital and technology played key roles in energy SV increases helping to consider and analyze policy implications of energy efficiency improvement. Applying the marginal measure, we also

  14. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  15. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  16. Food safety security: a new concept for enhancing food safety measures.

    PubMed

    Iyengar, Venkatesh; Elmadfa, Ibrahim

    2012-06-01

    The food safety security (FSS) concept is perceived as an early warning system for minimizing food safety (FS) breaches, and it functions in conjunction with existing FS measures. Essentially, the function of FS and FSS measures can be visualized in two parts: (i) the FS preventive measures as actions taken at the stem level, and (ii) the FSS interventions as actions taken at the root level, to enhance the impact of the implemented safety steps. In practice, along with FS, FSS also draws its support from (i) legislative directives and regulatory measures for enforcing verifiable, timely, and effective compliance; (ii) measurement systems in place for sustained quality assurance; and (iii) shared responsibility to ensure cohesion among all the stakeholders namely, policy makers, regulators, food producers, processors and distributors, and consumers. However, the functional framework of FSS differs from that of FS by way of: (i) retooling the vulnerable segments of the preventive features of existing FS measures; (ii) fine-tuning response systems to efficiently preempt the FS breaches; (iii) building a long-term nutrient and toxicant surveillance network based on validated measurement systems functioning in real time; (iv) focusing on crisp, clear, and correct communication that resonates among all the stakeholders; and (v) developing inter-disciplinary human resources to meet ever-increasing FS challenges. Important determinants of FSS include: (i) strengthening international dialogue for refining regulatory reforms and addressing emerging risks; (ii) developing innovative and strategic action points for intervention {in addition to Hazard Analysis and Critical Control Points (HACCP) procedures]; and (iii) introducing additional science-based tools such as metrology-based measurement systems.

  17. Visible School Security Measures and Student Academic Performance, Attendance, and Postsecondary Aspirations.

    PubMed

    Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-01-01

    Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.

  18. Information Leakage Problem in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Liu, Zhi-Hao; Chen, Han-Wu; Liu, Wen-Jie

    2016-11-01

    The information leakage problem in the efficient bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom is pointed out. Next, a way to revise this protocol to a truly secure one is given. We hope people pay more attention to the information leakage problem in order to design truly secure quantum communication protocols.

  19. [Are the flight security measures good for the patients? The "sickurity" problem].

    PubMed

    Felkai, Péter

    2010-10-10

    Due to the stiffening requirements of security measures at the airports, prevention of air-travel related illnesses have become more difficult. The backlash effects of restrictions (e.g. fluid and movement restrictions) can trigger or even improve pathophysiological processes. The most advanced security check methods, the full body scan, besides ethical and moral considerations, may induce yet unknown pathological processes. We face the similar problem with the traveller, who becomes ill or injured during the trip. In this case, repatriation is often required, which is usually accomplished by commercial airlines. If patient should be transported by stretcher, it is also available on regular flight, but in this case he/she must be accompanied by a medical professional. This solution raises much more security problem: not only the sick person and the medical team, but even their medical equipments and medicines have to be checked. Due to the lack of standardised regulations the security staff solves the problem by various attempts from emphatic approach till refusal. For these reasons, a clear and exact regulation is needed, which must be based upon medical experts' opinion, and should deal not only with the flight security but with the patient's security, as well. This regulation can cease the patients and their medical accompanied persons' to be defencelessness against local authorities and security services. The same is true for handicapped persons. Author suggests solutions for the problem, balancing between flight security and the patient's "sickurity".

  20. Efficient calculation of the robustness measure R for complex networks

    NASA Astrophysics Data System (ADS)

    Hong, Chen; He, Ning; Lordan, Oriol; Liang, Bo-Yuan; Yin, Nai-Yu

    2017-07-01

    In a recent work, Schneider et al. (2011) proposed a new measure R for network robustness, where the value of R is calculated within the entire process of malicious node attacks. In this paper, we present an approach to improve the calculation efficiency of R, in which a computationally efficient robustness measure R‧ is introduced when the fraction of failed nodes reaches to a critical threshold qc. Simulation results on three different types of network models and three real networks show that these networks all exhibit a computationally efficient robustness measure R‧. The relationships between R‧ and the network size N and the network average degree < k > are also explored. It is found that the value of R‧ decreases with N while increases with < k > . Our results would be useful for improving the calculation efficiency of network robustness measure R for complex networks.

  1. Measuring energy efficiency in the United States` economy: A beginning

    SciTech Connect

    1995-10-01

    Energy efficiency is a vital component of the Nation`s energy strategy. One of the Department of Energy`s missions are to promote energy efficiency to help the Nation manage its energy resources. The ability to define and measure energy efficiency is essential to this objective. In the absence of consistent defensible measures, energy efficiency is a vague, subjective concept that engenders directionless speculation and confusion rather than insightful analysis. The task of defining and measuring energy efficiency and creating statistical measures as descriptors is a daunting one. This publication is not a final product, but is EIA`s first attempt to define and measure energy efficiency in a systematic and robust manner for each of the sectors and the United States economy as a whole. In this process, EIA has relied on discussions, customer reviews, in-house reviews, and seminars that have focused on energy efficiency in each of the sectors. EIA solicits the continued participation of its customers in further refining this work.

  2. Channel Efficiency with Security Enhancement for Remote Condition Monitoring of Multi Machine System Using Hybrid Huffman Coding

    NASA Astrophysics Data System (ADS)

    Datta, Jinia; Chowdhuri, Sumana; Bera, Jitendranath

    2016-12-01

    This paper presents a novel scheme of remote condition monitoring of multi machine system where a secured and coded data of induction machine with different parameters is communicated between a state-of-the-art dedicated hardware Units (DHU) installed at the machine terminal and a centralized PC based machine data management (MDM) software. The DHUs are built for acquisition of different parameters from the respective machines, and hence are placed at their nearby panels in order to acquire different parameters cost effectively during their running condition. The MDM software collects these data through a communication channel where all the DHUs are networked using RS485 protocol. Before transmitting, the parameter's related data is modified with the adoption of differential pulse coded modulation (DPCM) and Huffman coding technique. It is further encrypted with a private key where different keys are used for different DHUs. In this way a data security scheme is adopted during its passage through the communication channel in order to avoid any third party attack into the channel. The hybrid mode of DPCM and Huffman coding is chosen to reduce the data packet length. A MATLAB based simulation and its practical implementation using DHUs at three machine terminals (one healthy three phase, one healthy single phase and one faulty three phase machine) proves its efficacy and usefulness for condition based maintenance of multi machine system. The data at the central control room are decrypted and decoded using MDM software. In this work it is observed that Chanel efficiency with respect to different parameter measurements has been increased very much.

  3. Measurement and simulation of the segmented Germanium-Detector's Efficiency

    NASA Astrophysics Data System (ADS)

    Salem, Shadi

    This paper presents the methods to determine the detection efficiency of the segmented germanium detector. Two methods are given for the investigating the detection efficiency of the semiconductor segmented-germanium detector. Experimental measurements using radioactive sources are reported. The radioactive sources, which were involved, can give us the opportunity to cover the photon energy ranging up to hundreds of keV. A useful compilation is included of the latest values of the emission rates per decay for the following radioactive sources: 241Am and 133Ba. The second method, the simulation of the efficiency is involved for comparison purposes. A good agreement between the measurements and the simulation is obtained.

  4. Measuring the Locational Efficiency of the Urban Hospital

    PubMed Central

    Schneider, Jerry B.

    1967-01-01

    A measure of locational efficiency, the locational imbalance vector (LIVOR) is developed and applied in the analysis of nineteen hospitals which provide medical, surgical, and obstetrical services in the Cincinnati metropolitan area. With only a few exceptions, the locational efficiency of the individual hospitals presently serving the Cincinnati area is found to be quite low. Some possible policy implications of the study's measure of locational efficiency are illustrated and its relation to a larger question, that of explaining the pattern of occupancy pressure in a metropolitan area, is also briefly discussed. PMID:6054382

  5. Alternate measures of replacement rates for social security benefits and retirement income.

    PubMed

    Biggs, Andrew G; Springstead, Glenn R

    2008-01-01

    Discussions of retirement planning and Social Security policy often focus on replacement rates, which represent retirement income or Social Security benefits relative to preretirement earnings. Replacement rates are a rule of thumb designed to simplify the process of smoothing consumption over individuals' lifetimes. Despite their widespread use, however, there is no common means of measuring replacement rates. Various measures of preretirement earnings mean that the denominators used in replacement rate calculations are often inconsistent and can lead to confusion. Whether a given replacement rate represents an adequate retirement income depends on whether the denominator in the replacement rate calculation is an appropriate measure of preretirement earnings. This article illustrates replacement rates using four measures of preretirement earnings: final earnings; the constant income payable from the present value (PV) of lifetime earnings (PV payment); the wage-indexed average of all earnings prior to claiming Social Security benefits; and the inflation-adjusted average of all earnings prior to claiming Social Security benefits (consumer price index (CPI) average). The article then measures replacement rates against a sample of the Social Security beneficiary population using the Social Security Administration's Modeling Income in the Near Term (MINT) microsimulation model. Replacement rates are shown based on Social Security benefits alone, to indicate the adequacy of the current benefit structure, as well as on total retirement income including defined benefit pensions and financial assets, to indicate total preparedness for retirement. The results show that replacement rates can vary considerably based on the definition of preretirement earnings used and whether replacement rates are measured on an individual or a shared basis. For current new retirees, replacement rates based on all sources of retirement income seem strong by most measures and are projected to

  6. Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

    NASA Astrophysics Data System (ADS)

    Sajeed, Shihan; Chaiwongkhot, Poompong; Bourgoin, Jean-Philippe; Jennewein, Thomas; Lütkenhaus, Norbert; Makarov, Vadim

    2015-06-01

    In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control the spatial mode to break security. We experimentally investigate a standard polarization QKD receiver and identify sources of efficiency mismatch in its optical scheme. We model a practical intercept-and-resend attack and show that it would break security in most situations. We show experimentally that adding an appropriately chosen spatial filter at the receiver's entrance may be an effective countermeasure.

  7. Security of Y-00 under heterodyne measurement and fast correlation attack

    NASA Astrophysics Data System (ADS)

    Donnet, Stéphane; Thangaraj, Andrew; Bloch, Matthieu; Cussey, Johann; Merolla, Jean-Marc; Larger, Laurent

    2006-08-01

    We provide a security analysis of the Y-00 protocol under heterodyne measurement and correlation attack. We show that the secrecy of the data encryption scheme is extremely sensitive to the running-key generation process. In many situations our simple attack succeeds in recovering the initial shared secret key. Our simulation results suggest that a truly secure implementation of the protocol should take into account the effective key generation method.

  8. Measuring Poverty for Food Security Analysis: Consumption- Versus Asset-Based Approaches.

    PubMed

    Hjelm, Lisa; Mathiassen, Astrid; Wadhwa, Amit

    2016-06-22

    Poverty and food insecurity are intrinsically linked as poor households often lack the resources required to access sufficient nutritious food to live an active and healthy life. Consumption and expenditure surveys are typically used to identify poor versus nonpoor households but are detailed and costly. Measures of wealth based on asset ownership and housing characteristics can be generated from lighter, less costly surveys. To examine whether indices based on asset ownership and housing characteristics (stock) complement household consumption (flow) when used to analyze inequalities in food security outcomes. Comprehensive data from Nepal, Malawi, Tanzania, Uganda, and Madagascar are used to examine correlations and overlaps in classification between indices of household wealth and consumption per capita. Inequality in food security indicators representing quantity, quality, and vulnerability is examined across wealth and consumption per capita quintiles. Wealth indices are correlated with consumption per capita, with coefficients between 0.5 and 0.6. The prevalence of food insecurity decreases from poorer to wealthier quintiles for all variables and for all food security measures in all countries. Energy deficiency varies much more across consumption quintiles than wealth index quintiles. Interestingly, inequalities in the share of consumption of food are more pronounced across the wealth index quintiles than per capita consumption. Although wealth indices and consumption per capita are related and both are drivers of food security, they cannot be used interchangeably for food security analysis. Each inequality measure is important for describing different aspects of food security. © The Author(s) 2016.

  9. EPA-ORD MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY

    EPA Science Inventory

    This presentation will describe the organization and the research and development activities of the ORD National Exposure Measurements Center and will focus on the Center's planned role in providing analytical method development, statistical sampling and design guidance, quality ...

  10. Atomic teleportation via cavity QED and position measurements: Efficiency analysis

    NASA Astrophysics Data System (ADS)

    Tumminello, M.; Ciccarello, F.

    2008-07-01

    We have recently presented a novel protocol to teleport an unknown atomic state via cavity QED and position measurements. Here, after a brief review of our scheme, we provide a quantitative study of its efficiency. This is accomplished by an explicit description of the measurement process that allows us to derive the fidelity with respect to the atomic internal state to be teleported.

  11. Implementation and Measurement Efficiency of Multidimensional Computerized Adaptive Testing

    ERIC Educational Resources Information Center

    Wang, Wen-Chung; Chen, Po-Hsi

    2004-01-01

    Multidimensional adaptive testing (MAT) procedures are proposed for the measurement of several latent traits by a single examination. Bayesian latent trait estimation and adaptive item selection are derived. Simulations were conducted to compare the measurement efficiency of MAT with those of unidimensional adaptive testing and random…

  12. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  13. A Framework for Comparative Assessments of Energy Efficiency Policy Measures

    SciTech Connect

    Blum, Helcio; Atkinson, Barbara; Lekov, Alex

    2011-05-24

    When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

  14. Improving crop productivity and resource use efficiency to ensure food security and environmental quality in China.

    PubMed

    Fan, Mingsheng; Shen, Jianbo; Yuan, Lixing; Jiang, Rongfeng; Chen, Xinping; Davies, William J; Zhang, Fusuo

    2012-01-01

    In recent years, agricultural growth in China has accelerated remarkably, but most of this growth has been driven by increased yield per unit area rather than by expansion of the cultivated area. Looking towards 2030, to meet the demand for grain and to feed a growing population on the available arable land, it is suggested that annual crop production should be increased to around 580 Mt and that yield should increase by at least 2% annually. Crop production will become more difficult with climate change, resource scarcity (e.g. land, water, energy, and nutrients) and environmental degradation (e.g. declining soil quality, increased greenhouse gas emissions, and surface water eutrophication). To pursue the fastest and most practical route to improved yield, the near-term strategy is application and extension of existing agricultural technologies. This would lead to substantial improvement in crop and soil management practices, which are currently suboptimal. Two pivotal components are required if we are to follow new trajectories. First, the disciplines of soil management and agronomy need to be given increased emphasis in research and teaching, as part of a grand food security challenge. Second, continued genetic improvement in crop varieties will be vital. However, our view is that the biggest gains from improved technology will come most immediately from combinations of improved crops and improved agronomical practices. The objectives of this paper are to summarize the historical trend of crop production in China and to examine the main constraints to the further increase of crop productivity. The paper provides a perspective on the challenge faced by science and technology in agriculture which must be met both in terms of increased crop productivity but also in increased resource use efficiency and the protection of environmental quality.

  15. Comparison of ionization chamber efficiencies for activity measurements.

    PubMed

    Schrader, H; Svec, A

    2004-01-01

    The calibration of ionization chamber measuring systems in terms of activity is described. The energy-dependent efficiency curves of three chambers at the Bureau International des Poids et Mesures, the National Physical Laboratory and the Physikalisch-Technische Bundesanstalt are determined and compared using a fitting procedure for the experimental radionuclide efficiencies by the Microsoft (MS) EXCEL Solver program. An estimation of the uncertainty of the efficiency curves and the deviations of experimental and calculated radionuclide efficiencies are given. By this fitting method, discrepancies in the efficiency determination can be detected at a level of about one percent. Systematic deviations entering into the calculations either from emission probabilities per decay or from absolute activity standardization are discussed.

  16. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  17. ADAPTING FTIR MEASUREMENT TECHNOLOGY TO HOMELAND SECURITY APPLICATIONS

    EPA Science Inventory

    Open-path Fourier transform infrared (OP-FTIR) sensors have numerous advantages for measuring chemical plumes over wide areas compared to point detection sensors. Extractive FTIR sensors have been used for industrial stack monitoring and are attractive for building ventilation sy...

  18. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  19. 33 CFR 105.265 - Security measures for handling cargo.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... storage in a restricted area while awaiting loading or pick up; (6) Restrict the entry of cargo to the..., giving the location of those dangerous goods and hazardous substances. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the implementation of measures to: (1) Unless...

  20. Efficiency transfer method applied to surface beta contamination measurements.

    PubMed

    Stanga, D; De Felice, P; Capogni, M

    2017-08-09

    In this paper, the application of the efficiency transfer method to the evaluation of the surface beta contamination is described. Using efficiency transfer factors, the reference calibration factor of contamination monitors is corrected, to obtain the calibration factor for an actual contamination source. The experimental part of the paper illustrates the applicability of the method to the direct measurement of the surface beta contamination. Copyright © 2017 Elsevier Ltd. All rights reserved.

  1. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    NASA Astrophysics Data System (ADS)

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  2. Controlled quantum secure direct communication by entanglement distillation or generalized measurement

    NASA Astrophysics Data System (ADS)

    Tan, Xiaoqing; Zhang, Xiaoqian

    2016-05-01

    We propose two controlled quantum secure communication schemes by entanglement distillation or generalized measurement. The sender Alice, the receiver Bob and the controllers David and Cliff take part in the whole schemes. The supervisors David and Cliff can control the information transmitted from Alice to Bob by adjusting the local measurement angles θ _4 and θ _3. Bob can verify his secret information by classical one-way function after communication. The average amount of information is analyzed and compared for these two methods by MATLAB. The generalized measurement is a better scheme. Our schemes are secure against some well-known attacks because classical encryption and decoy states are used to ensure the security of the classical channel and the quantum channel.

  3. Low cost cylindrical converter for measuring lead efficiency

    NASA Technical Reports Server (NTRS)

    Hatch, G. L.; Nakata, L.; Britt, E. J.

    1979-01-01

    A low cost cylindrical thermionic converter has been designed, fabricated, and tested for use in a NASA-JPL program to directly measure converter lead efficiencies using various electrode materials and surfaces. Efficiency measurements are made using input emitter heater power, output power at the leads, and calculated values of the parasitic losses that would not be present in the application configuration. This information can be used to predict the performance characteristics of the advanced converters currently under development. A series of five converters has been tested. Both structured and smooth molybdenum collectors have been used. Emitters included smooth molybdenum, smooth rhenium, and microstructured rhenium. Cesium pressure families of current-voltage curves are presented for emitter temperatures of 1600, 1700, and 1800 K, along with measured efficiencies as a function of converter current densities for each temperature.

  4. Low cost cylindrical converter for measuring lead efficiency

    NASA Technical Reports Server (NTRS)

    Hatch, G. L.; Nakata, L.; Britt, E. J.

    1979-01-01

    A low cost cylindrical thermionic converter has been designed, fabricated, and tested for use in a NASA-JPL program to directly measure converter lead efficiencies using various electrode materials and surfaces. Efficiency measurements are made using input emitter heater power, output power at the leads, and calculated values of the parasitic losses that would not be present in the application configuration. This information can be used to predict the performance characteristics of the advanced converters currently under development. A series of five converters has been tested. Both structured and smooth molybdenum collectors have been used. Emitters included smooth molybdenum, smooth rhenium, and microstructured rhenium. Cesium pressure families of current-voltage curves are presented for emitter temperatures of 1600, 1700, and 1800 K, along with measured efficiencies as a function of converter current densities for each temperature.

  5. Measuring Efficiency of Secondary Healthcare Providers in Slovenia

    PubMed Central

    Blatnik, Patricia; Bojnec, Štefan; Tušak, Matej

    2017-01-01

    Abstract The chief aim of this study was to analyze secondary healthcare providers' efficiency, focusing on the efficiency analysis of Slovene general hospitals. We intended to present a complete picture of technical, allocative, and cost or economic efficiency of general hospitals. Methods We researched the aspects of efficiency with two econometric methods. First, we calculated the necessary quotients of efficiency with the stochastic frontier analyze (SFA), which are realized by econometric evaluation of stochastic frontier functions; then, with the data envelopment analyze (DEA), we calculated the necessary quotients that are based on the linear programming method. Results Results on measures of efficiency showed that the two chosen methods produced two different conclusions. The SFA method concluded Celje General Hospital is the most efficient general hospital, whereas the DEA method concluded Brežice General Hospital was the hospital to be declared as the most efficient hospital. Conclusion Our results are a useful tool that can aid managers, payers, and designers of healthcare policy to better understand how general hospitals operate. The participants can accordingly decide with less difficulty on any further business operations of general hospitals, having the best practices of general hospitals at their disposal. PMID:28730180

  6. Acousto-Optics as an Efficient Method for Physical Measurements

    NASA Astrophysics Data System (ADS)

    Kulakov, Sergei V.; Balysheva, Olga L.; Zhdanov, Arcenii Yu.; Kludzin, Victor V.; Shakin, Oleg V.

    In addition to acousto-optic information processing and manufacturing of such devices, the interaction between optical and acoustic waves are an efficient method for physical measurements. The paper analyses the potential of the acousto-optic method for measurement and investigation of crystal properties. It also presents some examples of this method applied to such measurements and investigations. The acousto-optic implementation of the pulse-phase method is used for acoustic velocity measurements. Velocities in an arbitrary directions can be measured using the Shaefer-Bergman method (the visualization of the angular distribution of the inverse phase velocities) together with the pulse-phase method. The matrices of crystal elastic coefficients can be evaluated using the Shaefer-Bergman patterns, using the minimum number of tested samples. The Schlieren (shadow) image method can give information both on the characteristics of acoustic and optical fields. The acousto-optic interaction is Efficient Method for determination of elastic material nonlinearity parameters.

  7. Improved Methods for Identifying, Applying, and Verifying Industrial Energy Efficiency Measures

    NASA Astrophysics Data System (ADS)

    Harding, Andrew Chase

    Energy efficiency is the least expensive source of additional energy capacity for today's global energy expansion. Energy efficiency offers additional benefits of cost savings for consumers, reduced environmental impacts, and enhanced energy security. The challenges of energy efficiency include identifying potential efficiency measures, quantifying savings, determining cost effectiveness, and verifying savings of installed measures. This thesis presents three separate chapters which address these challenges. The first is a paper presented at the 2014 industrial energy technology conference (IETC) that details a compressed air system project using the systems approach to identify cost effective measures, energy intensity to project savings, and proper measurement and verification (M&V) practices to prove that the savings were achieved. The second is a discussion of proper M&V techniques, how these apply to international M&V protocols, and how M&V professionals can improve the accuracy and efficacy of their M&V activities. The third is an energy intensity analysis of a poultry processing facility at a unit operations level, which details the M&V practices used to determine the intensities at each unit operation and compares these to previous works.

  8. Implementation and Rejection of Industrial Steam System Energy Efficiency Measures

    SciTech Connect

    Therkelesen, Peter; McKane, Aimee

    2013-05-01

    Steam systems consume approximately one third of energy applied at U.S. industrial facilities. To reduce energy consumption, steam system energy assessments have been conducted on a wide range of industry types over the course of five years through the Energy Savings Assessment (ESA) program administered by the U.S. Department of Energy (U.S. DOE). ESA energy assessments result in energy efficiency measure recommendations that are given potential energy and energy cost savings and potential implementation cost values. Saving and cost metrics that measure the impact recommended measures will have at facilities, described as percentages of facility baseline energy and energy cost, are developed from ESA data and used in analyses. Developed savings and cost metrics are examined along with implementation and rejection rates of recommended steam system energy efficiency measures. Based on analyses, implementation of steam system energy efficiency measures is driven primarily by cost metrics: payback period and measure implementation cost as a percentage of facility baseline energy cost (implementation cost percentage). Stated reasons for rejecting recommended measures are primarily based upon economic concerns. Additionally, implementation rates of measures are not only functions of savings and cost metrics, but time as well.

  9. Infrared measurements of a scramjet exhaust. [to determine combustion efficiency

    NASA Technical Reports Server (NTRS)

    Reed, R. A.; Slack, M. W.

    1980-01-01

    Diagnostic 2 - 5 mm infrared spectra of a hydrogen burning scramjet exhaust were measured with an interferometer spectrometer. Exhaust gas temperatures and water vapor partial pressures were determined from the observed intensity and spectral profile of the H2O 2.7 mm infrared emission band. Overall engine combustion efficiencies were derived by combining these measurements with the known engine operating conditions. Efficiencies fall (70 - 50 percent) as fuel equivalence ratios rise (0.4 - 1.0). Data analysis techniques and sensitivity studies are also presented.

  10. X-ray reflectometer for optical efficiency and scatter measurements

    NASA Technical Reports Server (NTRS)

    Reynolds, J. M.; Fields, S. A.; Holland, R. L.

    1978-01-01

    An instrument has been developed to determine the reflection efficiency and scatter characteristics of optical samples at X-ray wavelengths from 1.5 to 113 A. The reflectometer operates in an oil-free vacuum chamber and measures the reflection efficiency and scatter characteristics as a function of the angle of incidence. The reflection efficiency is given for 8.34-A radiation incident on a fused silica sample finished to a flatness of one-tenth of a wavelength. The experimental reflection efficiency is compared with the theoretical data. The scatter curves are given for the direct X-ray beam and for the beam reflected from the fused silica sample at an angle of incidence of 50 arcmin. The full-width-at-half-maximum (FWHM) resolution of the instrument is approximately 13 arcsec, as determined by a least-squares smoothing of the experimental data.

  11. Efficient Measurement of Multiparticle Entanglement with Embedding Quantum Simulator.

    PubMed

    Chen, Ming-Cheng; Wu, Dian; Su, Zu-En; Cai, Xin-Dong; Wang, Xi-Lin; Yang, Tao; Li, Li; Liu, Nai-Le; Lu, Chao-Yang; Pan, Jian-Wei

    2016-02-19

    The quantum measurement of entanglement is a demanding task in the field of quantum information. Here, we report the direct and scalable measurement of multiparticle entanglement with embedding photonic quantum simulators. In this embedding framework [R. Di Candia et al. Phys. Rev. Lett. 111, 240502 (2013)], the N-qubit entanglement, which does not associate with a physical observable directly, can be efficiently measured with only two (for even N) and six (for odd N) local measurement settings. Our experiment uses multiphoton quantum simulators to mimic dynamical concurrence and three-tangle entangled systems and to track their entanglement evolutions.

  12. Closing the N-use efficiency gap to achieve food and environmental security.

    PubMed

    Cui, Zhenling; Wang, Guiliang; Yue, Shanchao; Wu, Liang; Zhang, Weifeng; Zhang, Fusuo; Chen, Xinping

    2014-05-20

    To achieve food and environmental security, closing the gap between actual and attainable N-use efficiency should be as important as closing yield gaps. Using a meta-analysis of 205 published studies from 317 study sites, including 1332 observations from rice, wheat, and maize system in China, reactive N (Nr) losses, and total N2O emissions from N fertilization both increased exponentially with increasing N application rate. On the basis of the N loss response curves from the literature meta-analysis, the direct N2O emission, NH3 volatilization, N leaching, and N runoff, and total N2O emission (direct + indirect) were calculated using information from the survey of farmers. The PFP-N (kilogram of harvested product per kilogram of N applied (kg (kg of N)(-1))) for 6259 farmers were relative low with only 37, 23, and 32 kg (kg of N)(-1) for rice, wheat, and maize systems, respectively. In comparison, the PFP-N for highest yield and PFP-N group (refers to fields where the PFP-N was within the 80-100th percentile among those fields that achieved yields within the 80-100th percentile) averaged 62, 42, and 53 kg (kg of N)(-1) for rice, wheat, and maize systems, respectively. The corresponding grain yield would increase by 1.6-2.3 Mg ha(-1), while the N application rate would be reduced by 56-100 kg of N ha(-1) from average farmer field to highest yield and PFP-N group. In return, the Nr loss intensity (4-11 kg of N (Mg of grain)(-1)) and total N2O emission intensity (0.15-0.29 kg of N (Mg of grain)(-1)) would both be reduced significantly as compared to current agricultural practices. In many circumstances, closing the PFP-N gap in intensive cropping systems is compatible with increased crop productivity and reductions in both Nr losses and total N2O emissions.

  13. Cryptographically secure hardware random number generator dedicated for distributed measurement and control systems

    NASA Astrophysics Data System (ADS)

    Czernik, Pawel

    The chaotic signal generator based on the theory of nonlinear dynamical systems for applications in cryptographically secure distributed measurement and control systems with asymmetric resources is presented. This system was implemented on the basis of the physical chaotic electronic vibration generator in which the resonant circuit is composed of two capacitors, two resistors, coil and transistor, called the Colpitts oscillator. The presented system was designed, programmed and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. True cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results will be here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  14. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    ERIC Educational Resources Information Center

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  15. Efficiency measurement using a motor-dynamo module

    NASA Astrophysics Data System (ADS)

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-11-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction.

  16. Efficiency Measurement Using a Motor-Dynamo Module

    ERIC Educational Resources Information Center

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-01-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction. (Contains 1 table and 8 figures.)

  17. Efficiency Measurement Using a Motor-Dynamo Module

    ERIC Educational Resources Information Center

    Ng, Pun-hon; Wong, Siu-ling; Mak, Se-yuen

    2009-01-01

    In this article, we describe a simple method which can be used to measure the efficiency of a low power dc motor, a motor-converted dynamo and a coupled motor-dynamo module as a function of the speed of rotation. The result can also be used to verify Faraday's law of electromagnetic induction. (Contains 1 table and 8 figures.)

  18. Using reflectance measurements to determine light use efficiency in corn

    USDA-ARS?s Scientific Manuscript database

    This study examines the ability of narrow band vegetation indexes to detect spectral changes associated with stress and relate them to light use efficiency (LUE) over the course of a day as well as through the growing season. In a corn field in Beltsville, MD, carbon flux measurements were made at a...

  19. Measuring Information Technology Performance: Operational Efficiency and Operational Effectiveness

    ERIC Educational Resources Information Center

    Moore, Annette G.

    2012-01-01

    This dissertation provides a practical approach for measuring operational efficiency and operational effectiveness for IT organizations introducing the ITIL process framework. The intent of the study was to assist Chief Information Officers (CIOs) in explaining the impact of introducing the Information Technology Infrastructure Library (ITIL)…

  20. Quantum efficiency measurements of Tektronix backside thinned CCDs

    NASA Technical Reports Server (NTRS)

    Delamere, Alan; Atkinson, Mike; Rice, James P.; Blouke, Morley; Reed, Richard

    1990-01-01

    Results are presented of a program in progress to produce CCDs with high stable quantum efficiency (QE). Measurements made at 253.7 nm over a six-month period showed no significant QE difference between two CCDs manufactured in 1989 and one manufactured in 1988. QE improvement by the addition of a two-layer antireflection coating is about threefold at 400 nm.

  1. Measuring industrial energy efficiency: Physical volume versus economic value

    SciTech Connect

    Freeman, S.L.; Niefer, M.J.; Roop, J.M.

    1996-12-01

    This report examines several different measures of industrial output for use in constructing estimates of industrial energy efficiency and discusses some reasons for differences between the measures. Estimates of volume-based measures of output, as well as 3 value-based measures of output (value of production, value of shipments, and value added), are evaluated for 15 separate 4-digit industries. Volatility, simple growth rate, and trend growth rate estimates are made for each industry and each measure of output. Correlations are made between the volume- and value-based measures of output. Historical energy use data are collected for 5 of the industries for making energy- intensity estimates. Growth rates in energy use, energy intensity, and correlations between volume- and value-based measures of energy intensity are computed. There is large variability in growth trend estimates both long term and from year to year. While there is a high correlation between volume- and value-based measures of output for a few industries, typically the correlation is low, and this is exacerbated for estimates of energy intensity. Analysis revealed reasons for these low correlations. It appears that substantial work must be done before reliable measures of trends in the energy efficiency of industry can be accurately characterized.

  2. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System.

    PubMed

    Ghanti, Shaila; Naik, G M

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack.

  3. Efficient Data Transfer Rate and Speed of Secured Ethernet Interface System

    PubMed Central

    Ghanti, Shaila

    2016-01-01

    Embedded systems are extensively used in home automation systems, small office systems, vehicle communication systems, and health service systems. The services provided by these systems are available on the Internet and these services need to be protected. Security features like IP filtering, UDP protection, or TCP protection need to be implemented depending on the specific application used by the device. Every device on the Internet must have network interface. This paper proposes the design of the embedded Secured Ethernet Interface System to protect the service available on the Internet against the SYN flood attack. In this experimental study, Secured Ethernet Interface System is customized to protect the web service against the SYN flood attack. Secured Ethernet Interface System is implemented on ALTERA Stratix IV FPGA as a system on chip and uses the modified SYN flood attack protection method. The experimental results using Secured Ethernet Interface System indicate increase in number of genuine clients getting service from the server, considerable improvement in the data transfer rate, and better response time during the SYN flood attack. PMID:28116350

  4. The Strategic Measures for the Industrial Security of Small and Medium Business

    PubMed Central

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures. PMID:24955414

  5. The strategic measures for the industrial security of small and medium business.

    PubMed

    Lee, Chang-Moo

    2014-01-01

    The competitiveness of companies increasingly depends upon whether they possess the cutting-edge or core technology. The technology should be protected from industrial espionage or leakage. A special attention needs to be given to SMB (small and medium business), furthermore, because SMB occupies most of the companies but has serious problems in terms of industrial security. The technology leakages of SMB would account for more than 2/3 of total leakages during last five years. The purpose of this study is, therefore, to analyze the problems of SMB in terms of industrial security and suggest the strategic solutions for SMB in South Korea. The low security awareness and financial difficulties, however, make it difficult for SMB to build the effective security management system which would protect the company from industrial espionage and leakage of its technology. The growing dependence of SMB on network such as internet, in addition, puts the SMB at risk of leaking its technology through hacking or similar ways. It requires new measures to confront and control such a risk. Online security control services and technology deposit system are suggested for such measures.

  6. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  7. Measuring efficiency of rice growing farmers using data envelopment analysis

    NASA Astrophysics Data System (ADS)

    Zaibidi, Nerda Zura; Kasim, Maznah Mat; Ramli, Razamin; Baten, Md. Azizul; Khan, Sahubar Ali Nadhar

    2015-12-01

    Self-sufficiency in rice production has been the main issue in Malaysia agriculture. It is significantly low and does not comply with the current average rice yield of 3.7 tons per ha per season. One of the best options and the most effective way to improve rice productivity is through more efficient utilization of paddy farmers. Getting farmers to grow rice is indeed a challenge when they could very well be making better money doing something else. This paper attempts to study the efficiency of rice growing farmers in Kubang Pasu using Data Envelopment Analysis model. For comparative analysis, three scenarios are considered in this study in measuring efficiency of rice growing farmers. The first scenario considers only fertilizer factor as an input while for the second, the land size is added as another factor. The third scenario considers more details about the inputs such as the type of fertilizer, NPK and mixed and also land tenureship and size. In all scenarios, the outputs are rice yield (tons) and the profit (RM). As expected, the findings show that the third scenario establishes the highest number of efficient rice growing farmers. It reveals that the combination of outputs and inputs chosen has significant contribution in measuring efficiency of rice growing farmers.

  8. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  9. 33 CFR 106.270 - Security measures for delivery of stores and industrial supplies.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... stores and industrial supplies. 106.270 Section 106.270 Navigation and Navigable Waters COAST GUARD... stores and industrial supplies. (a) General. The OCS facility owner or operator must ensure that security measures relating to the delivery of stores or industrial supplies to the OCS facility are implemented to...

  10. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility... bunkers are implemented to: (1) Check vessel stores for package integrity; (2) Prevent vessel stores from...

  11. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... vessel stores and bunkers. 105.270 Section 105.270 Navigation and Navigable Waters COAST GUARD... Requirements § 105.270 Security measures for delivery of vessel stores and bunkers. (a) General. The facility... bunkers are implemented to: (1) Check vessel stores for package integrity; (2) Prevent vessel stores from...

  12. Preventing School Bullying: Should Schools Prioritize an Authoritative School Discipline Approach over Security Measures?

    ERIC Educational Resources Information Center

    Gerlinger, Julie; Wo, James C.

    2016-01-01

    A common response to school violence features the use of security measures to deter serious and violent incidents. However, a second approach, based on school climate theory, suggests that schools exhibiting authoritative school discipline (i.e., high structure and support) might more effectively reduce school disorder. We tested these approaches…

  13. 33 CFR 105.270 - Security measures for delivery of vessel stores and bunkers.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (iv) Canines. (b) MARSEC Level 1. At MARSEC Level 1, the facility owner or operator must ensure the... facility at the rate specified by the approved FSP. (c) MARSEC Level 2. In addition to the security measures required for MARSEC Level 1 in this section, at MARSEC Level 2, the facility owner or...

  14. A new measure of identifying influential nodes: Efficiency centrality

    NASA Astrophysics Data System (ADS)

    Wang, Shasha; Du, Yuxian; Deng, Yong

    2017-06-01

    Identifying the influential nodes in complex networks is a fundamental and practical topic at the moment. Local metric like degree centrality measure is relatively simple and of less effectiveness, although the global metrics such as closeness and betweenness centrality measure can better identify influential nodes, still, there are some disadvantages and limitations. In this paper, a new efficiency centrality (EffC) to rank the spreaders in the whole network is proposed, which identify influential nodes by removing each node and meanwhile considering the changing degree of the whole network efficiency after removal. To evaluate the performance of our method, Susceptible-Infected-Recovered (SIR) model is used to simulate the epidemic spreading in four real networks. The experimental and simulated results show the efficiency and practicability of the proposed method. Thus, it is significant to rank spreaders in complex networks by using Network Efficiency. And our proposed EffC is proved to be a feasible and effective measure to identify influential nodes.

  15. Absolute efficiency measurements with the 10B based Jalousie detector

    NASA Astrophysics Data System (ADS)

    Modzel, G.; Henske, M.; Houben, A.; Klein, M.; Köhli, M.; Lennert, P.; Meven, M.; Schmidt, C. J.; Schmidt, U.; Schweika, W.

    2014-04-01

    The 10B based Jalousie detector is a replacement for 3He counter tubes, which are nowadays less affordable for large area detectors due to the 3He crisis. In this paper we investigate and verify the performance of the new 10B based detector concept and its adoption for the POWTEX diffractometer, which is designed for the detection of thermal neutrons with predicted detection efficiencies of 75-50% for neutron energies of 10-100 meV, respectively. The predicted detection efficiency has been verified by absolute measurements using neutrons with a wavelength of 1.17 Å (59 meV).

  16. Calorimetric measurements of energy transfer efficiency and melting efficiency in CO sub 2 laser beam welding

    SciTech Connect

    Fuerschbach, P.W.

    1990-01-01

    Our previous calorimetric studies of weld melting efficiency and arc efficiency in the GTAW and PAW processes have naturally led us to speculate as to the magnitude of the efficiencies in the LBW process which to data have also not been adequately investigated. Most welding engineers that have had experience with the LBW process are acutely aware that the metals' absorptivity, the surface finish, and the laser wavelength, all play an important role in affecting the energy transfer efficiency, but the extent of their influence and our understanding of the influence of other process variables is not well understood. In addition, it is widely thought that only the LBW or EBW processes can be selected for applications where thermal damage and distortion from the welding process must be kept to a minimum. For these reasons, we have looked forward to performing these calorimetric experiments since they potentially can answer such important questions as: whether or not the melting efficiency of the LBW process is superior to that obtainable with conventional GTAW and PAW welding processes This study was prompted by poor production yields on switching device due to cracking of the ceramic header after final closure welding with the CO{sub 2} LBW process. This calorimetric study was begun in hopes of determining if allowed variations in production process control variables were responsible for increases in heat input and the resulting thermal stresses. By measuring the net heat input to the workpiece with the calorimeter and by measuring the laser output energy and the weld fusion zone size it was possible to determine the magnitudes of both the energy transfer efficiency and the melting efficiency as well as observe their dependence on the process variables. 3 refs.

  17. Efficient security mechanisms for mHealth applications using wireless body sensor networks.

    PubMed

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme.

  18. Efficient Security Mechanisms for mHealth Applications Using Wireless Body Sensor Networks

    PubMed Central

    Sahoo, Prasan Kumar

    2012-01-01

    Recent technological advances in wireless communications and physiological sensing allow miniature, lightweight, ultra-low power, intelligent monitoring devices, which can be integrated into a Wireless Body Sensor Network (WBSN) for health monitoring. Physiological signals of humans such as heartbeats, temperature and pulse can be monitored from a distant location using tiny biomedical wireless sensors. Hence, it is highly essential to combine the ubiquitous computing with mobile health technology using wireless sensors and smart phones to monitor the well-being of chronic patients such as cardiac, Parkinson and epilepsy patients. Since physiological data of a patient are highly sensitive, maintaining its confidentiality is highly essential. Hence, security is a vital research issue in mobile health (mHealth) applications, especially if a patient has an embarrassing disease. In this paper a three tier security architecture for the mHealth application is proposed, in which light weight data confidentiality and authentication protocols are proposed to maintain the privacy of a patient. Moreover, considering the energy and hardware constraints of the wireless body sensors, low complexity data confidential and authentication schemes are designed. Performance evaluation of the proposed architecture shows that they can satisfy the energy and hardware limitations of the sensors and still can maintain the secure fabrics of the wireless body sensor networks. Besides, the proposed schemes can outperform in terms of energy consumption, memory usage and computation time over standard key establishment security scheme. PMID:23112734

  19. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    SciTech Connect

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  20. Hilbertian sine as an absolute measure of Bayesian inference in ISR, homeland security, medicine, and defense

    NASA Astrophysics Data System (ADS)

    Jannson, Tomasz; Wang, Wenjian; Hodelin, Juan; Forrester, Thomas; Romanov, Volodymyr; Kostrzewski, Andrew

    2016-05-01

    In this paper, Bayesian Binary Sensing (BBS) is discussed as an effective tool for Bayesian Inference (BI) evaluation in interdisciplinary areas such as ISR (and, C3I), Homeland Security, QC, medicine, defense, and many others. In particular, Hilbertian Sine (HS) as an absolute measure of BI, is introduced, while avoiding relativity of decision threshold identification, as in the case of traditional measures of BI, related to false positives and false negatives.

  1. Measurements of charge state breeding efficiency at BNL test EBIS

    NASA Astrophysics Data System (ADS)

    Kondrashev, S.; Alessi, J. G.; Beebe, E. N.; Dickerson, C.; Ostroumov, P. N.; Pikin, A.; Savard, G.

    2011-06-01

    Charge breeding of singly charged ions is required to efficiently accelerate rare isotope ion beams for nuclear and astrophysics experiments, and to enhance the accuracy of low-energy Penning trap-assisted spectroscopy. An efficient charge breeder for the Californium Rare Isotope Breeder Upgrade (CARIBU) to the ANL Tandem Linear Accelerator System (ATLAS) facility is being developed using the BNL Test Electron Beam Ion Source (Test EBIS) as a prototype. Parameters of the CARIBU EBIS charge breeder are similar to those of the BNL Test EBIS except the electron beam current will be adjustable in the range from 1 to 2 A. The electron beam current density in the CARIBU EBIS trap will be significantly higher than in existing operational charge state breeders based on the EBIS concept. The charge state breeding efficiency is expected to be about 25% for the isotope ions extracted from the CARIBU. For the success of our EBIS project, it is essential to demonstrate high breeding efficiency at the BNL Test EBIS tuned to the regime close to the parameters of the CARIBU EBIS at ANL. The breeding efficiency optimization and measurements have been successfully carried out using a Cs + surface ionization ion source for externally pulsed injection into the BNL Test EBIS. A Cs + ion beam with a total number of ions of 5×10 8 and optimized pulse length of 70 μs has been injected into the Test EBIS and charge-bred for 5.3 ms for two different electron beam currents - 1 and 1.5 A. In these experiments we have achieved 70% injection/extraction efficiency and breeding efficiency into the most abundant charge state ˜17%.

  2. Measurements of charge state breeding efficiency at BNL test EBIS

    SciTech Connect

    Kondrashev, S.; Alessi, J.; Beebe, E.N.; Dickerson, C.; Ostroumov, P.N.; Pikin, A.; Savard, G.

    2011-04-02

    Charge breeding of singly charged ions is required to efficiently accelerate rare isotope ion beams for nuclear and astrophysics experiments, and to enhance the accuracy of low-energy Penning trap-assisted spectroscopy. An efficient charge breeder for the Californium Rare Isotope Breeder Upgrade (CARIBU) to the ANL Tandem Linear Accelerator System (ATLAS) facility is being developed using the BNL Test Electron Beam Ion Source (Test EBIS) as a prototype. Parameters of the CARIBU EBIS charge breeder are similar to those of the BNL Test EBIS except the electron beam current will be adjustable in the range from 1 to 2 {angstrom}. The electron beam current density in the CARIBU EBIS trap will be significantly higher than in existing operational charge state breeders based on the EBIS concept. The charge state breeding efficiency is expected to be about 25% for the isotope ions extracted from the CARIBU. For the success of our EBIS project, it is essential to demonstrate high breeding efficiency at the BNL Test EBIS tuned to the regime close to the parameters of the CARIBU EBIS at ANL. The breeding efficiency optimization and measurements have been successfully carried out using a Cs{sup +} surface ionization ion source for externally pulsed injection into the BNL Test EBIS. A Cs{sup +} ion beam with a total number of ions of 5 x 10{sup 8} and optimized pulse length of 70 {mu}s has been injected into the Test EBIS and charge-bred for 5.3 ms for two different electron beam currents 1 and 1.5 {angstrom}. In these experiments we have achieved 70% injection/extraction efficiency and breeding efficiency into the most abundant charge state 17%.

  3. Measurement and simulation of thermoelectric efficiency for single leg

    SciTech Connect

    Hu, Xiaokai; Yamamoto, Atsushi Ohta, Michihiro; Nishiate, Hirotaka

    2015-04-15

    Thermoelectric efficiency measurements were carried out on n-type bismuth telluride legs with the hot-side temperature at 100 and 150°C. The electric power and heat flow were measured individually. Water coolant was utilized to maintain the cold-side temperature and to measure heat flow out of the cold side. Leg length and vacuum pressure were studied in terms of temperature difference across the leg, open-circuit voltage, internal resistance, and heat flow. Finite-element simulation on thermoelectric generation was performed in COMSOL Multiphysics, by inputting two-side temperatures and thermoelectric material properties. The open-circuit voltage and resistance were in good agreement between the measurement and simulation. Much larger heat flows were found in measurements, since they were comprised of conductive, convective, and radiative contributions. Parasitic heat flow was measured in the absence of bismuth telluride leg, and the conductive heat flow was then available. Finally, the maximum thermoelectric efficiency was derived in accordance with the electric power and the conductive heat flow.

  4. Measurement and simulation of thermoelectric efficiency for single leg.

    PubMed

    Hu, Xiaokai; Yamamoto, Atsushi; Ohta, Michihiro; Nishiate, Hirotaka

    2015-04-01

    Thermoelectric efficiency measurements were carried out on n-type bismuth telluride legs with the hot-side temperature at 100 and 150°C. The electric power and heat flow were measured individually. Water coolant was utilized to maintain the cold-side temperature and to measure heat flow out of the cold side. Leg length and vacuum pressure were studied in terms of temperature difference across the leg, open-circuit voltage, internal resistance, and heat flow. Finite-element simulation on thermoelectric generation was performed in COMSOL Multiphysics, by inputting two-side temperatures and thermoelectric material properties. The open-circuit voltage and resistance were in good agreement between the measurement and simulation. Much larger heat flows were found in measurements, since they were comprised of conductive, convective, and radiative contributions. Parasitic heat flow was measured in the absence of bismuth telluride leg, and the conductive heat flow was then available. Finally, the maximum thermoelectric efficiency was derived in accordance with the electric power and the conductive heat flow.

  5. A two-stage DEA approach for environmental efficiency measurement.

    PubMed

    Song, Malin; Wang, Shuhong; Liu, Wei

    2014-05-01

    The slacks-based measure (SBM) model based on the constant returns to scale has achieved some good results in addressing the undesirable outputs, such as waste water and water gas, in measuring environmental efficiency. However, the traditional SBM model cannot deal with the scenario in which desirable outputs are constant. Based on the axiomatic theory of productivity, this paper carries out a systematic research on the SBM model considering undesirable outputs, and further expands the SBM model from the perspective of network analysis. The new model can not only perform efficiency evaluation considering undesirable outputs, but also calculate desirable and undesirable outputs separately. The latter advantage successfully solves the "dependence" problem of outputs, that is, we can not increase the desirable outputs without producing any undesirable outputs. The following illustration shows that the efficiency values obtained by two-stage approach are smaller than those obtained by the traditional SBM model. Our approach provides a more profound analysis on how to improve environmental efficiency of the decision making units.

  6. Gamma Efficiency Simulations towards Coincidence Measurements for Fusion Cross Sections

    NASA Astrophysics Data System (ADS)

    Heine, M.; Courtin, S.; Fruet, G.; Jenkins, D. G.; Montanari, D.; Morris, L.; Regan, P. H.; Rudigier, M.; Symochko, D.

    2016-10-01

    With the experimental station STELLA (STELlar LAboratory) we will measure fusion cross sections of astrophysical relevance making use of the coincident detection of charged particles and gamma rays for background reduction. For the measurement of gamma rays from the de-excitation of fusion products a compact array of 36 UK FATIMA LaBr3 detectors is designed based on efficiency studies with Geant4. The photo peak efficiency in the region of interest compares to other gamma detection systems used in this field. The features of the internal decay of 138La is used in a background study to obtain an online calibration of the gamma detectors. Background data are fit to the Monte Carlo model of the self activity assuming crude exponential behavior of external background. Accuracy in the region of interest is of the order of some keV in this first study.

  7. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  8. Measuring outcomes and efficiency in medicare value-based purchasing.

    PubMed

    Tompkins, Christopher P; Higgins, Aparna R; Ritter, Grant A

    2009-01-01

    The Medicare program may soon adopt value-based purchasing (VBP), in which hospitals could receive incentives that are conditional on meeting specified performance objectives. The authors advocate for a market-oriented framework and direct measures of system-level value that are focused on better outcomes and lower total cost of care. They present a multidimensional framework for measuring outcomes of care and a method to adjust incentive payments based on efficiency. Incremental reforms based on VBP could provoke transformational changes in total patient care by linking payments to value related to the whole patient experience, recognizing shared accountability among providers.

  9. Toward the Effective and Efficient Measurement of Implementation Fidelity

    PubMed Central

    Schoenwald, Sonja K.; Garland, Ann F.; Chapman, Jason E.; Frazier, Stacy L.; Sheidow, Ashli J.; Southam-Gerow, Michael A.

    2011-01-01

    Implementation science in mental health is informed by other academic disciplines and industries. Conceptual and methodological territory charted in psychotherapy research is pertinent to two elements of the conceptual model of implementation posited by Aarons and colleagues (2010)—implementation fidelity and innovation feedback systems. Key characteristics of scientifically validated fidelity instruments, and of the feasibility of their use in routine care, are presented. The challenges of ensuring fidelity measurement methods are both effective (scientifically validated) and efficient (feasible and useful in routine care) are identified as are examples of implementation research attempting to balance these attributes of fidelity measurement. PMID:20957425

  10. Measurement and prediction of Energy Efficient Engine noise

    NASA Technical Reports Server (NTRS)

    Lavin, S. P.; Ho, P. Y.; Chamberlin, R.

    1984-01-01

    The NASA/GE Energy Efficient Engine (E3) static noise levels were measured in an acoustic arena on the Integrated Core and Low Spool Test System. These measured levels were scaled to the appropriate size to power four study aircraft and were projected to flight for evaluation of noise levels relative to FAR36, Stage III limits. As a result of these evaluations, it is predicted that the NASA/GE E3 engine with a wide spacing cut-on blade/vane ratio fan and a forced mixer nozzle can meet FAR36 Stage III limits with sufficient design margin.

  11. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    NASA Astrophysics Data System (ADS)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  12. Intelligence and Neural Efficiency: Measures of Brain Activation versus Measures of Functional Connectivity in the Brain

    ERIC Educational Resources Information Center

    Neubauer, Aljoscha C.; Fink, Andreas

    2009-01-01

    The neural efficiency hypothesis of intelligence suggests a more efficient use of the cortex (or even the brain) in brighter as compared to less intelligent individuals. This has been shown in a series of studies employing different neurophysiological measurement methods and a broad range of different cognitive task demands. However, most of the…

  13. Intelligence and Neural Efficiency: Measures of Brain Activation versus Measures of Functional Connectivity in the Brain

    ERIC Educational Resources Information Center

    Neubauer, Aljoscha C.; Fink, Andreas

    2009-01-01

    The neural efficiency hypothesis of intelligence suggests a more efficient use of the cortex (or even the brain) in brighter as compared to less intelligent individuals. This has been shown in a series of studies employing different neurophysiological measurement methods and a broad range of different cognitive task demands. However, most of the…

  14. Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms

    NASA Astrophysics Data System (ADS)

    Gover, Bradford N.; Bradley, John S.

    2004-12-01

    Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility. .

  15. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    PubMed

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  16. Efficiency Analysis and Comparison of Different Radon Progeny Measurement Methods

    PubMed Central

    Zhang, Lei

    2013-01-01

    Radon exposure to the public contributes more than half of all the radiation doses caused by natural radiation; accurate measurement of radon progeny is quite essential for the dose evaluation of radon exposure in environment. For the purpose of establishing a radon progeny standard and controlling measurement quality of commercial devices, it is quite important to analyze the efficiency of different measurement methods and determine which would be the most appropriate for radon progeny measurements. Through theoretical analysis and experimental measurement, some commonly used measurement methods were compared in this study and the development trends of those methods were reviewed. Results show that for radon progeny measurement, the spectroscopic analysis method is better than the gross count method, while least-square calculation methods is better than traditional three-count or five-count method. Multiperiod counting of α plus β spectrum as well as using weighted least-square calculation method might be the best choice for accurate measurement on radon progeny in standard radon chamber when calibrating commercial radon progeny monitors. PMID:24385873

  17. Compact Efficient Lidar Receiver for Measuring Atmospheric Aerosols

    NASA Technical Reports Server (NTRS)

    Gili, Christopher; De Young, Russell

    2006-01-01

    A small, light weight, and efficient aerosol lidar receiver was constructed and tested. Weight and space savings were realized by using rigid optic tubes and mounting cubes to package the steering optics and detectors in a compact assembly. The receiver had a 1064nm channel using an APD detector. The 532nm channel was split (90/10) into an analog channel (90%) and a photon counting channel (10%). The efficiency of the 1064nm channel with optical filter was 44.0%. The efficiency of the analog 532nm channel was 61.4% with the optical filter, and the efficiency of the 532nm photon counting channel was 7.6% with the optical filter. The results of the atmospheric tests show that the detectors were able to consistently return accurate results. The lidar receiver was able to detect distinct cloud layers, and the lidar returns also agreed across the different detectors. The use of a light weight fiber-coupled telescope reduced weight and allowed great latitude in detector assembly positioning due to the flexibility enabled by the use of fiber optics. The receiver is now ready to be deployed for aircraft or ground based aerosol lidar measurements.

  18. Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.

    PubMed

    Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun

    2017-06-01

    Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.

  19. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of U.S. households compared to piecemeal remodeling efforts. In this report, the U.S Department of Energy Building America Retrofit Alliance research team examines the improvement of a home’s energy performance in an opportunistic way by examining what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for energy efficiency upgrades to occur at the same time as remodeling proejcts. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home’s energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  20. Energy Efficiency Measures to Incorporate into Remodeling Projects

    SciTech Connect

    Liaukus, C.

    2014-12-01

    Energy improvements in a home are often approached as one concerted effort, beginning with a simple walk-through assessment or more in-depth energy audit and followed by the installation of recommended energy measures. While this approach allows for systems thinking to guide the efforts, comprehensive energy improvements of this nature are undertaken by a relatively small number of the households in our nation compared to more piecemeal remodeling efforts. Even when programs like the Weatherization Assistance Program and Home Performance with ENERGY STAR are considered, homes that have had a comprehensive energy makeover still represent a small fraction of the 111.1 million households. In this report, the U.S Department of Energy Building America Retrofit Alliance research team looks at the improvement of a home's energy performance in an opportunistic way: it examines what can be done to incorporate energy efficiency measures into general remodeling work and home repair projects. This allows for the possibility for people who would not normally pursue energy efficiency but will remodel their kitchen or re-side their home to improve their home's performance at the same time. There are challenges to this approach, not the least of which being that the work will take place over time in potentially many separate projects. The opportunity to improve a home's energy efficiency at one time expands or contracts with the scope of the remodel. As such, guidance on how to do each piece thoughtfully and with consideration for potential future projects, is critical.

  1. On Gray's paradox and efficiency measures for swimming

    NASA Astrophysics Data System (ADS)

    Bale, Rahul; Hao, Max; Bhalla, Amneet; Patankar, Neelesh

    2010-11-01

    In 1936 Gray reported that the "drag" power of dolphins was substantially larger than the estimates of muscle power. We revisit this "paradox" in the context of undulatory swimming. We consider larval zebrafish as a model system. We question the basic premise of comparing drag power to muscle power. There are two reasons. First, we recognize that it may not be possible decompose the net force on an undulatory swimmer into drag and thrust. If it becomes possible, as we show in our case, the drag power, which represents the work done on the fluid due to motion in the swimming direction, is exactly balanced by the thrust power, which represents the work done by the fluid. Thus, the total power in the swimming direction, computed in this way, is zero. Second, we show that most of the muscle energy is dissipated in causing the lateral motion of the body - not in overcoming the "drag" in the swimming direction. This will be shown based on a power balance equation. Thus, we argue that efficiency measures, that relate the drag power to muscle power, or the Froude efficiency, are not recommended. Instead non-dimensional cost-of-transport could be a useful measure to compare efficiencies of organisms at different scales.

  2. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    SciTech Connect

    Verbanis, E.; Martin, A.; Rosset, D.; Lim, C. C. W.; Thew, R. T.; Zbinden, H.

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW that significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.

  3. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    DOE PAGES

    Verbanis, E.; Martin, A.; Rosset, D.; ...

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW thatmore » significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.« less

  4. Resource-Efficient Measurement-Device-Independent Entanglement Witness

    SciTech Connect

    Verbanis, E.; Martin, A.; Rosset, D.; Lim, C. C. W.; Thew, R. T.; Zbinden, H.

    2016-05-09

    Imperfections in experimental measurement schemes can lead to falsely identifying, or over estimating, entanglement in a quantum system. A recent solution to this is to define schemes that are robust to measurement imperfections—measurement-device-independent entanglement witness (MDI-EW). This approach can be adapted to witness all entangled qubit states for a wide range of physical systems and does not depend on detection efficiencies or classical communication between devices. In this paper, we extend the theory to remove the necessity of prior knowledge about the two-qubit states to be witnessed. Moreover, we tested this model via a novel experimental implementation for MDI-EW that significantly reduces the experimental complexity. Finally, by applying it to a bipartite Werner state, we demonstrate the robustness of this approach against noise by witnessing entanglement down to an entangled state fraction close to 0.4.

  5. Method for improving measurement efficiency of lateral shearing interferometry

    NASA Astrophysics Data System (ADS)

    Li, Jie; Tang, Feng; Wang, Xiangzhao; Dai, Fengzhao; Ding, Lei; Chen, Bo; Yang, Xiaoyu; Chai, Liqun

    2017-02-01

    The computation time of wavefront reconstruction is decreased by sampling the difference fronts in the present study. The wavefront can be reconstructed with high accuracy up to 64 Zernike terms with only 32×32 sampled pixels. Furthermore, the computational efficiency can be improved by a factor of more than 1000, and the measurement efficiency of lateral shearing interferometry is improved. The influence of the terms used to reconstruct the wavefront, the grid size of the test wavefront, the shear ratio, and the random noise on the reconstruction accuracy is analyzed and compared, when the difference fronts are sampled with different grid sizes. Numerical simulations and experiments show that the relative reconstruction error is <5% if the grid size of the sampled difference fronts is more than four times the radial order of difference Zernike polynomials with a reasonable noise level and shear ratio.

  6. Measuring efficiency of international crude oil markets: A multifractality approach

    NASA Astrophysics Data System (ADS)

    Niere, H. M.

    2015-01-01

    The three major international crude oil markets are treated as complex systems and their multifractal properties are explored. The study covers daily prices of Brent crude, OPEC reference basket and West Texas Intermediate (WTI) crude from January 2, 2003 to January 2, 2014. A multifractal detrended fluctuation analysis (MFDFA) is employed to extract the generalized Hurst exponents in each of the time series. The generalized Hurst exponent is used to measure the degree of multifractality which in turn is used to quantify the efficiency of the three international crude oil markets. To identify whether the source of multifractality is long-range correlations or broad fat-tail distributions, shuffled data and surrogated data corresponding to each of the time series are generated. Shuffled data are obtained by randomizing the order of the price returns data. This will destroy any long-range correlation of the time series. Surrogated data is produced using the Fourier-Detrended Fluctuation Analysis (F-DFA). This is done by randomizing the phases of the price returns data in Fourier space. This will normalize the distribution of the time series. The study found that for the three crude oil markets, there is a strong dependence of the generalized Hurst exponents with respect to the order of fluctuations. This shows that the daily price time series of the markets under study have signs of multifractality. Using the degree of multifractality as a measure of efficiency, the results show that WTI is the most efficient while OPEC is the least efficient market. This implies that OPEC has the highest likelihood to be manipulated among the three markets. This reflects the fact that Brent and WTI is a very competitive market hence, it has a higher level of complexity compared against OPEC, which has a large monopoly power. Comparing with shuffled data and surrogated data, the findings suggest that for all the three crude oil markets, the multifractality is mainly due to long

  7. TPV efficiency measurements and predictions for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry effects. The overall efficiency of the TPV device is controlled by the TP cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4 x 4 configuration) in a cavity geometry. The first code, subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell electrical output performance predictions (assuming infinite parallel plates). The second code, utilizes a Monte Carlo Photon Transport code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays were fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  8. TPV efficiency predictions and measurements for a closed cavity geometry

    SciTech Connect

    Gethers, C.K.; Ballinger, C.T.; Postlethwait, M.A.; DePoy, D.M.; Baldasaro, P.F.

    1997-05-01

    A thermophotovoltaic (TPV) efficiency measurement, within a closed cavity, is an integrated test which incorporates four fundamental parameters of TPV direct energy conversion. These are: (1) the TPV devices, (2) spectral control, (3) a radiation/photon source, and (4) closed cavity geometry affects. The overall efficiency of the TPV device is controlled by the TPV cell performance, the spectral control characteristics, the radiator temperature and the geometric arrangement. Controlled efficiency measurements and predictions provide valuable feedback on all four. This paper describes and compares two computer codes developed to model 16, 1 cm{sup 2} TPV cells (in a 4x4 configuration) in a cavity geometry. The first code subdivides the infrared spectrum into several bands and then numerically integrates over the spectrum to provide absorbed heat flux and cell performance predictions (assuming infinite parallel plates). The second utilizes a Monte Carlo Ray-Tracing code that tracks photons, from birth at the radiation source, until they either escape or are absorbed. Absorption depends upon energy dependent reflection probabilities assigned to every geometrical surface within the cavity. The model also has the capability of tallying above and below bandgap absorptions (as a function of location) and can support various radiator temperature profiles. The arrays are fabricated using 0.55 eV InGaAs cells with Si/SiO interference filters for spectral control and at steady state conditions, array efficiency was calculated as the ratio of the load matched power to its absorbed heat flux. Preliminary experimental results are also compared with predictions.

  9. An efficient wireless power transfer system with security considerations for electric vehicle applications

    SciTech Connect

    Zhang, Zhen; Chau, K. T. Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-07

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  10. An efficient wireless power transfer system with security considerations for electric vehicle applications

    NASA Astrophysics Data System (ADS)

    Zhang, Zhen; Chau, K. T.; Liu, Chunhua; Qiu, Chun; Lin, Fei

    2014-05-01

    This paper presents a secure inductive wireless power transfer (WPT) system for electric vehicle (EV) applications, such as charging the electric devices inside EVs and performing energy exchange between EVs. The key is to employ chaos theory to encrypt the wirelessly transferred energy which can then be decrypted by specific receptors in the multi-objective system. In this paper, the principle of encrypted WPT is first revealed. Then, computer simulation is conducted to validate the feasibility of the proposed system. Moreover, by comparing the WPT systems with and without encryption, the proposed energy encryption scheme does not involve noticeable power consumption.

  11. Measuring Infant Attachment Security in Rhesus Macaques (Macaca mulatta): Adaptation of the Attachment Q-set

    PubMed Central

    Warfield, James J.; Kondo-Ikemura, Kiyomi; Waters, Everett

    2010-01-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult’s availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant’s typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This paper reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. PMID:20853398

  12. Measuring infant attachment security in rhesus macaques (Macaca mulatta): adaptation of the attachment Q-set.

    PubMed

    Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett

    2011-02-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. © 2010 Wiley-Liss, Inc.

  13. Security Vs. Liberty: How to Measure Privacy Costs in Domestic Surveillance Programs

    DTIC Science & Technology

    2014-03-01

    the moral duty “to violate legal, including constitutional, rights when necessary to avoid catastrophic harm to the nation.”5 This position also...the threat and effectiveness of an intelligence tool to measure the national security interests and the harm to privacy to determine the civil liberty...for the programs argued that the NSA surveillance efforts actually impose little, if any, harm to civil liberties. Neither side made a convincing

  14. Energy-efficient key distribution using electrocardiograph biometric set for secure communications in wireless body healthcare networks.

    PubMed

    Shi, Jinyang; Lam, Kwok-Yan; Gu, Ming; Li, Mingze; Chung, Siu-Leung

    2011-10-01

    Wireless body sensor network (WBSN) has gained significant interests as an important infrastructure for real-time biomedical healthcare systems, while the security of the sensitive health information becomes one of the main challenges. Due to the constraints of limited power, traditional cryptographic key distribution schemes are not suitable for WBSN. This paper proposes a novel energy-efficient approach, BodyKey, which can distribute the keys using the electrocardiograph biometrics. BodyKey represents the biometric features as ordered set, and deals with the biometric variations using set reconciliation. In this way, only limited necessary information needs to be communicated for key agreement, and the total energy consumption for key distribution can thus be reduced. Experiments on the PhysioBank Database show that BodyKey can perform an energy consumption rate of 0.01 mJ/bit with an equal accuracy rate of 97.28%, allowing the system to be used as an energy-efficient key distribution scheme for secure communications in WBSN.

  15. Improving Campus Security with Increased Lighting Efficiency while Simultaneously Reducing Light Pollution

    NASA Astrophysics Data System (ADS)

    Schenk, Andrew; Miller, Dan; Martell, Eric

    2008-04-01

    Many outdoor lighting fixtures fail to enhance the security of the assets they were designed to protect; moreover, they simultaneously increase the levels of light pollution for astronomers. The problem is simple: most lighting fixtures do not properly aim the light they produce downward. In fact, up to fifty percent of the light rays escape upward, thus wasting a significant amount of energy and severely degrading the environment in which to do astronomy. To resolve these problems, I first created a scale model of Millikin University's campus and took time exposures and photometer readings from the replicas of the existing light fixtures. I then fastened improved fixtures to the scaled lamps and retook the camera exposures and photometer readings for comparison. With this information I was able to take my work full scale and physically change one of the light fixtures on campus. Finally to wrap up my project I took my findings to safety and security to show the improvement that these new fixtures represented to Millikin's safety and to its astronomy equipment.

  16. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications

    PubMed Central

    Castedo, Luis

    2017-01-01

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up

  17. A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications.

    PubMed

    Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis

    2017-08-29

    Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to

  18. Cross-Sector Impact Analysis of Industrial Efficiency Measures

    SciTech Connect

    Morrow, William; CreskoEngineering, Joe; Carpenter, Alberta; Masanet, Eric; Nimbalkar, Sachin U; Shehabi, Arman

    2013-01-01

    The industrial or manufacturing sector is a foundational component to all economic activity. In addition to being a large direct consumer of energy, the manufacturing sector also produces materials, products, and technologies that influence the energy use of other economic sectors. For example, the manufacturing of a lighter-weight vehicle component affects the energy required to ship that component as well as the fuel efficiency of the assembled vehicle. Many energy efficiency opportunities exist to improve manufacturing energy consumption, however comparisons of manufacturing sector energy efficiency investment opportunities tend to exclude any impacts that occur once the product leaves the factory. Expanding the scope of analysis to include energy impacts across different stages of product life-cycle can highlight less obvious opportunities and inform actions that create the greatest economy-wide benefits. We present a methodology and associated analysis tool (LIGHTEnUP Lifecycle Industry GHgas, Technology and Energy through the Use Phase) that aims to capture both the manufacturing sector energy consumption and product life-cycle energy consumption implications of manufacturing innovation measures. The tool architecture incorporates U.S. national energy use data associated with manufacturing, building operations, and transportation. Inputs for technology assessment, both direct energy saving to the manufacturing sector, and indirect energy impacts to additional sectors are estimated through extensive literature review and engineering methods. The result is a transparent and uniform system of comparing manufacturing and use-phase impacts of technologies.

  19. Measuring food and nutrition security: tools and considerations for use among people living with HIV.

    PubMed

    Fielden, Sarah J; Anema, Aranka; Fergusson, Pamela; Muldoon, Katherine; Grede, Nils; de Pee, Saskia

    2014-10-01

    As an increasing number of countries implement integrated food and nutrition security (FNS) and HIV programs, global stakeholders need clarity on how to best measure FNS at the individual and household level. This paper reviews prominent FNS measurement tools, and describes considerations for interpretation in the context of HIV. There exist a range of FNS measurement tools and many have been adapted for use in HIV-endemic settings. Considerations in selecting appropriate tools include sub-types (food sufficiency, dietary diversity and food safety); scope/level of application; and available resources. Tools need to reflect both the needs of PLHIV and affected households and FNS program objectives. Generalized food sufficiency and dietary diversity tools may provide adequate measures of FNS in PLHIV for programmatic applications. Food consumption measurement tools provide further data for clinical or research applications. Measurement of food safety is an important, but underdeveloped aspect of assessment, especially for PLHIV.

  20. Consumption, Retirement and Social Security: Evaluating the Efficiency of Reform that Encourages Longer Careers*

    PubMed Central

    Laitner, John; Silverman, Dan

    2012-01-01

    This paper proposes and analyzes a Social Security reform in which individuals no longer face the OASI payroll tax after, say, age 54 or a career of 34 years, and their subsequent earnings have no bearing on their benefits. We first estimate parameters of a life–cycle model. Our specification includes non-separable preferences and possible disability. It predicts a consumption–expenditure change at retirement. We use the magnitude of the expenditure change, together with households’ retirement–age decisions, to identify key structural parameters. The estimated magnitude of the change in consumption–expenditure depends importantly on the treatment of consumption by adult children of the household. Simulations indicate that the reform could increase retirement ages one year or more, equivalent variations could average more than $4,000 per household, and income tax revenues per household could increase by more than $14,000. PMID:23729902

  1. Academic Consequences of Multiple Victimization and the Role of School Security Measures.

    PubMed

    Gardella, Joseph H; Tanner-Smith, Emily E; Fisher, Benjamin W

    2016-09-01

    Adolescents who experience multiple victimization (i.e., victimization on a regular basis) are at greater risk for having negative academic outcomes including lower achievement and poorer attendance than those who do not experience such victimization. Yet, the role of school contexts in this relationship remains unclear. Nevertheless, school-based efforts to reduce victimization often focus on altering contexts without sufficient evidence of associations with improved student outcomes. School security measures constitute one such suite of contextual interventions aimed at reducing victimization. This study tested a moderated mediation model in which the relationship between multiple victimization and academic performance is mediated by absenteeism, and the relationship between multiple victimization and absenteeism is moderated by the presence of school security measures. Participants were 5930 (49.6% female and 79.51% White) 12- to 18-year-old adolescents from a national sample collected through the 2011 School Crime Supplement to the National Crime Victimization Survey. Results of path analysis models indicated that the relationship between multiple victimization and academic performance was partially mediated by absenteeism, and that both metal detectors and security guards moderated the relationship between multiple victimization and absenteeism. Additional analyses revealed the utility of considering subpopulations of victims characterized by specific facets of their contexts. Implications for practitioners and researchers are discussed. © Society for Community Research and Action 2016.

  2. Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements

    SciTech Connect

    Ondrej Linda; Milos Manic; Miles McQueen

    2012-09-01

    Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenarios is demonstrated on several control system network topologies.

  3. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  4. Controlling Crime and Delinquency in the Schools: An Exploratory Study of Student Perceptions of School Security Measures

    ERIC Educational Resources Information Center

    Brown, Ben

    2005-01-01

    This paper provides an analysis of data on school security measures which were obtained from a survey administered to a sample of 230 high school students. The majority of students indicated that the school police officers and security officers help keep the schools safe and that the drug-sniffing dogs help reduce drugs in the schools, but there…

  5. Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement

    NASA Astrophysics Data System (ADS)

    Zhu, Zhen-Chao; Hu, Ai-Qun; Fu, An-Min

    2015-11-01

    In a recent study, Shukla et al. (Quantum Inf Process 13:2391-2405, 2014) proposed two quantum key agreement protocols based on Bell state and Bell measurement, and they claimed that their two protocols were secure. However, in this study, we will show that the three-party protocol they proposed is not secure. Any participant in the protocol can directly obtain other two participants' secret keys. More seriously, two dishonest participants in the protocol can conclude to determine the shared key alone. Furthermore, we will show that there is another minor flaw in their two protocols; that is, eavesdroppers can flip any bit of the final key without introducing any error. In the end, some possible improvements are proposed to avoid these flaws.

  6. Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture

    NASA Astrophysics Data System (ADS)

    Jurčević, M.; Hegeduš, H.; Golub, M.

    2010-01-01

    Testing and calibration of laboratory instruments and reference standards is a routine activity and is a resource and time consuming process. Since many of the modern instruments include some communication interfaces, it is possible to create a remote calibration system. This approach addresses a wide range of possible applications and permits to drive a number of different devices. On the other hand, remote calibration process involves a number of security issues due to recommendations specified in standard ISO/IEC 17025, since it is not under total control of the calibration laboratory personnel who will sign the calibration certificate. This approach implies that the traceability and integrity of the calibration process directly depends on the collected measurement data. The reliable and secure remote control and monitoring of instruments is a crucial aspect of internet-enabled calibration procedure.

  7. Impacts of multiple global environmental changes on African crop yield and water use efficiency: Implications to food and water security

    NASA Astrophysics Data System (ADS)

    Pan, S.; Yang, J.; Zhang, J.; Xu, R.; Dangal, S. R. S.; Zhang, B.; Tian, H.

    2016-12-01

    Africa is one of the most vulnerable regions in the world to climate change and climate variability. Much concern has been raised about the impacts of climate and other environmental factors on water resource and food security through the climate-water-food nexus. Understanding the responses of crop yield and water use efficiency to environmental changes is particularly important because Africa is well known for widespread poverty, slow economic growth and agricultural systems particularly sensitive to frequent and persistent droughts. However, the lack of integrated understanding has limited our ability to quantify and predict the potential of Africa's agricultural sustainability and freshwater supply, and to better manage the system for meeting an increasing food demand in a way that is socially and environmentally or ecologically sustainable. By using the Dynamic Land Ecosystem Model (DLEM-AG2) driven by spatially-explicit information on land use, climate and other environmental changes, we have assessed the spatial and temporal patterns of crop yield, evapotranspiration (ET) and water use efficiency across entire Africa in the past 35 years (1980-2015) and the rest of the 21st century (2016-2099). Our preliminary results indicate that African crop yield in the past three decades shows an increasing trend primarily due to cropland expansion (about 50%), elevated atmospheric CO2 concentration, and nitrogen deposition. However, crop yield shows substantially spatial and temporal variation due to inter-annual and inter-decadal climate variability and spatial heterogeneity of environmental drivers. Climate extremes especially droughts and heat wave have largely reduced crop yield in the most vulnerable regions. Our results indicate that N fertilizer could be a major driver to improve food security in Africa. Future climate warming could reduce crop yield and shift cropland distribution. Our study further suggests that improving water use efficiency through land

  8. Measuring the Neutron Detection Efficiency in CLAS12

    NASA Astrophysics Data System (ADS)

    Sherman, Keegan; Gilfoyle, Gerard

    2016-09-01

    One of the central physics goals of Jefferson Lab is to understand how quarks and gluons form nuclei. To that end, one of the approved experiments in Hall B will measure the magnetic form factor of the neutron with the new CLAS12 detector. We will extract the ratio of electron-neutron to electron-proton scattering events from deuterium which requires a measurement of the neutron detection efficiency (NDE). To measure NDE we will take calibration data using a proton target to produce tagged neutrons from the p(e,e'π+)n reaction. We are now simulating this reaction and developing the analysis code to extract the NDE. We use PYTHIA 6.4 to generate p(e,e'π+)n events and simulate the response of CLAS12 with the Geant4-based Monte Carlo code gemc. To tag the neutron, we use the measured, scattered electron, and π+ information to predict the neutron's path. If the path intersects the fiducial volume of the CLAS12 electromagnetic calorimeters, then we search for a hit near that point. The NDE is the ratio of the number of neutrons found in the calorimeters to the number of neutrons predicted to hit the calorimeters. The analysis was done using the CLAS12 Common Tools. We observe a rapid rise in the NDE at low neutron momentum and a plateau above 60%. Work supported by the University of Richmond and the US Department of Energy.

  9. Improving photosynthetic efficiency to address food security in the 21st century: Strategies for a more efficient crop canopy

    NASA Astrophysics Data System (ADS)

    VanLoocke, A. D.; Slattery, R.; Bernacchi, C.; Zhu, X.; Ort, D. R.

    2013-12-01

    Global food production will need to increase by approximately 70% by mid-century to meet the caloric and nutritional demand of population and economic growth. Achieving this goal will require successfully implementing a wide range of strategies, spanning the social and physical sciences. Here we will present opportunities for improving crop production through increasing photosynthetic rates for a crop canopy that do not require additional agronomic inputs. We will focus on a specific strategy related optimizing the distribution of light within a crop canopy because it is a possible way to improve canopy photosynthesis in crops that form dense canopies, such as soybean, by increasing the transmission of light within a canopy via reduced chlorophyll content. We hypothesized that if decreasing chlorophyll content in soybean leaves will result in greater light penetration into the canopy then this will enhance canopy photosynthesis and improve yields. In addition, if current chlorophyll content in soybean results in excess light absorption, then decreasing chlorophyll content will result in decreased photoprotection that results in the suppression of upper canopy photosynthesis associated with super-optimal light. These hypotheses were tested in 2012 and 2013 in the field on the soybean cultivar 'Clark' (WT) and a nearly isogenic chlorophyll-b deficient mutant (Y11y11). Throughout the season, profiles of light sensors measured incident and reflected light intensity at the canopy surface as well as light levels at ten heights within the canopy. Analyses of these data indicated greater reflectivity, transmissivity and within-canopy light levels for the Y11y11 canopy relative to WT especially in the top half of the canopy. A Gas exchange method was used to determine photosynthetic capacity and suppression high light levels. Daily integrals of leaf-level photosynthesis in sun leaves were greater in Y11y11 compared to WT at several times during the growing season and

  10. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes

    PubMed Central

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme. PMID:28072851

  11. A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes.

    PubMed

    Xie, Dong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2017-01-01

    In a general (k, n) scalable secret image sharing (SSIS) scheme, the secret image is shared by n participants and any k or more than k participants have the ability to reconstruct it. The scalability means that the amount of information in the reconstructed image scales in proportion to the number of the participants. In most existing SSIS schemes, the size of each image shadow is relatively large and the dealer does not has a flexible control strategy to adjust it to meet the demand of differen applications. Besides, almost all existing SSIS schemes are not applicable under noise circumstances. To address these deficiencies, in this paper we present a novel SSIS scheme based on a brand-new technique, called compressed sensing, which has been widely used in many fields such as image processing, wireless communication and medical imaging. Our scheme has the property of flexibility, which means that the dealer can achieve a compromise between the size of each shadow and the quality of the reconstructed image. In addition, our scheme has many other advantages, including smooth scalability, noise-resilient capability, and high security. The experimental results and the comparison with similar works demonstrate the feasibility and superiority of our scheme.

  12. Data Science at the Defense Personnel and Security Research Center. Mission: Improve the Effectiveness, Efficiency, and Fairness of DoD Personnel Security and Suitability Programs

    DTIC Science & Technology

    2015-05-14

    products/services) Data Science: Possible AT&L Initiatives 6 UNCLASSIFIED 2. Modeling/Estimating DoD Security Costs Goal: Create a taxonomy of DoD...Analysis: e.g., Clustering and taxonomic modeling  Predicting: Taxonomies and costs for each taxonomy , covering: • Personnel security • Information

  13. Measuring the Food Access Dimension of Food Security: A Critical Review and Mapping of Indicators.

    PubMed

    Leroy, Jef L; Ruel, Marie; Frongillo, Edward A; Harris, Jody; Ballard, Terri J

    2015-06-01

    With food security now a top priority for many governments and for the global development community, there is heightened awareness of the need to improve our understanding and measurement of food security. To bring clarity in the assessment of the food access dimension of food security at the household and individual level. For the most commonly used indicators, we reviewed their original purpose and construction, at what levels (household or individual) they were designed to be used, what components (quality, quantity, safety, and cultural acceptability) they were intended to reflect, and whether or not they have been tested for validity and comparability across contexts. We identified nine indicators and grouped them in three broad categories: experience-based, coping strategies, and dietary diversity. The indicators only capture the quantity and quality components of food access; none of the indicators capture information on safety or cultural acceptability of food access. Household Dietary Diversity (HDDS) and Food Consumption Score (FCS) are often considered indicators of both quantity and quality, but they have not been validated for the latter. We recommend the use of experience-based indicators, HDDS, or FCS to assess household access to energy; experience-based indicators to assess household access to diet quality (defined qualitatively as not having to adopt practices that favor acquiring cheaper, less appealing, and less micronutrient-dense foods); and individual dietary diversity scores for women or children to assess individual access to diet quality, defined as micronutrient adequacy. © The Author(s) 2015.

  14. Radiation pressure efficiency measurements of nanoparticle coated microspheres

    SciTech Connect

    Kim, Soo Y.; Taylor, Joseph D.; Ladouceur, Harold D.; Hart, Sean J.; Terray, Alex

    2013-12-02

    Experimental measurements of the radiation pressure efficiency (Q{sub pr}) for several microparticles have been compared to theoretical calculations extrapolated from the Bohren-Huffman code for Mie scattering of coated particles. An increased shift of the Q{sub pr} parameter was observed for 2 μm SiO{sub 2} core particles coated with nanoparticles of higher refractive indices. Coatings of 14 nm melamine particles were found to increase the Q{sub pr} parameter 135 times over similar coatings using SiO{sub 2} particles of the same size. While a coating of 100 nm polystyrene particles also showed a significant increase, they did not agree well with theoretical values. It is hypothesized that other factors such as increased scatter, drag, and finite coating coverage are no longer negligible for coatings using nanoparticles in this size regime.

  15. Sequential analysis and packaging of energy-efficiency measures

    SciTech Connect

    Bourne, R.C.; Elberling, L.

    1994-12-31

    This paper describes the sequential analysis and packaging method energy-efficiency measures (EEM`s) for residential sites in the Pacific Gas & Electric Company (PG&E) Advanced Customer Technology Test (ACT) project. By November 1993 the design process was completed for two new residences and was underway on one of two existing residences selected for the program. Process and design results for the two new residences will be described in this paper. The ACT{sup 2} program objective is to test the limits of cost-efficiency measures in typical residences within PG&E`s service territory, located in northern and central California. Detailed evaluations and rankings were conducted to select representative sites from more than twenty candidates. Both new homes are 1,670-1,700 ft{sup 2}, one-story designs located in the Sacramento Valley. The Davis site, approximately 17 miles west of Sacramento, is the residential pilot project located at home for the ACT{sup 2} residential design team, in a community known for its interest in energy conservation. The Stanford Ranch site, located in Rocklin approximately 20 miles northeast of Sacramento, is more representative of typical California tract construction in a major planned community. While climates for the two locations are similar, the Stanford Ranch site typically experiences higher summer temperatures, particularly at night. The ACT{sup 2} program is further described in several prior reports and papers. For each demonstration site, a computer base case model is developed based on the existing building for retrofit projects and on the building which would have been built, for new construction projects. A data evaluation subcontractor develops base case models for use by the design/build subcontractors (both residential and commercial) and evaluates project results based on monitoring data collected after EEM implementation. Completed projects are operated and monitored for two years after completion.

  16. Measures of efficiency in healthcare: QALMs about QALYs?

    PubMed

    Schlander, Michael

    2010-01-01

    Comparative economic evaluations are concerned with the relative efficiency of alternative uses for scarce resources. Cost-benefit analysis (CBA) is grounded in economic welfare theory and attempts to identify alternatives with a net social benefit, measuring the created value in terms of individual willingness to pay (WTP). In applied health economics, cost-effectiveness evaluation (CEA) is more widely used than CBA, adopting a modified efficiency criterion, minimization of incremental costs per quality-adjusted life year (QALY) gained ("cost-utility analysis," CUA). CBA has been greeted with skepticism in the health policy field, primarily owing to resistance to a monetary measure of benefit and owing to concerns that WTP may be unduly influenced by ability to pay. The move to CUA, however, has not been without problems. The framework deviates from economic theory in important aspects and rests on a set of highly restrictive assumptions, some of which must be considered as empirically falsified. Results of CUAs do not seem to be aligned with well-documented social preferences and the needs of healthcare policy makers acting on behalf of society. By implication, there is reason to assume that a context-independent value of a QALY does not exist, with potentially fatal consequences for any attempt to interpret CUAs in a normative way. Policy makers seem well advised to retain a pragmatic attitude towards the results of CUAs, while health economists should pay more attention to the further development of promising alternative evaluation paradigms as opposed to the application of algorithms grounded in poor theory.

  17. Factor structure of the Essen Climate Evaluation Schema measure of social climate in a UK medium-security setting.

    PubMed

    Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia

    2014-04-01

    Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.

  18. Arm-trunk coordination as a measure of vestibulospinal efficiency.

    PubMed

    Sibindi, Tafadzwa M; Krasovsky, Tal; Feldman, Anatol G; Dannenbaum, Elizabeth; Zeitouni, Anthony; Levin, Mindy F

    2013-01-01

    When arm and trunk segments are involved in reaching for objects within arm's reach, vestibulospinal pathways compensate for trunk motion influence on arm movement. This compensatory arm-trunk synergy is characterised by a gain coefficient of 0 to 1. Vestibular patients have less efficient arm-trunk synergies and lower gains. To assess the clinical usefulness of the gain measure, we used a portable ultrasound-based device to characterize arm-trunk coordination deficits in vestibular patients. Arm-trunk coordination without vision was measured in a Stationary Hand Task where hand position was maintained during trunk movement, and a Reaching Task with and without trunk motion. Twenty unilateral vestibular patients and 16 controls participated. For the Stationary Hand task, patient gains ranged from g=0.94 (good compensation) to 0.31 (poor compensation) and, on average, were lower than in controls (patients: 0.67 ± 0.19; controls: 0.85 ± 0.07; p< 0.01). Gains were significantly correlated with clinical tests (Sensory Organization; r=0.62, p< 0.01, Foam Romberg Eyes Closed; r=0.65, p< 0.01). For the Reaching Task, blocking trunk movement during reaching modified hand position significantly more in patients (8.2 ± 4.3 cm) compared to controls (4.5 ± 1.7 cm, p< 0.02) and the amount of hand position deviation was correlated with the degree of vestibular loss in a sub-group (n=14) of patients. Measurement of the Stationary Task arm-trunk gain and hand deviations during the Reaching Task can help characterize sensorimotor problems in vestibular-deficient patients and track recovery following therapeutic interventions. The ultrasound-based portable device is suitable for measuring vestibulospinal deficits in arm-trunk coordination in a clinical setting.

  19. Issues of Intruder Analytical Model Applicability for Evaluating an Efficiency of Security Systems

    NASA Astrophysics Data System (ADS)

    Bukovetskiy, Anton V.; Boyko, Vladimir I.; Kolpakov, Gennady N.; Poner, Michael V.

    2016-06-01

    Physical protection system (PPS) is created at a nuclear object to prevent unauthorized acts regarding to nuclear materials, nuclear installations, points of storage of nuclear materials and other items under physical protection. The ability of the PPS to prevent unauthorized actions of intruder was adopted as the main criterion for evaluating the efficiency of the physical protection system. The article considers the possibility of creation of the intruder analytical model to determine time indicators of overcoming boundaries of protection of nuclear object by an intruder with set features.

  20. Door locking and exit security measures on acute psychiatric admission wards.

    PubMed

    Nijman, H; Bowers, L; Haglund, K; Muir-Cochrane, E; Simpson, A; Van Der Merwe, M

    2011-09-01

    Locking the exit doors of psychiatric wards is believed to reduce the risk of patients absconding. The aims of the study were to investigate both the prevalence of door locking and other exit security measures on UK admission wards, as well as whether door locking appears to be effective in keeping inpatients in. A cross-sectional survey on 136 acute psychiatric wards in the UK was conducted, in which a range of data on patients, staff, and conflict and containment events, including door locking and absconding, were collected from shift to shift during a period of 6 months. About one-third of the participating wards (30%) operated with their ward exit door permanently locked, whereas another third (34%) never locked the ward door. Univariate analyses suggested little association between exit security measures and absconding. A more robust multilevel statistical analysis, however, did indicate a reduction of about 30% of absconding rates when the ward door was locked the entire shift. Although locking the ward door does seem to reduce absconding to a certain extent, it far from completely prevents it. As it may be unrealistic to strive for a 100% absconding-proof ward, alternative measures for door locking to prevent absconding are discussed. © 2011 Blackwell Publishing.

  1. An instrument for measuring scintillators efficiently based on silicon photomultipliers.

    PubMed

    Yang, M J; Zhang, Z M; Wang, Y J; Li, D W; Zhou, W; Tang, H H; Liu, Y T; Chai, P; Shuai, L; Huang, X C; Liu, S Q; Zhu, M L; Jiang, X P; Zhang, Y W; Li, T; Ma, B; Sun, S F; Sun, L Y; Wang, Q; Lu, Z R; Zhang, T; Wei, L

    2016-11-01

    An instrument used for measuring multiple scintillators' light output and energy resolution was developed. The instrument consisted of a light sensor array which was composed of 64 discrete SiPMs (Silicon Photomultipliers), a corresponding individual channel readout electronics system, and a data processing algorithm. A Teflon grid and a large interval between adjacent SiPMs were employed to eliminate the optical cross talk among scintillators. The scintillators' light output was obtained by comparing with a reference sample with known light output. Given the SiPM temperature dependency and the difference among each SiPM, a temperature offset correction algorithm and a non-uniformity correction algorithm were added to the instrument. A positioning algorithm, based on nine points, was designed to evaluate the performance of a scintillator array. Tests were performed to evaluate the instrument's performance. The uniformity of 64 channels for light output measurement was better than 98%, the stability was better than 98% when temperature varied from 15 °C to 40 °C, and the nonlinearity under 511 keV was better than 2%. This instrument was capable of selecting scintillators and evaluating the packaging technology of scintillator arrays with high efficiency and accuracy.

  2. An instrument for measuring scintillators efficiently based on silicon photomultipliers

    NASA Astrophysics Data System (ADS)

    Yang, M. J.; Zhang, Z. M.; Wang, Y. J.; Li, D. W.; Zhou, W.; Tang, H. H.; Liu, Y. T.; Chai, P.; Shuai, L.; Huang, X. C.; Liu, S. Q.; Zhu, M. L.; Jiang, X. P.; Zhang, Y. W.; Li, T.; Ma, B.; Sun, S. F.; Sun, L. Y.; Wang, Q.; Lu, Z. R.; Zhang, T.; Wei, L.

    2016-11-01

    An instrument used for measuring multiple scintillators' light output and energy resolution was developed. The instrument consisted of a light sensor array which was composed of 64 discrete SiPMs (Silicon Photomultipliers), a corresponding individual channel readout electronics system, and a data processing algorithm. A Teflon grid and a large interval between adjacent SiPMs were employed to eliminate the optical cross talk among scintillators. The scintillators' light output was obtained by comparing with a reference sample with known light output. Given the SiPM temperature dependency and the difference among each SiPM, a temperature offset correction algorithm and a non-uniformity correction algorithm were added to the instrument. A positioning algorithm, based on nine points, was designed to evaluate the performance of a scintillator array. Tests were performed to evaluate the instrument's performance. The uniformity of 64 channels for light output measurement was better than 98%, the stability was better than 98% when temperature varied from 15 °C to 40 °C, and the nonlinearity under 511 keV was better than 2%. This instrument was capable of selecting scintillators and evaluating the packaging technology of scintillator arrays with high efficiency and accuracy.

  3. Data Envelopment Analysis: Measurement of Educational Efficiency in Texas

    ERIC Educational Resources Information Center

    Carter, Lacy

    2012-01-01

    The purpose of this study was to examine the efficiency of Texas public school districts through Data Envelopment Analysis. The Data Envelopment Analysis estimation method calculated and assigned efficiency scores to each of the 931 school districts considered in the study. The efficiency scores were utilized in two phases. First, the school…

  4. A reference pelton turbine - design and efficiency measurements

    NASA Astrophysics Data System (ADS)

    Solemslie, Bjørn W.; Dahlhaug, Ole G.

    2014-03-01

    The Pelton turbine has been subject to a varying degree of research interest since the debut of the technology over a century ago. Despite its age there are gaps in the knowledge concerning the flow mechanisms effecting the flow through the turbine. A Pelton turbine has been designed at the Waterpower Laboratory at NTNU. This has been done in connection to a Ph.D. project focusing on the flow in Pelton turbine buckets. The design of the turbine has been conducted using in-house knowledge in addition to some comments from a turbine producer. To describe the geometry multiple Bezier curves were used and the design strategy aimed to give a smooth and continuous gradient along the main flow directions in the bucket. The turbine has been designed for the operational conditions of the Pelton test rig installed at the Waterpower Laboratory which is a horizontal single jet test rig with a jet diameter(ds) of 35 mm. The diameter(D) of the runner was set to 513 mm and the width(W) of a bucket 114 mm, leading to a D/W ratio of 4.5. Manufacturing of the turbine has been carried out in aluminium and the turbine has undergone efficiency testing and visual inspection during operation at a head of 70 m. The turbine did not performed as expected and the maximum efficiency was found to be 77.75%. The low efficiency is mainly caused by a large amount of water leaving the bucket through the lip and hence transferring close to zero of its energy to the shaft. The reason for the large lip loss is discussed and two possible causes are found; the jet is located too close to the lip, and the inner surface of the bucket does not lead the water away from the lip. The turbine geometry and all data from both measurements and simulations will be available upon request in an effort to increase the amount of available data concerning Pelton turbines.

  5. Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers

    PubMed Central

    Kohli, Charu; Banerjee, Bratati; Ingle, Gopal Krishna

    2017-01-01

    Introduction World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. Aim To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. Materials and Methods A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. Results A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Conclusion Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures. PMID:28658811

  6. Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers.

    PubMed

    Kohli, Charu; Gupta, Kalika; Banerjee, Bratati; Ingle, Gopal Krishna

    2017-05-01

    World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures.

  7. Adaptive Measurement of Well-Being: Maximizing Efficiency and Optimizing User Experience during Individual Assessment.

    PubMed

    Kraatz, Miriam; Sears, Lindsay E; Coberley, Carter R; Pope, James E

    2016-08-01

    Well-being is linked to important societal factors such as health care costs and productivity and has experienced a surge in development activity of both theories and measurement. This study builds on validation of the Well-Being 5 survey and for the first time applies Item Response Theory, a modern and flexible measurement paradigm, to form the basis of adaptive population well-being measurement. Adaptive testing allows survey questions to be administered selectively, thereby reducing the number of questions required of the participant. After the graded response model was fit to a sample of size N = 12,035, theta scores were estimated based on both the full-item bank and a simulation of Computerized Adaptive Testing (CAT). Comparisons of these 2 sets of score estimates with each other and of their correlations with external outcomes of job performance, absenteeism, and hospital admissions demonstrate that the CAT well-being scores maintain accuracy and validity. The simulation indicates that the average survey taker can expect a reduction in number of items administered during the CAT process of almost 50%. An increase in efficiency of this extent is of considerable value because of the time savings during the administration of the survey and the potential improvement of user experience, which in turn can help secure the success of a total population-based well-being improvement program. (Population Health Management 2016;19:284-290).

  8. Adaptive Measurement of Well-Being: Maximizing Efficiency and Optimizing User Experience during Individual Assessment

    PubMed Central

    Kraatz, Miriam; Coberley, Carter R.; Pope, James E.

    2016-01-01

    Abstract Well-being is linked to important societal factors such as health care costs and productivity and has experienced a surge in development activity of both theories and measurement. This study builds on validation of the Well-Being 5 survey and for the first time applies Item Response Theory, a modern and flexible measurement paradigm, to form the basis of adaptive population well-being measurement. Adaptive testing allows survey questions to be administered selectively, thereby reducing the number of questions required of the participant. After the graded response model was fit to a sample of size N = 12,035, theta scores were estimated based on both the full-item bank and a simulation of Computerized Adaptive Testing (CAT). Comparisons of these 2 sets of score estimates with each other and of their correlations with external outcomes of job performance, absenteeism, and hospital admissions demonstrate that the CAT well-being scores maintain accuracy and validity. The simulation indicates that the average survey taker can expect a reduction in number of items administered during the CAT process of almost 50%. An increase in efficiency of this extent is of considerable value because of the time savings during the administration of the survey and the potential improvement of user experience, which in turn can help secure the success of a total population-based well-being improvement program. (Population Health Management 2016;19:284–290) PMID:26674396

  9. Efficient linear criterion for witnessing Einstein-Podolsky-Rosen nonlocality under many-setting local measurements

    NASA Astrophysics Data System (ADS)

    Zheng, Yu-Lin; Zhen, Yi-Zheng; Chen, Zeng-Bing; Liu, Nai-Le; Chen, Kai; Pan, Jian-Wei

    2017-01-01

    The striking and distinctive nonlocal features of quantum mechanics were discovered by Einstein, Podolsky, and Rosen (EPR) beyond classical physics. At the core of the EPR argument, it was "steering" that Schrödinger proposed in 1935. Besides its fundamental significance, quantum steering opens up a novel application for quantum communication. Recent work has precisely characterized its properties; however, witnessing the EPR nonlocality remains a big challenge under arbitrary local measurements. Here we present an alternative linear criterion and complement existing results to efficiently testify steering for high-dimensional system in practice. By developing a novel and analytical method to tackle the maximization problem in deriving the bound of a steering criterion, we show how observed correlations can reveal powerfully the EPR nonlocality in an easily accessed manner. Although the criteria is not necessary and sufficient, it can recover some of the known results under a few settings of local measurements and is applicable even if the size of the system or the number of measurement settings are high. Remarkably, a deep connection is explicitly established between the steering and amount of entanglement. The results promise viable paths for secure communication with an untrusted source, providing optional loophole-free tests of the EPR nonlocality for high-dimensional states, as well as motivating solutions for other related problems in quantum information theory.

  10. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For...

  11. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For...

  12. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 3 2010-01-01 2010-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For...

  13. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For...

  14. 10 CFR 431.16 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Test procedures for the measurement of energy efficiency. 431.16 Section 431.16 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... Methods of Determining Efficiency § 431.16 Test procedures for the measurement of energy efficiency. For...

  15. Field measurements and guidelines for the application of wireless sensor networks to the environment and security.

    PubMed

    Gil Jiménez, Víctor P; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow(©). Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems.

  16. Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security

    PubMed Central

    Gil Jiménez, Víctor P.; Armada, Ana García

    2009-01-01

    Frequently, Wireless Sensor Networks (WSN) are designed focusing on applications and omitting transmission problems in these wireless networks. In this paper, we present a measurement campaign that has been carried out using one of the most commonly used WSN platforms, the micaZ from Crossbow©. Based on these measurements, some guidelines to deploy a robust and reliable WSN are provided. The results are focused on security and environmental applications but can also be extrapolated to other scenarios. A main conclusion that can be extracted is that, from the transmission point of view, a dense WSN is one of the best choices to overcome many of the transmission problems such as the existence of a transitional region, redundance, forwarding, obstructions or interference with other systems. PMID:22303175

  17. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date of... individual being hired as a Company Security Officer (CSO) or VSO, or any individual being hired to perform...

  18. Measuring the operational efficiency of individual theme park attractions.

    PubMed

    Kim, Changhee; Kim, Soowook

    2016-01-01

    This study assesses the operation efficiency of theme park attractions using the data envelopment analysis, utilizing actual data on 15 attractions at Samsung Everland located in Yongin-si, Republic of Korea. In particular, this study identifies crowding and waiting time as one of the main causes of visitor's satisfaction, and analyzes the efficiency of individual attractions in terms of waiting time. The installation area, installation cost, and annual repair cost are set as input factors and the number of annual users and customer satisfaction as output factors. The results show that the roller coaster-type attractions were less efficient than other types of attractions while rotating-type attractions were relatively more efficient. However, an importance performance analysis on individual attraction's efficiency and satisfaction showed that operational efficiency should not be the sole consideration in attraction installation. In addition, the projection points for input factors for efficient use of attractions and the appropriate reference set for benchmarking are provided as guideline for attraction efficiency management.

  19. R: A quantitative measure of NMR signal receiving efficiency.

    PubMed

    Mo, Huaping; Harwood, John; Zhang, Shucha; Xue, Yi; Santini, Robert; Raftery, Daniel

    2009-10-01

    Recognizing that the sensitivity of NMR is influenced by factors such as conductance and dielectric constant of the sample, we propose the receiving efficiency R to characterize how efficiently the NMR signal can be observed from a unit transverse magnetization in a sample under optimal probe tuning and matching conditions. Conveniently, the relative receiving efficiency can be defined as the ratio of the NMR signal induced by a unit transverse magnetization in a sample of interest and a reference solution. Based on the reciprocal relationship between excitation and observation in NMR, the relative receiving efficiency can be correlated with the 90 degrees pulse length (tau(90)). In the special case of perfect probe tuning (impedance matched to 50 Omega), R is inversely proportional to tau(90). Application of the NMR receiving efficiency in quantitative analysis potentially enables a single external concentration reference for almost any sample, eliminating the need to know its exact chemical composition or detailed electromagnetic properties.

  20. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  1. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  2. The Role of Earnings and Financial Risk in Distributional Analyses of Social Security Reform Measures

    ERIC Educational Resources Information Center

    Hungerford, Thomas L.

    2006-01-01

    The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…

  3. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  4. Advanced Micro Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and Power Quality at DoD Installations

    DTIC Science & Technology

    2016-10-28

    EW-201147) Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy Security, and...12-C-0002 5b. GRANT NUMBER Advanced Micro-Grid Energy Management Coupled with Integrated Volt/VAR Control for Improved Energy Efficiency, Energy ...AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) ESTCP ESTCP Energy & Water Program 11. SPONSOR/MONITOR’S REPORT 4800 Mark Center Drive

  5. Embedded Performance Validity Measures with Postdeployment Veterans: Cross-Validation and Efficiency with Multiple Measures.

    PubMed

    Shura, Robert D; Miskey, Holly M; Rowland, Jared A; Yoash-Gantz, Ruth E; Denning, John H

    2016-01-01

    Embedded validity measures support comprehensive assessment of performance validity. The purpose of this study was to evaluate the accuracy of individual embedded measures and to reduce them to the most efficient combination. The sample included 212 postdeployment veterans (average age = 35 years, average education = 14 years). Thirty embedded measures were initially identified as predictors of Green's Word Memory Test (WMT) and were derived from the California Verbal Learning Test-Second Edition (CVLT-II), Conners' Continuous Performance Test-Second Edition (CPT-II), Trail Making Test, Stroop, Wisconsin Card Sorting Test-64, the Wechsler Adult Intelligence Scale-Third Edition Letter-Number Sequencing, Rey Complex Figure Test (RCFT), Brief Visuospatial Memory Test-Revised, and the Finger Tapping Test. Eight nonoverlapping measures with the highest area-under-the-curve (AUC) values were retained for entry into a logistic regression analysis. Embedded measure accuracy was also compared to cutoffs found in the existing literature. Twenty-one percent of the sample failed the WMT. Previously developed cutoffs for individual measures showed poor sensitivity (SN) in the current sample except for the CPT-II (Total Errors, SN = .41). The CVLT-II (Trials 1-5 Total) showed the best overall accuracy (AUC = .80). After redundant measures were statistically eliminated, the model included the RCFT (Recognition True Positives), CPT-II (Total Errors), and CVLT-II (Trials 1-5 Total) and increased overall accuracy compared with the CVLT-II alone (AUC = .87). The combination of just 3 measures from the CPT-II, CVLT-II, and RCFT was the most accurate/efficient in predicting WMT performance.

  6. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2014-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  7. Integrating Multi-Sensor Remote Sensing and In-situ Measurements for Africa Drought Monitoring and Food Security Assessment

    NASA Astrophysics Data System (ADS)

    Hao, X.; Qu, J. J.; Motha, R. P.; Stefanski, R.; Malherbe, J.

    2015-12-01

    Drought is one of the most complicated natural hazards, and causes serious environmental, economic and social consequences. Agricultural production systems, which are highly susceptible to weather and climate extremes, are often the first and most vulnerable sector to be affected by drought events. In Africa, crop yield potential and grazing quality are already nearing their limit of temperature sensitivity, and, rapid population growth and frequent drought episodes pose serious complications for food security. It is critical to promote sustainable agriculture development in Africa under conditions of climate extremes. Soil moisture is one of the most important indicators for agriculture drought, and is a fundamentally critical parameter for decision support in crop management, including planting, water use efficiency and irrigation. While very significant technological advances have been introduced for remote sensing of surface soil moisture from space, in-situ measurements are still critical for calibration and validation of soil moisture estimation algorithms. For operational applications, synergistic collaboration is needed to integrate measurements from different sensors at different spatial and temporal scales. In this presentation, a collaborative effort is demonstrated for drought monitoring in Africa, supported and coordinated by WMO, including surface soil moisture and crop status monitoring. In-situ measurements of soil moisture, precipitation and temperature at selected sites are provided by local partners in Africa. Measurements from the Soil Moisture and Ocean Salinity (SMOS) and the Moderate Resolution Imaging Spectroradiometer (MODIS) are integrated with in-situ observations to derive surface soil moisture at high spatial resolution. Crop status is estimated through temporal analysis of current and historical MODIS measurements. Integrated analysis of soil moisture data and crop status provides both in-depth understanding of drought conditions and

  8. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    PubMed

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  9. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  10. Correlation of rheological characteristics of lubricants with transmission efficiency measurements

    NASA Technical Reports Server (NTRS)

    Jacobson, B. O.; Hamrock, B. J.; Hoeglund, E.

    1985-01-01

    The power efficiency of a helicopter transmission has been analyzed for 11 lubricants by looking at the Newtonian and non-Newtonian properties of the lubricants. A non-Newtonian property of the lubricants was the limiting shear strength proportionality constant. The tests were performed on a high-pressure, short-time shear strength analyzer. A power efficiency formula that was obtained by analyzing the Newtonian and non-Newtonian properties of the lubricants is presented in detail.

  11. The air-kerma rate constant: application to air-kerma measurements for homeland security.

    PubMed

    Pibida, L; Minniti, R; Lucas, L; Seltzer, S M

    2008-02-01

    Air-kerma rate measurements from 57Co, 60Co, and 137Cs radioactive sources were performed. These measurements were motivated by the development of new sources at the National Institute of Standards and Technology (NIST) for radiological testing of equipment for homeland security applications. The testing of radiation detection equipment relies on knowing the values of the air-kerma rate for the radioactive sources at a fixed distance from the source. The air-kerma rate can be measured or alternatively estimated by using published values of the air-kerma rate constant. Although there are a large number of published values of the air-kerma rate constant for radionuclide sources based on theoretical calculations, strong disagreement is observed throughout the literature. Furthermore, most of the published values have no uncertainties assigned, and therefore their use for testing radiological equipment is limited. In this work we report experimentally-measured values of the air-kerma rate for three radionuclides with well defined source geometries and activities. The results are compared to estimates based on published values of the air-kerma rate constant. Such values are easily found in the literature from the last three decades and are used commonly by the scientific community.

  12. [Ultima ratio of the applied security measures in placing perpetrators in a psychiatric hospital].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The meaning of articles on the main security measures concerned with placing the convict in a closed psychiatric unit is studied. Articles 93 & 94 section 1 of the penal code limit their application only as final measures--the ultima ratio. Art. 93 of the penal code pertains to the perpetrator of illegal actions in connection to their psychiatric illness, mental retardation, alcohol or other related substance addiction, along with a risk of the crime being committed once again, only when it will prevent the person from repeating the crime. The issues that need be considered are the following: psychic state of the perpetrator along with prediction of the risk of him repeating the act, but the liability evaluation and the degree of probability do not play any vital role. This is probably due to the fact that the measure described in art. 96 of the penal code has a limited time span (it cannot be any shorter than 3 months and longer than 2 years) and what is more; it can be applied instead of the punishment. Art. 94 section 1 of the penal code requires very precise evaluation of the risk of repetition in each case of a non-liable perpetrator guilty of conducting crime of serious social damage. This measure is not limited in time span, because it depends on the psychic state of the person under its influence. Henceforth it is considered as more restrictive.

  13. Measuring political commitment and opportunities to advance food and nutrition security: piloting a rapid assessment tool.

    PubMed

    Fox, Ashley M; Balarajan, Yarlini; Cheng, Chloe; Reich, Michael R

    2015-06-01

    Lack of political commitment has been identified as a primary reason for the low priority that food and nutrition interventions receive from national governments relative to the high disease burden caused by malnutrition. Researchers have identified a number of factors that contribute to food and nutrition's 'low-priority cycle' on national policy agendas, but few tools exist to rapidly measure political commitment and identify opportunities to advance food and nutrition on the policy agenda. This article presents a theory-based rapid assessment approach to gauging countries' level of political commitment to food and nutrition security and identifying opportunities to advance food and nutrition on the policy agenda. The rapid assessment tool was piloted among food and nutrition policymakers and planners in 10 low- and middle-income countries in April to June 2013. Food and nutrition commitment and policy opportunity scores were calculated for each country and strategies to advance food and nutrition on policy agendas were designed for each country. The article finds that, in a majority of countries, political leaders had verbally and symbolically committed to addressing food and nutrition, but adequate financial resources were not allocated to implement specific programmes. In addition, whereas the low cohesion of the policy community has been viewed a major underlying cause of the low-priority status of food and nutrition, the analysis finds that policy community cohesion and having a well thought-out policy alternative were present in most countries. This tool may be useful to policymakers and planners providing information that can be used to benchmark and/or evaluate advocacy efforts to advance reforms in the food and nutrition sector; furthermore, the results can help identify specific strategies that can be employed to move the food and nutrition agenda forward. This tool complements others that have been recently developed to measure national commitment to

  14. Characterization of Si nanostructures using internal quantum efficiency measurements

    SciTech Connect

    ZAIDI,SALEEM H.

    2000-04-01

    Hemispherical reflectance and internal quantum efficiency measurements have been employed to evaluate the response of Si nanostructured surfaces formed by using random and periodic reactive ion etching techniques. Random RIE-textured surfaces have demonstrated solar weighted reflectance of {approx} 3% over 300--1,200-nm spectral range even without the benefit of anti-reflection films. Random RIE-texturing has been found to be applicable over large areas ({approximately} 180 cm{sup 2}) of both single and multicrystalline Si surfaces. Due to the surface contamination and plasma-induced damage, RIE-textured surfaces did not initially provide increased short circuit current as expected from the enhanced absorption. Improved processing combined with wet-chemical damage removal etches resulted in significant improvement in the short circuit current with IQEs comparable to the random, wet-chemically textured surfaces. An interesting feature of the RIE-textured surfaces was their superior performance in the near IR spectral range. The response of RIE-textured periodic surfaces can be broadly classified into three distinct regimes. One-dimensional grating structures with triangular profiles are characterized by exceptionally low, polarization-independent reflective behavior. The reflectance response of such surfaces is similar to a graded-index anti-reflection film. The IQE response from these surfaces is severely degraded in the UV-Visible spectral region due to plasma-induced surface damage. One-dimensional grating structures with rectangular profiles exhibit spectrally selective absorptive behavior with somewhat similar IQE response. The third type of grating structure combines broadband anti-reflection behavior with significant IQE enhancement in 800--1,200-nm spectral region. The hemispherical reflectance of these 2D grating structures is comparable to random RIE-textured surfaces. The IQE enhancement in the long wavelength spectral region can be attributed to

  15. Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

    NASA Astrophysics Data System (ADS)

    Wang, Yang; Bao, Wan-Su; Chen, Rui-Ke; Zhou, Chun; Jiang, Mu-Sheng; Li, Hong-Wei

    2017-08-01

    Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie’s mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations.

  16. Measuring hospital efficiency: a comparison of two approaches.

    PubMed Central

    Chirikos, T N; Sear, A M

    2000-01-01

    OBJECTIVE: To compare the results of scoring hospital efficiency by means of two new types of frontier models, Data Envelopment Analysis (DEA) and stochastic frontier regression (SFR). STUDY SETTING: Financial records of Florida acute care hospitals in continuous operation over the period 1982-1993. STUDY DESIGN: Comparable DEA and SFR models are specified, and these models are then estimated to obtain the efficiency indexes yielded by each. The empirical results are subsequently examined to ascertain the extent to which they serve the needs of hospital policymakers. DATA COLLECTION: A longitudinal or panel data set is assembled, and a common set of output, input, and cost indicators is constructed to support the estimation of comparable DEA and SFR models. PRINCIPAL FINDINGS: DEA and SFR models yield convergent evidence about hospital efficiency at the industry level, but divergent portraits of the individual characteristics of the most and least efficient facilities. CONCLUSIONS: Hospital policymakers should not be indifferent to the choice of the frontier model used to score efficiency relationships. They may be well advised to wait until additional research clarifies reasons why DEA and SFR models yield divergent results before they introduce these methods into the policy process. PMID:10654837

  17. Measuring the efficiency of large pharmaceutical companies: an industry analysis.

    PubMed

    Gascón, Fernando; Lozano, Jesús; Ponte, Borja; de la Fuente, David

    2017-06-01

    This paper evaluates the relative efficiency of a sample of 37 large pharmaceutical laboratories in the period 2008-2013 using a data envelopment analysis (DEA) approach. We describe in detail the procedure followed to select and construct relevant inputs and outputs that characterize the production and innovation activity of these pharmaceutical firms. Models are estimated with financial information from Datastream, including R&D investment, and the number of new drugs authorized by the European Medicines Agency (EMA) and the US Food and Drug Administration (FDA) considering the time effect. The relative performances of these firms-taking into consideration the strategic importance of R&D-suggest that the pharmaceutical industry is a highly competitive sector given that there are many laboratories at the efficient frontier and many inefficient laboratories close to this border. Additionally, we use data from S&P Capital IQ to analyze 2071 financial transactions announced by our sample of laboratories as an alternative way to gain access to new drugs, and we link these transactions with R&D investment and DEA efficiency. We find that efficient laboratories make on average more financial transactions, and the relative size of each transaction is larger. However, pharmaceutical companies that simultaneously are more efficient and invest more internally in R&D announce smaller transactions relative to total assets.

  18. Measuring the efficiency of wastewater services through Data Envelopment Analysis.

    PubMed

    Guerrini, A; Romano, G; Leardini, C; Martini, M

    2015-01-01

    Efficient water management is a priority in the European Union, since the operational efficiency of many water utilities is very low compared to best practice. Several countries are restructuring the water industry to save costs. Larger-scale operations and vertical integration are promoted to achieve scale and scope economies; however, the literature is not unanimous that such economies exist. There is also little evidence of the effect of customer density on costs. This article offers some insights into this matter, analysing the Danish water industry by a two-stage Data Envelopment Analysis approach to investigate the effects of size, scope and density in the wastewater industry. The results show that the Danish wastewater industry is positively affected by vertical integration and higher population density: firms that serve more than 100 person per km of sewer and combine water and wastewater services achieve better efficiency. Size does not have any significant influence on global efficiency, although technical pure efficiency decreases statistically with firm size.

  19. Information Leakage in Efficient Bidirectional Quantum Secure Direct Communication with Single Photons in Both Polarization and Spatial-Mode Degrees of Freedom

    NASA Astrophysics Data System (ADS)

    Zhang, Cai; Situ, Haozhen

    2016-11-01

    Recently, Wang et al. presented a bidirectional quantum secure direct communication protocol with single photons in both polarization and spatial-mode degrees of freedom (Int. J. Theor. Phys. 54(10): 3443-3453, 2015). They claimed that their protocol was efficient and removed the drawback of information leakage. However, we found that the information leakage actually exists in their protocol. In this paper, we analyze Wang et al.'s protocol in detail. In addition, we propose an improvement to avoid the information leakage. The security of the improved protocol has also been discussed.

  20. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 3 2013-01-01 2013-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA, this...

  1. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 3 2012-01-01 2012-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA, this...

  2. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 3 2014-01-01 2014-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA, this...

  3. 10 CFR 431.444 - Test procedures for the measurement of energy efficiency.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 3 2011-01-01 2011-01-01 false Test procedures for the measurement of energy efficiency. 431.444 Section 431.444 Energy DEPARTMENT OF ENERGY ENERGY CONSERVATION ENERGY EFFICIENCY PROGRAM FOR... procedures for the measurement of energy efficiency. (a) Scope. Pursuant to section 346(b)(1) of EPCA, this...

  4. Measuring the burden of preventable diabetic hospitalisations in the Mexican Institute of Social Security (IMSS).

    PubMed

    Lugo-Palacios, David G; Cairns, John; Masetto, Cynthia

    2016-08-02

    The prevalence of diabetes among adults in Mexico has increased markedly from 6.7 % in 1994 to 14.7 % in 2015. Although the main diabetic complications can be prevented or delayed with timely and effective primary care, a high percentage of diabetic patients have developed them imposing an important preventable burden on Mexican society and on the health system. This paper estimates the financial and health burden caused by potentially preventable hospitalisations due to diabetic complications in hospitals operated by the largest social security institution in Latin America, the Mexican Institute of Social Security (IMSS), in the period 2007-2014. Hospitalisations in IMSS hospitals whose main cause was a diabetic complication were identified. The financial burden was estimated using IMSS diagnostic-related groups. To estimate the health burden, DALYs were computed under the assumption that patients would not have experienced complications if they had received timely and effective primary care. A total of 322,977 hospitalisations due to five diabetic complications were identified during the period studied, of which hospitalisations due to kidney failure and diabetic foot represent 78 %. The financial burden increased by 8.4 % in real terms between 2007 and 2014. However, when measured as cost per IMSS affiliate, it decreased by 11.3 %. The health burden had an overall decrease of 13.6 % and the associated DALYs in 2014 reached 103,688. Resources used for the hospital treatment of diabetic complications are then not available for other health care interventions. In order to prevent these hospitalisations more resources might need to be invested in primary care; the first step could be to consider the financial burden of these hospitalisations as a potential target for switching resources from hospital care to primary care services. However, more evidence of the effectiveness of different primary care interventions is needed to know how much of the burden could

  5. Improving the Coast Guard Ports, Waterways and Coastal Security Outcome Measure

    DTIC Science & Technology

    2009-06-01

    assessment of mission effectiveness in achieving homeland security? 5. Risk Modeling 5.a. What impact do you think the use of Risk Modeling would...assessment of mission effectiveness in achieving homeland security? 6. Expert Judgment 6.a. What impact do you think the use of Expert Judgment would have...of mission effectiveness in achieving homeland security? 7. Expert Judgment Aggregation 7.a. What impact do you think the use of Expert Judgment

  6. Low Efficiency Control Measures for Jet Engine Test Cells

    DTIC Science & Technology

    1978-09-01

    replacement cost was based upon filter cost data ob- tained from Mr. Roland Langlois, Owens - Corning Fiberglas Inc., Technical Cen- ter, Granville, Ohio. 3...Torgeson’s theory was used to calculate the collection efficiency of three commercial glass fiber filter media samples obtained from Owens - Corning Fiberglas

  7. Measuring Efficiencies of Academic Departments within a College

    ERIC Educational Resources Information Center

    Tauer, Loren W.; Fried, Harold O.; Fry, William E.

    2007-01-01

    Technical and allocative efficiencies of 26 academic departments in the College of Agriculture and Life Sciences at Cornell University are computed using Data Envelopment Analysis over 2004/05. Allocations of faculty time between teaching, research, and extension vary by department and are used as unique prices in calculating allocative…

  8. Comparison of measured and calculated collision efficiencies at low temperatures

    NASA Astrophysics Data System (ADS)

    Nagare, B.; Marcolli, C.; Stetzer, O.; Lohmann, U.

    2015-12-01

    Interactions of atmospheric aerosols with clouds influence cloud properties and modify the aerosol life cycle. Aerosol particles act as cloud condensation nuclei and ice nucleating particles or become incorporated into cloud droplets by scavenging. For an accurate description of aerosol scavenging and ice nucleation in contact mode, collision efficiency between droplets and aerosol particles needs to be known. This study derives the collision rate from experimental contact freezing data obtained with the ETH CoLlision Ice Nucleation CHamber (CLINCH). Freely falling 80 μm diameter water droplets are exposed to an aerosol consisting of 200 and 400 nm diameter silver iodide particles of concentrations from 500 to 5000 and 500 to 2000 cm-3, respectively, which act as ice nucleating particles in contact mode. The experimental data used to derive collision efficiency are in a temperature range of 238-245 K, where each collision of silver iodide particles with droplets can be assumed to result in the freezing of the droplet. An upper and lower limit of collision efficiency is also estimated for 800 nm diameter kaolinite particles. The chamber is kept at ice saturation at a temperature range of 236 to 261 K, leading to the slow evaporation of water droplets giving rise to thermophoresis and diffusiophoresis. Droplets and particles bear charges inducing electrophoresis. The experimentally derived collision efficiency values of 0.13, 0.07 and 0.047-0.11 for 200, 400 and 800 nm particles are around 1 order of magnitude higher than theoretical formulations which include Brownian diffusion, impaction, interception, thermophoretic, diffusiophoretic and electric forces. This discrepancy is most probably due to uncertainties and inaccuracies in the description of thermophoretic and diffusiophoretic processes acting together. This is, to the authors' knowledge, the first data set of collision efficiencies acquired below 273 K. More such experiments with different droplet and

  9. Measuring communication and social skills in a high security forensic setting using the behavioural status index.

    PubMed

    Woods, P; Reed, V; Collins, M

    2001-06-01

    Assessing patient functioning in the areas of communication and social skills is a core area of practice within psychiatric nursing. Difficulties within these areas can often represent the root of a number of presenting problems. Objective assessment can be difficult without a validated assessment schema. The Behavioural Status Index (BSI) offers such a system of baseline assessment and longitudinal monitoring as a basis for treatment, further specialised assessment, or measurement of outcome during and after interventions. This paper introduces some basic theory and describes the function and purpose of the BSI. This is followed by data analysis for the BSI communications and social skills sub-scale. Data were collected, using a repeated measures method by primary nurses, from a sample of 503 individual patients in two high security mental health hospitals. Results are reported for descriptive statistics, and factor analysis; and differences between the independent groups of Mental Health Act 1983 classification, ward dependency and gender. Data trends are indicative of clinically interesting relationships. A distinct factorial structure emerged suggesting groupings of assertive-interpersonal, non-verbal, social-perceptive and para-linguistic behaviours. Results are reported to be underpinning current European studies.

  10. Nuclear Resonance Fluorescence Measurements on ^237Np for Security and Safeguards Applications

    NASA Astrophysics Data System (ADS)

    Angell, C. T.; Joshi, T.; Yee, Ryan; Norman, E. B.; Kulp, W. D.; Warren, G. A.; Korbly, S.; Klimenko, A.; Wilson, C.; Copping, R.; Shuh, D. K.

    2009-10-01

    The smuggling of nuclear material and the diversion of fissile material for covert weapon programs both present grave risks to world security. Methods are needed to detect nuclear material smuggled in cargo, and for proper material accountability in civilian fuel re-processing facilities. Nuclear resonance fluorescence (NRF) is a technique that can address both needs. It is a non-destructive active interrogation method that provides isotope-specific information. It works by using a γ-ray beam to resonantly excite levels in a nucleus and observing the γ-rays emitted whose energy and intensity are characteristic of that isotope. ^237Np presents significant safeguard challenges; it is fissile yet currently has fewer safeguard restrictions. NRF measurements on ^237Np will expand the nuclear database and will permit designing interrogation and assay systems. Measurements were made using the bremsstrahlung beam at the HVRL at MIT on a 7 g target of ^237Np with two incident electron energies of 2.8 and 3.1 MeV. Results will be presented with discussion of the relevant nuclear structure necessary to predict levels in other actinides.

  11. Measure Guideline: Energy-Efficient Window Performance and Selection

    SciTech Connect

    Carmody, J.; Haglund, K.

    2012-11-01

    This document provides guidelines for the selection of energy-efficient windows in new and existing residential construction in all US climate zones. It includes information on window products, their attributes and performance. It provides cost/benefit information on window energy savings as well as information on non-energy benefits such as thermal comfort and reduced HVAC demands. The document also provides information on energy impacts of design decisions such as window orientation, total glazing area and shading devices and conditions. Information on resources for proper window installation is included as well. This document is for builders, homeowners, designers and anyone making decisions about selecting energy efficient window. It is intended to complement other Building America information and efforts.

  12. Measuring efficiency in modern gas turbine power stations

    SciTech Connect

    Parmar, J.; Gilmartin, D.

    1998-07-01

    The United Kingdom Government's decision to put the publicly-owned Electricity Supply Industry into the hands of private investors paved the way for the creation of a competitive electricity market, and encouraged the entry of Independent Power Producers (IPP). Competition in electricity generation has increased as new entrants have taken advantage of the latest Combined Cycle Gas Turbine (CCGT) technology, which offers rapid build times, low construction cost, and high cycle efficiency, as well as lower environmental emissions. It is of paramount importance that suitable Guarantees are in place before investing in either new build or existing power plant projects. There will be Guarantees within all of the contracts that provide the framework for a viable power project, from the power purchase agreement (PPA), and fuel supply agreement (FSA), to the turnkey contract (Engineer, Procure and Construct). The Plant Performance Guarantees, especially on module power output and heat rate, have a major impact on a project's economic viability, and although they are included within the turnkey construction contract, they may also be passed through to the PPA and FSA. This paper details the Performance Guarantee Tests that are carried out jointly by the Owner-Operator and the Plant Constructor on a large CCGT plant in the UK, though the Tests are as valid for international sites. The methodology of the Performance Test is described, along with the applicable International Standards. On-line efficiency monitoring at one of National Power's CCGT plant is also briefly outlined. A set of typical power and heat rate correction curves is provided in Appendix 1 for reference, while Appendix 2 contains an example calculation of turbine inlet temperature as per DIN 4341. Appendix 3 is a flow diagram for an online efficiency calculation cycle, using the EfficiencyMap{trademark} Performance Monitoring system.

  13. Transmission efficiency measurement at the FNAL 4-rod RFQ

    SciTech Connect

    Carneiro, J. P.; Garcia, F. G.; Ostiguy, J. F.; Saini, A.; Zwaska, R.; Mustapha, B.; Ostroumov, P.

    2014-12-01

    This paper presents measurements of the beam transmission performed on the 4-rod RFQ currently under operation at Fermilab. The beam current has been measured at the RFQ exit as a function of the magnetic field strength in the two LEBT solenoids. This measurement is compared with scans performed on the FermiGrid with the beam dynamics code TRACK. A particular attention is given to the impact, on the RFQ beam transmission, of the space-charge neutralization in the LEBT.

  14. Efficient measurement of amylose content in cereal grains.

    USDA-ARS?s Scientific Manuscript database

    Rapid and economical measurement of amylose content in barley is important for genetic study and breeding improvement of this trait. Seventeen genotypes with a wide range of amylose contents were used to compare the amylose measurement accuracy of the cost-effective iodine-potassium iodide (I:KI) me...

  15. Measurement of carbon capture efficiency and stored carbon leakage

    SciTech Connect

    Keeling, Ralph F.; Dubey, Manvendra K.

    2013-01-29

    Data representative of a measured carbon dioxide (CO.sub.2) concentration and of a measured oxygen (O.sub.2) concentration at a measurement location can be used to determine whether the measured carbon dioxide concentration at the measurement location is elevated relative to a baseline carbon dioxide concentration due to escape of carbon dioxide from a source associated with a carbon capture and storage process. Optionally, the data can be used to quantify a carbon dioxide concentration increase at the first location that is attributable to escape of carbon dioxide from the source and to calculate a rate of escape of carbon dioxide from the source by executing a model of gas-phase transport using at least the first carbon dioxide concentration increase. Related systems, methods, and articles of manufacture are also described.

  16. Measure Guideline. Energy-Efficient Window Performance and Selection

    SciTech Connect

    Carmody, John; Haglund, Kerry

    2012-11-01

    This document provides guidelines for the selection of energy-efficient windows in new and existing residential construction in all U.S. climate zones. It includes information on window products, their attributes and performance. It provides cost/benefit information on window energy savings as well as information on non-energy benefits such as thermal comfort and reduced HVAC demands. The report also provides information on energy impacts of design decisions such as window orientation, total glazing area and shading devices and conditions. Information on resources for proper window installation is included as well.

  17. Consistent and efficient processing of ADCP streamflow measurements

    USGS Publications Warehouse

    Mueller, David S.; Constantinescu, George; Garcia, Marcelo H.; Hanes, Dan

    2016-01-01

    The use of Acoustic Doppler Current Profilers (ADCPs) from a moving boat is a commonly used method for measuring streamflow. Currently, the algorithms used to compute the average depth, compute edge discharge, identify invalid data, and estimate velocity and discharge for invalid data vary among manufacturers. These differences could result in different discharges being computed from identical data. Consistent computational algorithm, automated filtering, and quality assessment of ADCP streamflow measurements that are independent of the ADCP manufacturer are being developed in a software program that can process ADCP moving-boat discharge measurements independent of the ADCP used to collect the data.

  18. Investigation of measurement accuracy of factors used for detective quantum efficiency measurement in digital radiography.

    PubMed

    Kunitomo, Hiroshi; Koyama, Shuji; Higashide, Ryo; Ichikawa, Katsuhiro; Hattori, Masumi; Okada, Yoko; Hayashi, Norio; Sawada, Michito

    2014-07-01

    In the detective quantum efficiency (DQE) evaluation of detectors for digital radiography (DR) systems, physical image quality indices such as modulation transfer function (MTF) and normalized noise power spectrum (NNPS) need to be accurately measured to obtain highly accurate DQE evaluations. However, there is a risk of errors in these measurements. In this study, we focused on error factors that should be considered in measurements using clinical DR systems. We compared the incident photon numbers indicated in IEC 62220-1 with those estimated using a Monte Carlo simulation based on X-ray energy spectra measured employing four DR systems. For NNPS, influences of X-ray intensity non-uniformity, tube voltage and aluminum purity were investigated. The effects of geometric magnifications on MTF accuracy were also examined using a tungsten edge plate at distances of 50, 100 and 150 mm from the detector surface at a source-image receptor distance of 2000 mm. The photon numbers in IEC 62220-1 coincided with our estimates of values, with error rates below 2.5%. Tube voltage errors of approximately ±5 kV caused NNPS errors of within 1.0%. The X-ray intensity non-uniformity caused NNPS errors of up to 2.0% at the anode side. Aluminum purity did not affect the measurement accuracy. The maximum MTF reductions caused by geometric magnifications were 3.67% for 1.0-mm X-ray focus and 1.83% for 0.6-mm X-ray focus.

  19. Improved Coalescence Efficiency Measurements for Small Precipitation Drops.

    NASA Astrophysics Data System (ADS)

    Ochs, Harry T., III; Schaufelberger, Daniel E.; Feng, James Q.

    1991-04-01

    A previously unreported feature of the coalescence of water drops was observed for an isolated pair of drops (R = 275 m and r = 200 m) falling at terminal velocity through nearly saturated air. This new feature, grazing coalescence, occurred when the horizontal offset between centers of the colliding drops is near the sum of their radii, and was observed because of the use of orthogonally placed cameras that permitted the determination of the true horizontal offset between the drops just prior to collision. This discovery has prompted a reexamination of a study by Ochs et al. (1986)in which a single camera system was used to make observations of drop collisions at similar drop sizes. In the previous work it was assumed that more central collisions would result in coalescence and that collisions outside of the central region would result in bounce. The maximum observed horizontal offset resulting in coalescence was believed to be an observation from which the coalescence efficiency could be derived. Since this geometrical method proved unsatisfactory, probably due to grazing coalescences, they used a statistical approach to evaluate the data. In light of the present observations the older work is reexamined and found to have reported coalescence efficiencies that are probably too high, most likely from excess charge on the drops in the earlier study.

  20. Sloan Digital Sky Survey observing time tracking and efficiency measurement

    SciTech Connect

    Eric H. Neilsen, Jr.; Richard G. Kron; William N. Boroski

    2002-10-16

    Accurate and consistent time tracking is essential for evaluating the efficiency of survey observing operations and identifying areas that need improvement. Off the shelf time tracking software, which requires users to enter activities by hand, proved tedious to use and insufficiently exible. In this paper, we present an alternate time tracking system developed specifically for Sloan Digital Sky Survey observing. This system uses an existing logging system, murmur, to log the beginning and ending times of tracked circumstances, including activities, weather, and problems which effect observing. Operations software automatically generates most entries for routine observing activities; in a night of routine observing, time tracking requires little or no attention from the observing staff. A graphical user interface allows observers to make entries marking time lost to weather and equipment, and to correct inaccurate entries made by the observing software. The last is necessary when the change in activity is not marked by a change in the state of the software or instruments, or when the time is used for engineering or other observing not part of routine survey data collection. A second utility generates reports of time usage from these logs. These reports include totals for the time spent for each observing task, time lost to weather and problems, efficiency statistics for comparison with the survey baseline, and a detailed listing of what activities and problems were present in any covered time period.

  1. Perceived Safety at Work in the Wake of Terror: The Importance of Security Measures and Emergency Preparedness.

    PubMed

    Nissen, Alexander; Heir, Trond

    2016-12-01

    We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).

  2. Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work

    SciTech Connect

    Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.; Endicott-Popovsky, Barbara E.

    2011-04-11

    Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus on our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.

  3. Statistically efficient tomography of low rank states with incomplete measurements

    NASA Astrophysics Data System (ADS)

    Acharya, Anirudh; Kypraios, Theodore; Guţă, Mădălin

    2016-04-01

    The construction of physically relevant low dimensional state models, and the design of appropriate measurements are key issues in tackling quantum state tomography for large dimensional systems. We consider the statistical problem of estimating low rank states in the set-up of multiple ions tomography, and investigate how the estimation error behaves with a reduction in the number of measurement settings, compared with the standard ion tomography setup. We present extensive simulation results showing that the error is robust with respect to the choice of states of a given rank, the random selection of settings, and that the number of settings can be significantly reduced with only a negligible increase in error. We present an argument to explain these findings based on a concentration inequality for the Fisher information matrix. In the more general setup of random basis measurements we use this argument to show that for certain rank r states it suffices to measure in O(r{log}d) bases to achieve the average Fisher information over all bases. We present numerical evidence for random states of up to eight atoms, which suggests that a similar behaviour holds in the case of Pauli bases measurements, for randomly chosen states. The relation to similar problems in compressed sensing is also discussed.

  4. [Design and implementation of an intellectualized measuring instrument for medical electricity security parameters].

    PubMed

    Guo, Hong-rui; Xu, Yan; Geng, Yan

    2006-09-01

    An introduction of an intelligent testing instrument for medical electrical equipment security is given in this article. The realization of its testing functions is based on a single-chip processor, the high-voltage control circuit and the relay combination network technology. It can be used to test security parameters such as the continuous leakage current, patient auxiliary current, dielectric strength and protective earth impedance. It is suitable for the medical electricity security testing of Kind I, II and Type B, BF, CF (internal power supply) medical electrical equipments.

  5. Measurements of the transport efficiency of the fragment mass analyzer

    SciTech Connect

    Back, B.B.; Blumenthal, D.J.; Davids, C.N.

    1995-08-01

    Extensive calculations of the transport of reaction products were carried out during the design phase of the instrument using the computer code GIOS. These show that the energy acceptance depends strongly on the angular deviation from the optical axis of the instrument. In order to reliably measure cross sections using this instrument it is therefore necessary to verify these calculations empirically.

  6. Heavy doping considerations and measurements in high-efficiency cells

    NASA Technical Reports Server (NTRS)

    Lindholm, F.

    1985-01-01

    Theoretical work on heavily doped silicon was described. Heavily doped polysilicon was used as a back-surface passivant replacing the usual back-surface field (BSF). Very good first results were achieved and there is the promise of a simple, low temperature deposition process. Short-circuit current-decay measurement methods were also covered.

  7. The Efficiency of Higher Education Institutions in England Revisited: Comparing Alternative Measures

    ERIC Educational Resources Information Center

    Johnes, Geraint; Tone, Kaoru

    2017-01-01

    Data envelopment analysis (DEA) has often been used to evaluate efficiency in the context of higher education institutions. Yet there are numerous alternative non-parametric measures of efficiency available. This paper compares efficiency scores obtained for institutions of higher education in England, 2013-2014, using three different methods: the…

  8. Selected Private Higher Educational Institutions in Metro Manila: A DEA Efficiency Measurement

    ERIC Educational Resources Information Center

    de Guzman, Maria Corazon Gwendolyn N.; Cabana, Emilyn

    2009-01-01

    This paper measures the technical efficiency of 16 selected colleges and universities in Metro Manila, Philippines, using academic data for the SY 2001-2005. Using the data envelopment analysis (DEA), on average, schools posted 0.807 index score and need additional 19.3% efficiency growth to be efficient. Overall, there are top four efficient…

  9. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...; (iii) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v... be an adverse impact to facility operations if the new hire is not allowed access. (c) This section...

  10. 33 CFR 105.257 - Security measures for newly-hired employees.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (iii) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v... be an adverse impact to facility operations if the new hire is not allowed access. (c) This section...

  11. 33 CFR 104.267 - Security measures for newly hired employees.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...) Social security number (optional); (iv) Employer name and 24 hour contact information; and (v) Date of... impact to vessel operations if the new hire is not allowed access. (c) This section does not apply to any...

  12. Clinical comparison of the efficiency and security of balloon dilators versus fascial dilators in percutaneous nephrolithotripsy (PCNL)

    PubMed Central

    Yang, Lingbo; Lu, Shuaiqi; Han, Xingtao; Wei, Pengtao; Yang, Jinhui; Hao, Tongtong

    2016-01-01

    Objective: To compare the efficiency and security of the balloon dilators versus fascial dilators in percutaneous nephrolithotripsy (PCNL), We compared the difference of intraoperative and postoperative parameters of patients using these two different methods of expansion and having no significant statistic differences in peroperative parameters. Methods: This is a retrospective analysis of 134 patients undergoing PCNL with upper urinary calculi from January 2012 to January 2014 in Luoyang Central Hospital affiliated to Zhengzhou University. These patients meeting the inclusion criteria were divided into two groups: the group of balloon dilators (group A) and the group of fascial dilators (group B). Two groups were compared for success rate of first expansion, clearance of stone, duration of surgery, intraoperative hemorrhage, blood transfusion rate, postoperative hospitalization and the incidence of complications. Result: In Group A, a total of 91 patients (51 men and 40 women, mean age 51.22±8.96 years, ranged from 28 to 68 years, the calculi maximum diameter from 0.9 to 4.5cm, 28 cases with a history of gravel, mean Body mass index 24.20±2.34, 73 cases with hydronephrosis and 26 cases with underlying diseases such as hypertension, diabetes and the like) undergoing PCNL were retrospectively reviewed. Similarly, In Group B, a total of 43 patients (28 men and 15 women, mean age 49.64±10.62 years, ranged from 15 to 70 years, the calculi maximum diameter from 1.1 to 5.2cm, 18 cases with a history of gravel, mean Body mass index 24.40±2.70, 38 cases with hydronephrosis and 14 cases with underlying diseases such as hypertension, diabetes and the like) undergoing PCNL were retrospectively reviewed. Our results showed that there was a statistically significant better outcome in Group A than in Group B in terms of success rate of first exploration, duration of operation, intraoperative hemorrhage, postoperative hospitalization and the incidence of complications

  13. Confocal stereology: an efficient tool for measurement of microscopic structures.

    PubMed

    Kubínová, Lucie; Janáček, Jiří

    2015-04-01

    Quantitative measurements of geometric forms or counting of objects in microscopic specimens is an essential tool in studies of microstructure. Confocal stereology represents a contemporary approach to the evaluation of microscopic structures by using a combination of stereological methods and confocal microscopy. 3-D images acquired by confocal microscopy can be used for the estimation of geometrical characteristics of microscopic structures by stereological methods, based on the evaluation of optical sections within a thick slice and using computer-generated virtual test probes. Such methods can be used for estimating volume, number, surface area and length using relevant spatial probes, which are generated by specific software. The interactions of the probes with the structure under study are interactively evaluated. An overview of the methods of confocal stereology developed during the past 30 years is presented. Their advantages and pitfalls in comparison with other methods for measurement of geometrical characteristics of microscopic structures are discussed.

  14. Efficient measurement error correction with spatially misaligned data

    PubMed Central

    Szpiro, Adam A.; Sheppard, Lianne; Lumley, Thomas

    2011-01-01

    Association studies in environmental statistics often involve exposure and outcome data that are misaligned in space. A common strategy is to employ a spatial model such as universal kriging to predict exposures at locations with outcome data and then estimate a regression parameter of interest using the predicted exposures. This results in measurement error because the predicted exposures do not correspond exactly to the true values. We characterize the measurement error by decomposing it into Berkson-like and classical-like components. One correction approach is the parametric bootstrap, which is effective but computationally intensive since it requires solving a nonlinear optimization problem for the exposure model parameters in each bootstrap sample. We propose a less computationally intensive alternative termed the “parameter bootstrap” that only requires solving one nonlinear optimization problem, and we also compare bootstrap methods to other recently proposed methods. We illustrate our methodology in simulations and with publicly available data from the Environmental Protection Agency. PMID:21252080

  15. New shape representation and similarity measure for efficient shape indexing

    NASA Astrophysics Data System (ADS)

    Kupeev, Konstantin Y.; Sivan, Zohar

    2001-12-01

    Efficient search and retrieval of similar shapes in large databases stipulates two hardly compatible demands to the shape representations. On one hand, shape similarity conveys similarity of spatial relations of the shape parts. Thus, the representation should embed a kind of graph description of the shape, and allow estimation of the (inexact) correspondence between these descriptions. On the other hand, the representation should enable fast retrieval in large databases. Current shape indexing solutions do not comply well to these stipulations simultaneously. The G-graphs have been introduced as shape descriptors conveying structural and quantitative shape information. In the current work we define a representation of the G-graphs by strings consisting of the symbols from a four-letter alphabet such that two G-graphs are isomorphic as G-graphs if and only if their string representations are identical. This allows us to represent shapes by vectors consisting of strings and to introduce a shape representation satisfying both above demands. Experimental results are presented.

  16. A highly efficient measure of mass segregation in star clusters

    NASA Astrophysics Data System (ADS)

    Olczak, C.; Spurzem, R.; Henning, Th.

    2011-08-01

    Context. Investigations of mass segregation are of vital interest for the understanding of the formation and dynamical evolution of stellar systems on a wide range of spatial scales. A consistent analysis requires a robust measure among different objects and well-defined comparison with theoretical expectations. Various methods have been used for this purpose but usually with limited significance, quantifiability, and application to both simulations and observations. Aims: We aim at developing a measure of mass segregation with as few parameters as possible, robustness against peculiar configurations, independence of mass determination, simple implementation, stable algorithm, and that is equally well adoptable for data from either simulations or observations. Methods: Our method is based on the minimum spanning tree (MST) that serves as a geometry-independent measure of concentration. Compared to previous such approaches we obtain a significant refinement by using the geometrical mean as an intermediate-pass. Results: The geometrical mean boosts the sensitivity compared to previous applications of the MST. It thus allows the detection of mass segregation with much higher confidence and for much lower degrees of mass segregation than other approaches. The method shows in particular very clear signatures even when applied to small subsets of the entire population. We confirm with high significance strong mass segregation of the five most massive stars in the Orion nebula cluster (ONC). Conclusions: Our method is the most sensitive general measure of mass segregation so far and provides robust results for both data from simulations and observations. As such it is ideally suited for tracking mass segregation in young star clusters and to investigate the long standing paradigm of primordial mass segregation by comparison of simulations and observations.

  17. Sleep Logs: Measurement of Individual and Operational Efficiency

    DTIC Science & Technology

    1991-05-01

    during a given mission scenario. There are many tools for measuring amounts and patterns of sleep. Portable brain wave recording systems, for an...Hullaney, and Wybarney, 1982). It can be used easily in the field to separate periods of rest/sleep (minimal activities , presumably asleep’ from...physically active periods. However, such actigraphic units are relatively expensive. The most economical and preferred method to study sleep, especially ill

  18. Measuring hospital efficiency with Data Envelopment Analysis: nonsubstitutable vs. substitutable inputs and outputs.

    PubMed

    Barnum, Darold T; Walton, Surrey M; Shields, Karen L; Schumock, Glen T

    2011-12-01

    There is a conflict between Data Envelopment Analysis (DEA) theory's requirement that inputs (outputs) be substitutable, and the ubiquitous use of nonsubstitutable inputs and outputs in DEA applications to hospitals. This paper develops efficiency indicators valid for nonsubstitutable variables. Then, using a sample of 87 community hospitals, it compares the new measures' efficiency estimates with those of conventional DEA measures. DEA substantially overestimated the hospitals' efficiency on the average, and reported many inefficient hospitals to be efficient. Further, it greatly overestimated the efficiency of some hospitals but only slightly overestimated the efficiency of others, thus making any comparisons among hospitals questionable. These results suggest that conventional DEA models should not be used to estimate the efficiency of hospitals unless there is empirical evidence that the inputs (outputs) are substitutable. If inputs (outputs) are not substitutes, efficiency indicators valid for nonsubstitutability should be employed, or, before applying DEA, the nonsubstitutable variables should be combined using an appropriate weighting scheme or statistical methodology.

  19. Efficiencies of intracoronary sodium nitroprusside on fractional flow reserve measurement

    PubMed Central

    Li, Shaosheng; Deng, Jie; Wang, Xiaozeng; Zhao, Xin; Han, Yaling

    2015-01-01

    Background: Fractional flow reserve (FFR) has certain advantages of assessing functional severity of coronary stenosis. Adenosine(AD) is the most widely used agents in FFR measurement but has the disadvantages of higher rate of complications. Sodium Nitroprusside (SNP) represents a valuable alternative. Methods and results: In 75 patients with 86 moderate coronary stenosis, FFR values, heart rate and blood pressure were measured at baseline, after 0.6 μg boluses of intracoronary (IC) SNP, and after 140 μg/kg /min of continuous intravenous (IV) AD. FFR values decreased significantly after administering IV AD and IC SNP compared with the baseline Pd/Pa values (P < 0.001). Mean FFR induced by IV AD was not significantly different from that by IC SNP (t = 0.577, P = 0.566). The mean kappa value in the evaluation of two methods was 0.973 for FFR. There was a significant correlation between the FFR values of IV AD and IC SNP (R = 0.911, P < 0.001). Significant decreases in the blood pressures were found after agents were given compared to the baseline. No significant difference was found between AD and SNP. In addition, immediate complications occurred in 60.5% patients of IV AD in contrast to no adverse events after IC SNP. Conclusion: SNP is a safe and effective agent and easy to use for the FFR measurement. Maximal hyperemia by IC SNP is equivalent to that by IV AD. IC SNP could be considered a potential alternative in patients with contraindications to AD administration. PMID:25932219

  20. Medical network security and viruses.

    PubMed

    Fernandez Del Val, C

    1991-01-01

    Medical network as connecting Hospital Information Systems are needed in order to exchange, compare and make accessible data. The use of OSI standard communication protocols (open-network environment) will allow to interconnect multiple vendor systems and to accommodate a wide range of underlaying of communication technologies. The security of information on a given host may become dependent of the security measures employed by the network and by other hosts. Computer viruses modifies the executable code and thrive in network environment filled with personal computers and third-party software. Most networks and computers, permit users to share files; this, let the viruses to bypass the security mechanisms of almost every commercial operating system. However, computer viruses axes not the only threat to the information in a network environment. Other as deliberate (passive attacks -wire-tapping-) and accidental threat (unauthorized access to the information) are potential risks to the security information. Cryptographic techniques that now are widely used can resolve the external security problems of the network and improve the internal security ones. This paper begins describing the threats to security that arise in an open-network environment, and goes to establish the security requirements of medical communication networks. This is followed by a description of security services as: confidentiality, integrity, authentication, access control, etc., that will be provided to include security mechanisms in such network. The integration of these security mechanisms into the communication protocols allows to implement secure communication systems that not only must provide the adequate security, but also must minimize the impact of security on other features as for example the efficiency. The remainder of the paper describes how the security mechanisms are formed using current cryptographic facilities as algorithms, one-way functions, cryptographic systems (symmetric

  1. An analysis of the Wheeler method for measuring the radiating efficiency of antennas

    NASA Technical Reports Server (NTRS)

    Smith, G. S.

    1977-01-01

    A model problem is formulated to evaluate the limitations imposed by the assumptions in the Wheeler or cap method for measuring the radiating efficiency of antennas. The antenna in the model is a circular loop and the radiation shield is a spherical metal shell. Calculated values of the actual efficiency of the antenna and the efficiency that would be measured using the Wheeler method are compared to determine the accuracy of the method and set guidelines for its application.

  2. Data Envelopment Analysis and Its Application to the Measurement of Efficiency in Higher Education

    ERIC Educational Resources Information Center

    Johnes, Jill

    2006-01-01

    The purpose of this paper is to examine the possibility of measuring efficiency in the context of higher education. The paper begins by exploring the advantages and drawbacks of the various methods for measuring efficiency in the higher education context. The ease with which data envelopment analysis (DEA) can handle multiple inputs and multiple…

  3. Data Envelopment Analysis and Its Application to the Measurement of Efficiency in Higher Education

    ERIC Educational Resources Information Center

    Johnes, Jill

    2006-01-01

    The purpose of this paper is to examine the possibility of measuring efficiency in the context of higher education. The paper begins by exploring the advantages and drawbacks of the various methods for measuring efficiency in the higher education context. The ease with which data envelopment analysis (DEA) can handle multiple inputs and multiple…

  4. Airborne Dust Cloud Measurements at the INL National Security Test Range

    SciTech Connect

    Michael L. Abbott; Norm Stanley; Larry Radke; Charles Smeltzer

    2007-09-01

    On July 11, 2007, a surface, high-explosive test (<20,000 lb TNT-equivalent) was carried out at the National Security Test Range (NSTR) on the Idaho National Laboratory (INL) Site. Aircraft-mounted rapid response (1-sec) particulate monitors were used to measure airborne PM-10 concentrations directly in the dust cloud and to develop a PM-10 emission factor that could be used for subsequent tests at the NSTR. The blast produced a mushroom-like dust cloud that rose approximately 2,500–3,000 ft above ground level, which quickly dissipated (within 5 miles of the source). In general, the cloud was smaller and less persistence than expected, or that might occur in other areas, likely due to the coarse sand and subsurface conditions that characterize the immediate NSTR area. Maximum short time-averaged (1-sec) PM-10 concentrations at the center of the cloud immediately after the event reached 421 µg m-3 but were rapidly reduced (by atmospheric dispersion and fallout) to near background levels (~10 µg m-3) after about 15 minutes. This occurred well within the INL Site boundary, about 8 km (5 miles) from the NSTR source. These findings demonstrate that maximum concentrations in ambient air beyond the INL Site boundary (closest is 11.2 km from NSTR) from these types of tests would be well within the 150 µg m-3 24-hour National Ambient Air Quality Standards for PM-10. Aircraft measurements and geostatistical techniques were used to successfully quantify the initial volume (1.64E+9 m3 or 1.64 km3) and mass (250 kg) of the PM-10 dust cloud, and a PM-10 emission factor (20 kg m-3 crater soil volume) was developed for this specific type of event at NSTR. The 250 kg of PM-10 mass estimated from this experiment is almost seven-times higher than the 36 kg estimated for the environmental assessment (DOE-ID 2007) using available Environmental Protection Agency (EPA 1995) emission factors. This experiment demonstrated that advanced aircraft-mounted instruments operated by

  5. What are we measuring? Comparison of household food security indicators in the Eastern Cape Province, South Africa.

    PubMed

    Hendriks, Sheryl L; van der Merwe, Corné; Ngidi, Mjabuliseni S; Manyamba, Christopher; Mbele, Mondli; McIntyre, Angela M; Mkandawire, Elizabeth; Molefe, Queeneth N; Mphephu, Mulalo Q; Ngwane, Lithle

    2016-01-01

    The development of national food security information systems is constrained by a lack of guidance on which indicators to use. This paper compares food security indicators across two seasons (summer and winter) in one of the most deprived areas of the Eastern Cape province of South Africa. The results show that only anthropometric indicators are sensitive enough to differentiate levels of food insecurity. The lack of consistent classification across indicators means that surveys must use a combination of food consumption and experience of hunger measures backed up by anthropometric measures. Targeting interventions is difficult if the measures cannot be relied on. Further investigation is needed to identify a suite of appropriate indicators for a national information and surveillance system.

  6. Efficient measurement of quantum gate error by interleaved randomized benchmarking.

    PubMed

    Magesan, Easwar; Gambetta, Jay M; Johnson, B R; Ryan, Colm A; Chow, Jerry M; Merkel, Seth T; da Silva, Marcus P; Keefe, George A; Rothwell, Mary B; Ohki, Thomas A; Ketchen, Mark B; Steffen, M

    2012-08-24

    We describe a scalable experimental protocol for estimating the average error of individual quantum computational gates. This protocol consists of interleaving random Clifford gates between the gate of interest and provides an estimate as well as theoretical bounds for the average error of the gate under test, so long as the average noise variation over all Clifford gates is small. This technique takes into account both state preparation and measurement errors and is scalable in the number of qubits. We apply this protocol to a superconducting qubit system and find a bounded average error of 0.003 [0,0.016] for the single-qubit gates X(π/2) and Y(π/2). These bounded values provide better estimates of the average error than those extracted via quantum process tomography.

  7. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    PubMed

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  8. [Measures to enhance patient safety. Importance of efficiency evaluation].

    PubMed

    Conen, D

    2011-02-01

    Over the last 10 years, there has been increasing awareness of medical errors and harm to patients in healthcare. There is now widespread acceptance of the problem of medical harm and a determination to tackle major patient safety problems. Safety is defined as freedom from accidental injury. Thus, clinical risk management has been increasingly requested by professionals and their professional organizations to make healthcare safer. Clinical risk management is one of a number of organizational systems or processes aimed to improve the quality of healthcare, but one which is primarily concerned with creating and maintaining safe systems of care. A definition of this form--identifying, analyzing, and controlling risks--fits more comfortably with the culture and mission of healthcare organizations and is more likely to achieve the support and involvement of clinical professionals because it better reflects their purpose and values. Patient safety needs to become embedded in the culture of healthcare, not just in the sense of individual high standards, but a widespread acceptance of understanding of risk and safety and the need of everyone to actively promote patient safety. Measures taken to enhance patient safety encompass a wide range of activities with regard to the errors in the process of medication, to surgical errors and surgical outcome ("safer surgery saves lives"), and to hospitalism and hospital-acquired infections taking into consideration adherence to hand hygiene. An evaluation of the added value to patient safety, when processes are systematically changed and the patients become involved in making healthcare safer, is needed.

  9. Security of quantum bit string commitment depends on the information measure.

    PubMed

    Buhrman, Harry; Christandl, Matthias; Hayden, Patrick; Lo, Hoi-Kwong; Wehner, Stephanie

    2006-12-22

    Unconditionally secure nonrelativistic bit commitment is known to be impossible in both the classical and the quantum world. However, when committing to a string of n bits at once, how far can we stretch the quantum limits? In this Letter, we introduce a framework of quantum schemes where Alice commits a string of n bits to Bob, in such a way that she can only cheat on a bits and Bob can learn at most b bits of information before the reveal phase. Our results are twofold: we show by an explicit construction that in the traditional approach, where the reveal and guess probabilities form the security criteria, no good schemes can exist: a + b is at least n. If, however, we use a more liberal criterion of security, the accessible information, we construct schemes where a = 4log2(n) + O(1) and b = 4, which is impossible classically. Our findings significantly extend known no-go results for quantum bit commitment.

  10. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.

    PubMed

    Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-12-21

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  11. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

    PubMed Central

    Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-01-01

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834

  12. An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards

    NASA Astrophysics Data System (ADS)

    Jin, Wenting; Xu, Jing

    Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocols provide an authenticated key exchange between two clients of different realms, who only share their passwords with their own servers. Recently, several such cross-realm C2C-PAKA protocols have been suggested in the private-key (symmetric) setting, but all of these protocols are found to be vulnerable to password-compromise impersonation attacks. In this paper, we propose our innovative C2C- PAKA-SC protocol in which smart cards are first utilized in the cross-realm setting so that it can resist all types of common attacks including password-compromise impersonation attacks and provide improved efficiency. Moveover, we modify the original formal security model to adapt our proposed protocol and present a corresponding security proof.

  13. Apparatus and method for measuring single cell and sub-cellular photosynthetic efficiency

    DOEpatents

    Davis, Ryan Wesley; Singh, Seema; Wu, Huawen

    2013-07-09

    Devices for measuring single cell changes in photosynthetic efficiency in algal aquaculture are disclosed that include a combination of modulated LED trans-illumination of different intensities with synchronized through objective laser illumination and confocal detection. Synchronization and intensity modulation of a dual illumination scheme were provided using a custom microcontroller for a laser beam block and constant current LED driver. Therefore, single whole cell photosynthetic efficiency, and subcellular (diffraction limited) photosynthetic efficiency measurement modes are permitted. Wide field rapid light scanning actinic illumination is provided for both by an intensity modulated 470 nm LED. For the whole cell photosynthetic efficiency measurement, the same LED provides saturating pulses for generating photosynthetic induction curves. For the subcellular photosynthetic efficiency measurement, a switched through objective 488 nm laser provides saturating pulses for generating photosynthetic induction curves. A second near IR LED is employed to generate dark adapted states in the system under study.

  14. Measuring agricultural sustainability in terms of efficiency: the case of Dutch sugar beet growers.

    PubMed

    De Koeijer, T J; Wossink, G A A; Struik, P C; Renkema, J A

    2002-09-01

    Sustainability embraces socio-economic and bio-ecological dimensions or attributes. This paper presents a conceptual framework for quantifying sustainability on the basis of efficiency theory commonly used in economics. The conceptual model is implemented using Data Envelopment Analysis (DEA). Sustainability is measured for a sample of Dutch sugar beet growers. The average technical efficiency was only 50%. A positive correlation was found between technical efficiency and sustainable efficiency. Differences in efficiency among farmers were persistent within and between years. We conclude that there is considerable scope for improving the sustainability of arable farming by better management.

  15. Energy efficiency measures in China: A three-stage DEA analysis

    NASA Astrophysics Data System (ADS)

    Cai, Yu; Xiong, Siqin; Ma, Xiaoming

    2017-04-01

    This paper measures energy efficiency of 30 regions in China during 2010-2014 by using the three-stage data envelopment analysis (DEA) model. The results indict that environmental factors and random error both have significant impacts on energy efficiency. After eliminating these influences, the results present that the energy efficiency in developed regions is almost higher than that in undeveloped or resource-rich regions and low scale technical efficiency is the main constraining factor in inefficient regions. Based on the efficiency characteristics, this paper divides all regions into four types and provide differential energy strategies.

  16. Omnium-G parabolic dish optical efficiency: a comparison of two independent measurement techniques

    SciTech Connect

    Bohn, M.; Gaul, H.

    1980-10-01

    Measurements made at SERI of the optical efficiency of the Omnium-G parabolic dish concentrator are described. Two independent techniques were used: the cold-water calorimeter method and the heat of fusion method. Results from both techniques agree quite well and indicate that the optical efficiency for a 10-cm receiver aperture is 25%. Optical efficiency measured in early 1979 was 37%, and in mid 1979 it had degraded to 21%. An optical alignment procedure is described that resulted in the increase in optical efficiency from 21% to the current value of 25%.

  17. Time dependant quantum efficiency and dark current measurements in an RF photocathode injector with a high quantum efficiency cathode

    SciTech Connect

    Fliller, R.P., III; Edwards, H.; Hartung, W.; /Michigan State U., NSCL

    2005-05-01

    Studies of photo-emission and field emission behavior in an RF gun have been carried out. Unexpected phenomena were observed. In situ changes in the cathode's quantum efficiency and dark current with time were seen during operation of the photo-injector. These changes were correlated with the magnetostatic field at the cathode. In addition, multipacting has been observed under certain conditions. Recent measurements indicate a correlation between multipacting and anomalous photo- and field emission behavior.

  18. Measuring method of diffraction efficiency for plane grating based on Fourier spectral technology.

    PubMed

    Ma, Zhenyu; Qi, Xiangdong; Li, Xiaotian; Zhang, Shanwen; Bayanheshig; Yu, Hongzhu; Yu, Haili; Jiao, Qingbin

    2016-01-20

    A traditional double monochromatic measurement instrument of diffraction efficiency for a plane grating involves two major problems: one is the differences of output spectrum bandwidths during measurement of a standard reflection mirror and the tested grating; the other is overlapping of diffracted spectra, which influence testing accuracy of diffraction efficiency. In this paper, a new measuring method of diffraction efficiency based on Fourier spectral technology is presented. The mathematical model of diffraction efficiency is first deduced and then verified by ray tracing and Fourier optics simulation. The influences of the moving cube corner's tilt error, lateral shift error, and maximal moving distance error on the measurement accuracy are analyzed in detail. The analyses provide theoretical references for designing diffraction efficiency instruments. Compared with the traditional diffraction efficiency measurement instrument with double monochromator structure, our method not only improves the measurement accuracy of diffraction efficiency but also has the advantage of high luminous flux, high spectral resolution, multiwavelength measurement in mean time, and high wavenumber accuracy.

  19. School Security Measures and Extracurricular Participation: An Exploratory Multi-Level Analysis

    ERIC Educational Resources Information Center

    Mowen, Thomas J.; Manierre, Matthew J.

    2017-01-01

    Although delinquency in US schools is near historic lows, concern over delinquency in US schools remains a pressing issue among school officials, parents, and policy-makers. Many scholars argue that the current approach to discipline in the United States is highly punitive. While some projects have assessed the effect of punitive security on…

  20. [Security measures in the penal code, in the opinions of expert psychiatrists and some problems in their applications].

    PubMed

    Hajdukiewicz, Danuta

    2006-01-01

    The aim of this paper is to remind expert psychiatrists, the three basic elements required for the application of security measures such as placing the convict in a psychiatric hospital. They are: 1) An act was of serious social damage, 2) the damage was committed in a state of non-liability, 3) there is a high risk of the person repeating the act of similar social damage. The fulfilment of these three is an obligation for the court to apply the security measure of placing the person in a psychiatric hospital (art. 94 section 1 of the penal code). Practice shows that experts have difficulties in these evaluations, which in turn results in faults in directing for placement withoutjust cause, or in turn-there is no directing, even though there are causes for it. There is a huge need for legal regulations on these manners, after the forensic psychiatric observation ends. The non-liable delinquent who committed an act of serious social damage is in risk of committing this act once more, whilst he is not in custody. The issue is in showing a legal basis for keeping the non-liable delinquent from such an act in a psychiatric hospital, in spite of ending the observation, until the legal sentence on the security measure is in place.

  1. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File.

    PubMed

    Gavrilov, Leonid A; Gavrilova, Natalia S

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102-105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  2. Mortality Measurement at Advanced Ages: A Study of the Social Security Administration Death Master File

    PubMed Central

    Gavrilov, Leonid A.; Gavrilova, Natalia S.

    2011-01-01

    Accurate estimates of mortality at advanced ages are essential to improving forecasts of mortality and the population size of the oldest old age group. However, estimation of hazard rates at extremely old ages poses serious challenges to researchers: (1) The observed mortality deceleration may be at least partially an artifact of mixing different birth cohorts with different mortality (heterogeneity effect); (2) standard assumptions of hazard rate estimates may be invalid when risk of death is extremely high at old ages and (3) ages of very old people may be exaggerated. One way of obtaining estimates of mortality at extreme ages is to pool together international records of persons surviving to extreme ages with subsequent efforts of strict age validation. This approach helps researchers to resolve the third of the above-mentioned problems but does not resolve the first two problems because of inevitable data heterogeneity when data for people belonging to different birth cohorts and countries are pooled together. In this paper we propose an alternative approach, which gives an opportunity to resolve the first two problems by compiling data for more homogeneous single-year birth cohorts with hazard rates measured at narrow (monthly) age intervals. Possible ways of resolving the third problem of hazard rate estimation are elaborated. This approach is based on data from the Social Security Administration Death Master File (DMF). Some birth cohorts covered by DMF could be studied by the method of extinct generations. Availability of month of birth and month of death information provides a unique opportunity to obtain hazard rate estimates for every month of age. Study of several single-year extinct birth cohorts shows that mortality trajectory at advanced ages follows the Gompertz law up to the ages 102–105 years without a noticeable deceleration. Earlier reports of mortality deceleration (deviation of mortality from the Gompertz law) at ages below 100 appear to be

  3. Thorough subcells diagnosis in a multi-junction solar cell via absolute electroluminescence-efficiency measurements.

    PubMed

    Chen, Shaoqiang; Zhu, Lin; Yoshita, Masahiro; Mochizuki, Toshimitsu; Kim, Changsu; Akiyama, Hidefumi; Imaizumi, Mitsuru; Kanemitsu, Yoshihiko

    2015-01-16

    World-wide studies on multi-junction (tandem) solar cells have led to record-breaking improvements in conversion efficiencies year after year. To obtain detailed and proper feedback for solar-cell design and fabrication, it is necessary to establish standard methods for diagnosing subcells in fabricated tandem devices. Here, we propose a potential standard method to quantify the detailed subcell properties of multi-junction solar cells based on absolute measurements of electroluminescence (EL) external quantum efficiency in addition to the conventional solar-cell external-quantum-efficiency measurements. We demonstrate that the absolute-EL-quantum-efficiency measurements provide I-V relations of individual subcells without the need for referencing measured I-V data, which is in stark contrast to previous works. Moreover, our measurements quantify the absolute rates of junction loss, non-radiative loss, radiative loss, and luminescence coupling in the subcells, which constitute the "balance sheets" of tandem solar cells.

  4. Use Conditions and Efficiency Measurements of DC Power Optimizers for Photovoltaic Systems: Preprint

    SciTech Connect

    Deline, C.; MacAlpine, S.

    2013-10-01

    No consensus standard exists for estimating annual conversion efficiency of DC-DC converters or power optimizers in photovoltaic (PV) applications. The performance benefits of PV power electronics including per-panel DC-DC converters depend in large part on the operating conditions of the PV system, along with the performance characteristics of the power optimizer itself. This work presents acase study of three system configurations that take advantage of the capabilities of DC power optimizers. Measured conversion efficiencies of DC-DC converters are applied to these scenarios to determine the annual weighted operating efficiency. A simplified general method of reporting weighted efficiency is given, based on the California Energy Commission's CEC efficiency rating and severalinput / output voltage ratios. Efficiency measurements of commercial power optimizer products are presented using the new performance metric, along with a description of the limitations of the approach.

  5. An energy-efficient and secure hybrid algorithm for wireless sensor networks using a mobile data collector

    NASA Astrophysics Data System (ADS)

    Dayananda, Karanam Ravichandran; Straub, Jeremy

    2017-05-01

    This paper proposes a new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches. It uses a mobile data collector (MDC) to collect information in order to save energy of sensor nodes in a wireless sensor network (WSN) as, in most networks, these sensor nodes have limited energy. Wireless sensor networks are prone to security problems because, among other things, it is possible to use a rogue sensor node to eavesdrop on or alter the information being transmitted. To prevent this, this paper introduces a security algorithm for MDC-based WSNs. A key use of this algorithm is to protect the confidentiality of the information sent by the sensor nodes. The sensor nodes are deployed in a random fashion and form group structures called clusters. Each cluster has a cluster head. The cluster head collects data from the other nodes using the time-division multiple access protocol. The sensor nodes send their data to the cluster head for transmission to the base station node for further processing. The MDC acts as an intermediate node between the cluster head and base station. The MDC, using its dynamic acyclic graph path, collects the data from the cluster head and sends it to base station. This approach is useful for applications including warfighting, intelligent building and medicine. To assess the proposed system, the paper presents a comparison of its performance with other approaches and algorithms that can be used for similar purposes.

  6. A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems.

    PubMed

    Mishra, Dheerendra; Srinivas, Jangirala; Mukhopadhyay, Sourav

    2014-10-01

    Advancement in network technology provides new ways to utilize telecare medicine information systems (TMIS) for patient care. Although TMIS usually faces various attacks as the services are provided over the public network. Recently, Jiang et al. proposed a chaotic map-based remote user authentication scheme for TMIS. Their scheme has the merits of low cost and session key agreement using Chaos theory. It enhances the security of the system by resisting various attacks. In this paper, we analyze the security of Jiang et al.'s scheme and demonstrate that their scheme is vulnerable to denial of service attack. Moreover, we demonstrate flaws in password change phase of their scheme. Further, our aim is to propose a new chaos map-based anonymous user authentication scheme for TMIS to overcome the weaknesses of Jiang et al.'s scheme, while also retaining the original merits of their scheme. We also show that our scheme is secure against various known attacks including the attacks found in Jiang et al.'s scheme. The proposed scheme is comparable in terms of the communication and computational overheads with Jiang et al.'s scheme and other related existing schemes. Moreover, we demonstrate the validity of the proposed scheme through the BAN (Burrows, Abadi, and Needham) logic.

  7. Measuring the Immeasurable: Applying Hierarchical Holographic Modeling to Developing Measures of Effectiveness for Stability, Security, Transition, and Reconstruction Operations

    DTIC Science & Technology

    2006-05-16

    and Internally Displaced Persons (IDPs) Judicial Personnel and Infrastructure Trafficking in Persons Property Food Security Legal System Reform...Shelter and Non- Food Relief Human Rights Humanitarian Demining Corrections Public Health War Crime Courts and Tribunals Education Truth...Risk Analysis, 22(2) (2002): 385. 26 Ibid. 27 Ibid. 28 Dombroski, 20. 29 Keith R. Hayes, “Final Report: Inductive Hazard Analysis for GMOs

  8. Transmission Efficiency Measurements and Correlations with Physical Characteristics of the Lubricant

    NASA Technical Reports Server (NTRS)

    Coy, J. J.; Mitchell, A. M.; Hamrock, B. J.

    1984-01-01

    Data from helicopter transmission efficiency tests were compared to physical properties of the eleven lubricants used in those tests. The tests were conducted with the OH-58 helicopter main rotor transmission. Efficiencies ranged from 98.3 to 98.8 percent. The data was examined for correlation of physical properties with efficiency. There was a reasonable correlation of efficiency with absolute viscosity if the viscosity was first corrected for temperature and pressure in the lubricated contact. Between lubricants, efficiency did not correlate well with viscosity at atmospheric pressure. Between lubricants, efficiency did not correlate well with calculated lubricant film forming capacity. Bench type sliding friction and wear measurements could not be correlated to transmission efficiency and component wear.

  9. Measuring the efficiencies of visiting nurse service agencies using data envelopment analysis.

    PubMed

    Kuwahara, Yuki; Nagata, Satoko; Taguchi, Atsuko; Naruse, Takashi; Kawaguchi, Hiroyuki; Murashima, Sachiyo

    2013-09-01

    This study develops a measure of the efficiency of visiting nurse (VN) agencies in Japan, examining the issues related to the measurement of efficiency, and identifying the characteristics that influence efficiency. We have employed a data envelopment analysis to measure the efficiency of 108 VN agencies, using the numbers of 5 types of staff as the input variables and the numbers of 3 types of visits as the output variables. The median efficiency scores of the VN agencies were found to be 0.80 and 1.00 according to the constant returns to scale (CRS) and variable returns to scale (VRS) models, respectively, and the median scale efficiency score was 0.95. This study supports using both the CRS and VRS models to measure the scale efficiency of VN service agencies. We also found that relatively efficient VN agencies filled at least 30 % of staff positions with experienced workers, and so concluded that this characteristic has a direct influence on the length of visits.

  10. Field Measurements of Heating System Efficiency in Nine Electrically-Heated Manufactured Homes.

    SciTech Connect

    Davis, Bob; Siegel, J.; Palmiter, L.; Baylon, D.

    1996-07-01

    This report presents the results of field measurements of heating efficiency performed on nine manufactured homes sited in the Pacific Northwest. The testing procedure collects real-time data on heating system energy use and heating zone temperatures, allowing direct calculation of heating system efficiency.

  11. Quality of Protection Evaluation of Security Mechanisms

    PubMed Central

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol. PMID:25136683

  12. Quality of protection evaluation of security mechanisms.

    PubMed

    Ksiezopolski, Bogdan; Zurek, Tomasz; Mokkas, Michail

    2014-01-01

    Recent research indicates that during the design of teleinformatic system the tradeoff between the systems performance and the system protection should be made. The traditional approach assumes that the best way is to apply the strongest possible security measures. Unfortunately, the overestimation of security measures can lead to the unreasonable increase of system load. This is especially important in multimedia systems where the performance has critical character. In many cases determination of the required level of protection and adjustment of some security measures to these requirements increase system efficiency. Such an approach is achieved by means of the quality of protection models where the security measures are evaluated according to their influence on the system security. In the paper, we propose a model for QoP evaluation of security mechanisms. Owing to this model, one can quantify the influence of particular security mechanisms on ensuring security attributes. The methodology of our model preparation is described and based on it the case study analysis is presented. We support our method by the tool where the models can be defined and QoP evaluation can be performed. Finally, we have modelled TLS cryptographic protocol and presented the QoP security mechanisms evaluation for the selected versions of this protocol.

  13. Field Measurements of Heating Efficiency of Electric Forced-Air Furnaces in Six Manufactured Homes.

    SciTech Connect

    Davis, Bob; Palmiter, Larry S.; Siegel, Jeff

    1994-07-26

    This report presents the results of field measurements of heating efficiency for six manufactured homes in the Pacific Northwest heated with electric forced-air systems. This is the first in a series of regional and national efforts to measure in detail the heating efficiency of manufactured homes. Only six homes were included in this study because of budgetary constraints; therefore this is not a representative sample. These investigations do provide some useful information on the heating efficiency of these homes. Useful comparisons can be drawn between these study homes and site-built heating efficiencies measured with a similar protocol. The protocol used to test these homes is very similar to another Ecotope protocol used in the study conducted in 1992 and 1993 for the Bonneville Power Administration to test the heating efficiency of 24 homes. This protocol combined real-time power measurements of furnace energy usage with energy usage during co-heat periods. Accessory data such as house and duct tightness measurements and tracer gas measurements were used to describe these homes and their heating system efficiency. Ensuring that manufactured housing is constructed in an energy and resource efficient manner is of increasing concern to manufactured home builders and consumers. No comparable work has been done to measure the heating system efficiency of MCS manufactured homes, although some co-heat tests have been performed on manufactured homes heated with natural gas to validate HUD thermal standards. It is expected that later in 1994 more research of this kind will be conducted, and perhaps a less costly and less time-consuming method for testing efficiencies will be develops.

  14. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    PubMed

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  15. Draft Evaluation, Measurement and Verification Guidance for Demand-Side Energy Efficiency

    EPA Pesticide Factsheets

    EPA is sharing draft Evaluation, Measurement and Verification Guidance for Demand-Side Energy Efficiency for public comment. This guidance is not a regulatory document, and is intended to supplement information provided in the Clean Power Plan.

  16. Integrating Energy Efficiency and Renewable Energy Measures in the Air Quality Planning Process

    EPA Pesticide Factsheets

    This guidance provides state and local air quality officials with valuable information on how to incorporate energy efficiency and renewable energy (EE/RE) measures into their air quality plan, also known as the State Implementation Plan (SIP).

  17. Integrating Energy Efficiency and Renewable Energy Measures in the Air Quality Planning Process

    EPA Pesticide Factsheets

    This guidance provides state and local air quality officials with valuable information on how to incorporate energy efficiency and renewable energy (EE/RE) measures into their air quality plan, also known as the State Implementation Plan (SIP).

  18. Comparison of two methods for high purity germanium detector efficiency calibration for charcoal canister radon measurement.

    PubMed

    Nikolic, J; Pantelic, G; Zivanovic, M; Rajacic, M; Todorovic, D

    2014-11-01

    The charcoal canister method of radon measurement according to US Environment Protection Agency protocol 520/5-87-005 is widely used for screening. This method is based on radon adsorption on coal and measurement of gamma radiation of radon daughters. For the purpose of gamma spectrometry, appropriate efficiency calibration of the measuring system must be performed. The most usual method of calibration is using standard canister, a sealed canister with the same matrix and geometry as the canisters used for measurements, but with the known activity of radon. In the absence of standard canister, a different method of efficiency calibration has to be implemented. This study presents the results of efficiency calibration using the EFFTRAN efficiency transfer software. Efficiency was calculated using a soil matrix cylindrical secondary reference material as a starting point. Calculated efficiency is then compared with the one obtained using standard canister and applied to a realistic measurement in order to evaluate the results of the efficiency transfer. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  19. Semiquantum secure direct communication using EPR pairs

    NASA Astrophysics Data System (ADS)

    Zhang, Ming-Hui; Li, Hui-Fang; Xia, Zhao-Qiang; Feng, Xiao-Yi; Peng, Jin-Ye

    2017-05-01

    Quantum secure direct communication can transmit a secret message directly through quantum channels without first generating a shared secret key. In the most of the existing protocols, quantum secure direct communication is possible only when both communicating participants have quantum capabilities. So what happens if either party of two participants just has classical capabilities? In this paper, we propose a semiquantum secure direct communication protocol with Einstein-Podolsky-Rosen photon pairs in which the classical sender Bob transmits a secret message to quantum Alice directly. After checking the security of quantum channels, Bob encodes his secret message on Alice's code sequence. Then, quantum Alice extracts Bob's secret message by measuring her home qubits and the received code qubits, respectively. In addition, we demonstrate the security of the proposed protocol against some individual eavesdropping attacks. The efficiency analysis shows that our protocol can provide higher efficiency.

  20. Food security of older adults requesting Older Americans Act Nutrition Program in Georgia can be validly measured using a short form of the U.S. Household Food Security Survey Module.

    PubMed

    Lee, Jung Sun; Johnson, Mary Ann; Brown, Arvine; Nord, Mark

    2011-07-01

    Food security is a newly recommended outcome measure for the Older Americans Act Nutrition Program (OAANP); however, it is unknown how best to evaluate the need for this program and assess its impact on a large scale. Therefore, we measured food security in all new OAANP participants and waitlisted applicants in Georgia between July and early November, 2008 (n = 4731) with the self-administered mail survey method used in the ongoing Georgia Performance Outcomes Measures project. We used a modified 6-item U.S. Household Food Security Survey Module (HFSSM) with a 30-d reference period and 2 reminder postcards. Approximately 33% of those identified completed the survey (n = 1594, mean age 74.6 ± 9.5 y, 68.6% female, 30.6% black). Most of the respondents (91%) completed all 6 food security questions, whereas 26 did not respond to any question. Infit and outfit statistics for each of the 6 questions were within an acceptable range. Psychometric properties observed in our food security data were generally similar to those in the nationally representative survey conducted by the Census Bureau and suggest that our food security statistics may be meaningfully compared with national food security statistics published by the USDA. Our findings suggest that food security can be reasonably measured by a short form of HFSSM in older adults requesting OAANP. Such methodology also can be used to estimate the extent of food insecurity and help guide program and policy decisions to meet the nutrition assistance needs of vulnerable older adults.